<?xml version="1.0" encoding="UTF-8"?>
<urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9">
    
    <url>
        <loc>https://event.cyberactive.be/contactus</loc>
        <lastmod>2025-01-22</lastmod>
    </url><url>
        <loc>https://event.cyberactive.be/terms</loc>
    </url><url>
        <loc>https://event.cyberactive.be/shop</loc>
    </url><url>
        <loc>https://event.cyberactive.be/</loc>
    </url><url>
        <loc>https://event.cyberactive.be/website/info</loc>
    </url><url>
        <loc>https://event.cyberactive.be/event/learn-to-build-trusted-digital-services-by-stepping-into-application-security-and-devsecops-5</loc>
    </url><url>
        <loc>https://event.cyberactive.be/event/implement-cybersecurity-on-the-connected-shopfloor-10</loc>
    </url><url>
        <loc>https://event.cyberactive.be/event/implementer-la-cybersecurite-au-sein-de-l-atelier-connecte-14</loc>
    </url><url>
        <loc>https://event.cyberactive.be/event/strengthen-resilience-against-phishing-and-targeted-threats-17</loc>
    </url><url>
        <loc>https://event.cyberactive.be/event/fortifier-la-cybersecurite-dans-l-industrie-manufacturiere-3</loc>
    </url><url>
        <loc>https://event.cyberactive.be/event/eerste-stappen-in-nis2-compliance-en-weerbaarheid-tegen-phishing-18</loc>
    </url><url>
        <loc>https://event.cyberactive.be/event/roadmap-to-application-and-cloud-security-9</loc>
    </url><url>
        <loc>https://event.cyberactive.be/event/apprendre-a-developper-des-services-digitaux-de-confiance-en-s-engageant-dans-la-securite-des-applications-et-devsecops-16</loc>
    </url><url>
        <loc>https://event.cyberactive.be/event/implement-cybersecurity-on-the-connected-shopfloor-25</loc>
    </url><url>
        <loc>https://event.cyberactive.be/event/mise-en-place-de-la-conformite-nis2-et-resilience-contre-le-phishing-19</loc>
    </url><url>
        <loc>https://event.cyberactive.be/event/strengthen-resilience-against-phishing-and-targeted-threats-23</loc>
    </url><url>
        <loc>https://event.cyberactive.be/event/fortifier-la-cybersecurite-dans-l-industrie-manufacturiere-20</loc>
    </url><url>
        <loc>https://event.cyberactive.be/event/roadmap-to-application-and-cloud-security-26</loc>
    </url><url>
        <loc>https://event.cyberactive.be/event/eerste-stappen-in-nis2-compliance-en-weerbaarheid-tegen-phishing-24</loc>
    </url><url>
        <loc>https://event.cyberactive.be/event/implementer-la-cybersecurite-au-sein-de-l-atelier-connecte-22</loc>
    </url><url>
        <loc>https://event.cyberactive.be/event/build-resilient-digital-services-guide-to-threat-modeling-and-network-it-security-essentials-29</loc>
    </url><url>
        <loc>https://event.cyberactive.be/event/apprendre-a-developper-des-services-digitaux-de-confiance-en-s-engageant-dans-la-securite-des-applications-et-devsecops-27</loc>
    </url><url>
        <loc>https://event.cyberactive.be/event/roadmap-to-application-and-cloud-security-32</loc>
    </url><url>
        <loc>https://event.cyberactive.be/event/strengthen-resilience-against-phishing-and-targeted-threats-31</loc>
    </url><url>
        <loc>https://event.cyberactive.be/event/mise-en-place-de-la-conformite-nis2-et-resilience-contre-le-phishing-30</loc>
    </url><url>
        <loc>https://event.cyberactive.be/event/securiser-votre-activite-de-production-strategies-et-bonnes-pratiques-pour-la-gestion-des-mots-de-passe-et-le-controle-d-acces-45</loc>
    </url><url>
        <loc>https://event.cyberactive.be/event/roadmap-to-application-and-cloud-security-44</loc>
    </url><url>
        <loc>https://event.cyberactive.be/event/apprendre-a-developper-des-services-digitaux-de-confiance-en-s-engageant-dans-la-securite-des-applications-et-devsecops-47</loc>
    </url><url>
        <loc>https://event.cyberactive.be/event/nis2-quel-impact-et-quelles-actions-pour-les-pme-manufacturieres-guide-d-achat-equipements-connectes-50</loc>
    </url><url>
        <loc>https://event.cyberactive.be/event/strenghten-resilience-against-phishing-and-targeted-threats-49</loc>
    </url><url>
        <loc>https://event.cyberactive.be/event/building-trust-in-digital-services-from-application-security-to-devsecops-54</loc>
    </url><url>
        <loc>https://event.cyberactive.be/event/secure-your-shopfloor-introduction-to-cybersecurity-52</loc>
    </url><url>
        <loc>https://event.cyberactive.be/event/fortifier-la-cybersecurite-dans-l-industrie-manufacturiere-56</loc>
    </url><url>
        <loc>https://event.cyberactive.be/event/cybersecurity-for-digital-services-practical-insights-for-nis2-with-cyfun-61</loc>
    </url><url>
        <loc>https://event.cyberactive.be/event/secure-your-shopfloor-introduction-to-cybersecurity-65</loc>
    </url><url>
        <loc>https://event.cyberactive.be/event/secure-your-shopfloor-introduction-to-cybersecurity-70</loc>
    </url><url>
        <loc>https://event.cyberactive.be/event/roadmap-to-application-and-cloud-security-63</loc>
    </url><url>
        <loc>https://event.cyberactive.be/event/practical-insights-for-nis2-with-cyfun-72</loc>
    </url><url>
