<?xml version="1.0" encoding="UTF-8"?>
<urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9" xmlns:image="http://www.google.com/schemas/sitemap-image/1.1" xmlns:xhtml="http://www.w3.org/1999/xhtml" xmlns:video="http://www.google.com/schemas/sitemap-video/1.1">
  <url>
    <loc>https://www.trustedci.org/2018-agenda-day1</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2018-06-25</lastmod>
  </url>
  <url>
    <loc>https://www.trustedci.org/2018-agenda-day1/2018/6/25/sessions-end</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2018-08-17</lastmod>
  </url>
  <url>
    <loc>https://www.trustedci.org/2018-agenda-day1/2018/8/21/training-sessions-resume-1</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2018-08-17</lastmod>
  </url>
  <url>
    <loc>https://www.trustedci.org/2018-agenda-day1/2018/8/21/coffee-break-1</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2018-08-17</lastmod>
  </url>
  <url>
    <loc>https://www.trustedci.org/2018-agenda-day1/2018/8/21/afternoon-training-sessions-begin-and-all-day-training-sessions-resume</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2018-08-17</lastmod>
  </url>
  <url>
    <loc>https://www.trustedci.org/2018-agenda-day1/2018/8/21/lunch-provided</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2018-08-17</lastmod>
  </url>
  <url>
    <loc>https://www.trustedci.org/2018-agenda-day1/2018/8/21/training-sessions-resume</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2018-08-17</lastmod>
  </url>
  <url>
    <loc>https://www.trustedci.org/2018-agenda-day1/2018/8/21/coffee-break</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2018-08-17</lastmod>
  </url>
  <url>
    <loc>https://www.trustedci.org/2018-agenda-day1/2018/8/21/morning-and-all-day-training-sessions-begin</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2018-08-17</lastmod>
  </url>
  <url>
    <loc>https://www.trustedci.org/2018-agenda-day1/2018/8/21/registration-and-continental-breakfast</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2018-08-17</lastmod>
  </url>
  <url>
    <loc>https://www.trustedci.org/2018-agenda-day3</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2018-08-17</lastmod>
  </url>
  <url>
    <loc>https://www.trustedci.org/2018-agenda-day3/2018/8/23/evidence-based-cybersecurity</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2018-08-17</lastmod>
  </url>
  <url>
    <loc>https://www.trustedci.org/2018-agenda-day3/2018/8/23/adjourn</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2018-08-17</lastmod>
  </url>
  <url>
    <loc>https://www.trustedci.org/2018-agenda-day3/2018/8/23/open-discussion-summary-of-summit-findings</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2018-08-17</lastmod>
  </url>
  <url>
    <loc>https://www.trustedci.org/2018-agenda-day3/2018/8/23/the-applicability-of-hpc-for-cyber-situational-awareness</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2018-08-17</lastmod>
  </url>
  <url>
    <loc>https://www.trustedci.org/2018-agenda-day3/2018/8/23/coffee-break</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2018-08-17</lastmod>
  </url>
  <url>
    <loc>https://www.trustedci.org/2018-agenda-day3/2018/8/23/panel-cloud-security-nsf-partnerships-with-cloud-providers</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2018-08-17</lastmod>
  </url>
  <url>
    <loc>https://www.trustedci.org/2018-agenda-day3/2018/8/23/keynote-2-marjory-blumenthal</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2018-08-17</lastmod>
  </url>
  <url>
    <loc>https://www.trustedci.org/2018-agenda-day3/2018/8/23/sign-in-and-continental-breakfast</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2018-08-17</lastmod>
  </url>
  <url>
    <loc>https://www.trustedci.org/2018-agenda-day2</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2018-08-17</lastmod>
  </url>
  <url>
    <loc>https://www.trustedci.org/2018-agenda-day2/2018/8/22/xsede-lessons-learned</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2018-08-17</lastmod>
  </url>
  <url>
    <loc>https://www.trustedci.org/2018-agenda-day2/2018/8/22/dismissal</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2018-08-17</lastmod>
  </url>
  <url>
    <loc>https://www.trustedci.org/2018-agenda-day2/2018/8/22/open-discussion-summary-of-the-days-findings</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2018-08-17</lastmod>
  </url>
  <url>
    <loc>https://www.trustedci.org/2018-agenda-day2/2018/8/22/finding-your-way-in-the-dark-security-from-first-principles</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2018-08-17</lastmod>
  </url>
  <url>
    <loc>https://www.trustedci.org/2018-agenda-day2/2018/8/22/beyond-the-beltway-the-problems-with-nists-approaches-to-cybersecurity-and-alternatives-for-nsf-science</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2018-08-17</lastmod>
  </url>
  <url>
    <loc>https://www.trustedci.org/2018-agenda-day2/2018/8/22/coffee-break-1</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2018-08-17</lastmod>
  </url>
  <url>
    <loc>https://www.trustedci.org/2018-agenda-day2/2018/6/25/panel-strategies-to-develop-a-diverse-and-inclusive-cybersecurity-pipeline</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2018-08-17</lastmod>
  </url>
  <url>
    <loc>https://www.trustedci.org/2018-agenda-day2/2018/8/22/htcondor</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2018-08-17</lastmod>
  </url>
  <url>
    <loc>https://www.trustedci.org/2018-agenda-day2/2018/8/22/lunch-and-table-topics</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2018-08-22</lastmod>
  </url>
  <url>
    <loc>https://www.trustedci.org/2018-agenda-day2/2018/8/22/cornell-red-cloud-campus-based-hybrid-cloud-computing</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2018-08-17</lastmod>
  </url>
  <url>
    <loc>https://www.trustedci.org/2018-agenda-day2/2018/6/25/from-bare-metal-to-virtual-lessons-learned-when-a-supercomputing-institute-deploys-its-first-cloud</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2018-08-17</lastmod>
  </url>
  <url>
    <loc>https://www.trustedci.org/2018-agenda-day2/2018/8/22/coffee-break</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2018-08-17</lastmod>
  </url>
  <url>
    <loc>https://www.trustedci.org/2018-agenda-day2/2018/8/22/keynote-1-jeff-spies</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2018-08-17</lastmod>
  </url>
  <url>
    <loc>https://www.trustedci.org/2018-agenda-day2/2018/6/25/welcome-and-nsf-address</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2018-08-17</lastmod>
  </url>
  <url>
    <loc>https://www.trustedci.org/2018-agenda-day2/2018/8/22/sign-in-and-continental-breakfast</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2018-08-17</lastmod>
  </url>
  <url>
    <loc>https://www.trustedci.org/trusted-ci-pod</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2025-09-15</lastmod>
  </url>
  <url>
    <loc>https://www.trustedci.org/trusted-ci-pod/2025/8/10/august-2025-securing-medical-imaging-ai-models-against-adversarial-attacks</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-08-25</lastmod>
  </url>
  <url>
    <loc>https://www.trustedci.org/trusted-ci-pod/2025/7/28/july-2025-tippss-to-improve-trust-identity-privacy-protection-safety-and-security-for-cyberphysical-systems</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-07-28</lastmod>
  </url>
  <url>
    <loc>https://www.trustedci.org/trusted-ci-pod/2025/6/23/june-2025-towards-practical-confidential-high-performance-computing</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-06-23</lastmod>
  </url>
  <url>
    <loc>https://www.trustedci.org/trusted-ci-pod/2025/5/2/may-2025-conducting-responsible-human-centered-ai-research</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-05-19</lastmod>
  </url>
  <url>
    <loc>https://www.trustedci.org/trusted-ci-pod/2025/3/17/march-2025-the-operational-technology-procurement-vendor-matrix</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-03-31</lastmod>
  </url>
  <url>
    <loc>https://www.trustedci.org/trusted-ci-pod/2025/2/4/february-2025-trusted-volunteer-edge-cloud-computing-for-scientific-workflows</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-02-24</lastmod>
  </url>
  <url>
    <loc>https://www.trustedci.org/trusted-ci-pod/2025/1/16/january-2025-a-unified-monitoring-approach-to-enhancing-the-security-and-resiliency-of-hazard-workflows</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2025-01-27</lastmod>
  </url>
  <url>
    <loc>https://www.trustedci.org/trusted-ci-pod/2024/11/18/november-2024-privacy-preserving-aggregate-range-queries-on-encrypted-multi-dimensional-databases</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2024-11-18</lastmod>
  </url>
  <url>
    <loc>https://www.trustedci.org/trusted-ci-pod/2024/8/14/august-2024-json-web-tokens-for-science-hands-on-jupyter-notebook-tutorial</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2024-08-26</lastmod>
  </url>
  <url>
    <loc>https://www.trustedci.org/trusted-ci-pod/2024/7/16/july-2024-automated-building-and-deploy-testing-using-zeek-as-an-example</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2024-07-22</lastmod>
  </url>
  <url>
    <loc>https://www.trustedci.org/trusted-ci-pod/2024/6/21/june-2024-the-transformative-twelve-taking-a-practical-evidence-based-approach-to-cybersecurity-controls</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2024-06-24</lastmod>
  </url>
  <url>
    <loc>https://www.trustedci.org/trusted-ci-pod/2024/5/3/may-2024-nsfs-2025-research-infrastructure-guide-information-assurance</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2024-05-20</lastmod>
  </url>
  <url>
    <loc>https://www.trustedci.org/trusted-ci-pod/2024/4/9/april-2024-sphere-security-and-privacy-heterogeneous-environment-for-reproducible-experimentation</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2024-06-21</lastmod>
  </url>
  <url>
    <loc>https://www.trustedci.org/trusted-ci-pod/2024/3/14/march-2024-lessons-from-the-accord-project</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2024-06-21</lastmod>
  </url>
  <url>
    <loc>https://www.trustedci.org/trusted-ci-pod/2023/11/30/december-2023-open-science-chain</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2024-06-21</lastmod>
  </url>
  <url>
    <loc>https://www.trustedci.org/trusted-ci-pod/2023/9/13/september-2023-improving-the-privacy-and-security-of-data-for-wastewater-based-epidemiology</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2024-06-21</lastmod>
  </url>
  <url>
    <loc>https://www.trustedci.org/trusted-ci-pod/2023/8/9/august-2023-leveraging-adaptive-framework-for-open-source-data-access-solutions</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2024-06-21</lastmod>
  </url>
  <url>
    <loc>https://www.trustedci.org/trusted-ci-pod/2023/7/17/july-2023-the-technical-landscape-of-ransomware-threat-models-and-defense-models</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2024-06-21</lastmod>
  </url>
  <url>
    <loc>https://www.trustedci.org/trusted-ci-pod/2023/6/26/june-2023-securemyresearch-at-indiana-university-effective-cybersecurity-for-research</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2024-06-21</lastmod>
  </url>
  <url>
    <loc>https://www.trustedci.org/trusted-ci-pod/2023/5/22/may-2023-senior-citizens-striking-back-at-scammers</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2024-06-21</lastmod>
  </url>
  <url>
    <loc>https://www.trustedci.org/trusted-ci-pod/2023/4/24/april-2023-cybersecurity-operations-for-the-nsf-access-cyberinfrastructure</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2024-06-21</lastmod>
  </url>
  <url>
    <loc>https://www.trustedci.org/trusted-ci-pod/2023/3/27/march-2023-the-internet2-routing-integrity-initiative</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2024-06-21</lastmod>
  </url>
  <url>
    <loc>https://www.trustedci.org/trusted-ci-pod/2023/2/27/february-2023-using-the-trusted-ci-framework-to-create-the-cfde-cybersecurity-program</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2024-06-21</lastmod>
  </url>
  <url>
    <loc>https://www.trustedci.org/trusted-ci-pod/2023/1/23/january-2023-improving-the-security-of-open-source-software-infrastructure</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2024-06-21</lastmod>
  </url>
  <url>
    <loc>https://www.trustedci.org/trusted-ci-pod/2022/12/5/december-2022-science-dmz-engagement-with-university-of-arkansas</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2024-06-21</lastmod>
  </url>
  <url>
    <loc>https://www.trustedci.org/trusted-ci-pod/2022/9/26/september-2022-lowering-the-barrier-to-entry-for-regulated-research-through-community-building</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2024-06-21</lastmod>
  </url>
  <url>
    <loc>https://www.trustedci.org/trusted-ci-pod/2022/8/22/august-2022-cis-controls-with-trusted-ci</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2024-06-21</lastmod>
