<?xml version="1.0" encoding="UTF-8"?> 
<urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9"> 
<url>
  <loc>https://www.techdemocracy.com/home</loc>
  <changefreq>always</changefreq>
</url>
<url>
  <loc>https://www.techdemocracy.com/partners</loc>
  <changefreq>always</changefreq>
</url>
<url>
  <loc>https://www.techdemocracy.com/resources</loc>
  <changefreq>always</changefreq>
</url>
<url>
  <loc>https://www.techdemocracy.com/solutions/identity-governance-and-administration</loc>
  <changefreq>always</changefreq>
</url>
<url>
  <loc>https://www.techdemocracy.com/solutions/customer-identity-and-access-management</loc>
  <changefreq>always</changefreq>
</url>
<url>
  <loc>https://www.techdemocracy.com/solutions/privileged-access-management</loc>
  <changefreq>always</changefreq>
</url>
<url>
  <loc>https://www.techdemocracy.com/solutions/access-management</loc>
  <changefreq>always</changefreq>
</url>
<url>
  <loc>https://www.techdemocracy.com/solutions/managed-soc</loc>
  <changefreq>always</changefreq>
</url>
<url>
  <loc>https://www.techdemocracy.com/services/advisory-consulting</loc>
  <changefreq>always</changefreq>
</url>
<url>
  <loc>https://www.techdemocracy.com/services/implementation-service</loc>
  <changefreq>always</changefreq>
</url>
<url>
  <loc>https://www.techdemocracy.com/services/operations-and-support</loc>
  <changefreq>always</changefreq>
</url>
<url>
  <loc>https://www.techdemocracy.com/services/manage-services</loc>
  <changefreq>always</changefreq>
</url>
<url>
  <loc>https://www.techdemocracy.com/products/fmms</loc>
  <changefreq>always</changefreq>
</url>
<url>
  <loc>https://www.techdemocracy.com/services/wfaas</loc>
  <changefreq>always</changefreq>
</url>
<url>
  <loc>https://www.techdemocracy.com/company/about-us</loc>
  <changefreq>always</changefreq>
</url>
<url>
  <loc>https://www.techdemocracy.com/company/leadership</loc>
  <changefreq>always</changefreq>
</url>
<url>
  <loc>https://www.techdemocracy.com/company/careers</loc>
  <changefreq>always</changefreq>
</url>
<url>
  <loc>https://www.techdemocracy.com/company/events</loc>
  <changefreq>always</changefreq>
</url>
<url>
  <loc>https://www.techdemocracy.com/passwordless-workshop/schedule</loc>
  <changefreq>always</changefreq>
</url>
<url>
  <loc>https://www.techdemocracy.com/privacy-policy</loc>
  <changefreq>always</changefreq>
</url>
<url>
  <loc>https://www.techdemocracy.com/cookie-policy</loc>
  <changefreq>always</changefreq>
</url>
<url>
  <loc>https://www.techdemocracy.com/terms-conditions</loc>
  <changefreq>always</changefreq>
</url>
<url>
  <loc>https://www.techdemocracy.com/resources/cloud-threats-2025-187</loc>
  <changefreq>always</changefreq>
</url>
<url>
  <loc>https://www.techdemocracy.com/resources/agentic-in-decision-making-186</loc>
  <changefreq>always</changefreq>
</url>
<url>
  <loc>https://www.techdemocracy.com/resources/soc-2-with-soar-185</loc>
  <changefreq>always</changefreq>
</url>
<url>
  <loc>https://www.techdemocracy.com/resources/soar-soc-automation-184</loc>
  <changefreq>always</changefreq>
</url>
<url>
  <loc>https://www.techdemocracy.com/resources/soar-threat-response-183</loc>
  <changefreq>always</changefreq>
</url>
<url>
  <loc>https://www.techdemocracy.com/resources/cybersecurity-in-educational-institutions-182</loc>
  <changefreq>always</changefreq>
</url>
<url>
  <loc>https://www.techdemocracy.com/resources/rbac-abac-pbac-access-control-model-181</loc>
  <changefreq>always</changefreq>
</url>
<url>
  <loc>https://www.techdemocracy.com/resources/microsoft-entra-id-workforce-support-180</loc>
  <changefreq>always</changefreq>
</url>
<url>
  <loc>https://www.techdemocracy.com/resources/building-cyber-resilient-healthcare-systems-179</loc>
  <changefreq>always</changefreq>
</url>
<url>
  <loc>https://www.techdemocracy.com/resources/passwords-vs-microsoft-entra-id-178</loc>
  <changefreq>always</changefreq>
</url>
<url>
  <loc>https://www.techdemocracy.com/resources/why-role-based-access-control-fails-177</loc>
