<?xml version="1.0" encoding="utf-8" standalone="yes"?><urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9" xmlns:xhtml="http://www.w3.org/1999/xhtml"><url><loc>/previous_events/2022_04/-my-why-.-how-fraud-and-identity-theft-led-me-into-cyber-defence-and-operation/</loc><lastmod>2022-09-04T00:00:00+10:00</lastmod></url><url><loc>/previous_events/2022_04/usr-bin-purl-or-why-learning-to-knit-made-me-a-better-cyber-professional/</loc><lastmod>2022-09-04T00:00:00+10:00</lastmod></url><url><loc>/previous_events/2022_04/a-deep-dive-into-winning-infosec-using-stickiness-and-oiliness/</loc><lastmod>2022-09-04T00:00:00+10:00</lastmod></url><url><loc>/previous_events/2022_04/an-unconvential-career-path.-from-hr-to-cyber./</loc><lastmod>2022-09-04T00:00:00+10:00</lastmod></url><url><loc>/previous_events/2022_04/back-to-basics-aka-why-cant-we-get-this-shit-right-/</loc><lastmod>2022-09-04T00:00:00+10:00</lastmod></url><url><loc>/previous_events/2022_04/beg-bounty-hall-of-f-shame/</loc><lastmod>2022-09-04T00:00:00+10:00</lastmod></url><url><loc>/previous_events/2022_04/build-amazing-things-securely/</loc><lastmod>2022-09-04T00:00:00+10:00</lastmod></url><url><loc>/previous_events/2022_04/building-security-workflows-using-open-source-tools/</loc><lastmod>2022-09-04T00:00:00+10:00</lastmod></url><url><loc>/previous_events/2022_04/career-transition--a-give-and-take-love-story/</loc><lastmod>2022-09-04T00:00:00+10:00</lastmod></url><url><loc>/categories/</loc><lastmod>2022-09-04T00:00:00+10:00</lastmod></url><url><loc>/</loc><lastmod>2022-09-04T00:00:00+10:00</lastmod></url><url><loc>/categories/comfycon-au-2022-winter/</loc><lastmod>2022-09-04T00:00:00+10:00</lastmod></url><url><loc>/previous_events/2022_04/</loc><lastmod>2022-09-04T00:00:00+10:00</lastmod></url><url><loc>/previous_events/2022_04/communicating-cyber---simple-tips-you-can-implement-to-level-up-your-influence/</loc><lastmod>2022-09-04T00:00:00+10:00</lastmod></url><url><loc>/previous_events/2022_04/control-supply-chain-threats-in-your-website/</loc><lastmod>2022-09-04T00:00:00+10:00</lastmod></url><url><loc>/previous_events/2022_04/covert-communication-channels-using-lora/</loc><lastmod>2022-09-04T00:00:00+10:00</lastmod></url><url><loc>/previous_events/2022_04/dancing-not-wrestling--moving-from-compliance-to-concordance-for-secure-software-developmen/</loc><lastmod>2022-09-04T00:00:00+10:00</lastmod></url><url><loc>/previous_events/2022_04/defence-against-the-dark-arts--learning-the-difference-between-a-security-strategy-and-a-plan/</loc><lastmod>2022-09-04T00:00:00+10:00</lastmod></url><url><loc>/previous_events/2022_04/deus-ex-promised-me-cool-augments-and-all-i-got-was-dystopia--when-do-i-get-my-robot-legs-and-will-they-get-hacked-/</loc><lastmod>2022-09-04T00:00:00+10:00</lastmod></url><url><loc>/previous_events/2022_04/dmarc-for-beginners-or-deflecting-bounty-begging/</loc><lastmod>2022-09-04T00:00:00+10:00</lastmod></url><url><loc>/previous_events/2022_04/homing-pigeons-teapots-and-pegs--a-beginners-guide-to-satirical-standards-april-fools-day-rfcs/</loc><lastmod>2022-09-04T00:00:00+10:00</lastmod></url><url><loc>/previous_events/2022_04/how-do-you-solve-a-cyber-problem-like-small-business-/</loc><lastmod>2022-09-04T00:00:00+10:00</lastmod></url><url><loc>/previous_events/2022_04/human-factor-engineering-in-the-sdlc/</loc><lastmod>2022-09-04T00:00:00+10:00</lastmod></url><url><loc>/previous_events/2022_04/insider-risks---what-should-we-be-looking-for-/</loc><lastmod>2022