<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>ISACASiliconValley-admin &#8211; ISACA Silicon Valley</title>
	<atom:link href="https://isacasiliconvalley.org/author/isacasiliconvalley-admin/feed/" rel="self" type="application/rss+xml" />
	<link>https://isacasiliconvalley.org</link>
	<description></description>
	<lastBuildDate>Mon, 08 Dec 2025 12:29:21 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.9.4</generator>

<image>
	<url>https://isacasiliconvalley.org/wp-content/uploads/2025/12/Isaca-Favicon.png</url>
	<title>ISACASiliconValley-admin &#8211; ISACA Silicon Valley</title>
	<link>https://isacasiliconvalley.org</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>Supply chain security assessment</title>
		<link>https://isacasiliconvalley.org/supply-chain-security-assessment/</link>
					<comments>https://isacasiliconvalley.org/supply-chain-security-assessment/#comments</comments>
		
		<dc:creator><![CDATA[ISACASiliconValley-admin]]></dc:creator>
		<pubDate>Fri, 05 Sep 2025 08:41:49 +0000</pubDate>
				<category><![CDATA[Case Study]]></category>
		<guid isPermaLink="false">https://isacasiliconvalley.org/?p=904</guid>

					<description><![CDATA[Case study on implementingcomprehensive supply chain riskmanagement.]]></description>
										<content:encoded><![CDATA[
<p>Case study on implementing<br>comprehensive supply chain risk<br>management.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://isacasiliconvalley.org/supply-chain-security-assessment/feed/</wfw:commentRss>
			<slash:comments>3</slash:comments>
		
		
			</item>
		<item>
		<title>Incident response playbook 2024</title>
		<link>https://isacasiliconvalley.org/incident-responseplaybook-2024/</link>
					<comments>https://isacasiliconvalley.org/incident-responseplaybook-2024/#comments</comments>
		
		<dc:creator><![CDATA[ISACASiliconValley-admin]]></dc:creator>
		<pubDate>Fri, 05 Sep 2025 08:40:14 +0000</pubDate>
				<category><![CDATA[Research]]></category>
		<guid isPermaLink="false">https://isacasiliconvalley.org/?p=898</guid>

					<description><![CDATA[Updated incident responsestrategies for modern threatlandscapes.]]></description>
										<content:encoded><![CDATA[
<p>Updated incident response<br>strategies for modern threat<br>landscapes.</p>



<p></p>
]]></content:encoded>
					
					<wfw:commentRss>https://isacasiliconvalley.org/incident-responseplaybook-2024/feed/</wfw:commentRss>
			<slash:comments>3</slash:comments>
		
		
			</item>
		<item>
		<title>GDPR compliance in the cloud era</title>
		<link>https://isacasiliconvalley.org/gdpr-compliance-in-thecloud-era/</link>
					<comments>https://isacasiliconvalley.org/gdpr-compliance-in-thecloud-era/#respond</comments>
		
		<dc:creator><![CDATA[ISACASiliconValley-admin]]></dc:creator>
		<pubDate>Fri, 05 Sep 2025 08:38:27 +0000</pubDate>
				<category><![CDATA[Guide]]></category>
		<guid isPermaLink="false">https://isacasiliconvalley.org/?p=894</guid>

					<description><![CDATA[Best practices for maintainingGDPR compliance while leveragingcloud technologies.]]></description>
										<content:encoded><![CDATA[
<p>Best practices for maintaining<br>GDPR compliance while leveraging<br>cloud technologies.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://isacasiliconvalley.org/gdpr-compliance-in-thecloud-era/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>AI in cybersecurity: opportunities and risks</title>
		<link>https://isacasiliconvalley.org/ai-in-cybersecurityopportunities-and-risks/</link>
					<comments>https://isacasiliconvalley.org/ai-in-cybersecurityopportunities-and-risks/#respond</comments>
		
		<dc:creator><![CDATA[ISACASiliconValley-admin]]></dc:creator>
		<pubDate>Fri, 05 Sep 2025 08:34:31 +0000</pubDate>
				<category><![CDATA[Blog]]></category>
		<guid isPermaLink="false">https://isacasiliconvalley.org/?p=888</guid>

					<description><![CDATA[Exploring the dual nature of AI incybersecurity &#8211; as both a powerfuldefense tool and a potential attackvector.]]></description>
										<content:encoded><![CDATA[
<p>Exploring the dual nature of AI in<br>cybersecurity &#8211; as both a powerful<br>defense tool and a potential attack<br>vector.</p>



<p></p>
]]></content:encoded>
					
					<wfw:commentRss>https://isacasiliconvalley.org/ai-in-cybersecurityopportunities-and-risks/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Zero trust architecture: a comprehensive implementation guide</title>
		<link>https://isacasiliconvalley.org/zero-trust-architecture-acomprehensive-implementationguide/</link>
					<comments>https://isacasiliconvalley.org/zero-trust-architecture-acomprehensive-implementationguide/#comments</comments>
		
		<dc:creator><![CDATA[ISACASiliconValley-admin]]></dc:creator>
		<pubDate>Fri, 05 Sep 2025 07:29:08 +0000</pubDate>
				<category><![CDATA[Whitepaper]]></category>
		<guid isPermaLink="false">https://isacasiliconvalley.org/?p=878</guid>

					<description><![CDATA[Discover how leading organizations are implementing Zero Trust principles to strengthen their cybersecurity posture in today&#8217;s distributed work environment.]]></description>
										<content:encoded><![CDATA[
<p>Discover how leading organizations are implementing Zero Trust principles to strengthen their cybersecurity posture in today&#8217;s distributed work environment.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://isacasiliconvalley.org/zero-trust-architecture-acomprehensive-implementationguide/feed/</wfw:commentRss>
			<slash:comments>3</slash:comments>
		
		
			</item>
	</channel>
</rss>