  <changefreq>always</changefreq>
</url>
<url>
  <loc>https://www.techdemocracy.com/resources/microsoft-entra-id-guide-176</loc>
  <changefreq>always</changefreq>
</url>
<url>
  <loc>https://www.techdemocracy.com/resources/Managing-Machine-and-service-accounts-with-PAM-175</loc>
  <changefreq>always</changefreq>
</url>
<url>
  <loc>https://www.techdemocracy.com/resources/top-5-benefits-of-pam-174</loc>
  <changefreq>always</changefreq>
</url>
<url>
  <loc>https://www.techdemocracy.com/resources/5-pitfalls-in-zero-trust-adoption-173</loc>
  <changefreq>always</changefreq>
</url>
<url>
  <loc>https://www.techdemocracy.com/resources/SOC-top-10-advantages-172</loc>
  <changefreq>always</changefreq>
</url>
<url>
  <loc>https://www.techdemocracy.com/resources/hidden-gaps-in-pam-171</loc>
  <changefreq>always</changefreq>
</url>
<url>
  <loc>https://www.techdemocracy.com/resources/7-benefits-IAM-170</loc>
  <changefreq>always</changefreq>
</url>
<url>
  <loc>https://www.techdemocracy.com/resources/automated-access-reviews-for-business-security-169</loc>
  <changefreq>always</changefreq>
</url>
<url>
  <loc>https://www.techdemocracy.com/resources/deepfake-and-synthetic-identity-attacks-168</loc>
  <changefreq>always</changefreq>
</url>
<url>
  <loc>https://www.techdemocracy.com/resources/5-ciam-benefits-167</loc>
  <changefreq>always</changefreq>
</url>
<url>
  <loc>https://www.techdemocracy.com/resources/ransomware-as-a-service-166</loc>
  <changefreq>always</changefreq>
</url>
<url>
  <loc>https://www.techdemocracy.com/resources/cyberthreat-2025-165</loc>
  <changefreq>always</changefreq>
</url>
<url>
  <loc>https://www.techdemocracy.com/resources/nist-csf-164</loc>
  <changefreq>always</changefreq>
</url>
<url>
  <loc>https://www.techdemocracy.com/resources/what-is-iga-and-why-is-it-important-162</loc>
  <changefreq>always</changefreq>
</url>
<url>
  <loc>https://www.techdemocracy.com/resources/Phishing-Attacks-in-India-163</loc>
  <changefreq>always</changefreq>
</url>
<url>
  <loc>https://www.techdemocracy.com/resources/ddos-attack-2024-161</loc>
  <changefreq>always</changefreq>
</url>
<url>
  <loc>https://www.techdemocracy.com/resources/data-breach-sectors-2024-160</loc>
  <changefreq>always</changefreq>
</url>
<url>
  <loc>https://www.techdemocracy.com/resources/Strengthening-SOC-for-RBI-and-SEBI-Compliance-159</loc>
  <changefreq>always</changefreq>
</url>
<url>
  <loc>https://www.techdemocracy.com/resources/it-asset-management-158</loc>
  <changefreq>always</changefreq>
</url>
<url>
  <loc>https://www.techdemocracy.com/resources/iga-for-organizations-157</loc>
  <changefreq>always</changefreq>
</url>
<url>
  <loc>https://www.techdemocracy.com/resources/socaas-educational-institutions-156</loc>
  <changefreq>always</changefreq>
</url>
<url>
  <loc>https://www.techdemocracy.com/resources/top-3-targeted-industries-for-cybersecurity-2025-155</loc>
  <changefreq>always</changefreq>
</url>
<url>
  <loc>https://www.techdemocracy.com/resources/soc-as-a-service-154</loc>
  <changefreq>always</changefreq>
</url>
<url>
  <loc>https://www.techdemocracy.com/resources/pim-and-pam-153</loc>
  <changefreq>always</changefreq>
</url>
<url>
  <loc>https://www.techdemocracy.com/resources/how-ueba-helps-in-threat-detection-152</loc>
  <changefreq>always</changefreq>
</url>
<url>
  <loc>https://www.techdemocracy.com/resources/security-operations-center-compliance-checklist-151</loc>
  <changefreq>always</changefreq>
</url>
<url>
  <loc>https://www.techdemocracy.com/resources/access-management-methods-and-protocols-150</loc>
  <changefreq>always</changefreq>
</url>
<url>
  <loc>https://www.techdemocracy.com/resources/ciam-vs-iam-which-one-is-right-for-your-organization-149</loc>
  <changefreq>always</changefreq>
</url>
<url>
  <loc>https://www.techdemocracy.com/resources/top-disaster-recovery-essentials-148</loc>
  <changefreq>always</changefreq>
</url>
<url>
  <loc>https://www.techdemocracy.com/resources/best-practices-in-cybersecurity-147</loc>