-09-04T00:00:00+10:00</lastmod></url><url><loc>/previous_events/2022_04/parables-for-self-care/</loc><lastmod>2022-09-04T00:00:00+10:00</lastmod></url><url><loc>/previous_events/2022_04/pentesting---the-first-6-months/</loc><lastmod>2022-09-04T00:00:00+10:00</lastmod></url><url><loc>/previous_events/2022_04/preventing-iis-exploitation-through-the-windows-kernel/</loc><lastmod>2022-09-04T00:00:00+10:00</lastmod></url><url><loc>/previous_events/</loc><lastmod>2022-09-04T00:00:00+10:00</lastmod></url><url><loc>/previous_events/2022_04/quantum-computing-what-is-it-good-for-/</loc><lastmod>2022-09-04T00:00:00+10:00</lastmod></url><url><loc>/previous_events/2022_04/scanning-millions-of-domains-and-compromising-the-email-supply-chain-of-australias-most-respected-institutions/</loc><lastmod>2022-09-04T00:00:00+10:00</lastmod></url><url><loc>/previous_events/2022_04/the-birth-of-the-surveillance-state-in-artefacts/</loc><lastmod>2022-09-04T00:00:00+10:00</lastmod></url><url><loc>/previous_events/2022_04/the-joy-of-security--politics-infighting-and-other-failure-modes-for-security-programs/</loc><lastmod>2022-09-04T00:00:00+10:00</lastmod></url><url><loc>/previous_events/2022_04/tips-to-alleviate-your-iso27001-certification-journey/</loc><lastmod>2022-09-04T00:00:00+10:00</lastmod></url><url><loc>/previous_events/2022_04/write-makes-right/</loc><lastmod>2022-09-04T00:00:00+10:00</lastmod></url><url><loc>/previous_events/2020_04/access-your-social-media-archives/</loc><lastmod>2020-04-11T00:00:00+10:00</lastmod></url><url><loc>/previous_events/2020_04/an-introduction-to-drone-security/</loc><lastmod>2020-04-11T00:00:00+10:00</lastmod></url><url><loc>/previous_events/2020_04/automating-the-boring/</loc><lastmod>2020-04-11T00:00:00+10:00</lastmod></url><url><loc>/previous_events/2020_04/careers-panel/</loc><lastmod>2020-04-11T00:00:00+10:00</lastmod></url><url><loc>/previous_events/2020_04/code-that-gets-you-pwns_d/</loc><lastmod>2020-04-11T00:00:00+10:00</lastmod></url><url><loc>/categories/comfycon-au-2020-winter/</loc><lastmod>2020-04-11T00:00:00+10:00</lastmod></url><url><loc>/previous_events/2020_04/</loc><lastmod>2020-04-11T00:00:00+10:00</lastmod></url><url><loc>/previous_events/2020_04/cv-workshop/</loc><lastmod>2020-04-11T00:00:00+10:00</lastmod></url><url><loc>/previous_events/2020_04/dependencies_-barely-managing/</loc><lastmod>2020-04-11T00:00:00+10:00</lastmod></url><url><loc>/previous_events/2020_04/digging-deeper-with-velociraptor---dfir-beast-mode/</loc><lastmod>2020-04-11T00:00:00+10:00</lastmod></url><url><loc>/previous_events/2020_04/disclose.io---vulnerability-disclosure-and-hacker-safeharbor-in-2020/</loc><lastmod>2020-04-11T00:00:00+10:00</lastmod></url><url><loc>/previous_events/2020_04/fireside-chat-with-tilley/</loc><lastmod>2020-04-11T00:00:00+10:00</lastmod></url><url><loc>/previous_events/2020_04/good-incident-response-more-than-just-tech-stuff/</loc><lastmod>2020-04-11T00:00:00+10:00</lastmod></url><url><loc>/previous_events/2020_04/hanging-on-the-telephone_-hacking-voip/</loc><lastmod>2020-04-11T00:00:00+10:00</lastmod></url><url><loc>/previous_events/2020_04/how-to-fight-a-virus-with-a-spreadsheet/</loc><lastmod>2020-04-11T00:00:00+10:00</lastmod></url><url><loc>/previous_events/2020_04/how-to-keep-kickass-women-in-tech---take-a-lesson-from-snowboarding/</loc><lastmod>2020-04-11T00:00:00+10:00</lastmod></url><url><loc>/previous_events/2020_04/how-to-sort-your-sabotage-plans/</loc><lastmod>2020-04-11T00:00:00+10