  </url>
  <url>
    <loc>https://www.trustedci.org/trusted-ci-pod/2022/6/27/june-2021-ransomware-threats-amp-mitigations-with-ren-isac</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2024-06-21</lastmod>
  </url>
  <url>
    <loc>https://www.trustedci.org/trusted-ci-pod/2022/4/25/apr-2022-updates-from-the-trusted-ci-framework-cohort</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2024-06-21</lastmod>
  </url>
  <url>
    <loc>https://www.trustedci.org/trusted-ci-pod/2022/2/28/feb-2022-the-results-of-the-trusted-ci-annual-challenge-on-software</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2024-06-21</lastmod>
  </url>
  <url>
    <loc>https://www.trustedci.org/trusted-ci-pod/2022/1/24/jan-2022-populating-the-hecvat-as-an-academic-research-provider-representing-your-security-posture-for-your-higher-ed-information-security-partners</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2024-06-21</lastmod>
  </url>
  <url>
    <loc>https://www.trustedci.org/trusted-ci-pod/2021/12/6/dec-2021-lessons-learned-from-a-real-world-ransomware-attack-on-researchers-at-msu</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2024-06-21</lastmod>
  </url>
  <url>
    <loc>https://www.trustedci.org/trusted-ci-pod/2021/10/25/oct-2021-the-trusted-ci-framework-overview-and-recent-developments</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2024-06-21</lastmod>
  </url>
  <url>
    <loc>https://www.trustedci.org/trusted-ci-pod/2021/9/27/sep-2021-q-factor-real-time-data-transfer-optimization</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2024-06-21</lastmod>
  </url>
  <url>
    <loc>https://www.trustedci.org/trusted-ci-pod/2021/8/30/aug-2021-ncsa-experience-with-soc2-in-the-research-computing-space</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2024-06-21</lastmod>
  </url>
  <url>
    <loc>https://www.trustedci.org/trusted-ci-pod/2021/7/26/july-2021-a-capability-based-authorization-infrastructure-for-distributed-high-throughput-computing</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2024-06-21</lastmod>
  </url>
  <url>
    <loc>https://www.trustedci.org/trusted-ci-pod/2021/7/26/june-2021-investigating-secure-development-in-practice-a-human-centered-perspective</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2024-06-21</lastmod>
  </url>
  <url>
    <loc>https://www.trustedci.org/trusted-ci-pod/2021/5/25/may-2021-identifying-vulnerable-github-repositories-in-scientific-cyberinfrastructure</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2024-06-21</lastmod>
  </url>
  <url>
    <loc>https://www.trustedci.org/trusted-ci-pod/2021/4/26/apr-2021-trusted-ci-webinar-arizona-states-science-dmz</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2024-06-21</lastmod>
  </url>
  <url>
    <loc>https://www.trustedci.org/trusted-ci-pod/2021/4/16/guest-episode-operationalizing-the-framework-getting-management-to-understand-cybersecurity</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2024-06-21</lastmod>
  </url>
  <url>
    <loc>https://www.trustedci.org/trusted-ci-pod/2021/4/16/may-2016-webinar-series-kick-off</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2024-06-21</lastmod>
  </url>
  <url>
    <loc>https://www.trustedci.org/trusted-ci-pod/2021/4/16/jun-2016-risk-self-evaluation</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2024-06-21</lastmod>
  </url>
  <url>
    <loc>https://www.trustedci.org/trusted-ci-pod/2021/4/16/jul-2016-xsede-information-sharing</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2024-06-21</lastmod>
  </url>
  <url>
    <loc>https://www.trustedci.org/trusted-ci-pod/2021/4/16/aug-2016-the-science-dmz-as-a-security-architecture</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2024-06-21</lastmod>
  </url>
  <url>
    <loc>https://www.trustedci.org/trusted-ci-pod/2021/4/16/sep-2016-the-risk-of-the-commons</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2024-06-21</lastmod>
  </url>
  <url>
    <loc>https://www.trustedci.org/trusted-ci-pod/2021/4/16/oct-2016-science-or-security</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2024-06-21</lastmod>
  </url>
  <url>
    <loc>https://www.trustedci.org/trusted-ci-pod/2021/4/16/dec-2016-cici-regional-cybersecurity-collaboration-projects</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2024-06-21</lastmod>
  </url>
  <url>
    <loc>https://www.trustedci.org/trusted-ci-pod/2021/4/16/jan-2017-open-science-cyber-risk-profile</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2024-06-21</lastmod>
  </url>
  <url>
    <loc>https://www.trustedci.org/trusted-ci-pod/2021/4/16/feb-2017-practical-cybersecurity-program-for-smaller-science-programs</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2024-06-21</lastmod>
  </url>
  <url>
    <loc>https://www.trustedci.org/trusted-ci-pod/2021/4/16/mar-2017-sdn-and-iam-integration-at-duke</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2024-06-21</lastmod>
  </url>
  <url>
    <loc>https://www.trustedci.org/trusted-ci-pod/2021/4/16/apr-2017-hipaa-and-fisma-computing-with-regulated-data</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2024-06-21</lastmod>
  </url>
  <url>
    <loc>https://www.trustedci.org/trusted-ci-pod/2021/4/16/may-2017-cybersecurity-research-transition-to-practice-ttp</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2024-06-21</lastmod>
  </url>
  <url>
    <loc>https://www.trustedci.org/trusted-ci-pod/2021/4/16/jun-2017-using-the-blockchain-to-secure-provenance-meta-data</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2024-06-21</lastmod>
  </url>
  <url>
    <loc>https://www.trustedci.org/trusted-ci-pod/2021/4/16/jul-2017-inaugural-security-program-at-internet2</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2024-06-21</lastmod>
  </url>
  <url>
    <loc>https://www.trustedci.org/trusted-ci-pod/2021/4/16/aug-2017-stronger-security-for-password-authentication</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2024-06-21</lastmod>
  </url>
  <url>
    <loc>https://www.trustedci.org/trusted-ci-pod/2021/4/16/aug-2017-an-overview-of-ctsc-engagements-and-the-application-process</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2024-06-21</lastmod>
  </url>
  <url>
    <loc>https://www.trustedci.org/trusted-ci-pod/2021/4/16/sep-2017-demystifying-threat-intelligence</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2024-06-21</lastmod>
  </url>
  <url>
    <loc>https://www.trustedci.org/trusted-ci-pod/2021/4/16/oct-2017-incident-response-in-an-open-and-decentralized-network</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2024-06-21</lastmod>
  </url>
  <url>
    <loc>https://www.trustedci.org/trusted-ci-pod/2021/4/16/dec-2017-the-state-of-the-cybersecurity-center-of-excellence</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2024-06-21</lastmod>
  </url>
  <url>
    <loc>https://www.trustedci.org/trusted-ci-pod/2021/4/14/feb-2018-smartprovenance-a-distributed-blockchain-based-data-provenance</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2024-06-21</lastmod>
  </url>
  <url>
    <loc>https://www.trustedci.org/trusted-ci-pod/2021/4/14/mar-2018-data-quality-and-security-evaluation-framework-development</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2024-06-21</lastmod>
  </url>
  <url>
    <loc>https://www.trustedci.org/trusted-ci-pod/2021/4/14/apr-2018-toward-security-managed-virtual-science-networks</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2024-06-21</lastmod>
  </url>
  <url>
    <loc>https://www.trustedci.org/trusted-ci-pod/2021/4/14/3osfmiedrhlc2q5zcmdlmf49b5ep1e</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2024-06-21</lastmod>
  </url>
  <url>
    <loc>https://www.trustedci.org/trusted-ci-pod/2021/4/14/jun-2018-security-program-at-lsst</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2024-06-21</lastmod>
  </url>
  <url>
    <loc>https://www.trustedci.org/trusted-ci-pod/2021/4/14/jul-2018-rsarc-trustworthy-computing-over-protected-datasets</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2024-06-21</lastmod>
  </url>
  <url>
    <loc>https://www.trustedci.org/trusted-ci-pod/2021/4/14/aug-2018-nist-800-171-compliance-program-at-university-of-connecticut</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2024-06-21</lastmod>
  </url>
  <url>
    <loc>https://www.trustedci.org/trusted-ci-pod/2021/4/14/sep-2018-the-sci-trust-framework</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2024-06-21</lastmod>
  </url>
  <url>
    <loc>https://www.trustedci.org/trusted-ci-pod/2021/4/14/oct-2018-urgent-problems-and-mostly-open-solutions</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2024-06-21</lastmod>
  </url>
  <url>
    <loc>https://www.trustedci.org/trusted-ci-pod/2021/4/14/dec-2018-security-best-practices-for-academic-cloud-service-providers</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2024-06-21</lastmod>
  </url>
  <url>
    <loc>https://www.trustedci.org/trusted-ci-pod/2021/4/13/jan-2019-securing-scientific-cyberinfrastructure-the-researchsoc</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2024-06-21</lastmod>
  </url>
  <url>
    <loc>https://www.trustedci.org/trusted-ci-pod/2021/4/13/feb-2019-anticipatory-cyber-defense-via-predictive-analytics-machine-learning-and-simulation</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2024-06-21</lastmod>
  </url>
  <url>
    <loc>https://www.trustedci.org/trusted-ci-pod/2021/4/13/mar-2019-the-nsf-cc-dni-securecloud-project</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2024-06-21</lastmod>
  </url>
  <url>
    <loc>https://www.trustedci.org/trusted-ci-pod/2021/4/13/apr-2019-reed-a-cybersecurity-framework-for-research-data-at-purdue-university</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2024-06-21</lastmod>
  </url>
  <url>
    <loc>https://www.trustedci.org/trusted-ci-pod/2021/4/13/may-2019-deployable-internet-routing-security</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2024-06-21</lastmod>
  </url>
  <url>
    <loc>https://www.trustedci.org/trusted-ci-pod/2021/4/13/jun-2019-the-trusted-ci-framework-toward-practical-comprehensive-cybersecurity-programs</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2024-06-21</lastmod>
  </url>
  <url>
    <loc>https://www.trustedci.org/trusted-ci-pod/2021/4/13/jul-2019-ancile-enhancing-privacy-for-ubiquitous-computing-with-use-based-privacy</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2024-06-21</lastmod>
  </url>
  <url>
    <loc>https://www.trustedci.org/trusted-ci-pod/2021/4/13/aug-2019-integrity-protection-for-scientific-workflow-data-motivation-and-initial-experiences</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2024-06-21</lastmod>
  </url>
  <url>
    <loc>https://www.trustedci.org/trusted-ci-pod/2021/4/13/sep-2019-jupyter-security-at-lawrence-livermore-national-laboratory</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2024-06-21</lastmod>
  </url>
  <url>
    <loc>https://www.trustedci.org/trusted-ci-pod/2021/4/13/oct-2019-trends-in-global-privacy-gdpr-one-year-later</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2024-06-21</lastmod>
  </url>
  <url>
    <loc>https://www.trustedci.org/trusted-ci-pod/2021/4/13/dec-2019-ddos-defense-in-depth-for-dns-ddidd-project-overview-and-early-results</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2024-06-21</lastmod>
  </url>
  <url>
    <loc>https://www.trustedci.org/trusted-ci-pod/2021/4/13/jan-2020-ren-isac-for-research-facilitiesprojects-with-kim-milford</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2024-06-21</lastmod>
  </url>
  <url>
    <loc>https://www.trustedci.org/trusted-ci-pod/2021/4/13/feb-2020-fabric-the-adaptive-programmable-networked-research-infrastructure-for-computer-science</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2024-06-21</lastmod>
  </url>
  <url>
    <loc>https://www.trustedci.org/trusted-ci-pod/2021/4/12/mar-2020-ontimeurb-multi-domain-security-for-science-gateway-applications</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2024-06-21</lastmod>
  </url>
  <url>
    <loc>https://www.trustedci.org/trusted-ci-pod/2021/4/12/apr-2020-trustworthy-decision-making-and-artificial-intelligence</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2024-06-21</lastmod>
  </url>
  <url>
    <loc>https://www.trustedci.org/trusted-ci-pod/2021/4/12/may-2020-is-your-code-safe-from-attack</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2024-06-21</lastmod>
  </url>
  <url>
    <loc>https://www.trustedci.org/trusted-ci-pod/2021/4/12/jun-2020-how-worried-should-i-be-the-worst-question-we-keep-asking-about-research-cybersecurity</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2024-06-21</lastmod>
  </url>
  <url>
    <loc>https://www.trustedci.org/trusted-ci-pod/2021/4/12/jul-2020-whose-line-is-it-anyway-problem-solving-in-complex-networks</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2024-06-21</lastmod>
  </url>
  <url>