  <changefreq>always</changefreq>
</url>
<url>
  <loc>https://www.techdemocracy.com/resources/identity-threat-detection-and-response-146</loc>
  <changefreq>always</changefreq>
</url>
<url>
  <loc>https://www.techdemocracy.com/resources/identity-security-best-practices-145</loc>
  <changefreq>always</changefreq>
</url>
<url>
  <loc>https://www.techdemocracy.com/resources/healthcare-cybersecurity-strategies-143</loc>
  <changefreq>always</changefreq>
</url>
<url>
  <loc>https://www.techdemocracy.com/resources/pam-prevents-mfa-fatigue-and-push-notification-attacks-144</loc>
  <changefreq>always</changefreq>
</url>
<url>
  <loc>https://www.techdemocracy.com/resources/choose-top-iam-solutions-142</loc>
  <changefreq>always</changefreq>
</url>
<url>
  <loc>https://www.techdemocracy.com/resources/cyber-kill-chain-and-stages-138</loc>
  <changefreq>always</changefreq>
</url>
<url>
  <loc>https://www.techdemocracy.com/resources/blind-spot-in-enterprise-security-141</loc>
  <changefreq>always</changefreq>
</url>
<url>
  <loc>https://www.techdemocracy.com/resources/managing-non-human-identities-in-iga-140</loc>
  <changefreq>always</changefreq>
</url>
<url>
  <loc>https://www.techdemocracy.com/resources/privileged-nhis-service-accounts-next-big-cyber-threat-139</loc>
  <changefreq>always</changefreq>
</url>
<url>
  <loc>https://www.techdemocracy.com/resources/azure-identity-access-management-136</loc>
  <changefreq>always</changefreq>
</url>
<url>
  <loc>https://www.techdemocracy.com/resources/unmanaged-nhis-attack-137</loc>
  <changefreq>always</changefreq>
</url>
<url>
  <loc>https://www.techdemocracy.com/resources/oracle-cloud-infrastructure-identity-access-management-135</loc>
  <changefreq>always</changefreq>
</url>
<url>
  <loc>https://www.techdemocracy.com/resources/google-cloud-operations-iam-134</loc>
  <changefreq>always</changefreq>
</url>
<url>
  <loc>https://www.techdemocracy.com/resources/aws-iam-comprehensive-guide-for-cloud-security-132</loc>
  <changefreq>always</changefreq>
</url>
<url>
  <loc>https://www.techdemocracy.com/resources/decentralized-identity-is-blockchain-the-future-of-iam-133</loc>
  <changefreq>always</changefreq>
</url>
<url>
  <loc>https://www.techdemocracy.com/resources/synthetic-identity-fraud-131</loc>
  <changefreq>always</changefreq>
</url>
<url>
  <loc>https://www.techdemocracy.com/resources/mfa-fatigue-attacks-130</loc>
  <changefreq>always</changefreq>
</url>
<url>
  <loc>https://www.techdemocracy.com/resources/managed-detection-and-response-129</loc>
  <changefreq>always</changefreq>
</url>
<url>
  <loc>https://www.techdemocracy.com/resources/strategies-for-data-security-in-healthcare-management-128</loc>
  <changefreq>always</changefreq>
</url>
<url>
  <loc>https://www.techdemocracy.com/resources/what-is-soar-security-orchestration-automation-response-123</loc>
  <changefreq>always</changefreq>
</url>
<url>
  <loc>https://www.techdemocracy.com/resources/hire2exit-model-for-non-human-identity-126</loc>
  <changefreq>always</changefreq>
</url>
<url>
  <loc>https://www.techdemocracy.com/resources/benefits-of-privileged-identity-management-125</loc>
  <changefreq>always</changefreq>
</url>
<url>
  <loc>https://www.techdemocracy.com/resources/shift-left-security-minimizing-nhi-exposure-124</loc>
  <changefreq>always</changefreq>
</url>
<url>
  <loc>https://www.techdemocracy.com/resources/just-in-time-access-for-modern-cybersecurity-120</loc>
  <changefreq>always</changefreq>
</url>
<url>
  <loc>https://www.techdemocracy.com/resources/network-operation-centers-and-their-role-122</loc>
  <changefreq>always</changefreq>
</url>
<url>
  <loc>https://www.techdemocracy.com/resources/securing-non-human-identities-ai-threat-detection-121</loc>
  <changefreq>always</changefreq>
</url>
<url>
  <loc>https://www.techdemocracy.com/resources/what-is-an-mssp-and-why-its-essential-for-business-security-112</loc>
  <changefreq>always</changefreq>
</url>
<url>
