<?xml version="1.0" encoding="utf-8" standalone="yes"?>
<urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9">
  <url><loc>https://www.c1.ai/blog</loc></url>
  <url><loc>https://www.c1.ai/blog/startup-values</loc></url>
  <url><loc>https://www.c1.ai/blog/5-takeaways-from-the-snowflake-attack</loc></url>
  <url><loc>https://www.c1.ai/blog/5-ways-to-clean-up-identity-and-access</loc></url>
  <url><loc>https://www.c1.ai/blog/accelerating-integrations-with-ai-generated-connectors</loc></url>
  <url><loc>https://www.c1.ai/blog/access-control-taming-group-sprawl</loc></url>
  <url><loc>https://www.c1.ai/blog/access-management-needs-a-conductor</loc></url>
  <url><loc>https://www.c1.ai/blog/access-profiles-a-smarter-way</loc></url>
  <url><loc>https://www.c1.ai/blog/C1+Okta</loc></url>
  <url><loc>https://www.c1.ai/blog/advanced-attribute-matchings-with-super-directory</loc></url>
  <url><loc>https://www.c1.ai/blog/ai-access-management-your-questions-answered</loc></url>
  <url><loc>https://www.c1.ai/blog/ai-in-identity-and-access-management</loc></url>
  <url><loc>https://www.c1.ai/blog/all-aboard-with-ross-haleliuk</loc></url>
  <url><loc>https://www.c1.ai/blog/all-aboard-with-ian-glazer</loc></url>
  <url><loc>https://www.c1.ai/blog/all-aboard-with-nancy-wang-and-ashish-popli</loc></url>
  <url><loc>https://www.c1.ai/blog/all_aboard_spicy_takes_with_david_lee_the_identity_jedi</loc></url>
  <url><loc>https://www.c1.ai/blog/all-aboard-with-rob-picard</loc></url>
  <url><loc>https://www.c1.ai/blog/announcing-access-conflicts</loc></url>
  <url><loc>https://www.c1.ai/blog/announcing-access-control-for-your-access-controls</loc></url>
  <url><loc>https://www.c1.ai/blog/announcing-baton-open-source-for-auditing-infrastructure-access</loc></url>
  <url><loc>https://www.c1.ai/blog/announcing-c1-integrations-for-claude-openai-and-cursor</loc></url>
  <url><loc>https://www.c1.ai/blog/announcing-cloud-privileged-access-management</loc></url>
  <url><loc>https://www.c1.ai/blog/Announcing_Conditional_Access_Policies_in_C1</loc></url>
  <url><loc>https://www.c1.ai/blog/conductorone-seed-funding</loc></url>
  <url><loc>https://www.c1.ai/blog/announcing-hybrid-infrastructure-support</loc></url>
  <url><loc>https://www.c1.ai/blog/announcing-identity-lifecycle-management</loc></url>
  <url><loc>https://www.c1.ai/blog/announcing-new-unified-directory-feature</loc></url>
  <url><loc>https://www.c1.ai/blog/conductorone-expands-series-a-to-27m-felicis</loc></url>
  <url><loc>https://www.c1.ai/blog/announcing-our-soc2-type2-certification</loc></url>
  <url><loc>https://www.c1.ai/blog/announcing-support-for-webhooks</loc></url>
  <url><loc>https://www.c1.ai/blog/announcing-unified-identity-governance</loc></url>
  <url><loc>https://www.c1.ai/blog/architecting-zero-trust-twingate-conductorone</loc></url>
  <url><loc>https://www.c1.ai/blog/automating-compliance-controls-least-privilege-access</loc></url>
  <url><loc>https://www.c1.ai/blog/baton-journey-to-identity-security-and-unified-access</loc></url>
  <url><loc>https://www.c1.ai/blog/baton-open-source-fabric-powering-identity-security</loc></url>
  <url><loc>https://www.c1.ai/blog/more-secure-aws-iam-best-practices</loc></url>
  <url><loc>https://www.c1.ai/blog/birthright-access-is-broken</loc></url>
  <url><loc>https://www.c1.ai/blog/conductorone-raises-15m-series-a-to-solve-identity-security-challenges</loc></url>
  <url><loc>https://www.c1.ai/blog/build-vs-buy-in-iga</loc></url>
  <url><loc>https://www.c1.ai/blog/building-trust-through-connector-reliability</loc></url>
  <url><loc>https://www.c1.ai/blog/c1-brings-wiz-insights-to-identity-decisions</loc></url>
  <url><loc>https://www.c1.ai/blog/chatgpt-how-ai-will-impact-security</loc></url>
  <url><loc>https://www.c1.ai/blog/ciso-top-3-takeaways-rsa-conference-2026</loc></url>
  <url><loc>https://www.c1.ai/blog/closing-the-door-on-group-sprawl</loc></url>
  <url><loc>https://www.c1.ai/blog/cpam-launch-week-recap</loc></url>
  <url><loc>https://www.c1.ai/blog/cmmc-compliance</loc></url>
  <url><loc>https://www.c1.ai/blog/company-values</loc></url>
  <url><loc>https://www.c1.ai/blog/conductorone-2.0-values-update</loc></url>
  <url><loc>https://www.c1.ai/blog/conductorone-blackhat-usa-2022</loc></url>
  <url><loc>https://www.c1.ai/blog/C1_Named_a_Fortune_Cyber_60_Company</loc></url>
  <url><loc>https://www.c1.ai/blog/continuing-journey-to-least-privilege-introducing-access-requests</loc></url>
  <url><loc>https://www.c1.ai/blog/crawl-walk-run</loc></url>
