<?xml version="1.0" encoding="UTF-8"?><?xml-stylesheet type="text/xsl" href="//ki-acora.s.nomatter.dev/main-sitemap.xsl"?>
<urlset xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xmlns:image="http://www.google.com/schemas/sitemap-image/1.1" xsi:schemaLocation="http://www.sitemaps.org/schemas/sitemap/0.9 http://www.sitemaps.org/schemas/sitemap/0.9/sitemap.xsd http://www.google.com/schemas/sitemap-image/1.1 http://www.google.com/schemas/sitemap-image/1.1/sitemap-image.xsd" xmlns="http://www.sitemaps.org/schemas/sitemap/0.9">
	<url>
		<loc>https://ki-acora.s.nomatter.dev/insights/deploying-the-user-experience/</loc>
		<lastmod>2024-11-12T11:43:05+00:00</lastmod>
		<image:image>
			<image:loc>https://static.acora.com/app/uploads/2022/06/deploying-the-user-experience.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://ki-acora.s.nomatter.dev/insights/bringing-the-it-experience-to-life/</loc>
		<lastmod>2024-11-12T11:50:19+00:00</lastmod>
		<image:image>
			<image:loc>https://static.acora.com/app/uploads/2022/04/Bringing-it-experience-to-life.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://ki-acora.s.nomatter.dev/insights/keeping-up-with-endpoint-threats/</loc>
		<lastmod>2024-11-12T11:55:38+00:00</lastmod>
		<image:image>
			<image:loc>https://static.acora.com/app/uploads/2024/10/keeping-up-with-endpoint-threats.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://ki-acora.s.nomatter.dev/insights/service-desk-outsourcing-what-to-consider/</loc>
		<lastmod>2024-11-12T12:04:36+00:00</lastmod>
		<image:image>
			<image:loc>https://static.acora.com/app/uploads/2024/10/service-desk-outsourcing.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://ki-acora.s.nomatter.dev/insights/the-acora-cio-2021-survey-report/</loc>
		<lastmod>2024-11-12T12:10:38+00:00</lastmod>
		<image:image>
			<image:loc>https://static.acora.com/app/uploads/2024/10/acora-cio-report-2021-covid19.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://ki-acora.s.nomatter.dev/insights/cyber-security-buyers-guide/</loc>
		<lastmod>2024-11-14T21:11:35+00:00</lastmod>
		<image:image>
			<image:loc>https://static.acora.com/app/uploads/2024/08/cyber-security-buyers-guide-1.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://ki-acora.s.nomatter.dev/insights/forward-thinking-with-data-insights-ebook/</loc>
		<lastmod>2024-11-14T21:14:46+00:00</lastmod>
		<image:image>
			<image:loc>https://static.acora.com/app/uploads/2024/10/forward-thinking-with-data-insights.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://ki-acora.s.nomatter.dev/insights/10-top-tips-to-ma-it-integration-success/</loc>
		<lastmod>2024-11-14T21:15:34+00:00</lastmod>
		<image:image>
			<image:loc>https://static.acora.com/app/uploads/2024/10/mergers-and-acquisitions-guide.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://ki-acora.s.nomatter.dev/insights/introducing-our-new-group-cto/</loc>
		<lastmod>2024-12-06T09:54:42+00:00</lastmod>
		<image:image>
			<image:loc>https://static.acora.com/app/uploads/2024/12/CTO-Header-Insight.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://ki-acora.s.nomatter.dev/insights/a-guide-to-slas-xlas-and-everything-in-between/</loc>
		<lastmod>2024-12-09T16:54:17+00:00</lastmod>
		<image:image>
			<image:loc>https://static.acora.com/app/uploads/2024/01/ultimate-guide-sla-xla-1.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://ki-acora.s.nomatter.dev/insights/ai-predictions-2025/</loc>
		<lastmod>2025-01-22T09:24:16+00:00</lastmod>
		<image:image>
			<image:loc>https://static.acora.com/app/uploads/2025/01/Group-CTOs-AI-Predictions-2025.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://ki-acora.s.nomatter.dev/insights/prominent-financial-institutions-adopting-ai-setting-new-benchmarks/</loc>
		<lastmod>2025-02-07T11:08:00+00:00</lastmod>
		<image:image>
			<image:loc>https://static.acora.com/app/uploads/2025/02/FS-Benchmarks-in-AI-Adoption.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://ki-acora.s.nomatter.dev/insights/disruptive-technologies-in-business-genai-knowledge-work/</loc>
		<lastmod>2025-02-14T09:52:13+00:00</lastmod>
		<image:image>
			<image:loc>https://static.acora.com/app/uploads/2024/10/Disruptive-Technology-GenAI-Knowledge-Work.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://ki-acora.s.nomatter.dev/insights/workday-optimisation-with-genai-a-chief-ai-officers-toolkit/</loc>
