<?xml version="1.0" encoding="UTF-8"?>
<!-- generator="wordpress.com" -->
<urlset xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xmlns="http://www.sitemaps.org/schemas/sitemap/0.9" xmlns:image="http://www.google.com/schemas/sitemap-image/1.1" xsi:schemaLocation="http://www.sitemaps.org/schemas/sitemap/0.9 http://www.sitemaps.org/schemas/sitemap/0.9/sitemap.xsd"><url><loc>https://dawidbalut.com/2022/04/24/im-not-on-instagram/</loc><lastmod>2022-04-24T10:31:13+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://dawidbalut.com/2018/12/27/my-book-social-skills-for-information-security-professionals-a-handbook-for-those-who-strive-to-lead-and-manage-effectively-is-live/</loc><image:image><image:loc>https://dawidbalut.com/wp-content/uploads/2018/12/Social-Skills-For-Information-Security-Professionals-A-Handbook-For-Those-Who-Strive-To-Lead-And-Manage-Effectively-by-Dawid-Balut.png</image:loc><image:title>Social Skills For Information Security Professionals, A Handbook For Those Who Strive To Lead And Manage Effectively by Dawid Balut</image:title></image:image><lastmod>2022-02-22T14:28:45+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://dawidbalut.com/podcast/</loc><lastmod>2022-02-19T10:31:40+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://dawidbalut.com/2022/02/18/rozmowa-kontrolowana-95/</loc><lastmod>2022-02-18T19:07:07+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://dawidbalut.com/2022/01/01/nist-cybersecurity-framework-v1-1-simplified/</loc><lastmod>2022-02-13T14:32:30+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://dawidbalut.com/about/</loc><image:image><image:loc>https://dawidbalut.com/wp-content/uploads/2018/07/36513664_1026293837536171_6045304114231902208_n1.jpg</image:loc><image:title>36513664_1026293837536171_6045304114231902208_n</image:title></image:image><image:image><image:loc>https://dawidbalut.com/wp-content/uploads/2017/06/stairs-lights-abstract-bubbles1.jpg</image:loc><image:title>Placeholder Image</image:title></image:image><lastmod>2021-11-01T21:16:04+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://dawidbalut.com/2018/11/16/hackers-approach-to-productivity-and-career-development-universal-truths/</loc><lastmod>2021-08-03T23:45:54+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://dawidbalut.com/2020/12/12/practical-guide-into-gcp-security-entry-mid-level/</loc><lastmod>2020-12-12T14:54:34+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://dawidbalut.com/2020/11/11/to-grow-is-to-care-about-others/</loc><lastmod>2020-11-11T03:11:29+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://dawidbalut.com/2020/10/04/the-fallacy-of-building-vs-buying/</loc><lastmod>2020-10-04T14:36:59+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://dawidbalut.com/2020/08/17/security-perimeter-budgeting-and-technical-debt/</loc><lastmod>2020-08-17T22:16:10+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://dawidbalut.com/2020/04/16/security-principles-of-google-cloud-platform/</loc><lastmod>2020-04-28T05:30:04+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://dawidbalut.com/2019/11/20/useful-training-and-mindset-for-becoming-a-cloud-security-architect/</loc><lastmod>2019-11-20T02:23:38+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://dawidbalut.com/2019/06/09/pl-jak-przygotowac-sie-do-zdania-certyfikatu-oscp/</loc><lastmod>2021-06-28T11:43:47+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://dawidbalut.com/2019/05/21/13-basic-steps-to-start-a-practical-implementation-of-devsecops-at-your-organisation/</loc><lastmod>2019-05-21T10:13:19+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://dawidbalut.com/2019/05/21/wlasny-lab-do-nauki-pentestow-jak-zaczac/</loc><lastmod>2019-05-21T08:56:17+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://dawidbalut.com/2018/12/15/social-skills-for-information-security-professionals-on-enabling-others-to-perform-at-their-best/</loc><lastmod>2018-12-15T16:29:28+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://dawidbalut.com/2018/12/02/remote-work-a-separate-office-space/</loc><lastmod>2018-12-02T18:07:37+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://dawidbalut.com/2018/12/01/im-never-motivated-or-inspired/</loc><lastmod>2018-12-02T10:36:43+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://dawidbalut.com/contact/</loc><lastmod>2018-11-16T11:19:11+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://dawidbalut.com/2018/11/06/social-skills-for-information-security-professionals-on-leading-by-example-removing-roadblocks-and-simplification/</loc><lastmod>2018-11-06T08:38:56+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://dawidbalut.com/2018/10/03/social-skills-for-information-security-professionals-on-agile-secure-sdlc-and-unhealthy-habits/</loc><lastmod>2018-10-03T19:21:14+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://dawidbalut.com/2018/09/19/social-skills-for-information-security-professionals-the-preface-to-my-book/</loc><lastmod>2018-09-19T20:06:34+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