  <url><loc>https://www.c1.ai/blog/custom-connectors</loc></url>
  <url><loc>https://www.c1.ai/blog/2022-09-whats-new-sept22</loc></url>
  <url><loc>https://www.c1.ai/blog/december-2025</loc></url>
  <url><loc>https://www.c1.ai/blog/defining-the-agentic-enterprise</loc></url>
  <url><loc>https://www.c1.ai/blog/designing-a-great-user-experience</loc></url>
  <url><loc>https://www.c1.ai/blog/there's-an-app-for-that</loc></url>
  <url><loc>https://www.c1.ai/blog/what-is-least-privilege-access</loc></url>
  <url><loc>https://www.c1.ai/blog/extensible-identity-flows-joiner-provisioning</loc></url>
  <url><loc>https://www.c1.ai/blog/five-ways-conductorone-streamlines-sox-compliance</loc></url>
  <url><loc>https://www.c1.ai/blog/four-ways-to-use-conductorone-automations-to-strengthen-security</loc></url>
  <url><loc>https://www.c1.ai/blog/from-manual-to-intelligent-using-ai-to-mature-y</loc></url>
  <url><loc>https://www.c1.ai/blog/from-risk-signal-to-governance-action-introducing-conductorone-crowdstrike-falcon-next-gen-identity-security</loc></url>
  <url><loc>https://www.c1.ai/blog/grant-trigger-found</loc></url>
  <url><loc>https://www.c1.ai/blog/growing-together</loc></url>
  <url><loc>https://www.c1.ai/blog/HARBleed_When_History_Doesn't_Repeat_But_It_Does_Rhyme</loc></url>
  <url><loc>https://www.c1.ai/blog/heres-what-your-auditor-thinks-about-agentic-ai</loc></url>
  <url><loc>https://www.c1.ai/blog/2022-08-whats-new-summer22</loc></url>
  <url><loc>https://www.c1.ai/blog/simplifying-fedramp-compliance-with-c1</loc></url>
  <url><loc>https://www.c1.ai/blog/uars-frequency</loc></url>
  <url><loc>https://www.c1.ai/blog/how-sla-escalation-policies-work-in-conductorone</loc></url>
  <url><loc>https://www.c1.ai/blog/how-tide-uses-conductorone-to-operationalize-least-privilege-at-scale</loc></url>
  <url><loc>https://www.c1.ai/blog/how-to-automate-ilm-with-conductorone</loc></url>
  <url><loc>https://www.c1.ai/blog/how-to-be-soc2-compliant-checklist-for-security-teams</loc></url>
  <url><loc>https://www.c1.ai/blog/how-dynamic-access-enables-least-privilege</loc></url>
  <url><loc>https://www.c1.ai/blog/passkeys-block-attacks</loc></url>
  <url><loc>https://www.c1.ai/blog/how-to-streamline-it-operations-with-conductorone-automations</loc></url>
  <url><loc>https://www.c1.ai/blog/how-to-use-uars-for-real-security</loc></url>
  <url><loc>https://www.c1.ai/blog/how-treasure-data-transformed-user-access-reviews-with-conductorone</loc></url>
  <url><loc>https://www.c1.ai/blog/how-uar-automation-improves-audit-readiness-and-reduces-risk</loc></url>
  <url><loc>https://www.c1.ai/blog/how-weaviate-automated-privileged-access</loc></url>
  <url><loc>https://www.c1.ai/blog/identity-becomes-the-battlefield-in-2026</loc></url>
  <url><loc>https://www.c1.ai/blog/identity-governance-vs-saas-management-solutions</loc></url>
  <url><loc>https://www.c1.ai/blog/identity-is-the-new-perimeter</loc></url>
  <url><loc>https://www.c1.ai/blog/identity-maturity-in-2026</loc></url>
  <url><loc>https://www.c1.ai/blog/2024-identity-security-outlook-report</loc></url>
  <url><loc>https://www.c1.ai/blog/iga-maturity-curve-treasure-data-webinar-recap</loc></url>
  <url><loc>https://www.c1.ai/blog/10-iga-metrics-every-security-team-should-use</loc></url>
  <url><loc>https://www.c1.ai/blog/implementing-least-privilege-access-tailscale-conductorone</loc></url>
  <url><loc>https://www.c1.ai/blog/incremental-sync</loc></url>
  <url><loc>https://www.c1.ai/blog/inside-conductorones-customer-first-support-model</loc></url>
  <url><loc>https://www.c1.ai/blog/inside-instacarts-just-in-time-access-playbook</loc></url>
  <url><loc>https://www.c1.ai/blog/inside-scoop-paul-yoo</loc></url>
  <url><loc>https://www.c1.ai/blog/interview-travis-mcpeak</loc></url>
  <url><loc>https://www.c1.ai/blog/introducing-ai-access-management</loc></url>
  <url><loc>https://www.c1.ai/blog/introducing-arbitrary-access-control-by-conductor-one</loc></url>
  <url><loc>https://www.c1.ai/blog/accuracy-reporting</loc></url>
  <url><loc>https://www.c1.ai/blog/introducing-baton-feeds</loc></url>
  <url><loc>https://www.c1.ai/blog/introducing-conductor-one</loc></url>
  <url><loc>https://www.c1.ai/blog/Introducing-conductorone-access-fabric-unified-identity-access-and-authorization-across-your-complex-environment</loc></url>
  <url><loc>https://www.c1.ai/blog/introducing-conductorones-advanced-microsoft-teams-integration</loc></url>
  <url><loc>https://www.c1.ai/blog/introducing-functions</loc></url>
