<?xml version="1.0" encoding="UTF-8"?>
<?xml-stylesheet type="text/xsl" href="https://riskstudio.com/en/sitemap.xsl"?>
<urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9" xmlns:xhtml="http://www.w3.org/1999/xhtml" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:schemaLocation="http://www.sitemaps.org/schemas/sitemap/0.9 http://www.sitemaps.org/schemas/sitemap/0.9/sitemap.xsd">
<!-- Sitemap is generated on 2026-04-09 11:45:27 GMT -->
	<url>
		<loc>https://riskstudio.com/en/</loc>
		<lastmod>2026-03-16T13:55:36+00:00</lastmod>
	</url>
	<url>
		<loc>https://riskstudio.com/en/news-feed/</loc>
		<lastmod>2026-04-07T12:07:07+00:00</lastmod>
	</url>
	<url>
		<loc>https://riskstudio.com/en/coordinated-vulnerability-disclosure/</loc>
		<lastmod>2026-04-07T14:02:45+00:00</lastmod>
	</url>
	<url>
		<loc>https://riskstudio.com/en/terms-and-conditions/</loc>
		<lastmod>2026-02-12T09:28:58+00:00</lastmod>
	</url>
	<url>
		<loc>https://riskstudio.com/en/report-requested/</loc>
		<lastmod>2026-02-06T09:59:37+00:00</lastmod>
	</url>
	<url>
		<loc>https://riskstudio.com/en/report/</loc>
		<lastmod>2026-03-23T18:13:55+00:00</lastmod>
	</url>
	<url>
		<loc>https://riskstudio.com/en/riskstudio/</loc>
		<lastmod>2026-02-17T12:06:56+00:00</lastmod>
	</url>
	<url>
		<loc>https://riskstudio.com/en/registration-confirmed/</loc>
		<lastmod>2026-02-05T08:44:19+00:00</lastmod>
	</url>
	<url>
		<loc>https://riskstudio.com/en/newsletter-subscription/</loc>
		<lastmod>2026-02-17T12:11:13+00:00</lastmod>
	</url>
	<url>
		<loc>https://riskstudio.com/en/registration-re-registration/</loc>
		<lastmod>2026-02-17T12:11:38+00:00</lastmod>
	</url>
	<url>
		<loc>https://riskstudio.com/en/end-subscription/</loc>
		<lastmod>2026-02-17T12:12:01+00:00</lastmod>
	</url>
	<url>
		<loc>https://riskstudio.com/en/manage-subscription/</loc>
		<lastmod>2026-02-17T12:12:19+00:00</lastmod>
	</url>
	<url>
		<loc>https://riskstudio.com/en/thanks-for-registering/</loc>
		<lastmod>2026-02-17T12:12:46+00:00</lastmod>
	</url>
	<url>
		<loc>https://riskstudio.com/en/pricing/</loc>
		<lastmod>2026-02-19T08:56:06+00:00</lastmod>
	</url>
	<url>
		<loc>https://riskstudio.com/en/privacy-policy/</loc>
		<lastmod>2026-02-17T12:13:13+00:00</lastmod>
	</url>
	<url>
		<loc>https://riskstudio.com/en/contact/</loc>
		<lastmod>2026-02-12T10:09:37+00:00</lastmod>
	</url>
	<url>
		<loc>https://riskstudio.com/en/blog/who-protects-you-as-a-customer/</loc>
		<lastmod>2026-04-07T12:11:44+00:00</lastmod>
	</url>
	<url>
		<loc>https://riskstudio.com/en/blog/nis2-quick-scan-are-you-already-on-your-way/</loc>
		<lastmod>2026-03-16T15:07:26+00:00</lastmod>
	</url>
	<url>
		<loc>https://riskstudio.com/en/blog/what-does-the-dictu-assessment-tool-for-cloud-sovereignty-mean/</loc>
		<lastmod>2026-03-16T14:03:37+00:00</lastmod>