:00</lastmod></url><url><loc>/previous_events/2020_04/introduction-to-lockpicking/</loc><lastmod>2020-04-11T00:00:00+10:00</lastmod></url><url><loc>/previous_events/2020_04/is-there-anyone-on-board-who-can-fly-a-devsecops-plane_/</loc><lastmod>2020-04-11T00:00:00+10:00</lastmod></url><url><loc>/previous_events/2020_04/lies-deception-and-fantasy/</loc><lastmod>2020-04-11T00:00:00+10:00</lastmod></url><url><loc>/previous_events/2020_04/meditation-for-crisis-professionals/</loc><lastmod>2020-04-11T00:00:00+10:00</lastmod></url><url><loc>/previous_events/2020_04/osint-a-learning-journey/</loc><lastmod>2020-04-11T00:00:00+10:00</lastmod></url><url><loc>/previous_events/2020_04/overcoming-cyber-performance-anxiety_-the-continuous-cyber-maturity-model/</loc><lastmod>2020-04-11T00:00:00+10:00</lastmod></url><url><loc>/previous_events/2020_04/pwnagotchi-your-new-digital-pet/</loc><lastmod>2020-04-11T00:00:00+10:00</lastmod></url><url><loc>/previous_events/2020_04/security-at-the-speed-of-devops/</loc><lastmod>2020-04-11T00:00:00+10:00</lastmod></url><url><loc>/previous_events/2020_04/the-cia-triad_-staying-sane-in-crazy-times/</loc><lastmod>2020-04-11T00:00:00+10:00</lastmod></url><url><loc>/previous_events/2020_04/things-to-do-with-a-faraday-cage/</loc><lastmod>2020-04-11T00:00:00+10:00</lastmod></url><url><loc>/previous_events/2020_04/using-interlace-for-organising-tests-and-multithreading-over-targets/</loc><lastmod>2020-04-11T00:00:00+10:00</lastmod></url><url><loc>/previous_events/2020_04/vulnerability-research-as-a-lifestyle/</loc><lastmod>2020-04-11T00:00:00+10:00</lastmod></url><url><loc>/previous_events/2020_04/why-you-should-go-get-it/</loc><lastmod>2020-04-11T00:00:00+10:00</lastmod></url><url><loc>/previous_events/2020_04/zero-trust-...-it-is-not-just-about-infrastructure/</loc><lastmod>2020-04-11T00:00:00+10:00</lastmod></url><url><loc>/homepage/</loc></url><url><loc>/previous_events/2022_11/30000-years-of-longing---explorations-of-human-desire-and-technological-yearning/</loc></url><url><loc>/previous_events/2022_11/a-comfy-introduction-to-amateur-radio/</loc></url><url><loc>/speakers/aaron/</loc></url><url><loc>/speakers/adam-mccarthy/</loc></url><url><loc>/speakers/alex-bek/</loc></url><url><loc>/speakers/alex-tilley/</loc></url><url><loc>/speakers/alexei-doudkine/</loc></url><url><loc>/speakers/allen-baranov/</loc></url><url><loc>/speakers/andrew-mcdonnell/</loc></url><url><loc>/speakers/andrew-scully/</loc></url><url><loc>/speakers/angela-kamaru/</loc></url><url><loc>/previous_events/2022_11/applying-first-nations-philosophy-to-cyber-security-strategies./</loc></url><url><loc>/speakers/attacus/</loc></url><url><loc>/previous_events/2024_04/backing-up-your-tech-career--building-redundancy-in-the-face-of-redundancy/</loc></url><url><loc>/speakers/beau-faull/</loc></url><url><loc>/speakers/bec-caldwell/</loc></url><url><loc>/speakers/bec-millwood/</loc></url><url><loc>/speakers/ben-gittins/</loc></url><url><loc>/speakers/ben-waters/</loc></url><url><loc>/speakers/benzies/</loc></url><url><loc>/speakers/bianca-binns/</loc></url><url><loc>/speakers/bigdaddy/</loc></url><url><loc>/previous_events/2024_04/biohacking-wellness--physical-and-mental/</loc></url><url><loc>/speakers/blake-mcdermott/</loc></url><url><loc>/blog/</loc></url><url><loc>/speakers/bronwyn-mercer/</loc></url><url><loc>/previous_events/2020_11/building-a-vibrant-and-competitive-ecosystem/</loc></url><url><loc>/speakers/cairo/</loc></url><url><loc>/speakers/caitlin/</loc></url><url><loc>/speakers/cam-la/</loc></url><url><loc>/speakers/casey-ellis/</loc></url><url><loc>/cfp/</loc></url><url><loc>/cfp/cfp_writing/</loc></url><url><loc>/speakers/chloe-pang/</loc></url><url><loc>/speakers/civilized/</loc></url><url><loc>/speakers/claire-carpenter/</loc></url><url><loc>/previous_events/2022_11/code-graphology--how-to-study-an-exploit-to-identify-developer-habits-and-discover-more/</loc></url><url><loc>/code-of-conduct/</loc></url><url><loc>/speakers/cole-cornford/</loc></url><url><loc>/categories/comfycon-au-2020-summer/</loc></url><url><loc>/categories/comfycon-au-2022-summer/</loc></url><url><loc>/categories/comfycon-au-2024-winter/</loc></url><url><loc>/previous_events/2024_04/</loc></url><url><loc>/previous_events/2020_11/</loc></url><url><loc>/previous_events/2022_11/</loc></url><url><loc>/previous_events/2025_09/</loc></url><url><loc>/previous_events/2024_04/comfycon-intermission/</loc></url><url><loc>/speakers/corch/</loc></url><url><loc>/previous_events/2020_11/cyber-security-adulting/</loc></url><url><loc>/previous_events/2022_11/cyber-startup-101/</loc></url><url><loc>/previous_events/2022_11/cyborg-security--the-implications-of-human-iot-devices/</loc></url><url><loc>/speakers/danarchi/</loc></url><url><loc>/speakers/david-arthur/</loc></url><url><loc>/speakers/dawn/</loc></url><url><loc>/speakers/debi-ashenden/</loc></url><url><loc>/previous_events/2022_11/decoding-infrastructure-as-code-security/</loc></url><url><loc>/previous_events/2020_11/digital-forensics-for-compressed-files/</loc></url><url><loc>/previous_events/2022_11/diy-threat-hunting-program/</loc></url><url><loc>/speakers/downunderctf/</loc></url><url><loc>/previous_events/2020_11/downunderctf--australias-largest-ctf-in-a-nutshell/</loc></url><url><loc>/speakers/edward-farrell/</loc></url><url><loc>/speakers/eleanor-mcmurtry/</loc></url><url><loc>/previous_events/2024_04/embracing-the-power-of-neurodiversity-in-cybersecurity/</loc></url><url><loc>/speakers/emily-holyoake/</loc></url><url><loc>/speakers/faith/</loc></url><url><loc>/previous_events/2024_04/from-pollen-to-protocols--diversifying-the-landscape-of-cyber-risk./</loc></url><url><loc>/previous_events/2020_11/function-similarity-using-machine-learning/</loc></url><url><loc>/speakers/garth/</loc></url><url><loc>/speakers/george-coldham/</loc></url><url><loc>/speakers/gitanjali/</loc></url><url><loc>/previous_events/2024_04/grc-is-for-everyone--demystifying-the-what-where-and-why-of-governance-risk--compliance-in-australia/</loc></url><url><loc>/previous_events/2024_04/green-fields-for-a-green-analyst--my-first-90-days-in-cyber-with-no-experience-and-no-security-program/</loc></url><url><loc>/previous_events/2020_11/guardians-of-the-cloud--the-sysadmins-guide-to-cloud-security/</loc></url><url><loc>/speakers/gyle/</loc></url><url><loc>/previous_events/2022_11/hack-your-people-networks--applying-red-and-blue-teaming-to-your-career/</loc></url><url><loc>/previous_events/2024_04/hacking-humanity--ethical-strategies-for-influence-and-connection/</loc></url><url><loc>/speakers/hal-pomeranz/</loc></url><url><loc>/speakers/hannah-mckelvie/</loc></url><url><loc>/speakers/hilt86/</loc></url><url><loc>/speakers/hoodiepony/</loc></url><url><loc>/previous_events/2022_11/how-to-prevent-women-joining-cyber-and-keep-other-underrepresented-identities-out-too-satire/</loc></url><url><loc>/previous_events/2024_04/influencing-security-with-no-authority---lessons-from-the-field/</loc></url><url><loc>/previous_events/2022_11/inside-the-mind-of-a-con-artist/</loc></url><url><loc>/previous_events/2024_04/introduction-to-threat-modelling/</loc></url><url><loc>/previous_events/2020_11/it-starts-with-a-question---inquiry-for-cyber-security/</loc></url><url><loc>/speakers/jailbreak/</loc></url><url><loc>/speakers/james-cooper/</loc></url><url><loc>/speakers/jas-wooley/</loc></url><url><loc>/speakers/jess-dodson/</loc></url><url><loc>/speakers/jill-taylor/</loc></url><url><loc>/speakers/josh-armitage/</loc></url><url><loc>/speakers/josh-lemon/</loc></url><url><loc>/speakers/kane-narraway/</loc></url><url><loc>/speakers/kas/</loc></url><url><loc>/speakers/katnissmelb/</loc></url><url><loc>/speakers/kaz/</loc></url><url><loc>/speakers/keira/</loc></url><url><loc>/speakers/kirk-nicholls/</loc></url><url><loc>/previous_events/2024_04/know-your-avatar--mods-energy-drinks-and-the-vibrant-contested-world-of-online-gaming/</loc></url><url><loc>/speakers/kristine-sihto/</loc></url><url><loc>/speakers/kronicd/</loc></url><url><loc>/speakers/laura-bell/</loc></url><url><loc>/previous_events/2022_11/lawyer-up-how-to-translate-tech-speak-to-business-speak/</loc></url><url><loc>/previous_events/2020_11/lets-talk-cfps---stop-putting-off-that-conference-submission/</loc></url><url><loc>/speakers/lidia/</loc></url><url><loc>/speakers/lissette/</loc></url><url><loc>/speakers/louis/</loc></url><url><loc>/speakers/mm/</loc></url><url><loc>/previous_events/2020_11/magecart---modern-web-attacks-for-fun-and-profit/</loc></url><url><loc>/speakers/marshmallow/</loc></url><url><loc>/speakers/matt-belvedere/</loc></url><url><loc>/speakers/matt-strahan/</loc></url><url><loc>/speakers/mattg/</loc></url><url><loc>/previous_events/2020_11/mental-health-in-infosec---we-need-to-talk/</loc></url><url><loc>/speakers/michael-skelton/</loc></url><url><loc>/speakers/michelle-price/</loc></url><url><loc>/speakers/mike-cohen/</loc></url><url><loc>/speakers/mike-monnik/</loc></url><url><loc>/speakers/mike-pritchard/</loc></url><url><loc>/speakers/naina-dasgupta/</loc></url><url><loc>/speakers/nathan-jarvie/</loc></url><url><loc>/speakers/nick-rieniets/</loc></url><url><loc>/authors/</loc></url><url><loc>/speakers/</loc></url><url><loc>/pages/</loc></url><url><loc>/speakers/paul-black/</loc></url><url><loc>/previous_events/2020_11/peer-review--bitter-wisdom-is-better-than-sweet-folly/</loc></url><url><loc>/speakers/peter-hannay/</loc></url><url><loc>/previous_events/2020_11/planning-your-active-defence-with-mitre-shield/</loc></url><url><loc>/speakers/polly-cheung/</loc></url><url><loc>/previous_events/2020_11/practical-osinting...-while-mountain-biking/</loc></url><url><loc>/speakers/prescott-pym/</loc></url><url><loc>/previous_events/2024_04/profit-from-misery/</loc></url><url><loc>/speakers/rami-tawil/</loc></url><url><loc>/previous_events/2020_11/red-teaming-cognitive-principles-for-understanding-complexity./</loc></url><url><loc>/speakers/redpandadoge/</loc></url><url><loc>/speakers/ren%C3%A9e/</loc></url><url><loc>/previous_events/2020_11/report-ranger--pentesting-reports-with-markdown-and-automation/</loc></url><url><loc>/speakers/ricki-burke/</loc></url><url><loc>/speakers/ryan-mclaren/</loc></url><url><loc>/speakers/sam-crowther/</loc></url><url><loc>/speakers/sam-hitchiner/</loc></url><url><loc>/speakers/sarah-iannantuono/</loc></url><url><loc>/speakers/sarah-young/</loc></url><url><loc>/speakers/sebastian-salla/</loc></url><url><loc>/previous_events