  <url><loc>https://www.c1.ai/blog/introducing-helpdesk-provisioning-and-automation</loc></url>
  <url><loc>https://www.c1.ai/blog/introducing-secret-sharing</loc></url>
  <url><loc>https://www.c1.ai/blog/introducing-shadow-app-detection-tracking-and-management-in-conductorone</loc></url>
  <url><loc>https://www.c1.ai/blog/Introducing_the_First_AI_Assistant_for_Identity_Governance_C1_Copilot</loc></url>
  <url><loc>https://www.c1.ai/blog/is-enterprise-saas-dying</loc></url>
  <url><loc>https://www.c1.ai/blog/january-2026</loc></url>
  <url><loc>https://www.c1.ai/blog/key-takeaways-from-the-2025-fis-report</loc></url>
  <url><loc>https://www.c1.ai/blog/light-iga</loc></url>
  <url><loc>https://www.c1.ai/blog/managing-identity-as-code-how-to-use-terraform-with-c1</loc></url>
  <url><loc>https://www.c1.ai/blog/managing-identity-for-sql-powered-apps-no-apis-necessary</loc></url>
  <url><loc>https://www.c1.ai/blog/managing-nhis-in-2025</loc></url>
  <url><loc>https://www.c1.ai/blog/meet-automations-architect</loc></url>
  <url><loc>https://www.c1.ai/blog/meet-ivip</loc></url>
  <url><loc>https://www.c1.ai/blog/meet-super-directory</loc></url>
  <url><loc>https://www.c1.ai/blog/moving-beyond-least-privilege</loc></url>
  <url><loc>https://www.c1.ai/blog/moving-beyond-zero-trust</loc></url>
  <url><loc>https://www.c1.ai/blog/moving-on-from-legacy-iga-why-users-wont-go-back</loc></url>
  <url><loc>https://www.c1.ai/blog/human-vs-nhi-explained</loc></url>
  <url><loc>https://www.c1.ai/blog/ninja-saas</loc></url>
  <url><loc>https://www.c1.ai/blog/nist-csf-20-what-to-know</loc></url>
  <url><loc>https://www.c1.ai/blog/nist-releases-cyber-ai-profile</loc></url>
  <url><loc>https://www.c1.ai/blog/NYDFS-23-NYCRR-500-and-least-privilege-access</loc></url>
  <url><loc>https://www.c1.ai/blog/nydfs-regulation-what-it-means-for-access-controls-and-how-to-comply</loc></url>
  <url><loc>https://www.c1.ai/blog/one-size-doesnt-fit-all-expanding-beyond-idp-based-provisioning</loc></url>
  <url><loc>https://www.c1.ai/blog/power-of-policies-in-c1</loc></url>
  <url><loc>https://www.c1.ai/blog/q2-release-roundup</loc></url>
  <url><loc>https://www.c1.ai/blog/inclusion-in-the-infrared-100</loc></url>
  <url><loc>https://www.c1.ai/blog/reimagining-identity-governance</loc></url>
  <url><loc>https://www.c1.ai/blog/rethinking-access-management</loc></url>
  <url><loc>https://www.c1.ai/blog/rethinking-identity-for-an-ai-native-future</loc></url>
  <url><loc>https://www.c1.ai/blog/risks-of-weak-iga-2026</loc></url>
  <url><loc>https://www.c1.ai/blog/how-rrcu-uses-conductorone-automations</loc></url>
  <url><loc>https://www.c1.ai/blog/running-uar-campaigns-deep-dive</loc></url>
  <url><loc>https://www.c1.ai/blog/scoping-uar-campaigns-deep-dive</loc></url>
  <url><loc>https://www.c1.ai/blog/secrets-keyrotation-automation</loc></url>
  <url><loc>https://www.c1.ai/blog/securing-americas-ports</loc></url>
  <url><loc>https://www.c1.ai/blog/security-vs-compliance-bridging-the-gap-with-c1</loc></url>
  <url><loc>https://www.c1.ai/blog/series-b</loc></url>
  <url><loc>https://www.c1.ai/blog/simplify-onboarding-with-automated-account-provisioning</loc></url>
  <url><loc>https://www.c1.ai/blog/SOC2-and-least-privilege-access-control</loc></url>
  <url><loc>https://www.c1.ai/blog/sod-in-modern-identity-security</loc></url>
  <url><loc>https://www.c1.ai/blog/iga-hits-the-big-time</loc></url>
  <url><loc>https://www.c1.ai/blog/squire-agentic-first-ephemeral-dev-environments-at-conductorone</loc></url>
  <url><loc>https://www.c1.ai/blog/takeaways-reddit-hack</loc></url>
  <url><loc>https://www.c1.ai/blog/technical-deep-dive-using-baton-to-audit-infrastructure-access</loc></url>
  <url><loc>https://www.c1.ai/blog/the-ai-identity-problem</loc></url>
  <url><loc>https://www.c1.ai/blog/the-cia-triad-was-built-for-a-world-that-no-longer-exists</loc></url>
  <url><loc>https://www.c1.ai/blog/the-cure-for-igad</loc></url>
  <url><loc>https://www.c1.ai/blog/the-divergent-ai-landscape</loc></url>
  <url><loc>https://www.c1.ai/blog/great-convergence-it-security</loc></url>
  <url><loc>https://www.c1.ai/blog/the-growing-threat-of-ai-driven-social-engineering</loc></url>
  <url><loc>https://www.c1.ai/blog/the-importance-of-the-end-user-experience</loc></url>
  <url><loc>https://www.c1.ai/blog/the-inevitable-ai-wave-modeling-the-ai-agent-explosion</loc></url>
  <url><loc>https://www.c1.ai/blog/the-modern-iga-rfp-guide</loc></url>
  <url><loc>https://www.c1.ai/blog/nis2-what-to-know</loc></url>