    <loc>https://www.trustedci.org/trusted-ci-pod/2021/4/12/aug-2020-transitioning-cybersecurity-research-to-practice-success-stories-and-tools-you-can-use</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2024-06-21</lastmod>
  </url>
  <url>
    <loc>https://www.trustedci.org/trusted-ci-pod/2021/4/12/sep-2020-accord-integrating-ci-policy-and-mechanism-to-support-research-on-sensitive-data</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2024-06-21</lastmod>
  </url>
  <url>
    <loc>https://www.trustedci.org/trusted-ci-pod/2021/4/9/oct-2020-cybersecurity-maturity-model-certification-cmmc</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2024-06-21</lastmod>
  </url>
  <url>
    <loc>https://www.trustedci.org/trusted-ci-pod/2021/4/9/oct-2020-enforcing-security-and-privacy-policies-to-protect-research-data</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2024-06-21</lastmod>
  </url>
  <url>
    <loc>https://www.trustedci.org/trusted-ci-pod/2021/4/9/dec-2020-trustworthy-data-panel</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2024-06-21</lastmod>
  </url>
  <url>
    <loc>https://www.trustedci.org/trusted-ci-pod/2021/3/30/march-2021-reed-purdues-evolution-from-a-cui-environment-to-an-ecosystem-to-a-community</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2024-06-21</lastmod>
  </url>
  <url>
    <loc>https://www.trustedci.org/trusted-ci-pod/2021/3/26/feb-2021-care-cybersecurity-in-application-research-and-education</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2024-06-21</lastmod>
  </url>
  <url>
    <loc>https://www.trustedci.org/trusted-ci-pod/2021/3/24/jan-2021-scitokens-federated-authorization-for-distributed-scientific-computing</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2024-06-21</lastmod>
  </url>
  <url>
    <loc>https://www.trustedci.org/guide</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2023-02-02</lastmod>
  </url>
  <url>
    <loc>https://www.trustedci.org/2015summit</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2018-05-01</lastmod>
  </url>
  <url>
    <loc>https://www.trustedci.org/2014trainingsessions</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2014-09-24</lastmod>
  </url>
  <url>
    <loc>https://www.trustedci.org/cc-nie</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2022-10-11</lastmod>
  </url>
  <url>
    <loc>https://www.trustedci.org/cybersecurity-program</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2025-02-04</lastmod>
  </url>
  <url>
    <loc>https://www.trustedci.org/useful-links</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2022-03-07</lastmod>
  </url>
  <url>
    <loc>https://www.trustedci.org/2013-nsf-cybersecurity-summit</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2018-05-01</lastmod>
  </url>
  <url>
    <loc>https://www.trustedci.org/lno</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2022-10-11</lastmod>
  </url>
  <url>
    <loc>https://www.trustedci.org/acknowledgement</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2026-03-04</lastmod>
  </url>
  <url>
    <loc>https://www.trustedci.org/includingtrustedci</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2026-03-04</lastmod>
  </url>
  <url>
    <loc>https://www.trustedci.org/ligo</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2022-10-11</lastmod>
  </url>
  <url>
    <loc>https://www.trustedci.org/cfp2014</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2014-07-01</lastmod>
  </url>
  <url>
    <loc>https://www.trustedci.org/cybergis</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2022-10-11</lastmod>
  </url>
  <url>
    <loc>https://www.trustedci.org/icecube</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2022-10-11</lastmod>
  </url>
  <url>
    <loc>https://www.trustedci.org/pegasus</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2022-10-11</lastmod>
  </url>
  <url>
    <loc>https://www.trustedci.org/dataone</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2022-10-11</lastmod>
  </url>
  <url>
    <loc>https://www.trustedci.org/globus</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2022-10-11</lastmod>
  </url>
  <url>
    <loc>https://www.trustedci.org/who-we-are</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2026-03-20</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5047a5a6e4b0dcecada15549/2137e402-6dd2-4dab-acef-f5ba8d493c09/IMG_8268+-+Edited.jpg</image:loc>
      <image:title>The Team - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5047a5a6e4b0dcecada15549/b88c91be-b859-4682-a7a0-e0767792c0df/trusted-ci-institutions.png</image:loc>
      <image:title>The Team - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.trustedci.org/advisory-committee</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2026-03-20</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5047a5a6e4b0dcecada15549/484b9820-da01-4462-8575-1da863420052/IMG_7106+%28edited+2%29.jpg</image:loc>
      <image:title>Trusted CI Advisory Committee - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5047a5a6e4b0dcecada15549/50b68f3b-cb13-4bd5-b673-321856d1de5c/Damian+Clarke+%281%29.jpeg</image:loc>
      <image:title>Trusted CI Advisory Committee - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5047a5a6e4b0dcecada15549/0f565391-9cbf-4ac7-a796-84e88237c708/EricCross.jpeg</image:loc>
      <image:title>Trusted CI Advisory Committee - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5047a5a6e4b0dcecada15549/27afff25-2f24-4ec7-9373-6009d5455ab1/JarretCummings.jpeg</image:loc>
      <image:title>Trusted CI Advisory Committee - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5047a5a6e4b0dcecada15549/6ce523ea-85dc-4373-bbcf-911b276e8199/Manish.jpeg</image:loc>
      <image:title>Trusted CI Advisory Committee - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5047a5a6e4b0dcecada15549/31493607-f541-4322-a5b1-71804ac938f1/JenniferSchopf.jpeg</image:loc>
      <image:title>Trusted CI Advisory Committee - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5047a5a6e4b0dcecada15549/cdc02fc0-d8b7-42cc-aec0-4f092556f00b/CherylWashington.jpeg</image:loc>
      <image:title>Trusted CI Advisory Committee - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.trustedci.org/trainingmaterials</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2019-06-17</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5047a5a6e4b0dcecada15549/1529349056567-XSKR3OJCS0RCRSQS3XP7/2018-06-18_13-56-32.png</image:loc>
      <image:title>Training Materials</image:title>
    </image:image>
  </url>
  <url>
    <loc>https://www.trustedci.org/help</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2024-03-20</lastmod>
  </url>
  <url>
    <loc>https://www.trustedci.org/contact</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2024-10-01</lastmod>
  </url>
  <url>
    <loc>https://www.trustedci.org/reports</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2026-03-04</lastmod>
  </url>
  <url>
    <loc>https://www.trustedci.org/2014summit</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2018-05-01</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5047a5a6e4b0dcecada15549/1408712811165-S6O4ZU317NU7M3OS9MHC/2ndfloor.jpg</image:loc>
      <image:title>2014 NSF Summit</image:title>
      <image:caption>Second floor layout of Westin Arlington Gateway</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.trustedci.org/dkist</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2022-10-11</lastmod>
  </url>
  <url>
    <loc>https://www.trustedci.org/scigap</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2022-10-11</lastmod>
  </url>
  <url>
    <loc>https://www.trustedci.org/hubzero</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2022-10-11</lastmod>
  </url>
  <url>
    <loc>https://www.trustedci.org/trustedci-email-lists</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2024-05-23</lastmod>
  </url>
  <url>
    <loc>https://www.trustedci.org/gemini-observatory</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2022-10-11</lastmod>
  </url>
  <url>
    <loc>https://www.trustedci.org/partners</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2026-03-04</lastmod>
  </url>
  <url>
    <loc>https://www.trustedci.org/2015-nsf-cfp</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2016-03-17</lastmod>
  </url>
  <url>
    <loc>https://www.trustedci.org/tips-for-building-cfp-responses</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2018-05-01</lastmod>
  </url>
  <url>
    <loc>https://www.trustedci.org/lsst</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2022-10-11</lastmod>
  </url>
  <url>
    <loc>https://www.trustedci.org/ooi</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2022-10-11</lastmod>
  </url>
  <url>
    <loc>https://www.trustedci.org/2015training</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2016-03-17</lastmod>
  </url>
  <url>
    <loc>https://www.trustedci.org/presentations</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2025-08-07</lastmod>
  </url>
  <url>
    <loc>https://www.trustedci.org/aot</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2022-10-11</lastmod>
  </url>
  <url>
    <loc>https://www.trustedci.org/neon</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2022-10-11</lastmod>
  </url>
  <url>
    <loc>https://www.trustedci.org/perfsonar</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2016-01-21</lastmod>
  </url>
  <url>
    <loc>https://www.trustedci.org/aarc</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2022-10-11</lastmod>
  </url>
  <url>
    <loc>https://www.trustedci.org/ibeis</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2022-10-11</lastmod>
  </url>
  <url>
    <loc>https://www.trustedci.org/iam</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2024-02-16</lastmod>
  </url>
  <url>
    <loc>https://www.trustedci.org/webinars</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2026-03-04</lastmod>
  </url>
  <url>
    <loc>https://www.trustedci.org/2016summit</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2018-05-01</lastmod>
  </url>
  <url>
    <loc>https://www.trustedci.org/software-assurance</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2026-03-04</lastmod>
  </url>
  <url>
    <loc>https://www.trustedci.org/summit2016/students</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2017-03-27</lastmod>
  </url>
  <url>
    <loc>https://www.trustedci.org/2016-nsf-registration</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2017-03-27</lastmod>
  </url>
  <url>
    <loc>https://www.trustedci.org/2016-nsf-cfp</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2017-03-27</lastmod>
  </url>
  <url>
    <loc>https://www.trustedci.org/2016training</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2017-03-27</lastmod>
  </url>
  <url>
    <loc>https://www.trustedci.org/survey</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2020-02-16</lastmod>
  </url>
  <url>
    <loc>https://www.trustedci.org/oscrp</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2019-07-12</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5047a5a6e4b0dcecada15549/1477429314488-IORWQDARQ2WZ2RGWN8MJ/Embargoed_Data.png</image:loc>
      <image:title>Open Science Cyber Risk Profile</image:title>
    </image:image>
  </url>
  <url>
    <loc>https://www.trustedci.org/2017nsfsummit</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2021-01-08</lastmod>
  </url>
  <url>
    <loc>https://www.trustedci.org/students2017</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2017-05-15</lastmod>
  </url>
  <url>
    <loc>https://www.trustedci.org/2017-nsf-cfp</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2017-05-25</lastmod>
  </url>
  <url>
    <loc>https://www.trustedci.org/pearc17</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2021-01-08</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5047a5a6e4b0dcecada15549/1495818223319-JAKSF7T7XYNWZYTSPLVI/image-asset.jpeg</image:loc>
      <image:title>PEARC17</image:title>
    </image:image>
  </url>
  <url>
    <loc>https://www.trustedci.org/2017training</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2018-05-01</lastmod>
  </url>
  <url>
    <loc>https://www.trustedci.org/webinars-cfp</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2025-09-15</lastmod>
  </url>
  <url>
    <loc>https://www.trustedci.org/vulnerabilities</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2024-05-23</lastmod>
  </url>
  <url>
    <loc>https://www.trustedci.org/designsafe</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2022-10-11</lastmod>
  </url>
  <url>
    <loc>https://www.trustedci.org/mission</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2026-03-04</lastmod>
  </url>
  <url>
    <loc>https://www.trustedci.org/cloud-service-provider-security-best-practices</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2018-08-22</lastmod>
  </url>
  <url>
    <loc>https://www.trustedci.org/genapp</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2022-10-11</lastmod>
  </url>
  <url>