  <loc>https://www.techdemocracy.com/resources/api-key-based-access-with-secure-api-keys-119</loc>
  <changefreq>always</changefreq>
</url>
<url>
  <loc>https://www.techdemocracy.com/resources/optimizing-non-human-identity-with-key-use-cases-118</loc>
  <changefreq>always</changefreq>
</url>
<url>
  <loc>https://www.techdemocracy.com/resources/cloud-computing-security-issues-and-their-solutions-116</loc>
  <changefreq>always</changefreq>
</url>
<url>
  <loc>https://www.techdemocracy.com/resources/siem-explained-its-role-in-security-management-117</loc>
  <changefreq>always</changefreq>
</url>
<url>
  <loc>https://www.techdemocracy.com/resources/malware-based-nhl-attack-threats-and-solutions-115</loc>
  <changefreq>always</changefreq>
</url>
<url>
  <loc>https://www.techdemocracy.com/resources/compliance-in-cybersecurity-113</loc>
  <changefreq>always</changefreq>
</url>
<url>
  <loc>https://www.techdemocracy.com/resources/non-human-identities-in-kubernotes-114</loc>
  <changefreq>always</changefreq>
</url>
<url>
  <loc>https://www.techdemocracy.com/resources/securing-non-human-identities-and-workloads-111</loc>
  <changefreq>always</changefreq>
</url>
<url>
  <loc>https://www.techdemocracy.com/resources/top-10-cybersecurity-tips-for-small-businesses-in-2025-105</loc>
  <changefreq>always</changefreq>
</url>
<url>
  <loc>https://www.techdemocracy.com/resources/characteristics-of-non-human-identities-110</loc>
  <changefreq>always</changefreq>
</url>
<url>
  <loc>https://www.techdemocracy.com/resources/what-is-cloud-security-understanding-its-importance-and-key-features-2-109</loc>
  <changefreq>always</changefreq>
</url>
<url>
  <loc>https://www.techdemocracy.com/resources/cyber-attacks-involving-non-human-identities-108</loc>
  <changefreq>always</changefreq>
</url>
<url>
  <loc>https://www.techdemocracy.com/resources/importance-of-nhi-management-106</loc>
  <changefreq>always</changefreq>
</url>
<url>
  <loc>https://www.techdemocracy.com/resources/Understanding-SIEM-and-SOC-Key-Insights-for-Cybersecurity-Success-103</loc>
  <changefreq>always</changefreq>
</url>
<url>
  <loc>https://www.techdemocracy.com/resources/Difference-between-Cybersecurity-and-Information-Security-104</loc>
  <changefreq>always</changefreq>
</url>
<url>
  <loc>https://www.techdemocracy.com/resources/SOC-for-Cybersecurity-Roles-and-Best-Practices-102</loc>
  <changefreq>always</changefreq>
</url>
<url>
  <loc>https://www.techdemocracy.com/resources/Top-10-Endpoint-Security-Threats-Every-Organization-Must-Know-101</loc>
  <changefreq>always</changefreq>
</url>
<url>
  <loc>https://www.techdemocracy.com/resources/Impact-of-AI-on-Cybersecurity-100</loc>
  <changefreq>always</changefreq>
</url>
<url>
  <loc>https://www.techdemocracy.com/resources/Cybersecurity-and-Manufacturing-Best-Practices-2025-98</loc>
  <changefreq>always</changefreq>
</url>
<url>
  <loc>https://www.techdemocracy.com/resources/Top-5-Data-Breaches-in-Healthcare-99</loc>
  <changefreq>always</changefreq>
</url>
<url>
  <loc>https://www.techdemocracy.com/resources/Banking-and-Risk-Management-Strategies-96</loc>
  <changefreq>always</changefreq>
</url>
<url>
  <loc>https://www.techdemocracy.com/resources/Effective-Cyber-Defense-for-Enterprises-97</loc>
  <changefreq>always</changefreq>
</url>
<url>
  <loc>https://www.techdemocracy.com/resources/Role-of-a-Privileged-Identity-Manager-95</loc>
  <changefreq>always</changefreq>
</url>
<url>
  <loc>https://www.techdemocracy.com/resources/Benefits-of-Multifactor-Authentication-for-Enhanced-Security-94</loc>
  <changefreq>always</changefreq>
</url>
<url>
  <loc>https://www.techdemocracy.com/resources/IAM-Trends-and-Predictions-Year-2025-93</loc>
  <changefreq>always</changefreq>
</url>
<url>
  <loc>https://www.techdemocracy.com/resources/great-iam-solution-92</loc>
  <changefreq>always</changefreq>
</url>
<url>
  <loc>https://www.techdemocracy.com/resources/best-iam-solutions-enhance-enterprise-security-91</loc>
  <changefreq>always</changefreq>
</url>
<url>