  <url><loc>https://www.c1.ai/blog/the-pressure-is-real-inside-the-stress-and-resilience-of-security-leaders</loc></url>
  <url><loc>https://www.c1.ai/blog/the-sso-tax-what-it-is-and-why-it-sucks</loc></url>
  <url><loc>https://www.c1.ai/blog/the-state-of-agentic-ai</loc></url>
  <url><loc>https://www.c1.ai/blog/three-properties-identity-must-have-in-the-agentic-era</loc></url>
  <url><loc>https://www.c1.ai/blog/to-provision-or-not-to-provision</loc></url>
  <url><loc>https://www.c1.ai/blog/Traditional_PAM_is_Dead_Long_Live_Just_in_Time_Access</loc></url>
  <url><loc>https://www.c1.ai/blog/union-station-the-internal-platform-powering-c1s-agentic-enterprise-transformation</loc></url>
  <url><loc>https://www.c1.ai/blog/us-vs-uk-perspectives-on-ai-and-security</loc></url>
  <url><loc>https://www.c1.ai/blog/virtual-entitlements-simplifying-access-and-bundling-permissions</loc></url>
  <url><loc>https://www.c1.ai/blog/wearec1</loc></url>
  <url><loc>https://www.c1.ai/blog/what-identity-governance-looks-like-when-automation-does-the-work</loc></url>
  <url><loc>https://www.c1.ai/blog/after-zero-trust</loc></url>
  <url><loc>https://www.c1.ai/blog/when-threat-models-collide</loc></url>
  <url><loc>https://www.c1.ai/blog/why-iam-iga-and-pam-break-in-the-agentic-enterprise</loc></url>
  <url><loc>https://www.c1.ai/blog/the-cyberhut-why-modern-organizations-need-next-gen-iga</loc></url>
  <url><loc>https://www.c1.ai/blog/why-uars-are-becoming-a-relic-of-the-past</loc></url>
  <url><loc>https://www.c1.ai/blog/shift-left-identity</loc></url>
  <url><loc>https://www.c1.ai/blog/your-ai-strategy-has-a-blind-spot</loc></url>
  <url><loc>https://www.c1.ai/blog/your-enterprise-needs-an-immune-system</loc></url>
  <url><loc>https://www.c1.ai/blog/your-problems-arent-unique</loc></url>
  <url><loc>https://www.c1.ai/blog/your-recruiting-stack-is-a-disaster</loc></url>
  <url><loc>https://www.c1.ai/blog/zero-trust-in-practice-how-we-keep-customer-data-secure-at-conductorone</loc></url>
  <url><loc>https://www.c1.ai/engineering</loc></url>
  <url><loc>https://www.c1.ai/engineering/every-branch-condition-compiles-to-a-dfa</loc></url>
  <url><loc>https://www.c1.ai/engineering/fault-injection-for-complete-branch-coverage</loc></url>
  <url><loc>https://www.c1.ai/engineering/formally-verifying-identity-connectors</loc></url>
  <url><loc>https://www.c1.ai/engineering/how-we-cut-our-embedding-costs-in-half-and-shrank-storage-by-50</loc></url>
  <url><loc>https://www.c1.ai/engineering/one-mock-server-twelve-protocols</loc></url>
  <url><loc>https://www.c1.ai/engineering/proving-equivalence-with-egraphs</loc></url>
  <url><loc>https://www.c1.ai/engineering/six-shapes-of-authorization</loc></url>
  <url><loc>https://www.c1.ai/engineering/splitting-ai-agents-to-contain-prompt-injection</loc></url>
  <url><loc>https://www.c1.ai/guides</loc></url>
  <url><loc>https://www.c1.ai/guides/identity-and-access-management-tools</loc></url>
  <url><loc>https://www.c1.ai/guides/sailpoint-alternatives-competitors</loc></url>
  <url><loc>https://www.c1.ai/guides/saviynt-alternatives-competitors</loc></url>
  <url><loc>https://www.c1.ai/guides/zluri-alternatives-competitors</loc></url>
  <url><loc>https://www.c1.ai/guides/lumos-alternatives-competitors</loc></url>
  <url><loc>https://www.c1.ai/guides/iga-solutions</loc></url>
  <url><loc>https://www.c1.ai/guides/best-identity-lifecycle-management-solutions</loc></url>
  <url><loc>https://www.c1.ai/guides/identity-management-best-practices</loc></url>
  <url><loc>https://www.c1.ai/guides/identity-governance-best-practices</loc></url>
  <url><loc>https://www.c1.ai/guides/best-grc-solutions</loc></url>
  <url><loc>https://www.c1.ai/guides/four-ways-to-configure-aws-access</loc></url>
  <url><loc>https://www.c1.ai/guides/zilla-security-alternatives-competitors</loc></url>
  <url><loc>https://www.c1.ai/guides/benefits-of-identity-access-management</loc></url>
  <url><loc>https://www.c1.ai/guides/pathlock-alternatives-competitors</loc></url>
  <url><loc>https://www.c1.ai/guides/okta-alternatives-competitors</loc></url>
  <url><loc>https://www.c1.ai/guides/identity-access-management-implementation-plan</loc></url>
  <url><loc>https://www.c1.ai/guides/microsoft-entra-alternatives-competitors</loc></url>
  <url><loc>https://www.c1.ai/guides/veza-alternatives-competitors</loc></url>
  <url><loc>https://www.c1.ai/guides/a-cisos-guide-to-agentic-ai</loc></url>
  <url><loc>https://www.c1.ai/guides/installing-and-harnessing-aws-iam-access-analyzer</loc></url>