        <loc>https://event.cyberactive.be/event/build-resilient-digital-services-guide-to-network-it-security-essentials-76</loc>
    </url><url>
        <loc>https://event.cyberactive.be/event/build-resilient-digital-services-learning-trajectory-88</loc>
    </url><url>
        <loc>https://event.cyberactive.be/event/nis2-decryptage-et-actions-concretes-86</loc>
    </url><url>
        <loc>https://event.cyberactive.be/event/make-your-ai-systems-safe-secure-75</loc>
    </url><url>
        <loc>https://event.cyberactive.be/event/build-resilient-digital-services-guide-to-threat-modeling-77</loc>
    </url><url>
        <loc>https://event.cyberactive.be/event/build-resilient-digital-services-application-security-81</loc>
    </url><url>
        <loc>https://event.cyberactive.be/event/build-resilient-digital-services-make-your-ai-systems-safe-secure-71</loc>
    </url><url>
        <loc>https://event.cyberactive.be/event/build-resilient-digital-services-devsecops-82</loc>
    </url><url>
        <loc>https://event.cyberactive.be/event/build-resilient-digital-services-practical-insights-for-nis2-with-cyfun-79</loc>
    </url><url>
        <loc>https://event.cyberactive.be/event/build-resilient-digital-services-how-to-start-with-nis2-compliance-83</loc>
    </url><url>
        <loc>https://event.cyberactive.be/event/build-resilient-digital-services-roadmap-to-cloud-security-80</loc>
    </url><url>
        <loc>https://event.cyberactive.be/event/make-your-ai-systems-safe-secure-73</loc>
    </url><url>
        <loc>https://event.cyberactive.be/event/build-resilient-digital-services-supply-chain-security-84</loc>
    </url><url>
        <loc>https://event.cyberactive.be/event/make-your-ai-systems-safe-secure-74</loc>
    </url><url>
        <loc>https://event.cyberactive.be/event/practical-insights-for-nis2-with-cyfun-100</loc>
    </url><url>
        <loc>https://event.cyberactive.be/event/ot-security-essentials-for-manufacturing-smes-lunch-learn-trajectory-97</loc>
    </url><url>
        <loc>https://event.cyberactive.be/event/nis2-and-supply-chain-security-lunch-learn-trajectory-94</loc>
    </url><url>
        <loc>https://event.cyberactive.be/event/nis2-cybersecurite-l-essentiel-pour-dirigeants-et-administrateurs-98</loc>
    </url><url>
        <loc>https://event.cyberactive.be/event/nis2-cybersecurity-an-essential-briefing-for-management-board-members-102</loc>
    </url><url>
        <loc>https://event.cyberactive.be/event/make-your-ai-systems-safe-secure-93</loc>
    </url><url>
        <loc>https://event.cyberactive.be/event/nis2-cybersecurite-l-essentiel-pour-dirigeants-et-administrateurs-103</loc>
    </url><url>
        <loc>https://event.cyberactive.be/event/nis2-compliance-in-het-tijdperk-van-ai-106</loc>
    </url><url>
        <loc>https://event.cyberactive.be/event/nis2-compliance-in-the-age-of-ai-105</loc>
    </url><url>
        <loc>https://event.cyberactive.be/event/securiser-l-industrie-guide-ot-it-contre-les-menaces-109</loc>
    </url><url>
        <loc>https://event.cyberactive.be/event/build-resilient-digital-services-lunch-learn-trajectory-108</loc>
    </url><url>
        <loc>https://event.cyberactive.be/event/guide-to-threat-modeling-and-network-it-security-essentials-112</loc>
    </url><url>
        <loc>https://event.cyberactive.be/event/nis2-cybersecurity-an-essential-briefing-for-management-board-members-107</loc>
    </url><url>
        <loc>https://event.cyberactive.be/event/securiser-votre-activite-de-production-strategies-et-bonnes-pratiques-pour-la-gestion-des-mots-de-passe-et-le-controle-d-acces-110</loc>
    </url><url>
        <loc>https://event.cyberactive.be/event/nis2-compliance-in-the-age-of-ai-111</loc>
    </url><url>
        <loc>https://event.cyberactive.be/event/nis2-cybersecurity-an-essential-briefing-for-management-board-members-116</loc>
    </url><url>
        <loc>https://event.cyberactive.be/event/nis2-cybersecurite-l-essentiel-pour-dirigeants-et-administrateurs-113</loc>
    </url><url>
        <loc>https://event.cyberactive.be/event/nis2-cybersecurity-an-essential-briefing-for-management-board-members-117</loc>
    </url><url>
        <loc>https://event.cyberactive.be/event/nis2-cybersecurite-l-essentiel-pour-dirigeants-et-administrateurs-115</loc>
    </url><url>
        <loc>https://event.cyberactive.be/event/nis2-cybersecurite-l-essentiel-pour-dirigeants-et-administrateurs-120</loc>
    </url><url>
        <loc>https://event.cyberactive.be/event/implement-cybersecurity-on-the-connected-shopfloor-122</loc>
    </url><url>
        <loc>https://event.cyberactive.be/event/nis2-cybersecurity-an-essential-briefing-for-management-board-members-118</loc>
    </url><url>
        <loc>https://event.cyberactive.be/event/nis2-cybersecurite-l-essentiel-pour-dirigeants-et-administrateurs-121</loc>
    </url><url>
        <loc>https://event.cyberactive.be/event/practical-insights-for-nis2-with-cyfun-124</loc>
    </url><url>
        <loc>https://event.cyberactive.be/event/nis2-cybersecurity-an-essential-briefing-for-management-board-members-119</loc>
    </url><url>
        <loc>https://event.cyberactive.be/events</loc>
    </url>
</urlset>