    <loc>https://www.trustedci.org/summit2018/students</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2018-06-20</lastmod>
  </url>
  <url>
    <loc>https://www.trustedci.org/2018-nsf-cybersecurity-summit</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2021-01-11</lastmod>
  </url>
  <url>
    <loc>https://www.trustedci.org/call-for-participation-2018</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2018-06-14</lastmod>
  </url>
  <url>
    <loc>https://www.trustedci.org/community-leadership-program</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2018-05-04</lastmod>
  </url>
  <url>
    <loc>https://www.trustedci.org/compliance-programs</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2022-03-23</lastmod>
  </url>
  <url>
    <loc>https://www.trustedci.org/incident-response</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2024-05-23</lastmod>
  </url>
  <url>
    <loc>https://www.trustedci.org/2018-summit-agenda</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2018-08-17</lastmod>
  </url>
  <url>
    <loc>https://www.trustedci.org/2018-nsf-summit-agenda</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2018-08-22</lastmod>
  </url>
  <url>
    <loc>https://www.trustedci.org/training-descriptions-2018</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2019-09-20</lastmod>
  </url>
  <url>
    <loc>https://www.trustedci.org/nsf-cybersecurity-summit-code-of-conduct</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2024-11-21</lastmod>
  </url>
  <url>
    <loc>https://www.trustedci.org/science-gateway-community-institute</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2022-10-11</lastmod>
  </url>
  <url>
    <loc>https://www.trustedci.org/2019-nsf-cybersecurity-summit</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2020-04-17</lastmod>
  </url>
  <url>
    <loc>https://www.trustedci.org/2019-ttp-workshop</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2024-08-27</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5047a5a6e4b0dcecada15549/1549557772607-QLRSUX5MTXEYI965YTR8/TrustedCI_logo_blue_web.png</image:loc>
      <image:title>The 2019 Cybersecurity TTP Workshop</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5047a5a6e4b0dcecada15549/1549557753362-5Y7YROEVYUCKX0037PA3/eevbdnicnw_w308.jpg</image:loc>
      <image:title>The 2019 Cybersecurity TTP Workshop</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5047a5a6e4b0dcecada15549/1549469340089-KMQSBT6H1AVVZTWE33P0/Microsoft-logo_rgb_gray.png</image:loc>
      <image:title>The 2019 Cybersecurity TTP Workshop</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5047a5a6e4b0dcecada15549/1560453662141-16INZJYEHP8WD8APCWAV/box1200x630.jpg</image:loc>
      <image:title>The 2019 Cybersecurity TTP Workshop</image:title>
    </image:image>
  </url>
  <url>
    <loc>https://www.trustedci.org/technology-transition-to-practice</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2024-01-23</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5047a5a6e4b0dcecada15549/1561663798368-1E3DD842OW0QVA0EETBK/cacr-ttp-workshop-chicago-2019-76.JPG</image:loc>
      <image:title>Cybersecurity Technology Transfer to Practice</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5047a5a6e4b0dcecada15549/1561663806960-Q6NAX06AGCICAJ3IIM2D/cacr-ttp-workshop-chicago-2019-5.JPG</image:loc>
      <image:title>Cybersecurity Technology Transfer to Practice</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5047a5a6e4b0dcecada15549/1561663817390-WHP8LU6VGGDMJNWHR3HM/cacr-ttp-workshop-chicago-2019-15.JPG</image:loc>
      <image:title>Cybersecurity Technology Transfer to Practice</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5047a5a6e4b0dcecada15549/1561663828078-43P6Z5FBNJGB84V2EKY5/cacr-ttp-workshop-chicago-2019-26.JPG</image:loc>
      <image:title>Cybersecurity Technology Transfer to Practice</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5047a5a6e4b0dcecada15549/1561663836461-D6MIK3HA9V75DTJNGO9W/cacr-ttp-workshop-chicago-2019-63.JPG</image:loc>
      <image:title>Cybersecurity Technology Transfer to Practice</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5047a5a6e4b0dcecada15549/1561663844636-H7W1XTOFBDONV1TCDRO3/cacr-ttp-workshop-chicago-2019-77.JPG</image:loc>
      <image:title>Cybersecurity Technology Transfer to Practice</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5047a5a6e4b0dcecada15549/1561663854829-U2P0R335UFWKR55KRL1A/cacr-ttp-workshop-chicago-2019-88.JPG</image:loc>
      <image:title>Cybersecurity Technology Transfer to Practice</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5047a5a6e4b0dcecada15549/1561663861912-TXPA945L9L7R2NPMFGOP/cacr-ttp-workshop-chicago-2019-92.JPG</image:loc>
      <image:title>Cybersecurity Technology Transfer to Practice</image:title>
    </image:image>
  </url>
  <url>
    <loc>https://www.trustedci.org/fellows/2019</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2025-09-17</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5047a5a6e4b0dcecada15549/1556137463471-4344QLRR1HAAS9M8IKUS/Shafaq_Chaudhry.jpg</image:loc>
      <image:title>2019 Fellows - Shafaq Chaudhry Assistant director of graduate and research IT at the University of Central Florida.</image:title>
      <image:caption>Shafaq's research interests include public safety communications, wireless networks and Software-Defined Networking. She is the Central Florida coordinator for Aspirations in Computing (AiC) program of National Center for Women &amp; Information Technology (NCWIT) and the president of the Women in EECS group at UCF. Shafaq has been serving on the reviewer committee for the Grace Hopper Celebration conference since 2017.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5047a5a6e4b0dcecada15549/1556137598014-0K9UE6NRZ9Y3Q8JQ53Q2/matias3.jpg</image:loc>
      <image:title>2019 Fellows - Matias Carrasco Kind Senior research and data scientist at the National Center for Supercomputing Applications.</image:title>
      <image:caption>Matias is an expert in scientific cloud computing and scientific platforms. and his interests in astrophysics are in cosmology, extragalactic astronomy, machine and deep learning, especially in large scale structures, galaxy formation and evolution, and photometric redshift estimation. He is also interested in data-intensive science, data visualization, image processing, web applications, scientific platforms, software engineering and architecture, and cyberinfrastructure in general.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5047a5a6e4b0dcecada15549/1556137643645-9HPVAWID1XPI1U33THYW/2017_09_25-Perez%2C+Gabriella-demercado-06.jpg</image:loc>
      <image:title>2019 Fellows - Gabriella Perez Research technology compliance specialist at the University of Iowa.</image:title>
      <image:caption>Gabriella has served as the University of Iowa’s Research Technology Compliance Specialist since the position was created in May 2017. She is the primary campus point-of-contact for technology compliance questions among researchers and the campus OneIT network of technical specialists who utilize the campus computing cluster. She serves as a cybersecurity and compliance liaison with the Division of Sponsored Programs, the Human Subjects Office, and the UI Libraries.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5047a5a6e4b0dcecada15549/1556137811482-G5EVEMMAYYMWDOPZDEJ4/Rege_Headshot.jpg</image:loc>
      <image:title>2019 Fellows - Aunshul Rege Associate Professor with the Department of Criminal Justice at Temple University.</image:title>
      <image:caption>Anushul has been researching proactive cybersecurity in the context of cybercrimes against critical infrastructures for over 10 years. Specifically, her research examines adversarial and defender behavior, decision-making, adaptations, modus operandi, and group dynamics. Aunshul is also passionate about educating the next generation workforce across the social and hard sciences about the relevance of the human factor in cybersecurity through experiential learning.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5047a5a6e4b0dcecada15549/1556137923664-3DHE72IB51WMCPYLKSVD/Vogiatzis.jpg</image:loc>
      <image:title>2019 Fellows - Chrysafis Vogiatzis Assistant professor at North Carolina A&amp;T State University.</image:title>
      <image:caption>Chrysafis' current research interests lie in network optimization and combinatorial optimization, along with their vast applications in modern socio-technical and biological systems. One of the main axes of his research is focusing on the study of centrality metrics in biological, social, and infrastructure networks, in order to identify groups and persons of interest.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5047a5a6e4b0dcecada15549/1556137964141-6E9XMT6BSGUGMY84LHUP/4464_Ester_Yang_01_LR.jpg</image:loc>
      <image:title>2019 Fellows - S. Jay Yang Professor at the Rochester Institute of Technology.</image:title>
      <image:caption>Jay is currently a Professor and the Department Head for the Department of Computer Engineering at Rochester Institute of Technology and also serves as the Director of Global Outreach in the Center of Cybersecurity at RIT. His research group has developed several pioneering machine learning, attack modeling, and simulation systems to provide predictive analytics and anticipatory cyber defense. His earlier works included FuSIA, VTAC, ViSAw, F-VLMM, and attack obfuscation modeling.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.trustedci.org/pearc19-workshop</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2019-07-30</lastmod>
  </url>
  <url>
    <loc>https://www.trustedci.org/summit2019/students</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2019-09-23</lastmod>
  </url>
  <url>
    <loc>https://www.trustedci.org/pearc19-panel</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2019-07-22</lastmod>
  </url>
  <url>
    <loc>https://www.trustedci.org/pearc19</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2019-12-06</lastmod>
  </url>
  <url>
    <loc>https://www.trustedci.org/2019-ttp-workshop/agenda</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2019-06-27</lastmod>
  </url>
  <url>
    <loc>https://www.trustedci.org/cfp2019</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2019-09-13</lastmod>
  </url>
  <url>
    <loc>https://www.trustedci.org/leadership2019</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2019-06-18</lastmod>
  </url>
  <url>
    <loc>https://www.trustedci.org/guide-overview</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2021-03-04</lastmod>
  </url>
  <url>
    <loc>https://www.trustedci.org/2019-quilt</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2019-09-26</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5047a5a6e4b0dcecada15549/1568224060684-8RGSJROKM1M0KVD3JIU7/quilt.jpg</image:loc>
      <image:title>2019 Quilt</image:title>
    </image:image>
  </url>
  <url>
    <loc>https://www.trustedci.org/training-descriptions-2019</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2019-10-07</lastmod>
  </url>
  <url>
    <loc>https://www.trustedci.org/fellows/about</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2026-03-04</lastmod>
  </url>
  <url>
    <loc>https://www.trustedci.org/2019-presentations</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2020-03-09</lastmod>
  </url>
  <url>
    <loc>https://www.trustedci.org/slate</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2020-01-21</lastmod>
  </url>
  <url>
    <loc>https://www.trustedci.org/2020-nsf-summit</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2021-04-29</lastmod>
  </url>
  <url>
    <loc>https://www.trustedci.org/workshops</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2021-03-10</lastmod>
  </url>
  <url>
    <loc>https://www.trustedci.org/pearc20-workshop</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2021-06-30</lastmod>
  </url>
  <url>
    <loc>https://www.trustedci.org/pearc18-workshop</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2022-02-18</lastmod>
  </url>
  <url>
    <loc>https://www.trustedci.org/code-of-conduct</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2025-11-19</lastmod>
  </url>
  <url>
    <loc>https://www.trustedci.org/pearc20</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2020-07-27</lastmod>
  </url>
  <url>
    <loc>https://www.trustedci.org/2020-fellows</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2020-11-09</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5047a5a6e4b0dcecada15549/1583439256145-O08APQT70CF0MQXY3VEX/songjiewang.png</image:loc>
      <image:title>2020 Fellows - Songjie Wang Cyberinfrastructure Engineer, University of Missouri</image:title>