  <loc>https://www.techdemocracy.com/resources/maximize-roi-with-the-best-iam-solutions-90</loc>
  <changefreq>always</changefreq>
</url>
<url>
  <loc>https://www.techdemocracy.com/resources/role-of-identity-management-providers-89</loc>
  <changefreq>always</changefreq>
</url>
<url>
  <loc>https://www.techdemocracy.com/resources/nist-cybersecurity-framework-for-startups-88</loc>
  <changefreq>always</changefreq>
</url>
<url>
  <loc>https://www.techdemocracy.com/resources/common-nist-framework-mistakes-to-avoid-87</loc>
  <changefreq>always</changefreq>
</url>
<url>
  <loc>https://www.techdemocracy.com/resources/nist-framework-in-healthcare-86</loc>
  <changefreq>always</changefreq>
</url>
<url>
  <loc>https://www.techdemocracy.com/resources/role-of-iam-assessment-in-zero-trust-architecture-85</loc>
  <changefreq>always</changefreq>
</url>
<url>
  <loc>https://www.techdemocracy.com/resources/iam-assessment-84</loc>
  <changefreq>always</changefreq>
</url>
<url>
  <loc>https://www.techdemocracy.com/resources/best-iam-provider-83</loc>
  <changefreq>always</changefreq>
</url>
<url>
  <loc>https://www.techdemocracy.com/resources/whats-idaas-benefits-use-cases-differences-traditional-iam-82</loc>
  <changefreq>always</changefreq>
</url>
<url>
  <loc>https://www.techdemocracy.com/resources/identity-and-access-management-solutions-81</loc>
  <changefreq>always</changefreq>
</url>
<url>
  <loc>https://www.techdemocracy.com/resources/iam-staffing-80</loc>
  <changefreq>always</changefreq>
</url>
<url>
  <loc>https://www.techdemocracy.com/resources/zero-trust-framework-79</loc>
  <changefreq>always</changefreq>
</url>
<url>
  <loc>https://www.techdemocracy.com/resources/rise-of-biometric-authentication-strengthening-security-78</loc>
  <changefreq>always</changefreq>
</url>
<url>
  <loc>https://www.techdemocracy.com/resources/customer-identity-and-access-management-and-customer-trust-77</loc>
  <changefreq>always</changefreq>
</url>
<url>
  <loc>https://www.techdemocracy.com/resources/techdemocracy-achieves-soc-2-type-2-certification-76</loc>
  <changefreq>always</changefreq>
</url>
<url>
  <loc>https://www.techdemocracy.com/resources/privileged-access-management-solutions-75</loc>
  <changefreq>always</changefreq>
</url>
<url>
  <loc>https://www.techdemocracy.com/resources/iga-best-practices-74</loc>
  <changefreq>always</changefreq>
</url>
<url>
  <loc>https://www.techdemocracy.com/resources/role-of-identity-governance-73</loc>
  <changefreq>always</changefreq>
</url>
<url>
  <loc>https://www.techdemocracy.com/resources/identity-governance-and-administration-solutions-for-business-72</loc>
  <changefreq>always</changefreq>
</url>
<url>
  <loc>https://www.techdemocracy.com/resources/role-of-iam-in-healthcare-71</loc>
  <changefreq>always</changefreq>
</url>
<url>
  <loc>https://www.techdemocracy.com/resources/iam-digital-transformation-70</loc>
  <changefreq>always</changefreq>
</url>
<url>
  <loc>https://www.techdemocracy.com/resources/iam-compliance-69</loc>
  <changefreq>always</changefreq>
</url>
<url>
  <loc>https://www.techdemocracy.com/resources/iam-for-startups-68</loc>
  <changefreq>always</changefreq>
</url>
<url>
  <loc>https://www.techdemocracy.com/resources/ciam-webinar-part-2-67</loc>
  <changefreq>always</changefreq>
</url>
<url>
  <loc>https://www.techdemocracy.com/resources/importance-of-24-7-soc-monitoring-65</loc>
  <changefreq>always</changefreq>
</url>
<url>
  <loc>https://www.techdemocracy.com/resources/real-time-threat-detection-64</loc>
  <changefreq>always</changefreq>
</url>
<url>
  <loc>https://www.techdemocracy.com/resources/socs-role-in-monitoring-and-mitigation-63</loc>
  <changefreq>always</changefreq>
</url>
<url>
  <loc>https://www.techdemocracy.com/resources/role-of-ai-and-machine-learning-in-modern-socs-62</loc>
  <changefreq>always</changefreq>
</url>
<url>
  <loc>https://www.techdemocracy.com/resources/the-role-based-access-control-61</loc>
  <changefreq>always</changefreq>
</url>
<url>