	</url>
	<url>
		<loc>https://riskstudio.com/en/blog/riskstudio-at-normnests-trustcafe-april-2/</loc>
		<lastmod>2026-03-03T13:53:06+00:00</lastmod>
	</url>
	<url>
		<loc>https://riskstudio.com/en/blog/riskstudio-at-cybersec-europe-2026-may-20-21-in-brussels/</loc>
		<lastmod>2026-02-25T11:49:48+00:00</lastmod>
	</url>
	<url>
		<loc>https://riskstudio.com/en/blog/odido-leaks-millions-of-customer-records-what-now/</loc>
		<lastmod>2026-02-17T15:32:46+00:00</lastmod>
	</url>
	<url>
		<loc>https://riskstudio.com/en/blog/software-supply-chain-failures/</loc>
		<lastmod>2026-02-12T09:49:38+00:00</lastmod>
	</url>
	<url>
		<loc>https://riskstudio.com/en/blog/cyber-hygiene-and-a-clean-supply-chain/</loc>
		<lastmod>2026-02-12T12:06:41+00:00</lastmod>
	</url>
	<url>
		<loc>https://riskstudio.com/en/blog/the-lesson-from-the-hack-on-polands-power-grid/</loc>
		<lastmod>2026-02-10T23:45:49+00:00</lastmod>
	</url>
	<url>
		<loc>https://riskstudio.com/en/blog/2026-2030-coalition-agreement-digital-ambitions-call-for-a-grip-on-risks/</loc>
		<lastmod>2026-02-12T08:20:40+00:00</lastmod>
	</url>
	<url>
		<loc>https://riskstudio.com/en/blog/hack-at-data-broker-shows-supply-chain-risks-in-ads/</loc>
		<lastmod>2026-02-10T23:46:21+00:00</lastmod>
	</url>
	<url>
		<loc>https://riskstudio.com/en/blog/eu-wants-to-bar-chinese-equipment-from-critical-networks/</loc>
		<lastmod>2026-02-10T23:46:38+00:00</lastmod>
	</url>
	<url>
		<loc>https://riskstudio.com/en/blog/the-netherlands-and-dependence-on-u-s-tech-infrastructure/</loc>
		<lastmod>2026-02-11T23:04:59+00:00</lastmod>
	</url>
	<url>
		<loc>https://riskstudio.com/en/blog/who-is-the-supply-chain-risk-manager-in-your-organization/</loc>
		<lastmod>2026-02-05T08:44:12+00:00</lastmod>
	</url>
	<url>
		<loc>https://riskstudio.com/en/blog/nis2-supply-chain-in-60-minutes/</loc>
		<lastmod>2026-02-11T23:04:42+00:00</lastmod>
	</url>
	<url>
		<loc>https://riskstudio.com/en/blog/riskstudio-vision-of-supply-chain-risk-management/</loc>
		<lastmod>2026-02-11T23:05:16+00:00</lastmod>
	</url>
	<url>
		<loc>https://riskstudio.com/en/blog/shadow-suppliers/</loc>
		<lastmod>2026-02-11T23:06:02+00:00</lastmod>
	</url>
	<url>
		<loc>https://riskstudio.com/en/blog/scrm-tprm-and-vrm-in-plain-language/</loc>
		<lastmod>2026-02-09T16:11:05+00:00</lastmod>
	</url>
	<url>
		<loc>https://riskstudio.com/en/blog/cyber-resilience-under-the-microscope-in-kpn-report/</loc>
		<lastmod>2026-02-11T23:06:29+00:00</lastmod>
	</url>
	<url>
		<loc>https://riskstudio.com/en/blog/lessons-from-enisas-nis-investments-survey/</loc>
		<lastmod>2026-02-05T08:44:01+00:00</lastmod>
	</url>
	<url>
		<loc>https://riskstudio.com/en/blog/rdi-sets-the-tone-chain-security-is-no-longer-a-choice/</loc>
		<lastmod>2026-02-05T08:44:01+00:00</lastmod>
	</url>
	<url>