  <url><loc>https://www.c1.ai/guides/zero-standing-privileges</loc></url>
  <url><loc>https://www.c1.ai/guides/access-controls-maturity-model</loc></url>
  <url><loc>https://www.c1.ai/guides/access-request-management</loc></url>
  <url><loc>https://www.c1.ai/guides/ai-user-experience-identity-access-management</loc></url>
  <url><loc>https://www.c1.ai/guides/best-practices-for-configuring-snowflake-access-control</loc></url>
  <url><loc>https://www.c1.ai/guides/Best-Practices-for-Privileged-Access-Management-for-the-Cloud</loc></url>
  <url><loc>https://www.c1.ai/guides/cloud-based-identity-access-management</loc></url>
  <url><loc>https://www.c1.ai/guides/contractor-access-management</loc></url>
  <url><loc>https://www.c1.ai/guides/identity-lifecycle-management-cost-considerations</loc></url>
  <url><loc>https://www.c1.ai/guides/decoding-access-control-navigating-rbac-abac-and-pbac-for-optimal-security-strategies</loc></url>
  <url><loc>https://www.c1.ai/guides/dora-compliance-best-practices</loc></url>
  <url><loc>https://www.c1.ai/guides/Everything_You_Want_to_Know_about_GCP _Access_Control</loc></url>
  <url><loc>https://www.c1.ai/guides/Everything_You_Wanted_to_Know_about_GitHub_Access_Control</loc></url>
  <url><loc>https://www.c1.ai/guides/guide-seven-principles-least-privilege-access-implementation</loc></url>
  <url><loc>https://www.c1.ai/guides/how-ai-iam-mitigates-cybersecurity-threats</loc></url>
  <url><loc>https://www.c1.ai/guides/nydfs-identity-security-compliance</loc></url>
  <url><loc>https://www.c1.ai/guides/identity-access-management-risk-assessment</loc></url>
  <url><loc>https://www.c1.ai/guides/how-to-implement-identity-lifecycle-management</loc></url>
  <url><loc>https://www.c1.ai/guides/how-to-use-aws-labs-sso-to-sync-google-workspace-groups</loc></url>
  <url><loc>https://www.c1.ai/guides/hybrid-cloud-security-common-challenges-and-architecture-best-practices</loc></url>
  <url><loc>https://www.c1.ai/guides/iam-provisioning</loc></url>
  <url><loc>https://www.c1.ai/guides/identity-access-management-roadmap</loc></url>
  <url><loc>https://www.c1.ai/guides/iam-vs-rbac</loc></url>
  <url><loc>https://www.c1.ai/guides/identity-access-management-frameworks</loc></url>
  <url><loc>https://www.c1.ai/guides/identity-and-access-management-challenges</loc></url>
  <url><loc>https://www.c1.ai/guides/identity-governance-challenges</loc></url>
  <url><loc>https://www.c1.ai/guides/identity-governance-software-cost</loc></url>
  <url><loc>https://www.c1.ai/guides/identity-lifecycle-management</loc></url>
  <url><loc>https://www.c1.ai/guides/identity-management-vs-access-management</loc></url>
  <url><loc>https://www.c1.ai/guides/iga-success-metrics</loc></url>
  <url><loc>https://www.c1.ai/guides/identity-governance-vs-iam</loc></url>
  <url><loc>https://www.c1.ai/guides/implementing-ai-identity-access-management-best-practices</loc></url>
  <url><loc>https://www.c1.ai/guides/implementing-cloud-iam-for-cloud-functions-with-a-least-privilege-approach</loc></url>
  <url><loc>https://www.c1.ai/guides/implementing-just-in-time-access-for-vms-in-microsoft-azure</loc></url>
  <url><loc>https://www.c1.ai/guides/implementing-just-in-time-access-in-google-cloud-platform</loc></url>
  <url><loc>https://www.c1.ai/guides/joiner-mover-leaver-process-for-iam</loc></url>
  <url><loc>https://www.c1.ai/guides/differences-between-jit-and-pam</loc></url>
  <url><loc>https://www.c1.ai/guides/future-trends-ai-identity-access-management</loc></url>
  <url><loc>https://www.c1.ai/guides/non-employee-access-management</loc></url>
  <url><loc>https://www.c1.ai/guides/non-human-identity-management</loc></url>
  <url><loc>https://www.c1.ai/guides/overcoming-common-multicloud-security-challenges</loc></url>
  <url><loc>https://www.c1.ai/guides/path-to-identity-maturity</loc></url>
  <url><loc>https://www.c1.ai/guides/regulatory-compliance-ai-identity-access-management</loc></url>
  <url><loc>https://www.c1.ai/guides/scim-provisioning</loc></url>
  <url><loc>https://www.c1.ai/guides/Snowflake_Authorization_and_Permission_Model_Deep_Dive</loc></url>
  <url><loc>https://www.c1.ai/guides/SOX-Access-Controls-Separation-of-Duties-and-Best-Practices</loc></url>
  <url><loc>https://www.c1.ai/guides/sox-audit</loc></url>
  <url><loc>https://www.c1.ai/guides/securing-identity-for-any-application-deep-dive-integrations</loc></url>
  <url><loc>https://www.c1.ai/guides/user-access-review-software</loc></url>