  <loc>https://www.techdemocracy.com/resources/importance-of-single-sign-on-solutions-60</loc>
  <changefreq>always</changefreq>
</url>
<url>
  <loc>https://www.techdemocracy.com/resources/ai-and-machine-learning-in-enhancing-iam-59</loc>
  <changefreq>always</changefreq>
</url>
<url>
  <loc>https://www.techdemocracy.com/resources/the-importance-of-endpoint-security-58</loc>
  <changefreq>always</changefreq>
</url>
<url>
  <loc>https://www.techdemocracy.com/resources/how-cybersecurity-consulting-builds-strong-defense-strategy-57</loc>
  <changefreq>always</changefreq>
</url>
<url>
  <loc>https://www.techdemocracy.com/resources/customer-identity-and-access-management-solutions-56</loc>
  <changefreq>always</changefreq>
</url>
<url>
  <loc>https://www.techdemocracy.com/resources/how-to-attack-phishing-attacks-55</loc>
  <changefreq>always</changefreq>
</url>
<url>
  <loc>https://www.techdemocracy.com/resources/cyber-defense-for-enterprises-top-10-strategies-2024-54</loc>
  <changefreq>always</changefreq>
</url>
<url>
  <loc>https://www.techdemocracy.com/resources/education-it-security-protecting-student-data-53</loc>
  <changefreq>always</changefreq>
</url>
<url>
  <loc>https://www.techdemocracy.com/resources/benefits-of-identity-governance-and-administration-52</loc>
  <changefreq>always</changefreq>
</url>
<url>
  <loc>https://www.techdemocracy.com/resources/benefits-of-pam-solutions-51</loc>
  <changefreq>always</changefreq>
</url>
<url>
  <loc>https://www.techdemocracy.com/resources/cloud-security-challenges-solutions-north-american-enterprises-50</loc>
  <changefreq>always</changefreq>
</url>
<url>
  <loc>https://www.techdemocracy.com/resources/zero-trust-security-and-identity-first-strategies-49</loc>
  <changefreq>always</changefreq>
</url>
<url>
  <loc>https://www.techdemocracy.com/resources/iam-best-practices-for-small-businesses-48</loc>
  <changefreq>always</changefreq>
</url>
<url>
  <loc>https://www.techdemocracy.com/resources/identity-security-for-remote-workers-47</loc>
  <changefreq>always</changefreq>
</url>
<url>
  <loc>https://www.techdemocracy.com/resources/how-managed-socs-improve-cybersecurity-46</loc>
  <changefreq>always</changefreq>
</url>
<url>
  <loc>https://www.techdemocracy.com/resources/protect-personal-information-online-45</loc>
  <changefreq>always</changefreq>
</url>
<url>
  <loc>https://www.techdemocracy.com/resources/self-sovereign-identities-blockchain-iam-north-america-44</loc>
  <changefreq>always</changefreq>
</url>
<url>
  <loc>https://www.techdemocracy.com/resources/enhance-identity-security-with-iam-solutions-43</loc>
  <changefreq>always</changefreq>
</url>
<url>
  <loc>https://www.techdemocracy.com/resources/iam-in-hybrid-work-environments-42</loc>
  <changefreq>always</changefreq>
</url>
<url>
  <loc>https://www.techdemocracy.com/resources/iam-and-cyberthreats-41</loc>
  <changefreq>always</changefreq>
</url>
<url>
  <loc>https://www.techdemocracy.com/resources/identity-threat-detection-39</loc>
  <changefreq>always</changefreq>
</url>
<url>
  <loc>https://www.techdemocracy.com/resources/realm-of-identity-security-user-behavior-managing-risk-38</loc>
  <changefreq>always</changefreq>
</url>
<url>
  <loc>https://www.techdemocracy.com/resources/identity-as-the-new-perimeter-37</loc>
  <changefreq>always</changefreq>
</url>
<url>
  <loc>https://www.techdemocracy.com/resources/tony-nawrocki-vp-identity-services-36</loc>
  <changefreq>always</changefreq>
</url>
<url>
  <loc>https://www.techdemocracy.com/resources/3-stage-approach-to-iam-and-ciam-success-35</loc>
  <changefreq>always</changefreq>
</url>
<url>
  <loc>https://www.techdemocracy.com/resources/importance-of-iam-in-education-34</loc>
  <changefreq>always</changefreq>
</url>
<url>
  <loc>https://www.techdemocracy.com/resources/identity-centric-security-in-managing-insider-threats-33</loc>
  <changefreq>always</changefreq>
</url>
<url>
  <loc>https://www.techdemocracy.com/resources/evolution-of-identity-security-from-passwords-to-biometrics-32</loc>