		<loc>https://riskstudio.com/en/blog/netherlands-faces-digital-turning-point-chain-insight-as-key-to-resilience/</loc>
		<lastmod>2026-02-05T08:50:44+00:00</lastmod>
	</url>
	<url>
		<loc>https://riskstudio.com/en/blog/jaguar-land-rover-sales-sharply-down-due-to-cyber-attack/</loc>
		<lastmod>2026-02-05T08:51:12+00:00</lastmod>
	</url>
	<url>
		<loc>https://riskstudio.com/en/blog/interrail-data-leak-what-a-travel-platform-teaches-us-about-digital-supply-chain-risks/</loc>
		<lastmod>2026-02-05T08:51:42+00:00</lastmod>
	</url>
	<url>
		<loc>https://riskstudio.com/en/blog/new-name-nis2-supply-chain/</loc>
		<lastmod>2026-02-05T08:44:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://riskstudio.com/en/blog/riskstudio-is-a-partner-of-digitally-secure-together/</loc>
		<lastmod>2026-02-05T08:51:42+00:00</lastmod>
	</url>
	<url>
		<loc>https://riskstudio.com/en/blog/riskstudio-and-nis2-quality-mark-join-forces/</loc>
		<lastmod>2026-02-05T08:51:50+00:00</lastmod>
	</url>
	<url>
		<loc>https://riskstudio.com/en/blog/new-cyber-resilience-center-east-netherlands-strong-together-against-digital-threats/</loc>
		<lastmod>2026-02-05T08:51:57+00:00</lastmod>
	</url>
	<url>
		<loc>https://riskstudio.com/en/blog/riskstudio-official-vendor-within-kpn-business-partner/</loc>
		<lastmod>2026-02-05T08:52:15+00:00</lastmod>
	</url>
	<url>
		<loc>https://riskstudio.com/en/blog/benchmarking/</loc>
		<lastmod>2026-02-05T13:02:12+00:00</lastmod>
	</url>
	<url>
		<loc>https://riskstudio.com/en/blog/visual-insights/</loc>
		<lastmod>2026-02-05T13:00:58+00:00</lastmod>
	</url>
	<url>
		<loc>https://riskstudio.com/en/blog/roles-and-workspaces/</loc>
		<lastmod>2026-02-05T13:02:42+00:00</lastmod>
	</url>
	<url>
		<loc>https://riskstudio.com/en/blog/meet-riskstudio/</loc>
		<lastmod>2026-02-17T12:10:27+00:00</lastmod>
	</url>
	<url>
		<loc>https://riskstudio.com/en/blog/release-notes/</loc>
		<lastmod>2026-02-06T08:24:59+00:00</lastmod>
	</url>
	<url>
		<loc>https://riskstudio.com/en/blog/would-you-like-to-join-our-team/</loc>
		<lastmod>2026-02-12T10:46:23+00:00</lastmod>
	</url>
	<url>
		<loc>https://riskstudio.com/en/blog/cloud-and-infrastructure-ownership-blind-spot-in-digital-chains/</loc>
		<lastmod>2026-02-05T13:03:12+00:00</lastmod>
	</url>
	<url>
		<loc>https://riskstudio.com/en/blog/why-cyber-ratings-belong-in-the-annual-report/</loc>
		<lastmod>2026-02-05T13:03:11+00:00</lastmod>
	</url>
	<url>
		<loc>https://riskstudio.com/en/blog/when-government-intervenes-in-the-tech-sector-the-supply-chain-shock-no-one-saw-coming/</loc>
		<lastmod>2026-02-05T13:04:56+00:00</lastmod>
	</url>
	<url>
		<loc>https://riskstudio.com/en/blog/municipal-digital-security-agenda-the-emphasis-is-shifting-to-external-dependencies/</loc>
		<lastmod>2026-02-05T13:03:48+00:00</lastmod>
	</url>
	<url>