  <url><loc>https://www.c1.ai/guides/the-evolution-of-identity</loc></url>
  <url><loc>https://www.c1.ai/guides/role-of-ai-identity-governance-administration-iga</loc></url>
  <url><loc>https://www.c1.ai/guides/third-party-access-management</loc></url>
  <url><loc>https://www.c1.ai/guides/traditional-vs-ai-identity-access-management</loc></url>
  <url><loc>https://www.c1.ai/guides/uar-maturity-model</loc></url>
  <url><loc>https://www.c1.ai/guides/identity-access-provisioning-lifecycle</loc></url>
  <url><loc>https://www.c1.ai/guides/it-compliance-audit</loc></url>
  <url><loc>https://www.c1.ai/guides/nist-csf</loc></url>
  <url><loc>https://www.c1.ai/guides/identity-lifecycle-management-phases</loc></url>
  <url><loc>https://www.c1.ai/guides/user-access-management</loc></url>
  <url><loc>https://www.c1.ai/guides/user-access-review-template</loc></url>
  <url><loc>https://www.c1.ai/guides/user-access-reviews-best-practices-guide</loc></url>
  <url><loc>https://www.c1.ai/guides/vendor-access-management</loc></url>
  <url><loc>https://www.c1.ai/guides/vendor-offboarding-checklist</loc></url>
  <url><loc>https://www.c1.ai/guides/vendor-privileged-access</loc></url>
  <url><loc>https://www.c1.ai/guides/what-devsecops-need-to-know-about-iga</loc></url>
  <url><loc>https://www.c1.ai/guides/why-completeness-and-accuracy-are-important</loc></url>
  <url><loc>https://www.c1.ai/glossary/access-governance-software</loc></url>
  <url><loc>https://www.c1.ai/glossary/how-to-stay-compliant-with-access-reviews</loc></url>
  <url><loc>https://www.c1.ai/glossary/identity-governance-vs-sspm</loc></url>
  <url><loc>https://www.c1.ai/glossary/identity-management-vs-identity-security-whats-the-difference</loc></url>
  <url><loc>https://www.c1.ai/glossary/least-privilege-access-vs-zero-trust</loc></url>
  <url><loc>https://www.c1.ai/glossary/least-privilege</loc></url>
  <url><loc>https://www.c1.ai/glossary/social-engineering-vs-phishing</loc></url>
  <url><loc>https://www.c1.ai/glossary/access-controls</loc></url>
  <url><loc>https://www.c1.ai/glossary/access-requests</loc></url>
  <url><loc>https://www.c1.ai/glossary/what-are-entitlements</loc></url>
  <url><loc>https://www.c1.ai/glossary/what-are-non-human-identities</loc></url>
  <url><loc>https://www.c1.ai/glossary/orphaned-accounts</loc></url>
  <url><loc>https://www.c1.ai/glossary/time-based-access-controls</loc></url>
  <url><loc>https://www.c1.ai/glossary/user-access-reviews</loc></url>
  <url><loc>https://www.c1.ai/glossary/what-is-a-converged-identity-platform</loc></url>
  <url><loc>https://www.c1.ai/glossary/access-governance</loc></url>
  <url><loc>https://www.c1.ai/glossary/access-provisioning</loc></url>
  <url><loc>https://www.c1.ai/glossary/agentic-ai</loc></url>
  <url><loc>https://www.c1.ai/glossary/what-is-an-identity-provider</loc></url>
  <url><loc>https://www.c1.ai/glossary/mcp-server</loc></url>
  <url><loc>https://www.c1.ai/glossary/what-is-attribute-based-access-control</loc></url>
  <url><loc>https://www.c1.ai/glossary/authentication-vs-authorization</loc></url>
  <url><loc>https://www.c1.ai/glossary/birthright-access</loc></url>
  <url><loc>https://www.c1.ai/glossary/what-is-blast-radius-in-cybersecurity</loc></url>
  <url><loc>https://www.c1.ai/glossary/what-is-break-glass-access</loc></url>
  <url><loc>https://www.c1.ai/glossary/cloud-infrastructure-entitlement-management-ciem</loc></url>
  <url><loc>https://www.c1.ai/glossary/what-is-fedramp</loc></url>
  <url><loc>https://www.c1.ai/glossary/what-is-glba</loc></url>
  <url><loc>https://www.c1.ai/glossary/what-is-hipaa</loc></url>
  <url><loc>https://www.c1.ai/glossary/what-is-hitrust</loc></url>
  <url><loc>https://www.c1.ai/glossary/what-is-iam</loc></url>
  <url><loc>https://www.c1.ai/glossary/identity-governance</loc></url>
  <url><loc>https://www.c1.ai/glossary/identity-security-posture-management-ispm</loc></url>
  <url><loc>https://www.c1.ai/glossary/identity-security</loc></url>
  <url><loc>https://www.c1.ai/glossary/what-is-iga-vs-pam</loc></url>
  <url><loc>https://www.c1.ai/glossary/what-is-iso-27001</loc></url>
  <url><loc>https://www.c1.ai/glossary/just-in-time-provisioning</loc></url>
  <url><loc>https://www.c1.ai/glossary/What-is-Just-in-Time-Access</loc></url>
  <url><loc>https://www.c1.ai/glossary/what-is-light-iga</loc></url>
  <url><loc>https://www.c1.ai/glossary/machine-identity-management</loc></url>
  <url><loc>https://www.c1.ai/glossary/nist</loc></url>
  <url><loc>https://www.c1.ai/glossary/pam</loc></url>