  <changefreq>always</changefreq>
</url>
<url>
  <loc>https://www.techdemocracy.com/resources/best-iam-solutions-provider-in-india-31</loc>
  <changefreq>always</changefreq>
</url>
<url>
  <loc>https://www.techdemocracy.com/resources/identity-and-access-management-iam-solutions-in-india-30</loc>
  <changefreq>always</changefreq>
</url>
<url>
  <loc>https://www.techdemocracy.com/resources/managed-soc-solutions-for-smes-29</loc>
  <changefreq>always</changefreq>
</url>
<url>
  <loc>https://www.techdemocracy.com/resources/managed-soc-staffing-and-training-challenges-28</loc>
  <changefreq>always</changefreq>
</url>
<url>
  <loc>https://www.techdemocracy.com/resources/significance-of-privileged-access-management-27</loc>
  <changefreq>always</changefreq>
</url>
<url>
  <loc>https://www.techdemocracy.com/resources/unlock-your-identity-journey-with-iam-strategic-assessment-isa-26</loc>
  <changefreq>always</changefreq>
</url>
<url>
  <loc>https://www.techdemocracy.com/resources/north-america-growth-advisor-team-techdemocracy-25</loc>
  <changefreq>always</changefreq>
</url>
<url>
  <loc>https://www.techdemocracy.com/resources/todd-rossin-co-ceo-cso-24</loc>
  <changefreq>always</changefreq>
</url>
<url>
  <loc>https://www.techdemocracy.com/resources/user-authentication-methods-23</loc>
  <changefreq>always</changefreq>
</url>
<url>
  <loc>https://www.techdemocracy.com/resources/importance-of-managed-soc-for-healthcare-organizations-22</loc>
  <changefreq>always</changefreq>
</url>
<url>
  <loc>https://www.techdemocracy.com/resources/outsourcing-soc-operations-21</loc>
  <changefreq>always</changefreq>
</url>
<url>
  <loc>https://www.techdemocracy.com/resources/significance-of-iam-in-financial-services-20</loc>
  <changefreq>always</changefreq>
</url>
<url>
  <loc>https://www.techdemocracy.com/resources/iam-in-supply-chain-management-19</loc>
  <changefreq>always</changefreq>
</url>
<url>
  <loc>https://www.techdemocracy.com/resources/sko-2024-at-westin-hyderabad-18</loc>
  <changefreq>always</changefreq>
</url>
<url>
  <loc>https://www.techdemocracy.com/resources/techdemocracy-new-cyber-security-operation-center-17</loc>
  <changefreq>always</changefreq>
</url>
<url>
  <loc>https://www.techdemocracy.com/resources/multi-factor-authentication-and-identity-and-access-management-3</loc>
  <changefreq>always</changefreq>
</url>
<url>
  <loc>https://www.techdemocracy.com/resources/identity-platforms-for-enterprises-in-digital-age-16</loc>
  <changefreq>always</changefreq>
</url>
<url>
  <loc>https://www.techdemocracy.com/resources/employee-convenience-techdemocracy-14</loc>
  <changefreq>always</changefreq>
</url>
<url>
  <loc>https://www.techdemocracy.com/resources/trust-techdemocracy-for-a-cyber-secure-future-13</loc>
  <changefreq>always</changefreq>
</url>
<url>
  <loc>https://www.techdemocracy.com/resources/techdemocracy-unveiled-a-brief-introduction-12</loc>
  <changefreq>always</changefreq>
</url>
<url>
  <loc>https://www.techdemocracy.com/resources/identity-governance-implementation-for-trading-company-11</loc>
  <changefreq>always</changefreq>
</url>
<url>
  <loc>https://www.techdemocracy.com/resources/ciam-implementation-for-healthcare-organization-10</loc>
  <changefreq>always</changefreq>
</url>
<url>
  <loc>https://www.techdemocracy.com/resources/legacy-identity-technology-to-modern-identity-governance-9</loc>
  <changefreq>always</changefreq>
</url>
<url>
  <loc>https://www.techdemocracy.com/resources/identity-solution-transformation-of-a-healthcare-firm-8</loc>
  <changefreq>always</changefreq>
</url>
<url>
  <loc>https://www.techdemocracy.com/resources/identity-solution-enhancement-for-leading-financial-service-firm-7</loc>
  <changefreq>always</changefreq>
</url>
<url>
  <loc>https://www.techdemocracy.com/resources/importance-of-iam-in-banking-6</loc>
  <changefreq>always</changefreq>
</url>
<url>
  <loc>https://www.techdemocracy.com/resources/ai-in-security-and-digital-identity-verification-5</loc>
