<?xml version="1.0" encoding="UTF-8"?>
<urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9">
<url>
<loc>https://scottaltiparmak.com</loc>
<lastmod>2026-04-03T20:49:20.783Z</lastmod>
<changefreq>weekly</changefreq>
<priority>1</priority>
</url>
<url>
<loc>https://scottaltiparmak.com/about</loc>
<lastmod>2026-04-03T20:49:20.783Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://scottaltiparmak.com/speaking</loc>
<lastmod>2026-04-03T20:49:20.783Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://scottaltiparmak.com/blog</loc>
<lastmod>2026-04-03T20:49:20.783Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://scottaltiparmak.com/projects</loc>
<lastmod>2026-04-03T20:49:20.783Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://scottaltiparmak.com/research</loc>
<lastmod>2026-04-03T20:49:20.783Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://scottaltiparmak.com/research/report</loc>
<lastmod>2026-04-03T20:49:20.783Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://scottaltiparmak.com/newsletter</loc>
<lastmod>2026-04-03T20:49:20.783Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://scottaltiparmak.com/newsletter/archive</loc>
<lastmod>2026-04-03T20:49:20.783Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.6</priority>
</url>
<url>
<loc>https://scottaltiparmak.com/contact</loc>
<lastmod>2026-04-03T20:49:20.783Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://scottaltiparmak.com/feed.xml</loc>
<lastmod>2026-04-03T20:49:20.783Z</lastmod>
</url>
<url>
<loc>https://scottaltiparmak.com/blog/pbsc-cyber-symposium-how-security-teams-use-ai</loc>
<lastmod>2026-04-03T00:00:00.000Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://scottaltiparmak.com/blog/preliminary-findings-ai-phishing-detection-153-participants</loc>
<lastmod>2026-04-03T00:00:00.000Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://scottaltiparmak.com/blog/why-game-mechanics-work-for-security-training</loc>
<lastmod>2026-03-29T00:00:00.000Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://scottaltiparmak.com/blog/threat-terminal-v2-pvp-is-here</loc>
<lastmod>2026-03-27T00:00:00.000Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://scottaltiparmak.com/blog/threat-terminal-v2-whats-coming</loc>
<lastmod>2026-03-24T00:00:00.000Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://scottaltiparmak.com/blog/100-participants-initial-findings</loc>
<lastmod>2026-03-20T00:00:00.000Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://scottaltiparmak.com/blog/pilot-data-which-phishing-techniques-fool-people</loc>
<lastmod>2026-03-15T00:00:00.000Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://scottaltiparmak.com/blog/fluent-prose-the-phishing-technique-training-ignores</loc>
<lastmod>2026-03-15T00:00:00.000Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://scottaltiparmak.com/blog/phishing-contextual-signals</loc>
<lastmod>2026-03-13T00:00:00.000Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://scottaltiparmak.com/blog/what-happens-when-ai-makes-every-phishing-email-perfect</loc>
<lastmod>2026-03-11T00:00:00.000Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://scottaltiparmak.com/blog/building-phishing-detection-dataset-claude-api</loc>
<lastmod>2026-03-09T00:00:00.000Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://scottaltiparmak.com/blog/building-retro-phish-what-went-wrong</loc>
<lastmod>2026-03-08T00:00:00.000Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://scottaltiparmak.com/blog/threat-intelligence-tarot</loc>
<lastmod>2026-03-06T00:00:00.000Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://scottaltiparmak.com/blog/retro-phish-research</loc>
<lastmod>2026-03-04T00:00:00.000Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://scottaltiparmak.com/blog/why-your-entra-tenant-has-orphaned-apps</loc>
<lastmod>2026-02-28T00:00:00.000Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://scottaltiparmak.com/blog/security-is-applied-it</loc>
<lastmod>2026-02-28T00:00:00.000Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://scottaltiparmak.com/blog/offensive-security-makes-you-a-better-defender</loc>
<lastmod>2025-12-20T00:00:00.000Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://scottaltiparmak.com/blog/breaking-into-cybersecurity-a-roadmap-for-students</loc>
<lastmod>2025-05-30T00:00:00.000Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://scottaltiparmak.com/blog/tag/AI</loc>
<lastmod>2026-04-03T20:49:20.789Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://scottaltiparmak.com/blog/tag/Blue%20Team</loc>
<lastmod>2026-04-03T20:49:20.789Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://scottaltiparmak.com/blog/tag/Career</loc>
<lastmod>2026-04-03T20:49:20.789Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://scottaltiparmak.com/blog/tag/Claude%20API</loc>
<lastmod>2026-04-03T20:49:20.789Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://scottaltiparmak.com/blog/tag/Cybersecurity</loc>
<lastmod>2026-04-03T20:49:20.789Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://scottaltiparmak.com/blog/tag/Defense</loc>
<lastmod>2026-04-03T20:49:20.789Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://scottaltiparmak.com/blog/tag/Entra%20ID</loc>
<lastmod>2026-04-03T20:49:20.789Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://scottaltiparmak.com/blog/tag/Game%20Design</loc>
<lastmod>2026-04-03T20:49:20.789Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://scottaltiparmak.com/blog/tag/Getting%20Started</loc>
<lastmod>2026-04-03T20:49:20.789Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://scottaltiparmak.com/blog/tag/IAM</loc>
<lastmod>2026-04-03T20:49:20.789Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://scottaltiparmak.com/blog/tag/Identity</loc>
<lastmod>2026-04-03T20:49:20.789Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://scottaltiparmak.com/blog/tag/MITRE%20ATT%26CK</loc>
<lastmod>2026-04-03T20:49:20.789Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://scottaltiparmak.com/blog/tag/Offensive%20Security</loc>
<lastmod>2026-04-03T20:49:20.789Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://scottaltiparmak.com/blog/tag/Phishing</loc>
<lastmod>2026-04-03T20:49:20.789Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://scottaltiparmak.com/blog/tag/Projects</loc>
<lastmod>2026-04-03T20:49:20.789Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://scottaltiparmak.com/blog/tag/Research</loc>
<lastmod>2026-04-03T20:49:20.789Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://scottaltiparmak.com/blog/tag/Security%20Awareness</loc>
<lastmod>2026-04-03T20:49:20.789Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://scottaltiparmak.com/blog/tag/Security%20Engineering</loc>
<lastmod>2026-04-03T20:49:20.789Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://scottaltiparmak.com/blog/tag/Speaking</loc>
<lastmod>2026-04-03T20:49:20.789Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://scottaltiparmak.com/blog/tag/Students</loc>
<lastmod>2026-04-03T20:49:20.789Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://scottaltiparmak.com/blog/tag/Threat%20Intelligence</loc>
<lastmod>2026-04-03T20:49:20.789Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.5</priority>
</url>
<url>
<loc>https://scottaltiparmak.com/blog/tag/Threat%20Terminal</loc>
<lastmod>2026-04-03T20:49:20.789Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.5</priority>
</url>
</urlset>
