<?xml version="1.0" encoding="UTF-8"?>
<?xml-stylesheet type="text/xsl" href="https://josephmarashlian.com/sitemap-stylesheet.xsl"?>
<urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:schemaLocation="http://www.sitemaps.org/schemas/sitemap/0.9 http://www.sitemaps.org/schemas/sitemap/0.9/sitemap.xsd" xmlns:image="http://www.google.com/schemas/sitemap-image/1.1" xmlns:xhtml="http://www.w3.org/1999/xhtml">
  <url>
    <loc>https://josephmarashlian.com/how-smart-companies-use-technology-to-move-faster/</loc>
    <lastmod>2026-01-28T08:28:59+00:00</lastmod>
    <image:image>
      <image:loc>https://josephmarashlian.com/wp-content/uploads/2026/01/Joseph-Marashlian-CIO-Move-Faster-With-Technology.png</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://josephmarashlian.com/wp-content/uploads/2026/01/how-smart-companies-use-technology-to-move-faster.png</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://josephmarashlian.com/wp-content/uploads/2026/01/Joseph-Marashlian-Speed-Without-Control-Is-Not-Speed.png</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://josephmarashlian.com/wp-content/uploads/2025/12/it-leadership-gap-cio-strategy.png</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://josephmarashlian.com/wp-content/uploads/2026/01/Joseph-Marashlian-CIO-Partner.png</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://josephmarashlian.com/it-leadership-gap-cio-strategy/</loc>
    <lastmod>2026-01-12T02:40:51+00:00</lastmod>
    <image:image>
      <image:loc>https://josephmarashlian.com/wp-content/uploads/2025/12/Joseph-Marashlian-IT-Leadership-Gap.png</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://josephmarashlian.com/wp-content/uploads/2025/12/Joseph-Marashlian-Closing-The-Gap.png</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://josephmarashlian.com/wp-content/uploads/2025/12/it-problems-leadership-gap.png</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://josephmarashlian.com/wp-content/uploads/2025/12/it-strategy-business-alignment-six-steps-1024x484.png</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://josephmarashlian.com/wp-content/uploads/2025/12/Joseph-Marashlian-Closing-The-Gap.png</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://josephmarashlian.com/cloud-migration-mistakes/</loc>
    <lastmod>2025-11-24T21:50:03+00:00</lastmod>
    <image:image>
      <image:loc>https://josephmarashlian.com/wp-content/uploads/2025/11/Joseph-Marashlian-Cloud-Migration-Azure-Entra-ID-AWS-1.png</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://josephmarashlian.com/wp-content/uploads/2025/11/cloud-migration-mistakes-enterprise-sidebar.png</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://josephmarashlian.com/wp-content/uploads/2025/11/cloud-migration-no-architecture-plan-thumbnail-768x768.png</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://josephmarashlian.com/wp-content/uploads/2025/11/underestimating-cloud-costs-thumbnail-768x768.png</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://josephmarashlian.com/wp-content/uploads/2025/11/weak-identity-and-access-strategy-768x768.png</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://josephmarashlian.com/wp-content/uploads/2025/11/moving-everything-at-once-thumbnail-768x768.png</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://josephmarashlian.com/wp-content/uploads/2025/11/ignoring-security-hardening-thumbnail-768x768.png</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://josephmarashlian.com/cybersecurity-risk-reduction-moves/</loc>
    <lastmod>2025-11-24T21:50:26+00:00</lastmod>
    <image:image>
      <image:loc>https://josephmarashlian.com/wp-content/uploads/2025/11/Joseph-Marashlian-5-Practical-Moves-Reduce-Cybersecurity-Risks.png</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://josephmarashlian.com/wp-content/uploads/2025/09/5-practical-cybersecurity-moves-sidebar-683x1024.png</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://josephmarashlian.com/wp-content/uploads/2025/09/multifactor-authentication-security-thumbnail-768x768.png</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://josephmarashlian.com/wp-content/uploads/2025/09/patch-the-systems-cybersecurity-thumbnail-768x768.png</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://josephmarashlian.com/wp-content/uploads/2025/09/strengthen-email-security-thumbnail-768x768.png</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://josephmarashlian.com/wp-content/uploads/2025/09/endpoint-security-thumbnail-768x768.png</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://josephmarashlian.com/wp-content/uploads/2025/09/real-time-monitoring-automated-remediation-thumb-768x768.png</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://josephmarashlian.com/it-environment-resilience/</loc>