		<lastmod>2025-02-14T09:55:07+00:00</lastmod>
		<image:image>
			<image:loc>https://static.acora.com/app/uploads/2024/09/AI-workplace-optimisation-toolkit.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://ki-acora.s.nomatter.dev/insights/harnessing-data-and-ai-real-world-use-cases/</loc>
		<lastmod>2025-02-14T09:58:07+00:00</lastmod>
		<image:image>
			<image:loc>https://static.acora.com/app/uploads/2024/10/Harnessing-Data-and-AI.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://ki-acora.s.nomatter.dev/insights/a-guide-to-successful-cyber-security-and-it-projects-and-why-they-fail/</loc>
		<lastmod>2025-02-14T10:02:15+00:00</lastmod>
		<image:image>
			<image:loc>https://static.acora.com/app/uploads/2024/10/a-guide-to-why-it-projects-fail.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://ki-acora.s.nomatter.dev/insights/managed-cloud-services-an-expert-guide/</loc>
		<lastmod>2025-02-14T10:04:39+00:00</lastmod>
		<image:image>
			<image:loc>https://static.acora.com/app/uploads/2024/08/managed-cloud-service-expert-guide-2.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://ki-acora.s.nomatter.dev/insights/aligning-security-with-business-objectives/</loc>
		<lastmod>2025-02-14T10:05:02+00:00</lastmod>
		<image:image>
			<image:loc>https://static.acora.com/app/uploads/2024/10/simon-crumplin-podcast.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://ki-acora.s.nomatter.dev/insights/be-dora-ready-dora-compliance-checklist/</loc>
		<lastmod>2025-02-14T10:08:40+00:00</lastmod>
		<image:image>
			<image:loc>https://static.acora.com/app/uploads/2024/06/dora-compliance-checklist-be-dora-ready.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://ki-acora.s.nomatter.dev/insights/cyber-predictions-for-2025-and-beyond/</loc>
		<lastmod>2025-02-14T11:25:31+00:00</lastmod>
		<image:image>
			<image:loc>https://static.acora.com/app/uploads/2024/12/CISO-nary-Visions-2025-and-beyond-1.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://ki-acora.s.nomatter.dev/insights/threat-insight-and-the-evolving-ciso-role/</loc>
		<lastmod>2025-02-14T15:17:12+00:00</lastmod>
		<image:image>
			<image:loc>https://static.acora.com/app/uploads/2025/01/Threats-Evolving-CISO-Role.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://ki-acora.s.nomatter.dev/insights/the-identity-shift/</loc>
		<lastmod>2025-03-11T13:28:13+00:00</lastmod>
		<image:image>
			<image:loc>https://static.acora.com/app/uploads/2024/12/Legacy-Identity-Shift-Acora-Silverfort-1.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://ki-acora.s.nomatter.dev/insights/celebrating-neurodiversity-in-the-workplace/</loc>
		<lastmod>2025-03-18T13:22:34+00:00</lastmod>
		<image:image>
			<image:loc>https://static.acora.com/app/uploads/2025/03/shutterstock_2414402329-Copy-scaled.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://ki-acora.s.nomatter.dev/insights/building-layered-security-and-proactive-threat-detection/</loc>
		<lastmod>2025-03-18T15:25:55+00:00</lastmod>
		<image:image>
			<image:loc>https://static.acora.com/app/uploads/2025/02/Understanding-Risk-Levels-Layered-Security.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://ki-acora.s.nomatter.dev/insights/acora-cio-report-2023/</loc>
		<lastmod>2025-03-26T07:40:25+00:00</lastmod>
		<image:image>
			<image:loc>https://static.acora.com/app/uploads/2024/10/2023-cio-report.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://ki-acora.s.nomatter.dev/insights/the-acora-cio-report-2022/</loc>
		<lastmod>2025-03-26T07:41:52+00:00</lastmod>
		<image:image>
			<image:loc>https://static.acora.com/app/uploads/2024/10/acora-2022-cio-report.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://ki-acora.s.nomatter.dev/insights/2020-cio-survey/</loc>
		<lastmod>2025-03-26T16:06:10+00:00</lastmod>
		<image:image>
			<image:loc>https://static.acora.com/app/uploads/2024/10/2020-cio-report.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://ki-acora.s.nomatter.dev/insights/managed-soc-an-expert-guide/</loc>
		<lastmod>2025-04-17T11:27:55+00:00</lastmod>
		<image:image>
			<image:loc>https://static.acora.com/app/uploads/2024/10/an-expert-guide-to-managed-soc-main.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://ki-acora.s.nomatter.dev/insights/evolving-roles-in-the-age-of-ai-the-future-of-the-c-suite/</loc>