      <image:caption>Songjie provides services to the research community for cloud infrastructure and deployment, technology transformation, system engineering, and application development. He is actively involved in various research projects that concern problems in cloud computing, cybersecurity, mobile edge computing, and machine learning. He is a liaison between the college and the campus high-performance computing center to facilitate research productivity.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5047a5a6e4b0dcecada15549/1585592445129-0WL80KVDM1T4ZOTNOEIV/Trusted+CI+Pic+.+Dr.+Tonya+Davis+copy.jpg</image:loc>
      <image:title>2020 Fellows - Tonya Davis Assistant Professor in the Department of Social Work, Psychology Counseling, Alabama A&amp;M University</image:title>
      <image:caption>Tonya is the Program Coordinator of the Graduate Psychology Program. Tonya's broad research interest include understanding how cyber interactions impact behavior. Specific areas of interest include psychological distortions and influence on privacy decision making, Social Engineering and Culture, role of Group Dynamics in cyber crimes, and Technology-infused Mental Health Interventions</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5047a5a6e4b0dcecada15549/1583439825382-PWT8FJJMG8283XNVPJEB/smriti+Bhatt.png</image:loc>
      <image:title>2020 Fellows - Smriti Bhatt Assistant Professor of Computer Science, Texas A&amp;M University-San Antonio</image:title>
      <image:caption>Smriti Bhatt, Ph.D., does research in security and privacy in Cloud and Internet of Things (IoT). She focuses on securing authorization, communication, and data flow in the context of Cloud enabled IoT domains such as smart home, smart health, and wearable IoT. Dr. Bhatt is passionate about enhancing diversity and inclusion in computing and serves as a co-advisor for a Women in CyberSecurity student chapter. She is active in Grace Hopper Celebration, CyberW, and San Antonio Women in IT.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5047a5a6e4b0dcecada15549/1583440049124-J5HT7264R0BUGMBVT4TX/Luanzhengguo_photo.jpg</image:loc>
      <image:title>2020 Fellows - Luanzheng “Lenny” Guo Postdoctoral Researcher at Pacific Northwest National Laboratory</image:title>
      <image:caption>Luanzheng Guo is a postdoctoral researcher at the Pacific Northwest National Laboratory, working with the HPC Group in the research area between High-Performance Computing (HPC) systems and Machine Learning. Previously, he obtained his PhD degree in electrical engineering and computer science from the University of California-Merced. His PhD research focused on system resilience and reliability in HPC systems. During his PhD study, his research was nominated for the best poster award in SC'16, won outstanding lightning talk in SC'18, and was featured by HPCwire in its "What's New in HPC Research" in 2018. He was also a recipient of Elsevier's outstanding reviewer award in 2018 and the UC Merced Graduate Dean's Dissertation Fellowship in 2020.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5047a5a6e4b0dcecada15549/1583440289310-234CXDAZJ894R3GMH75I/Jerry%2BSuit%2BSmall.jpg</image:loc>
      <image:title>2020 Fellows - Jerry Perez Director of Cyber Infrastructure Operations, University of Texas at Dallas</image:title>
      <image:caption>Jerry Perez, Ph.D., has over 18 years of experience using and teaching HPC technologies. Dr. Perez is interested in collaborating with other universities to share HPC knowledge; teaching computer science subjects such as programming, systems design, and massive-compute high-throughput computing (compute grids); creating cyberinfrastructure projects to share resources; and promote academic excellence through HPC in the classroom.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5047a5a6e4b0dcecada15549/1583440433809-7OG6H7Z7LRGYVA1X0ST5/LC.jpg</image:loc>
      <image:title>2020 Fellows - Laura Christopherson Senior Data Scientist, Renaissance Computing Institute (RENCI)</image:title>
      <image:caption>Laura's background is in theater, art, and information science. Her interests include social informatics, language and communication, user-centered design, and research and design ethics. At RENCI, she works with scientists to design and develop cyberinfrastructure to support them in their research. It is important to her to take good care of the scientists she works with and to make their research data safe and secure.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.trustedci.org/programs</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2021-02-25</lastmod>
  </url>
  <url>
    <loc>https://www.trustedci.org/previous-events</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2026-03-04</lastmod>
  </url>
  <url>
    <loc>https://www.trustedci.org/ttp-success</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2024-08-27</lastmod>
  </url>
  <url>
    <loc>https://www.trustedci.org/covid19</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2020-05-05</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5047a5a6e4b0dcecada15549/1586446431654-D8LHGJITP8BUFIW12D3W/cicoe-logo-horizontal.png</image:loc>
      <image:title>COVID-19 Resources</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5047a5a6e4b0dcecada15549/1586447512417-E67B3DG3RRNM9DZ09QE3/sgci-logo+%281%29.png</image:loc>
      <image:title>COVID-19 Resources</image:title>
    </image:image>
  </url>
  <url>
    <loc>https://www.trustedci.org/office-hours</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2022-10-11</lastmod>
  </url>
  <url>
    <loc>https://www.trustedci.org/2020-student-program</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2021-06-11</lastmod>
  </url>
  <url>
    <loc>https://www.trustedci.org/cfp-2020</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2020-07-16</lastmod>
  </url>
  <url>
    <loc>https://www.trustedci.org/virtual-code-of-conduct</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2024-11-21</lastmod>
  </url>
  <url>
    <loc>https://www.trustedci.org/2020-summit-training-sessions</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2020-09-01</lastmod>
  </url>
  <url>
    <loc>https://www.trustedci.org/successstories</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2026-03-04</lastmod>
  </url>
  <url>
    <loc>https://www.trustedci.org/alumni</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2026-03-04</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5047a5a6e4b0dcecada15549/fcb2297b-fc6c-44a8-8fdd-21e28a3ac632/emilykadams500x500.jpeg</image:loc>
      <image:title>Alumni - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5047a5a6e4b0dcecada15549/1615306546676-GUFBPO28G4BWFIP4OH62/tom-barton-2208x2273square.png</image:loc>
      <image:title>Alumni</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5047a5a6e4b0dcecada15549/40e9a76f-dc63-46e4-87c3-f7ecfe3b444e/dana-brunson624x640.jpg</image:loc>
      <image:title>Alumni - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5047a5a6e4b0dcecada15549/77c1c3ef-d5a2-40af-a19a-a1a9147b6de7/DebraChapman.jpg</image:loc>
      <image:title>Alumni - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5047a5a6e4b0dcecada15549/3bee87ef-2b7f-45d9-b8c3-a5ebe85b4fbe/AdrianCrenshaw250x249.jpg</image:loc>
      <image:title>Alumni - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5047a5a6e4b0dcecada15549/1609429599099-PI6WHA700BPZFAWXFH3T/randy-heiland-200x200.jpg</image:loc>
      <image:title>Alumni</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5047a5a6e4b0dcecada15549/1605105156628-8W1JI3ZSND0DZM87XID2/florence-hudson-225x225.jpeg</image:loc>
      <image:title>Alumni</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5047a5a6e4b0dcecada15549/1605715296519-BBOUZJFS4OQYD3BC982W/scott-koranda-300x300.PNG</image:loc>
      <image:title>Alumni</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5047a5a6e4b0dcecada15549/1631216800092-TF6L9CN6S39J32Y5XFT3/bob-cowles2629x2586.jpg</image:loc>
      <image:title>Alumni - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5047a5a6e4b0dcecada15549/1615306057017-NE4MPWNU2I36P2LQL8LA/nick-multari-400x451.jpg</image:loc>
      <image:title>Alumni</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5047a5a6e4b0dcecada15549/8e64f6fc-6a32-46ec-8c98-a84c556ad2e6/AnuragShankar2099x2099.jpeg</image:loc>
      <image:title>Alumni - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5047a5a6e4b0dcecada15549/1625076026101-Q2WYKSWD4VIFBBJ5T2T3/amy-starzynski-coddensHeadshot2021-1342x1380.jpg</image:loc>
      <image:title>Alumni</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5047a5a6e4b0dcecada15549/dde101cd-9288-4faa-b686-974677ee83c8/alecyasinsac4480x6720.jpeg</image:loc>
      <image:title>Alumni - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.trustedci.org/2020-summit-presentations-slides</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2021-01-12</lastmod>
  </url>
  <url>
    <loc>https://www.trustedci.org/2021-fellows</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2021-08-24</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5047a5a6e4b0dcecada15549/1613508534990-0IJHPPISE6H6IXQ46YU7/MCCAFFREY_Deb4x5.jpg</image:loc>
      <image:title>2021 Fellows - Deb McCaffrey Research Computing Facilitator at Michigan Medicine</image:title>
      <image:caption>Deb McCaffrey is a Research Computing Facilitator at Michigan Medicine, the University of Michigan's health system and medical school. She fell backwards into facilitation after completing a PhD in physical chemistry at UC Berkeley and has never looked back. She loves being involved in all the different research projects on campus and learning something new every day. Her long-term career goal is to get NIH and NSF to collaborate on cyberinfrastructure and provide NSF-like programs to researchers with sensitive data."</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5047a5a6e4b0dcecada15549/1613587234659-VNDBN60UVD99TKC4C9EJ/Amiya_portrait.JPG</image:loc>
      <image:title>2021 Fellows - Amiya Maji Senior Computational Scientist at Purdue University</image:title>
      <image:caption>Amiya works as a Sr. Computational Scientist at Purdue University, where he collaborates with researchers from various scientific domains to streamline their scientific processes and reduce application ‎and data bottlenecks. He also leads the software build automation and testing efforts for Purdue's HPC clusters. Amiya’s research focuses on reliability and security of distributed computing systems; more specifically on vulnerability analysis and testing of mobile and cloud applications, and of IoT devices. Amiya and his colleagues have discovered several vulnerabilities in Android mobile applications and more recently in Wear OS. Amiya is also passionate about emerging socio-technological issues such as ethical AI and spread of misinformation in social networks.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5047a5a6e4b0dcecada15549/1613587390438-303R6FZ5JENZXBRTKTIY/JMM+photo.jpg</image:loc>
      <image:title>2021 Fellows - Dr. Elie Alhajjar Research Scientist at the Army Cyber Institute (ACI)</image:title>
      <image:caption>Dr. Elie Alhajjar is a research scientist at the Army Cyber Institute (ACI) and jointly an Assistant Professor in the Department of Mathematical Sciences at the United States Military Academy (USMA) in West Point, NY, where he teaches and mentors cadets from all academic disciplines. His research interests include mathematical modeling, machine learning and network analysis, from a cybersecurity viewpoint. He has presented his research work in international meetings in North America, Europe, and Asia. Before coming to West Point, Dr. Elie Alhajjar had a research appointment at the National Institute of Standards and Technology (NIST) in Gaithersburg, MD. He holds a Master of Science and a PhD in mathematics from George Mason University, as well as master’s and bachelor’s degrees from Notre Dame University.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5047a5a6e4b0dcecada15549/1613587883114-451EIIX4PCE2TJN10HVS/matt+peterson.jpg</image:loc>
      <image:title>2021 Fellows - Matthew Peterson Senior Faculty Research Assistant at Oregon State Univ.</image:title>
      <image:caption>Matthew is a Senior Faculty Research Assistant at Oregon State University's (OSU) Center for Genome Research and Biocomputing, where he is responsible for managing REDCap (Research Electronic Data Capture) platforms, assisting with health-related data management in the Cloud, and developing software pipelines for computational processing of genomics laboratory data. This past year, he has also been responsible for secure data management for the OSU TRACE-COVID-19 study that examines the prevalence of the novel coronavirus in communities. Matthew holds an M.S. in Applied Information Management from the University of Oregon and a Graduate Certificate in College and University Teaching from OSU. He is passionate about teaching and serves as an instructor for high performance computing and programming courses.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5047a5a6e4b0dcecada15549/1613588376892-CHXEV1UA5F7HGCVXAY04/Mauricio.png</image:loc>