    <lastmod>2025-11-24T21:51:02+00:00</lastmod>
    <image:image>
      <image:loc>https://josephmarashlian.com/wp-content/uploads/2025/11/Joseph-Marashlian-IT-Environment-Cyber-Security.png</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://josephmarashlian.com/wp-content/uploads/2025/09/it-environment-resilience-infrastructure-security-683x1024.png</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://josephmarashlian.com/wp-content/uploads/2025/09/lack-of-standardization-thumbnail-768x768.png</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://josephmarashlian.com/wp-content/uploads/2025/09/no-real-time-visibility-thumbnail-768x768.png</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://josephmarashlian.com/wp-content/uploads/2025/09/fragmented-cybersecurity-thumbnail-joseph-marashlian-768x768.png</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://josephmarashlian.com/wp-content/uploads/2025/09/business-continuity-redundancy-plan-thumbnail-768x768.png</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://josephmarashlian.com/wp-content/uploads/2025/09/infrastructure-hardening-modernization-thumbnail-768x768.png</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://josephmarashlian.com/wp-content/uploads/2025/09/cybersecurity-built-into-every-layer-thumbnail-768x768.png</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://josephmarashlian.com/wp-content/uploads/2025/09/business-continuity-and-disaster-recovery-thumbnail-768x768.png</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://josephmarashlian.com/wp-content/uploads/2025/09/proactive-monitoring-automated-remediation-thumbnail-768x768.png</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://josephmarashlian.com/wp-content/uploads/2025/09/executive-level-reporting-and-governance-thumbnail-768x768.png</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://josephmarashlian.com/hipaa-and-soc-2-compliance-controls/</loc>
    <lastmod>2025-11-24T21:49:41+00:00</lastmod>
    <image:image>
      <image:loc>https://josephmarashlian.com/wp-content/uploads/2025/11/Joseph-Marashlian-HIPAA-And-SOC-2-Compliance.png</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://josephmarashlian.com/wp-content/uploads/2025/11/new-compliance-rules-hipaa-soc2-joseph-marashlian-cio.png</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://josephmarashlian.com/wp-content/uploads/2025/11/identity-access-hardening-joseph-marashlian-cio-768x768.png</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://josephmarashlian.com/wp-content/uploads/2025/11/endpoint-access-hardening-joseph-marashlian-cio.png</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://josephmarashlian.com/wp-content/uploads/2025/11/secure-cloud-infrastructure-joseph-marashlian-cio-768x768.png</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://josephmarashlian.com/wp-content/uploads/2025/11/vulnerability-patch-management-joseph-marashlian-cio-768x768.png</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://josephmarashlian.com/wp-content/uploads/2025/11/logging-evidence-collection-monitoring-joseph-marashlian-cio-768x768.png</image:loc>
    </image:image>
  </url>
  <url>
    <loc>https://josephmarashlian.com/ai-rewriting-the-enterprise-playbook/</loc>
    <lastmod>2025-11-24T21:52:02+00:00</lastmod>
    <image:image>
      <image:loc>https://josephmarashlian.com/wp-content/uploads/2025/11/Joseph-Marashlian-AI-Technology-In-Business.png</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://josephmarashlian.com/wp-content/uploads/2025/11/ai-reshaping-modern-enterprise.png</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://josephmarashlian.com/wp-content/uploads/2025/11/ai-clarity-and-purpose-768x512.png</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://josephmarashlian.com/wp-content/uploads/2025/11/ai-ethical-secure-implementation-768x512.png</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://josephmarashlian.com/wp-content/uploads/2025/11/ai-change-management-team-enablement-768x512.png</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://josephmarashlian.com/wp-content/uploads/2025/11/ai-governance-oversight-768x512.png</image:loc>
    </image:image>
    <image:image>
      <image:loc>https://josephmarashlian.com/wp-content/uploads/2025/11/ai-integration-existing-systems-768x512.png</image:loc>
    </image:image>
  </url>
</urlset>