  <changefreq>always</changefreq>
</url>
<url>
  <loc>https://www.techdemocracy.com/resources/identity-and-access-management-essential-for-business-4</loc>
  <changefreq>always</changefreq>
</url>
<url>
  <loc>https://www.techdemocracy.com/resources/key-traits-of-successful-it-professionals-2</loc>
  <changefreq>always</changefreq>
</url>
<url>
  <loc>https://www.techdemocracy.com/resources/iam-solutions-necessary-for-fed-it-1</loc>
  <changefreq>always</changefreq>
</url>
<url>
  <loc>https://www.techdemocracy.com/../../assets/documents/TechDemocracy Onepager 09112023_v9 -letter head.pdf</loc>
  <changefreq>always</changefreq>
</url>
<url>
  <loc>https://www.techdemocracy.com/../../assets/documents/SOC OnePager @TDC 240723 V1 1.pdf</loc>
  <changefreq>always</changefreq>
</url>
<url>
  <loc>https://www.techdemocracy.com/company/contact-us</loc>
  <changefreq>always</changefreq>
</url>
<url>
  <loc>https://www.techdemocracy.com/company/event/game-night-with-techdemocracy-and-sailpoint-43</loc>
  <changefreq>always</changefreq>
</url>
<url>
  <loc>https://www.techdemocracy.com/company/event/sailpoint-identity-day-boston-44</loc>
  <changefreq>always</changefreq>
</url>
<url>
  <loc>https://www.techdemocracy.com/company/event/how-to-get-ahead-of-the-5-ciam-pitfalls-that-sabotage-scale-security-and-user-experience-41</loc>
  <changefreq>always</changefreq>
</url>
<url>
  <loc>https://www.techdemocracy.com/company/event/sail-point-identity-day-santa-clara-2025-45</loc>
  <changefreq>always</changefreq>
</url>
<url>
  <loc>https://www.techdemocracy.com/company/event/tech-democracy-at-identiverse-2025-agile-innovation-in-identity-security-36</loc>
  <changefreq>always</changefreq>
</url>
<url>
  <loc>https://www.techdemocracy.com/company/event/tech-democracy-partnering-with-omada-identity-at-rocky-mountain-information-security-conference-2025-40</loc>
  <changefreq>always</changefreq>
</url>
<url>
  <loc>https://www.techdemocracy.com</loc>
  <changefreq>always</changefreq>
</url>
<url>
  <loc>https://www.techdemocracy.com/home</loc>
  <changefreq>always</changefreq>
</url>
<url>
  <loc>https://www.techdemocracy.com/company/contact-us</loc>
  <changefreq>always</changefreq>
</url>
<url>
  <loc>https://www.techdemocracy.com/solutions/managed-soc</loc>
  <changefreq>always</changefreq>
</url>
<url>
  <loc>https://www.techdemocracy.com/resources/Phishing-Attacks-in-India-163</loc>
  <changefreq>always</changefreq>
</url>
<url>
  <loc>https://www.techdemocracy.com/resources/role-of-iam-assessment-in-zero-trust-architecture-85</loc>
  <changefreq>always</changefreq>
</url>
<url>
  <loc>https://www.techdemocracy.com/resources/importance-of-managed-soc-for-healthcare-organizations-22</loc>
  <changefreq>always</changefreq>
</url>
<url>
  <loc>https://www.techdemocracy.com/</loc>
  <changefreq>always</changefreq>
</url>
<url>
  <loc>https://www.techdemocracy.com/resources/identity-threat-detection-and-response-146</loc>
  <changefreq>always</changefreq>
</url>
<url>
  <loc>https://www.techdemocracy.com/resources/characteristics-of-non-human-identities-110</loc>
  <changefreq>always</changefreq>
</url>
<url>
  <loc>https://www.techdemocracy.com/solutions/privileged-access-management</loc>
  <changefreq>always</changefreq>
</url>
<url>
  <loc>https://www.techdemocracy.com/resources/benefits-of-identity-governance-and-administration-52</loc>
  <changefreq>always</changefreq>
</url>
<url>
  <loc>https://www.techdemocracy.com/solutions/identity-governance-and-administration</loc>
  <changefreq>always</changefreq>
</url>
<url>
  <loc>https://www.techdemocracy.com/solutions/customer-identity-and-access-management</loc>
  <changefreq>always</changefreq>
</url>
<url>
  <loc>https://www.techdemocracy.com/Top IAM Solutions 2025: How to Choose the Best One</loc>
  <changefreq>always</changefreq>
</url>
<url>
  <loc>https://www.techdemocracy.com/industry-resources?industry=3&amp;industryName=Healthcare</loc>
  <changefreq>always</changefreq>
</url>
</urlset>