  <url><loc>https://www.c1.ai/glossary/what-is-policy-based-access-control</loc></url>
  <url><loc>https://www.c1.ai/glossary/provisioning-deprovisioning</loc></url>
  <url><loc>https://www.c1.ai/glossary/what-is-role-based-access-control</loc></url>
  <url><loc>https://www.c1.ai/glossary/saml-vs-scim</loc></url>
  <url><loc>https://www.c1.ai/glossary/what-is-separation-of-duties</loc></url>
  <url><loc>https://www.c1.ai/glossary/what-is-shadow-it</loc></url>
  <url><loc>https://www.c1.ai/glossary/what-is-single-sign-on-sso</loc></url>
  <url><loc>https://www.c1.ai/glossary/what-is-temporary-elevated-access</loc></url>
  <url><loc>https://www.c1.ai/glossary/sox-vs-soc2</loc></url>
  <url><loc>https://www.c1.ai/glossary/zero-standing-privilege</loc></url>
  <url><loc>https://www.c1.ai/glossary/zero-trust</loc></url>
  <url><loc>https://www.c1.ai/glossary/why-migrate-from-birthright-to-just-in-time-access</loc></url>
  <url><loc>https://www.c1.ai/news</loc></url>
  <url><loc>https://www.c1.ai/news/press-release/conductorone-integrates-with-crowdstrike</loc></url>
  <url><loc>https://www.c1.ai/news/press-release/c1-collaborates-with-wiz</loc></url>
  <url><loc>https://www.c1.ai/news/press-release/conductorone-achieves-4x-revenue-growth-significant-traction-in-enterprise-market</loc></url>
  <url><loc>https://www.c1.ai/news/press-release/conductorone-announces-identity-lifecycle-management</loc></url>
  <url><loc>https://www.c1.ai/news/press-release/conductorone-appoints-william-bengtson-ciso</loc></url>
  <url><loc>https://www.c1.ai/news/press-release/conductorone-expands-executive-team-with-new-field-ciso-and-vp-of-finance</loc></url>
  <url><loc>https://www.c1.ai/news/press-release/conductorone-extends-next-gen-iga-platform-with-separation-of-duties-policy-automation</loc></url>
  <url><loc>https://www.c1.ai/news/press-release/conductorone-introduces-auditor-ready-data-accuracy-reporting</loc></url>
  <url><loc>https://www.c1.ai/news/press-release/conductorone-launches-solution-to-detect-secure-and-manage-access-to-shadow-apps</loc></url>
  <url><loc>https://www.c1.ai/news/press-release/conductorone-named-access-management-solution-of-the-year-by-cybersecurity-breakthrough</loc></url>
  <url><loc>https://www.c1.ai/news/press-release/conductorone-named-to-citizens-jmp-cyber-66</loc></url>
  <url><loc>https://www.c1.ai/news/press-release/conductorone-named-to-fortune-cyber60-list</loc></url>
  <url><loc>https://www.c1.ai/news/press-release/conductorone-partners-with-guidepoint-security-to-deliver-modern-identity-governance</loc></url>
  <url><loc>https://www.c1.ai/news/press-release/conductorone-raises-79-million-series-b</loc></url>
  <url><loc>https://www.c1.ai/news/press-release/conductorone-recognized-as-sinet16-innovator</loc></url>
  <url><loc>https://www.c1.ai/news/press-release/conductorone-streamlines-access-provisioning-with-helpdesk-automation</loc></url>
  <url><loc>https://www.c1.ai/news/press-release/conductorone-unveils-multi-agent-identity-security-platform</loc></url>
  <url><loc>https://www.c1.ai/news/press-release/conductorone-unveils-unified-identity-governance-for-human-and-non-human-identities</loc></url>
  <url><loc>https://www.c1.ai/news/press-release/conductorones-new-identity-security-outlook-report-reveals-the-top-identity-related-challenges-and-opportunities-in-2024</loc></url>
  <url><loc>https://www.c1.ai/news/press-release/future-of-identity-security-2026</loc></url>
  <url><loc>https://www.c1.ai/news/press-release/instacart-automates-just-in-time-access-with-conductorone</loc></url>
  <url><loc>https://www.c1.ai/news/press-release/introducing-ai-access-management</loc></url>
  <url><loc>https://www.c1.ai/news/press-release/survey-security-leaders-go-all-in-on-ai-agents-to-address-surging-identity-attacks</loc></url>
  <url><loc>https://www.c1.ai/podcast</loc></url>
  <url><loc>https://www.c1.ai/podcast/A_Deep_Dive_into_Compliance_with_Chris_Niggel</loc></url>
  <url><loc>https://www.c1.ai/podcast/a-global-view-of-ai-and-security</loc></url>
  <url><loc>https://www.c1.ai/podcast/adding-brakes-to-go-faster-navigating-agentic-ai</loc></url>
  <url><loc>https://www.c1.ai/podcast/analyzing-success-in-cybersecurity</loc></url>
  <url><loc>https://www.c1.ai/podcast/breaking-down-least-privilege-and-zero-standing-privilege</loc></url>
  <url><loc>https://www.c1.ai/podcast/guy-podjarny-snyk-building-effective-security-program</loc></url>
  <url><loc>https://www.c1.ai/podcast/kunal-agarwal-dope-building-dope-experiences</loc></url>