      <image:title>2021 Fellows - Mauricio Tavares Senior Security Engineer at FABRIC and FAB (FABRIC Across Borders)"</image:title>
      <image:caption>Mauricio Tavares has worked in the credit card and medical industry, which led to an interest in the behavioral aspect of data security and privacy.  He has published in topics ranging from aerospace engineering to computer automation and data privacy.  At RENCI he is a member of the FABRIC security working group helping craft the policies and procedures and advise IT staff to effectively  protect this multinational research project."</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5047a5a6e4b0dcecada15549/1613590476742-CKJ4KYAVQFSKQTN2RDOZ/Richard+Wagner.jpg</image:loc>
      <image:title>2021 Fellows - Richard Wagner Systems Integration Engineer at University of California, San Diego</image:title>
      <image:caption>Rick is part of the UCSD Research IT team, where he helps design and build cyberinfrastructure solutions for highly complex research projects that cut across the campus and beyond it. His career began with using cyberinfrastructure as a tool for research in astrophysics, solving data challenges in cosmology and supersonic turbulence. From there he worked in HPC at the San Diego Supercomputer and with Globus at the University of Chicago.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5047a5a6e4b0dcecada15549/1613590626781-175401L8ARM4SE2WC9RO/smho2021.jpg</image:loc>
      <image:title>2021 Fellows - Shuyuan Metcalfe Associate Professor at Florida State University</image:title>
      <image:caption>Shuyuan’s research focuses on trusted human-computer interactions, investigating issues of computer-mediated deception, disinformation, cyberbullying, hate speech, cloud forensics, cyber insider threat, and interactive cyber defense. She adopts heuristic approaches to coaching the next-gen cybersecurity workforce. Shuyuan is a sociotechnical behavioral scientist designing human-centered computing experiments that simulate complex trust interactions in cyberinfrastructure. Novel methodologies are invented to computationally model the defense of cyberspace, while addressing information ethics and privacy.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5047a5a6e4b0dcecada15549/1613589234168-U4UO1BTSQS3NU3J14FQP/MichaelKyle_bio_pic.jpg</image:loc>
      <image:title>2021 Fellows - Michael Kyle Scientific Applications Consultant at University of Delaware</image:title>
      <image:caption>Michael’s background is in Meteorology and has several years of experience as a scientific programmer. He currently works at the University of Delaware (UD) in the Information Technologies Research Cyberinfrastructure unit. In this role, Michael works directly with UD’s researchers and its partnering organizations to assist them in the best use of UD’s HPC resources. He is currently working on a Master’s in Cybersecurity at UD and wants to combine his passions for cybersecurity and research cyberinfrastructure to continue developing a safe, and secure computing environment for all types of research.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.trustedci.org/framework/share</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2025-04-18</lastmod>
  </url>
  <url>
    <loc>https://www.trustedci.org/cpe</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2021-03-11</lastmod>
  </url>
  <url>
    <loc>https://www.trustedci.org/pearc21-workshop</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2021-07-20</lastmod>
  </url>
  <url>
    <loc>https://www.trustedci.org/pearc21</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2021-06-21</lastmod>
  </url>
  <url>
    <loc>https://www.trustedci.org/embed-test</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2021-08-09</lastmod>
  </url>
  <url>
    <loc>https://www.trustedci.org/2021-testbed-facility-security-workshop</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2021-10-18</lastmod>
  </url>
  <url>
    <loc>https://www.trustedci.org/2021-summit-program</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2021-10-13</lastmod>
  </url>
  <url>
    <loc>https://www.trustedci.org/2021-cybersecurity-summit</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2022-02-18</lastmod>
  </url>
  <url>
    <loc>https://www.trustedci.org/science-gateways</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2021-09-20</lastmod>
  </url>
  <url>
    <loc>https://www.trustedci.org/hecvat</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2021-12-01</lastmod>
  </url>
  <url>
    <loc>https://www.trustedci.org/home-home-2026-03-04</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2026-03-04</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5047a5a6e4b0dcecada15549/b80aecd7-35ab-41c6-ae42-aba5d331309c/CyberecuritySummit23_groupALL_6162.jpg</image:loc>
      <image:title>Home - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5047a5a6e4b0dcecada15549/c72b7341-f9b4-4e78-bf57-a26bafa86c24/trusted-ci-framework-logo+%281%29.png</image:loc>
      <image:title>Home - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.trustedci.org/ransomware</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2023-10-07</lastmod>
  </url>
  <url>
    <loc>https://www.trustedci.org/secure-by-design</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2025-11-19</lastmod>
  </url>
  <url>
    <loc>https://www.trustedci.org/2022-fellows</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2023-03-07</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5047a5a6e4b0dcecada15549/0292c201-0f65-4696-9e31-27dce546abb6/meira_0068.jpg</image:loc>
      <image:title>2022 Fellows - Brian Roland Data Management Specialist at Northwestern University</image:title>
      <image:caption>Brian Roland provides Data Management support and consultation for researchers at Northwestern University. He supports researchers across a broad spectrum of research disciplines with data workflow design and leveraging the appropriate data storage and data transfer solutions to meet their research goals and both federal and institutional compliance needs. In addition to providing data workflow support, Brian enjoys working with his colleagues on building out institutional lines of service that help optimize the data flows involved with researchers’ analysis and data management plans.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5047a5a6e4b0dcecada15549/9b3ae4b2-d78f-431d-9960-646ef7f9fcb8/webpnet-resizeimage-74.jpg</image:loc>
      <image:title>2022 Fellows - Charles McElroy Assistant Professor at Cleveland State University</image:title>
      <image:caption>Professor Charles McElroy earned his PhD from Case Western Reserve University, (Cleveland, OH) in Information Systems in 2017. There he studied how diverse scientific teams used sophisticated cyberinfrastructure to formulate complex arguments. Upon graduation, Professor McElroy won a national competition sponsored by the Office of the Director for National Intelligence to conduct research in data science at the Center for Data Driven Discovery (CD3) at the California Institute of Technology (Pasadena, CA). At the conclusion of his IC PostDoc experience, Professor McElroy won a Fulbright Fellowship to Oxford University (2019), where he focused on issues related to Cyber-Security. Professor McElroy is currently a new Assistant Professor in Information Systems at Cleveland State University. His interests include data science, AI, machine learning and how these tools can be applied to cybersecurity issues</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5047a5a6e4b0dcecada15549/025fb188-c9e1-4bc6-b847-6ef3748f21b6/garhan_attebury.jpg</image:loc>
      <image:title>2022 Fellows - Garhan Attebury Lead System Administrator at the University of Nebraska-Lincoln</image:title>
      <image:caption>Garhan Attebury is the lead system administrator within the Holland Computing Center at the University of Nebraska. His efforts and interests cover a wide spectrum of research computing areas from local HPC needs to global computing with involvement in the WLCG and other distributed platforms. He additionally acts as the networking and security liaison for HCC and has a strong interest in architecting solutions that balance enabling research with meeting security and privacy needs.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5047a5a6e4b0dcecada15549/24d64a2e-31d1-49ad-8866-379bba6fa04f/PXL_20210318_211348905%7E2.jpg</image:loc>
      <image:title>2022 Fellows - Hannah Hiles Research Project Manager and Product owner at RENCI</image:title>
      <image:caption>Hannah Hiles is a research project manager and product owner at the Renaissance Computing Institute (RENCI). She received her MS in Library and Information Science from UNC Greensboro; her studies focused on academic and digital libraries and served as a touchstone for instilling a curiosity about the intersection of people and information. Her research is centered around UI/UX development, mindful community engagement, and iterative design of best practices to support researchers and their research communities in accomplishing shared goals.  .</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5047a5a6e4b0dcecada15549/075705fa-e8e3-4bd5-b1c6-82489c9e537c/std-pic-joey.png</image:loc>
      <image:title>2022 Fellows - Joseph White-Swift Systems Engineer for HPC/CI in the Office of Information Technology at The University of Texas at Dallas</image:title>
      <image:caption>Joey is systems engineer at the University of Texas at Dallas focusing on CI and Networking. Wearing his CI hat, he primarily serves economists from around the Federal Reserve Bank System in a partnership to admin and support their Big-Tex Cluster. Wearing his networking hat, he provides networking support and services for the university CI infrastructure and the university science DMZ, which includes both the Texas Research and Education CyberInfrastructure Services (TRECIS) and the Global Environment for Network Innovations (GENI) projects. Wearing his researcher hat, he works with, supports, and conducts research as a member of the Open Networking Advanced Research (OpNeAR) Lab and has also served as a reviewer for the INDIS Workshop since 2020. Joey has been a member of the IEEE since 2016 and is an Eagle Scout.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5047a5a6e4b0dcecada15549/49c6a9a0-8c3a-42d2-8a50-8cd3f7b1854c/cragin_m-1.jpeg</image:loc>
      <image:title>2022 Fellows - Melissa Cragin Chief Strategist for Data Initiatives in the Research data Services at SDSC/UCSD</image:title>
      <image:caption>Melissa Cragin is Chief Strategist for Data Initiatives in the Research Data Services division at the San Diego Supercomputer Center (SDSC), at the University of California San Diego (UCSD). Prior to joining SDSC, Melissa was the Executive Director of the Midwest Big Data Hub, based at the National Center for Supercomputing Applications (NCSA) at the University of Illinois at Urbana-Champaign (UIUC). Previously, Melissa served for several years in the Office of the Assistant Director, Directorate of Biological Sciences at the National Science Foundation (NSF), where she guided development of data policy and accelerated community engagement on research data management and public access. At SDSC, Melissa works on projects to improve data access and use, and foster the development of the national data infrastructure ecosystem and related policy. Melissa has a PhD in information science from the iSchool at Illinois (UIUC), and a MLIS degree from Rutgers University.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5047a5a6e4b0dcecada15549/853bfc3d-9a60-411f-95c4-f8e0ded5b032/Streng+photo.jpg</image:loc>
      <image:title>2022 Fellows - Stephen Streng Research Development Strategist with the Strategic Projects and Research Collaborative (SPARC) at the University of Minnesota</image:title>
      <image:caption>Stephen Streng is a Research Development Strategist with the Strategic Projects and Research Collaborative (SPARC) at the University of Minnesota (UMN). In this role, he helps interdisciplinary and multi-institutional teams and the UMN system achieve significant impact by providing competitive intelligence, strategic planning, proposal development, and project design consultation. Stephen has been involved in cybersecurity since 2015, when in a previous role at the UMN Food Protection and Defense Institute (FPDI), he initiated FPDI’s cybersecurity research program by organizing and facilitating the first Food Industry Cybersecurity Summit. In 2019, FPDI published his white paper, Adulterating More Than Food: The Cyber Risk to Food Processing and Manufacturing, which examined the cyber risks to industrial control systems in the food processing and manufacturing industries. Stephen is a former Department of Homeland Security Analytic Exchange Program (AEP) participant as a member of the Protecting Sensitive Data and Intellectual Property topic team, and he currently serves on the UMN Highly Restricted Data Steering Committee. Stephen continues to consult for FPDI and has an ongoing interest in operational technology cybersecurity.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5047a5a6e4b0dcecada15549/5c6b5af5-a87f-4a0c-80b9-8d790511dd9c/Unal_Tatar-Headshot-new1.jpg</image:loc>