		<lastmod>2025-05-22T11:07:02+00:00</lastmod>
		<image:image>
			<image:loc>https://static.acora.com/app/uploads/2025/04/Evolving-roles.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://ki-acora.s.nomatter.dev/insights/driving-ai-conversations-that-deliver-real-business-value/</loc>
		<lastmod>2025-06-05T16:47:15+00:00</lastmod>
		<image:image>
			<image:loc>https://static.acora.com/app/uploads/2025/05/Driving-AI-Conversations-That-Deliver-Real-Business-Value.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://ki-acora.s.nomatter.dev/insights/how-ai-tools-are-changing-the-nature-of-cyber-attacks/</loc>
		<lastmod>2025-10-09T12:15:27+00:00</lastmod>
		<image:image>
			<image:loc>https://static.acora.com/app/uploads/2025/09/automated-ai-cyber-attack-header.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://ki-acora.s.nomatter.dev/insights/how-to-measure-the-business-impact-of-ai-services/</loc>
		<lastmod>2025-10-09T12:15:31+00:00</lastmod>
		<image:image>
			<image:loc>https://static.acora.com/app/uploads/2025/08/How-To-Measure-The-Business-Impact-Of-AI-Services2-1.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://ki-acora.s.nomatter.dev/insights/shifting-left-how-to-align-dev-it-and-cyber/</loc>
		<lastmod>2025-10-09T12:15:31+00:00</lastmod>
		<image:image>
			<image:loc>https://static.acora.com/app/uploads/2025/09/How-to-Align-Dev-IT-and-Cyber2.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://ki-acora.s.nomatter.dev/insights/rethinking-it-strategy-in-the-age-of-genai/</loc>
		<lastmod>2025-10-09T12:15:32+00:00</lastmod>
		<image:image>
			<image:loc>https://static.acora.com/app/uploads/2025/07/Rethinking-IT-Strategy-In-The-Age-Of-Generative-AI-Banner.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://ki-acora.s.nomatter.dev/insights/how-to-use-data-platform-services-for-growth/</loc>
		<lastmod>2025-10-09T12:15:33+00:00</lastmod>
		<image:image>
			<image:loc>https://static.acora.com/app/uploads/2025/08/How-to-Use-Data-Platform-Services-for-Growth.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://ki-acora.s.nomatter.dev/insights/structured-data-vs-unstructured-data/</loc>
		<lastmod>2025-10-09T12:15:34+00:00</lastmod>
		<image:image>
			<image:loc>https://static.acora.com/app/uploads/2025/07/Structured-Data-vs-Unstructured-Data2.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://ki-acora.s.nomatter.dev/insights/a-strategic-cyber-security-approach-the-key-to-cyber-resilience/</loc>
		<lastmod>2025-10-09T12:15:36+00:00</lastmod>
		<image:image>
			<image:loc>https://static.acora.com/app/uploads/2025/02/Risk-Vs-Threat-Approach-to-Cyber-Resilience-3.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://ki-acora.s.nomatter.dev/insights/ai-needs-data-but-is-your-data-ready-for-ai/</loc>
		<lastmod>2025-10-23T14:20:04+00:00</lastmod>
		<image:image>
			<image:loc>https://static.acora.com/app/uploads/2025/09/data-needs-ai.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://ki-acora.s.nomatter.dev/insights/why-ransomware-groups-are-now-targeting-critical-infrastructure/</loc>
		<lastmod>2025-11-11T12:47:43+00:00</lastmod>
		<image:image>
			<image:loc>https://static.acora.com/app/uploads/2025/10/critical-infrastructure-cyber.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://ki-acora.s.nomatter.dev/insights/ai-data-privacy-laws-how-businesses-can-stay-on-the-right-side-of-regulation/</loc>
		<lastmod>2025-11-27T13:54:22+00:00</lastmod>
		<image:image>
			<image:loc>https://static.acora.com/app/uploads/2025/11/offside-flag-data-ai-privacy-1.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://ki-acora.s.nomatter.dev/insights/the-new-blueprint-for-agentic-ai-mastering-the-leap-from-gpt-to-guided-agents/</loc>
		<lastmod>2025-12-09T14:15:54+00:00</lastmod>
		<image:image>
			<image:loc>https://static.acora.com/app/uploads/2025/12/Agentic-AI-Blueprint.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://ki-acora.s.nomatter.dev/insights/creating-a-step-change-in-it-experience/</loc>
		<lastmod>2025-12-22T12:00:32+00:00</lastmod>
		<image:image>
			<image:loc>https://static.acora.com/app/uploads/2022/03/Creating-a-step-change-in-it-experience.jpg</image:loc>
		</image:image>
	</url>
</urlset>
<!-- XML Sitemap generated by Yoast SEO -->