  <url><loc>https://www.c1.ai/podcast/creating-opportunity-in-a-dominated-market</loc></url>
  <url><loc>https://www.c1.ai/podcast/demystifying-itdr-didi-dotan</loc></url>
  <url><loc>https://www.c1.ai/podcast/from-fear-to-excitement-ai-agents-in-security</loc></url>
  <url><loc>https://www.c1.ai/podcast/getting-a-pulse-on-cybersecurity</loc></url>
  <url><loc>https://www.c1.ai/podcast/tony-huie-twingate-breaking-down-zero-trust</loc></url>
  <url><loc>https://www.c1.ai/podcast/how-hashicorp-built-cpam-least-privilege-will-bengtson</loc></url>
  <url><loc>https://www.c1.ai/podcast/implementing_transparent_security_with_den_jones</loc></url>
  <url><loc>https://www.c1.ai/podcast/moving-beyond-break-fix-it-ylan-muller-firehydrant</loc></url>
  <url><loc>https://www.c1.ai/podcast/all-aboard-jason-chan</loc></url>
  <url><loc>https://www.c1.ai/podcast/reinventing-endpoint-security</loc></url>
  <url><loc>https://www.c1.ai/podcast/SBOMs-and-Supply-Chain-Security-with-Rob-Szumski</loc></url>
  <url><loc>https://www.c1.ai/podcast/securing-devices-beyond-the-perimeter-with-kandjis-dom-lombardi</loc></url>
  <url><loc>https://www.c1.ai/podcast/Security_Automation_with_Tines's_Eoin_Hinchy</loc></url>
  <url><loc>https://www.c1.ai/podcast/Security-Hiring-Tips-with-Code-Red's-Tom-Alcock</loc></url>
  <url><loc>https://www.c1.ai/podcast/security-strategy-for-startups</loc></url>
  <url><loc>https://www.c1.ai/podcast/shift-left-cloud-infrastructure-security-travis-mcpeak</loc></url>
  <url><loc>https://www.c1.ai/podcast/shifting-focus</loc></url>
  <url><loc>https://www.c1.ai/podcast/Spicy_Takes_with_David_Lee_the_Identity_Jedi</loc></url>
  <url><loc>https://www.c1.ai/podcast/how-to-think-about-non-human-identities-and-ai</loc></url>
  <url><loc>https://www.c1.ai/podcast/the-death-of-saas-and-the-rise-of-agentic-ai</loc></url>
  <url><loc>https://www.c1.ai/podcast/The_Intersection_of_AI_and_Identity_with_the_Identity_Jedi_David_Lee</loc></url>
  <url><loc>https://www.c1.ai/podcast/the-untold-history-of-identity</loc></url>
  <url><loc>https://www.c1.ai/podcast/The_Past_Present_and_Future_of_Passwords_with_Jeff_Shiner</loc></url>
  <url><loc>https://www.c1.ai/podcast/unlocking-zero-trust-networking-avery-pennarun</loc></url>
  <url><loc>https://www.c1.ai/podcast/what-does-your-auditor-think-about-agentic-ai</loc></url>
  <url><loc>https://www.c1.ai/talks</loc></url>
  <url><loc>https://www.c1.ai/talks/access-governance-the-automation-evolution</loc></url>
  <url><loc>https://www.c1.ai/talks/agents-in-production-the-new-reality-of-enterprise-identity</loc></url>
  <url><loc>https://www.c1.ai/talks/beyond-user-access-reviews-webinar</loc></url>
  <url><loc>https://www.c1.ai/talks/code-story-with-special-guest-alex-bovee</loc></url>
  <url><loc>https://www.c1.ai/talks/cybarr-chats-best-practices-for-access-reviews</loc></url>
  <url><loc>https://www.c1.ai/talks/digitaloceans-recipe-for-sox-success-webinar</loc></url>
  <url><loc>https://www.c1.ai/talks/get-it-started-get-it-done-hosted-by-den-jones</loc></url>
  <url><loc>https://www.c1.ai/talks/iga-maturity-curve-webinar</loc></url>
  <url><loc>https://www.c1.ai/talks/lock-and-key-webinar</loc></url>
  <url><loc>https://www.c1.ai/talks/rethinking-identity-governance</loc></url>
  <url><loc>https://www.c1.ai/talks/risky-biz-podcast-with-conductorones-alex-bovee</loc></url>
  <url><loc>https://www.c1.ai/talks/sans-cyber-solutions-zero-trust-least-privilege-access</loc></url>
  <url><loc>https://www.c1.ai/talks/so-long-standing-access-webinar</loc></url>
  <url><loc>https://www.c1.ai/talks/spotlight-on-conductorones-alex-bovee-on-ingredients-of-a-high-growth-startup</loc></url>
  <url><loc>https://www.c1.ai/talks/the-cto-show-demystifying-identity-management-and-automation-in-cybersecurity-with-conductorone-s-paul-querna</loc></url>
  <url><loc>https://www.c1.ai/talks/the-didi-lital-show-with-alex-bovee</loc></url>
  <url><loc>https://www.c1.ai/talks/the-engine-room-dynamic-access-control</loc></url>
  <url><loc>https://www.c1.ai/talks/the-engine-room-inside-the-policy-engine</loc></url>
  <url><loc>https://www.c1.ai/talks/the-engine-room-user-access-reviews</loc></url>
  <url><loc>https://www.c1.ai/talks/the-identity-at-the-center-podcast-with-alex-bovee-june-2024</loc></url>
  <url><loc>https://www.c1.ai/talks/the-identity-at-the-center-podcast-with-alex-bovee</loc></url>
  <url><loc>https://www.c1.ai/talks/the-identity-jedi-podcast-with-alex-bovee</loc></url>
</urlset>