      <image:title>2022 Fellows - Unal Tatar Assistant Professor at SUNY at Albany</image:title>
      <image:caption>Dr. Unal Tatar is an assistant professor at the College of Emergency Preparedness, Homeland Security, and Cybersecurity at the University at Albany. Dr. Tatar served as the head of the National Computer Emergency Response Team of Turkey and as an academic advisor at the NATO Center of Excellence Defense Against Terrorism. Dr. Tatar has three main lines of research: the economics of cybersecurity and risk management, critical infrastructure protection and national security, and cybersecurity capacity building and workforce development. Dr. Tatar’s research has been funded by NSF, DOD, NSA, ONR, AFRL, NATO and several foundations. Dr. Tatar holds a BS in Computer Science, an MS in Cryptography, and a Ph.D. in Engineering Management and Systems Engineering.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.trustedci.org/fellows-products</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2024-11-15</lastmod>
  </url>
  <url>
    <loc>https://www.trustedci.org/2022-cybersecurity-summit</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2022-12-13</lastmod>
  </url>
  <url>
    <loc>https://www.trustedci.org/2022-summit-program</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2022-10-21</lastmod>
  </url>
  <url>
    <loc>https://www.trustedci.org/2022-summit-program-oct-19</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2022-10-21</lastmod>
  </url>
  <url>
    <loc>https://www.trustedci.org/2022-summit-program-oct-20</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2022-10-21</lastmod>
  </url>
  <url>
    <loc>https://www.trustedci.org/resource-catalog</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2026-03-04</lastmod>
  </url>
  <url>
    <loc>https://www.trustedci.org/cohort</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2026-03-23</lastmod>
  </url>
  <url>
    <loc>https://www.trustedci.org/2022-cybersecurity-summit-copy</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2023-08-03</lastmod>
  </url>
  <url>
    <loc>https://www.trustedci.org/2023-fellows</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2023-03-13</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5047a5a6e4b0dcecada15549/934acfef-459c-47b7-a6fb-4624873b8276/Ramazan+Aygun+-4+%284%29.jpg</image:loc>
      <image:title>2023 Fellows - Ramazan S. Aygun Director of Center for Research Computing at Kennesaw State University</image:title>
      <image:caption>Ramazan S. Aygun is the Director of Center for Research Computing at Kennesaw State University and Associate Professor of Computer Science with joint appointment at the School of Data Science and Analytics.  He has published more than 130 refereed international journal papers, conference papers and book chapters in various aspects of data science including big data computing, machine learning, multimedia forensics, data mining, data modeling, data communications, data compression, data presentation, data retrieval, data indexing, data querying, and data fusion. His most recent work includes trustworthy machine learning and developing fair and explainable machine learning models by studying possible bias in the datasets. He is recently leading NSF funded project titled “CC* Data Storage: High Volume Data Storage Infrastructure for Scientific Research and Education at Kennesaw State University Shared as Open Science Data Federation Data Origin.” Dr. Aygun served as a program co-chair of IEEE International Symposium on Multimedia in 2012 and 2018. He has also served on the organization and program committees of more than 60 conferences and workshops. He is also serving as an Associate Editor of IEEE Transactions on Multimedia. He is a co-author of the book titled Data Analytics for Protein Crystallization.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5047a5a6e4b0dcecada15549/7068f367-6f7d-4e62-af94-a283ab649f7b/profile_pcao3_Cao%2C+Phuong_2033_focused.jpg</image:loc>
      <image:title>2023 Fellows - Phuong Cao Research Scientist at the Cybersecurity Division at the National Center for Supercomputing Applications (NCSA) at the University of Illinois at Urbana-Champaign</image:title>
      <image:caption>Phuong Cao is a Research Scientist at the Cybersecurity Division at the National Center for Supercomputing Applications (NCSA) at the University of Illinois at Urbana-Champaign. His research mission is to secure cyberinfrastructure, in particular high performance scientific computing, e.g., Blue Waters supercomputer. He has a broad interest in security, with a multidisciplinary focus on Internet-scale measurements of operational systems, deep measurement driven analytics using probabilistic graphical models, ML/AI-driven honeypot for early attack response, and machine assisted proofs of federated authentication protocols. Prior to joining NCSA, he has had hands-on experience in the network security industry, including reverse engineering of polymorphic computer viruses, responding to globally distributed denial of service attacks (Akamai’s CDN, LinkedIn), securing the Watson Health Cloud (IBM z Systems), and formal verification of smart contracts and OAuth protocols (Microsoft).</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5047a5a6e4b0dcecada15549/230c8d26-af3e-49a0-a2b4-48352d917b6f/IMG_0556.jpg</image:loc>
      <image:title>2023 Fellows - Nick Harrison Information Security Officer for the North Carolina Community College System</image:title>
      <image:caption>Nick Harrison is an Information Security Officer for the North Carolina Community College System, where he helps staff and faculty provide secure technical solutions for the next generation of the nation's workforce. Prior to joining the Community College system, Nick was the Director of Advanced Cyberinfrastructure Services at the Renaissance Computing Institute. He has over twenty years of IT experience in higher education and enjoys learning about cloud and virtualization technologies.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5047a5a6e4b0dcecada15549/387b8d57-ed76-408e-9cba-2906ade0f815/l+sussman.jpg</image:loc>
      <image:title>2023 Fellows - Lori Sussman Assistant Professor of Technology and Cybersecurity at the University of Southern Maine.</image:title>
      <image:caption>Lori Sussman, Ed.D., is an Assistant Professor of Technology and Cybersecurity at the University of Southern Maine. She was part of the fourth class at the United States Military Academy to admit women and is a West Point graduate. Lori retired from the U.S. Army as a highly decorated colonel. Her military leadership experiences include 15th Regimental Signal Brigade Commander, 2nd Infantry Division Battalion Commander/CIO/G-6, Presidential Communications Officer, Joint Staff J-6 Executive Officer, and Assistant to the Army Chief of the Staff, as well as numerous demanding tactical assignments. Upon leaving service, Dr. Sussman worked in large and small companies, notably Cisco Systems and Hewlett Packard Enterprise (HPE). She is also an entrepreneur, having created several consulting businesses. In these varied roles, Dr. Sussman has managed a spectrum of highly complex organizations engaged in developing, integrating, deploying, and sustaining state-of-the-art technology and security solutions for clients. The Epsilon Pi Tau Technology Honor Society Awarded Dr. Sussman with the Warner Minilecture Award in 2020 and 2021 for her research about Cybersecurity Ambassadors. These individual awards followed recognition by the National Cyberwatch Center as the 2021 Most Innovative Cybersecurity Education Initiative. In 2021, Governor Mills named Dr. Sussman one of eleven veteran aides-de-camp. Her research areas include cybersecurity education, cybersecurity training and awareness, gender equity in technology and cybersecurity, and technology and cybersecurity leadership.    .</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5047a5a6e4b0dcecada15549/6fa89695-6394-42e8-a968-080aaae1b0be/TrustedCI_headshot_grogers.jpg</image:loc>
      <image:title>2023 Fellows - Dr. Gary Rogers HPC Systems Administrator for the National Institute for Computational Sciences (NICS) at the University of Tennessee</image:title>
      <image:caption>Dr. Gary Rogers earned his PhD in Computer Science from the University of Tennessee, while starting his career at the National Institute for Computational Sciences. He has over 18 years of HPC experience, many of those as an HPC administrator on some of the fastest supercomputers in the world. He played a key role in the national cyberinfrastructure projects, XSEDE and XSEDE 2.0, as the manager of the System and Operations Support group. He also participated in the XSEDE 2.0 Cybersecurity group, as well as the XSEDE Development Coordination Council. His current interests include developing and deploying secure compute platforms on which sensitive data can be analyzed, while reducing the barrier of entry for researchers to access and use such a platform. He holds an MS in Computer Science from the University of Tennessee, as well as a BS in Computer Science from the University of the South (Sewanee).</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5047a5a6e4b0dcecada15549/1d769d25-6c3c-4bd7-9865-bd7b60b904d1/full_head_shot.jpg</image:loc>
      <image:title>2023 Fellows - David White Parks, Recreation, and Tourism Management research professor at Clemson University</image:title>
      <image:caption>David White is a Parks, Recreation, and Tourism Management research professor at Clemson University. He is a Geographic Information Systems (GIS) expert with over twenty-five years in mapping, analytics, and spatial data collection. His most recent work uses mobility data to study visitation behavior in parks and protected areas. Additionally, his research has included several projects developing enterprise data and information systems requiring spatial data visualization and analytics. He holds a Ph.D. in Marine Science from the University of South Carolina.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5047a5a6e4b0dcecada15549/9f16a3b5-e51c-4294-a4d8-a92138e5afb5/headshot-Ferbert.jpg</image:loc>
      <image:title>2023 Fellows - Andrew Ferbert Platform Services manager at the San Diego Supercomputer Center (SDSC) at UC San Diego (UCSD).</image:title>
      <image:caption>Andrew Ferbert is the Platform Services manager at the San Diego Supercomputer Center (SDSC) at UC San Diego (UCSD). Andrew’s primary responsibility is supporting SDSC and UCSD researchers through managed systems, operational support, and production systems integration. Throughout his career at SDSC, Andrew has never shied away from challenges and has worked in a variety of roles including desktop support, datacenter physical security, systems administration within HIPAA and FISMA projects, and working on projects with various branches of the United States Armed Forces.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.trustedci.org/2023-cybersecurity-summit</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2025-10-28</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5047a5a6e4b0dcecada15549/baa6ad1e-2a3e-425c-9b0e-9df24f582de4/NSF-Cybersecurity-Summit-2023_web-banner_w-logo.jpg</image:loc>
      <image:title>2023  NSF Cybersecurity Summit - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.trustedci.org/2023-cfp</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2023-06-13</lastmod>
  </url>
  <url>
    <loc>https://www.trustedci.org/hotel-information</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2023-10-10</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5047a5a6e4b0dcecada15549/f8156a7c-dccf-441e-b46f-31f94e5ab085/Screenshot+2023-10-10+at+10.20.42%E2%80%AFAM.png</image:loc>
      <image:title>Hotel Information - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.trustedci.org/science-dmz</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2023-08-20</lastmod>
  </url>
  <url>
    <loc>https://www.trustedci.org/employment-opportunities</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2026-01-14</lastmod>
  </url>
  <url>
    <loc>https://www.trustedci.org/2024-nsf-cybersecurity-summit</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2025-09-26</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5047a5a6e4b0dcecada15549/6b484eef-6b37-4cdc-bea6-47083749ff1e/NSF_Cybersecurity-Summit-2023_banner.png</image:loc>