		<loc>https://riskstudio.com/en/blog/nis2-strategically-important-but-how-do-you-get-started/</loc>
		<lastmod>2026-02-05T13:03:11+00:00</lastmod>
	</url>
	<url>
		<loc>https://riskstudio.com/en/blog/digital-sovereignty-under-pressure-at-the-international-criminal-court/</loc>
		<lastmod>2026-02-05T13:03:48+00:00</lastmod>
	</url>
	<url>
		<loc>https://riskstudio.com/en/blog/a-data-breach-that-crosses-the-boundaries-of-one-municipality/</loc>
		<lastmod>2026-02-05T13:03:56+00:00</lastmod>
	</url>
	<url>
		<loc>https://riskstudio.com/en/blog/the-data-breach-at-air-france-klm-an-incident-beyond-their-own-walls/</loc>
		<lastmod>2026-02-05T13:03:19+00:00</lastmod>
	</url>
	<url>
		<loc>https://riskstudio.com/en/blog/colonial-pipeline-digital-vulnerability-with-physical-consequences/</loc>
		<lastmod>2026-02-05T13:01:37+00:00</lastmod>
	</url>
	<url>
		<loc>https://riskstudio.com/en/blog/the-kaseya-incident-the-classic/</loc>
		<lastmod>2026-02-05T13:01:37+00:00</lastmod>
	</url>
	<url>
		<loc>https://riskstudio.com/en/blog/log4j-a-small-piece-of-software-with-enormous-consequences/</loc>
		<lastmod>2026-02-05T13:02:12+00:00</lastmod>
	</url>
	<url>
		<loc>https://riskstudio.com/en/blog/the-moveit-incident-a-wake-up-call-for-digital-chain-risks/</loc>
		<lastmod>2026-02-05T13:01:37+00:00</lastmod>
	</url>
	<url>
		<loc>https://riskstudio.com/en/blog/the-nebu-incident-when-a-supplier-suddenly-gains-visibility/</loc>
		<lastmod>2026-02-17T12:21:36+00:00</lastmod>
	</url>
	<url>
		<loc>https://riskstudio.com/en/blog/supply-chain-intelligence-for-oversight-and-decision-making/</loc>
		<lastmod>2026-02-05T13:01:45+00:00</lastmod>
	</url>
	<url>
		<loc>https://riskstudio.com/en/blog/own-home-in-order-by-2028/</loc>
		<lastmod>2026-02-05T13:01:53+00:00</lastmod>
	</url>
	<url>
		<loc>https://riskstudio.com/en/blog/the-day-cloudflare-took-down-20-of-the-internet/</loc>
		<lastmod>2026-02-05T19:13:10+00:00</lastmod>
	</url>
	<url>
		<loc>https://riskstudio.com/en/blog/digid-acquisition-shows-urgency-of-vendor-risk-management/</loc>
		<lastmod>2025-12-21T22:18:55+00:00</lastmod>
	</url>
	<url>
		<loc>https://riskstudio.com/en/blog/riskstudio-joins-cyberveilig-nederland/</loc>
		<lastmod>2026-02-05T13:27:37+00:00</lastmod>
	</url>
	<url>
		<loc>https://riskstudio.com/en/blog/security-congress-2025-the-event-for-digital-sovereignty/</loc>
		<lastmod>2026-02-05T13:23:22+00:00</lastmod>
	</url>
	<url>
		<loc>https://riskstudio.com/en/blog/vision-unfold-2025-on-strategy-technology-and-trust/</loc>
		<lastmod>2026-02-05T13:23:48+00:00</lastmod>
	</url>
	<url>
		<loc>https://riskstudio.com/en/blog/one-conference-2024-een-inspirerende-plek-waar-cyberveiligheid-verbindt/</loc>
		<lastmod>2026-02-05T13:30:08+00:00</lastmod>
	</url>
</urlset>
<!-- Sitemap is served from cache -->