/2024_04/securing-layoffs-without-being-an-a--hole/</loc></url><url><loc>/previous_events/2020_11/securing-mobile-apps-using-google-firebase/</loc></url><url><loc>/previous_events/2024_04/securing-rest-api-endpoints-against-data-leaks--or-how-to-avoid-another-optus/</loc></url><url><loc>/previous_events/2020_11/security-design-flaws-in-storage-by-zapier/</loc></url><url><loc>/speakers/sh3r4_hax/</loc></url><url><loc>/speakers/shanna-daly/</loc></url><url><loc>/speakers/silvio-cesare/</loc></url><url><loc>/speakers/simon-carabetta/</loc></url><url><loc>/speakers/simon-harvey/</loc></url><url><loc>/speakers/simon-koch/</loc></url><url><loc>/previous_events/2024_04/so-you-wanna-be-a-freelancer-/</loc></url><url><loc>/previous_events/2020_11/so-youve-decided-to-go-out-on-your-own...-how-to-setup-for-business-or-subcontracting/</loc></url><url><loc>/cfp/speaker_resources/</loc></url><url><loc>/speakers/steven-coomber/</loc></url><url><loc>/previous_events/2024_04/supply-chain-security--eating-slsa-for-breakfast/</loc></url><url><loc>/speakers/swarley/</loc></url><url><loc>/speakers/syngularity0/</loc></url><url><loc>/tags/</loc></url><url><loc>/previous_events/2020_11/taming-the-velociraptor--who-needs-edr-anyway-/</loc></url><url><loc>/previous_events/2020_11/teach-it-users-not-to-get-phished--play-the-game-get-the-knowledge-and-confidence-to-handle-phishing-emails-websites/</loc></url><url><loc>/previous_events/2022_11/technical-development-for-people-from-non-technical-backgrounds-application-product-security-focus/</loc></url><url><loc>/previous_events/2020_11/the-blunt-advice-about-getting-a-job-in-cybersecurity/</loc></url><url><loc>/previous_events/2024_04/the-bonzi-chip--the-pitfalls-of-success/</loc></url><url><loc>/previous_events/2022_11/the-iso-on-the-cake--insights-into-getting-27001-certification/</loc></url><url><loc>/previous_events/2020_11/the-paradox-at-the-heart-of-cloud-native-security/</loc></url><url><loc>/speakers/thequietlife/</loc></url><url><loc>/previous_events/2024_04/thinking-of-starting-your-own-company--do-it-but-maybe-listen-to-this-first/</loc></url><url><loc>/speakers/thomas-roccia/</loc></url><url><loc>/previous_events/2020_11/threat-hunting-for-dummies/</loc></url><url><loc>/speakers/tm-ching/</loc></url><url><loc>/previous_events/2024_04/to-insert-swipe-or-touch--a-credit-card-dilemma/</loc></url><url><loc>/speakers/toni-james/</loc></url><url><loc>/speakers/tracy-tam/</loc></url><url><loc>/speakers/uday-korlimarla/</loc></url><url><loc>/previous_events/2020_11/using-statistical-analysis-to-find-beacon-communication-activity/</loc></url><url><loc>/speakers/vanessa-sunassee/</loc></url><url><loc>/speakers/vaughan-shanks/</loc></url><url><loc>/speakers/vlado-vajdic/</loc></url><url><loc>/previous_events/2024_04/what-do-you-really-need-to-authenticate-/</loc></url><url><loc>/about/</loc></url><url><loc>/previous_events/2020_11/what-we-do-in-the-shadows/</loc></url><url><loc>/previous_events/2020_11/why-i--privacy/</loc></url><url><loc>/previous_events/2024_04/why-prefetch-artefacts-are-like-ducks/</loc></url><url><loc>/previous_events/2024_04/why-security-initiatives-are-doomed-to-fail-and-what-you-can-do-about-it/</loc></url><url><loc>/previous_events/2022_11/why-youre-probably-doing-cti-wrong---and-so-am-i-volume-1/</loc></url><url><loc>/previous_events/2022_11/womens-stories-from-the-tech-trenches-v2.0/</loc></url><url><loc>/previous_events/2022_11/xfs-deleted-file-recovery/</loc></url></urlset>