      <image:title>2024 NSF Cybersecurity Summit - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5047a5a6e4b0dcecada15549/1714747139154-HGS1QS0S5YA34AKI5PA4/Jupiter%2BZeek.jpg</image:loc>
      <image:title>2024 NSF Cybersecurity Summit</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5047a5a6e4b0dcecada15549/1714747151176-2QN0WM91XIX8EGDTU4GR/Intermediate-to-Zeek-5.jpg</image:loc>
      <image:title>2024 NSF Cybersecurity Summit</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5047a5a6e4b0dcecada15549/1714747155866-QZCLJN1ZXLMEDQAH7WUV/student+poster.jpg</image:loc>
      <image:title>2024 NSF Cybersecurity Summit</image:title>
      <image:caption />
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5047a5a6e4b0dcecada15549/1714747159277-Y2C2DYQRL4GW83H2M2R6/Mark.jpeg</image:loc>
      <image:title>2024 NSF Cybersecurity Summit</image:title>
      <image:caption />
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5047a5a6e4b0dcecada15549/1714747715399-NK40XIS74Y0YBP2T9QQD/CyberecuritySummit23_groupStaff_6195.jpg</image:loc>
      <image:title>2024 NSF Cybersecurity Summit</image:title>
      <image:caption />
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5047a5a6e4b0dcecada15549/1714747760318-KR6C4LM5GNE8EF6JP9TD/IMG_3791.jpg</image:loc>
      <image:title>2024 NSF Cybersecurity Summit</image:title>
      <image:caption />
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5047a5a6e4b0dcecada15549/1714747774461-HB0DA1NIWPGNJD6UD1LF/CyberecuritySummit23_groupALL_6162.jpg</image:loc>
      <image:title>2024 NSF Cybersecurity Summit</image:title>
      <image:caption />
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5047a5a6e4b0dcecada15549/1714751481190-AQUWPR0F87BSVRRQNFVG/IMG_3801.jpg</image:loc>
      <image:title>2024 NSF Cybersecurity Summit</image:title>
      <image:caption />
    </image:image>
  </url>
  <url>
    <loc>https://www.trustedci.org/2024-cfp-draft-in-progress</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2024-05-10</lastmod>
  </url>
  <url>
    <loc>https://www.trustedci.org/students/about</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2026-03-04</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5047a5a6e4b0dcecada15549/89941573-69f7-4031-a1c3-c3f6d314dd62/Students.jpg</image:loc>
      <image:title>Students</image:title>
    </image:image>
  </url>
  <url>
    <loc>https://www.trustedci.org/2025-nsf-cybersecurity-summit</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2026-01-13</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5047a5a6e4b0dcecada15549/34655b0e-6286-4abf-982b-dcd6a2233597/NSF_Cybersecurity-Summit-2025_banner.png</image:loc>
      <image:title>2025 NSF Cybersecurity Summit - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5047a5a6e4b0dcecada15549/020760ab-07d9-47e2-97d0-62f6c198d8fe/Denver+International+Airport+Plan+a+Trip.png</image:loc>
      <image:title>2025 NSF Cybersecurity Summit - Make it stand out</image:title>
      <image:caption>Plan your transportation to and from Denver International Airport (DIA) with the Next Ride trip planning tool (click image for link).</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.trustedci.org/2025-cfp</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2025-07-15</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5047a5a6e4b0dcecada15549/fde2ee8b-a9dd-40b1-a104-73d5dbddc557/NSF-NCAR-UCAR-logos.png</image:loc>
      <image:title>2025 CFP - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.trustedci.org/2025-students</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2025-06-11</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5047a5a6e4b0dcecada15549/543bec3a-9e93-42b3-ad84-432390014bca/MaryCyrusPhotography-WiCyS-Kofoworola-62788.jpg</image:loc>
      <image:title>2025 Students - Kofoworola Idowu</image:title>
      <image:caption>Graduate student in Cybersecurity, Yeshiva University Kofoworola is a cybersecurity graduate student with hands-on experience in systems administration, risk assessment, and vulnerability management. Enthusiastic about defending digital infrastructure and staying ahead of threats, she is excited to collaborate with Trusted CI experts. Outside of cybersecurity, she enjoys discovering new hobbies and dancing.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5047a5a6e4b0dcecada15549/833e1099-fe48-4e7a-aac5-452fb9c9cc30/IMG_0270.jpeg</image:loc>
      <image:title>2025 Students - Konstantin Metz</image:title>
      <image:caption>M.S. student in Cybersecurity &amp; Privacy, University of Central Florida Konstantin is a CyberCorps Scholarship for Service recipient and graduate student whose research focuses on dark patterns and accessibility in human-computer interaction. He brings experience from both the U.S. government and private sector in cloud security, systems administration, and incident response. With a background in IT, public relations, and cybersecurity policy, Konstantin also enjoys cooking, traveling, and exploring healthcare tech innovations. He is bilingual in German and English and plans to pursue a Ph.D.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5047a5a6e4b0dcecada15549/49a067d5-5b89-41a8-b5f7-16a02f01330f/Headshot.jpeg</image:loc>
      <image:title>2025 Students - Saquoia Cox</image:title>
      <image:caption>Graduate student in Cybersecurity Saquoia is currently pursuing her graduate degree in cybersecurity, building on a strong foundation in Accounting and Business Administration. She works as a Senior Accounting Analyst at The Walt Disney Company and serves as a peer mentor supporting students across disciplines. Passionate about the intersection of finance, digital ethics, and security, she is dedicated to helping organizations protect both data and financial integrity.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5047a5a6e4b0dcecada15549/fafeacec-0cb5-42e2-b663-21b559881840/Trina_Locklear_2022_Profile_Picture.jpg</image:loc>
      <image:title>2025 Students - Trina Locklear</image:title>
      <image:caption>Ph.D. student in Computer Science, The University of Alabama A member of the Lumbee Tribe of North Carolina, Trina is a doctoral student researching software security in high performance computing. A former GAANN fellow and intern at Lawrence Livermore National Laboratory, she is passionate about ensuring secure computational environments. In her free time, she enjoys baking—especially southern pound cake.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.trustedci.org/program-description-2025-nsf-cybersecurity-summit</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2025-10-21</lastmod>
  </url>
  <url>
    <loc>https://www.trustedci.org/student-program-details-on-application</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2026-02-17</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5047a5a6e4b0dcecada15549/89941573-69f7-4031-a1c3-c3f6d314dd62/Students.jpg</image:loc>
      <image:title>Student Program Details on Application</image:title>
    </image:image>
  </url>
  <url>
    <loc>https://www.trustedci.org/2025-fellows</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2025-09-25</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5047a5a6e4b0dcecada15549/c53ba343-df3c-4b12-82e1-d2ce82c40103/PHOTO-2024-08-08-13-06-50+%281%29.jpg</image:loc>
      <image:title>2025 Fellows - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5047a5a6e4b0dcecada15549/e3fc7bea-8350-4d9a-9b81-c0e15e31c7ab/Cabrera_Senator.jpg+2.jpg</image:loc>
      <image:title>2025 Fellows - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5047a5a6e4b0dcecada15549/e12fe3c0-7f8d-4162-9395-5ceb5fdb6698/hchi-small_v2.jpg</image:loc>
      <image:title>2025 Fellows - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5047a5a6e4b0dcecada15549/5a045d18-1db1-4252-a7e9-dcf19db77299/Vivian.jpg</image:loc>
      <image:title>2025 Fellows - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5047a5a6e4b0dcecada15549/2140e57c-c482-4a1d-bb83-b7bec05e8e27/mkandes-tcif-2025.jpg</image:loc>
      <image:title>2025 Fellows - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5047a5a6e4b0dcecada15549/be4cb2c7-0f8b-44a6-8043-54f87d55288b/Mananga+1.jpg</image:loc>
      <image:title>2025 Fellows - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5047a5a6e4b0dcecada15549/bcf04f8a-4cd6-4f7b-ac36-43c35c2c059f/Marfo_William_Headshot.jpg</image:loc>
      <image:title>2025 Fellows - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5047a5a6e4b0dcecada15549/8f78cc89-d265-46c8-a308-ec29914271e2/hp_profile.jpg</image:loc>
      <image:title>2025 Fellows - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5047a5a6e4b0dcecada15549/27a64e21-ee69-48a5-bf2c-06d3ce453517/PengyinShan-NCSA.jpg</image:loc>
      <image:title>2025 Fellows - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5047a5a6e4b0dcecada15549/98bf7fcb-71ed-4da4-8f0a-d540ce47b857/nitin_pic.jpg</image:loc>
      <image:title>2025 Fellows - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.trustedci.org/2026-regional-summit</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2026-03-31</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5047a5a6e4b0dcecada15549/89528339-5d79-4870-a065-f601ec28d510/rough+mockup+a.png</image:loc>
      <image:title>2026 Regional Summit - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5047a5a6e4b0dcecada15549/5c1a35b6-7319-414c-a422-6a14c1a62f3e/Trusted+Regional+Summit+4.21.26-4.22.jpg</image:loc>
      <image:title>2026 Regional Summit - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.trustedci.org/framework/implementation</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2025-10-21</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5047a5a6e4b0dcecada15549/1614194926644-WRL8OCB7W7N84YWMZARB/Large+All+Pillars.png</image:loc>
      <image:title>Implementation Guidance</image:title>
    </image:image>
  </url>
  <url>
    <loc>https://www.trustedci.org/framework/templates</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2026-02-12</lastmod>
  </url>
  <url>
    <loc>https://www.trustedci.org/framework</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2025-10-20</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5047a5a6e4b0dcecada15549/1614194926644-WRL8OCB7W7N84YWMZARB/Large+All+Pillars.png</image:loc>
      <image:title>Framework - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5047a5a6e4b0dcecada15549/158ec573-471c-4c0b-8a58-4ea02a5030ee/framework-adopters-2.28.25.png</image:loc>
      <image:title>Framework - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5047a5a6e4b0dcecada15549/12768a7d-4223-4d95-bf68-4fd5eabfb2e1/tci-framework-badge-download.png</image:loc>
      <image:title>Framework - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.trustedci.org/framework/core</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2025-10-21</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5047a5a6e4b0dcecada15549/1614194851568-65WF5TUX8E28I3IS27U6/Large+Blue+Pillar.png</image:loc>
      <image:title>Framework Core</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5047a5a6e4b0dcecada15549/1614194785868-Y5SHSZ19EQ4IP1VTZZR8/Large+Purple+Pillar.png</image:loc>
      <image:title>Framework Core</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5047a5a6e4b0dcecada15549/1614194725423-IW5YTMUA3ZCAU3ZQQVE7/Large+Green+Pillar.png</image:loc>
      <image:title>Framework Core</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5047a5a6e4b0dcecada15549/1614194675711-C1ILA6IKZYQVZFA361NS/Large+Red+Pillar.png</image:loc>
      <image:title>Framework Core</image:title>
    </image:image>
  </url>
  <url>
    <loc>https://www.trustedci.org/2026-nsf-cybersecurity-summit</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2026-02-19</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5047a5a6e4b0dcecada15549/4fa92c06-9bfd-4673-91c0-285a4e6299f1/mockup+a+%281%29.png</image:loc>
      <image:title>2026 NSF Cybersecurity Summit - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.trustedci.org/scholars-faq</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2026-02-17</lastmod>
  </url>
  <url>
    <loc>https://www.trustedci.org/secure-ai</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2026-03-19</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5047a5a6e4b0dcecada15549/1771973225450-5OKVBKFDZU0RLTW927YG/unsplash-image-5fNmWej4tAA.jpg</image:loc>
      <image:title>Secure Use Of AI</image:title>
    </image:image>
  </url>
  <url>
    <loc>https://www.trustedci.org/home</loc>
    <changefreq>daily</changefreq>
    <priority>1.0</priority>
    <lastmod>2026-03-06</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5047a5a6e4b0dcecada15549/b80aecd7-35ab-41c6-ae42-aba5d331309c/CyberecuritySummit23_groupALL_6162.jpg</image:loc>
      <image:title>Home - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.trustedci.org/research-security</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2026-03-06</lastmod>
  </url>
</urlset>