://dawidbalut.com/2018/09/19/social-skills-for-information-security-professionals-on-credibility-awareness-and-business/</loc><image:image><image:loc>https://dawidbalut.com/wp-content/uploads/2018/09/socialskills.png</image:loc><image:title>socialskills</image:title></image:image><lastmod>2018-09-19T20:05:54+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://dawidbalut.com/2018/08/18/programming-skills-in-infosec-career/</loc><lastmod>2018-09-04T17:22:17+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://dawidbalut.com/2018/08/17/sharing-udemy-courses-and-certifications-in-cv-and-resume/</loc><lastmod>2018-08-17T08:00:03+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://dawidbalut.com/2017/09/12/books-that-transformed-my-life-and-career/</loc><image:image><image:loc>https://dawidbalut.com/wp-content/uploads/2017/09/e1004-12sgkwdt70kpkwfjgnmaeva.jpeg</image:loc><image:title>e1004-12sgkwdt70kpkwfjgnmaeva</image:title></image:image><lastmod>2018-07-12T19:08:59+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://dawidbalut.com/2018/05/14/which-skills-are-essential-to-find-a-job-in-security-and-how-to-build-an-initial-portfolio/</loc><lastmod>2018-05-15T11:54:20+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://dawidbalut.com/questions/</loc><lastmod>2018-05-14T12:26:02+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://dawidbalut.com/2018/05/10/top-9-rules-to-maximize-roi-of-bug-bounties-and-penetration-tests/</loc><lastmod>2018-05-11T11:15:13+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://dawidbalut.com/2018/05/06/here-is-what-we-should-teach-all-software-developers-about-security/</loc><lastmod>2018-05-07T10:01:00+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://dawidbalut.com/2018/04/17/penetration-testing-and-vulnerability-assessments-are-not-going-anywhere-anytime-soon-we-still-suck-at-basics/</loc><lastmod>2018-04-21T15:44:25+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://dawidbalut.com/2018/04/21/the-most-important-lesson-for-aspiring-penetration-testers-and-junior-security-professionals/</loc><lastmod>2018-04-21T00:28:07+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://dawidbalut.com/2018/04/21/corporate-meetings-should-involve-everyone-to-actually-find-the-best-solution-to-a-problem/</loc><lastmod>2018-04-21T00:21:40+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://dawidbalut.com/2018/03/12/effectiveness-high-productivity-and-fulfillment-in-infosec%e2%80%8a-%e2%80%8athe-game-that-never-ends/</loc><image:image><image:loc>https://dawidbalut.com/wp-content/uploads/2018/03/54889-1lkbvz9d2flud53unses9ng.jpeg</image:loc><image:title>54889-1lkbvz9d2flud53unses9ng</image:title></image:image><lastmod>2018-03-13T00:26:33+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://dawidbalut.com/2018/03/10/here-is-how-social-medias-ruin-our-security-awareness-programs/</loc><lastmod>2018-03-12T20:25:44+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://dawidbalut.com/2018/02/17/at-the-end-its-all-about-protecting-the-money-making-machine/</loc><lastmod>2018-02-17T01:07:57+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://dawidbalut.com/2018/01/10/jak-zostac-pentesterem-i-specjalista-bezpieczenstwa/</loc><lastmod>2018-09-04T17:21:19+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://dawidbalut.com/2016/11/01/employment-expectations-mismatch-and-recruitment-pitfalls-in-infosec/</loc><image:image><image:loc>https://dawidbalut.com/wp-content/uploads/2017/06/324b2-16rrakjmddoo9vhqxih3_6a.jpeg</image:loc><image:title>324b2-16rrakjmddoo9vhqxih3_6a</image:title></image:image><lastmod>2018-01-29T00:58:31+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://dawidbalut.com/2018/01/22/growing-thick-skin-in-infosec-to-avoid-burnouts-and-be-more-effective/</loc><image:image><image:loc>https://dawidbalut.com/wp-content/uploads/2018/01/1443a-0tatb_qrisvci_q9.jpg</image:loc><image:title>1443a-0tatb_qrisvci_q9</image:title></image:image><lastmod>2018-01-22T15:09:38+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://dawidbalut.com/2018/01/03/leave-your-ego-at-the-door-and-study-empathetic-leadership/</loc><lastmod>2018-01-04T17:03:58+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://dawidbalut.com/2017/12/18/working-in-the-office-8h-per-day-should-be-dead-by-now/</loc><lastmod>2017-12-18T07:17:04+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://dawidbalut.com/2017/11/28/security-is-an-art-of-tradeoffs-so-learn-how-to-manage-the-risks/</loc><image:image><image:loc>https://dawidbalut.com/wp-content/uploads/2017/11/ac391-1f1yw0rutvqgdbc9udohdwq.png</image:loc><image:title>ac391-1f1yw0rutvqgdbc9udohdwq</image:title></image:image><lastmod>2017-11-28T22:10:30+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://dawidbalut.com/2017/11/02/make-your-security-training-relevant-and-brief/</loc><lastmod>2017-11-02T10:12:29+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://dawidbalut.com/2017/10/24/secure-software-engineering%e2%80%8a-%e2%80%8aowasp-top-10-intro-course/</loc><lastmod>2017-10-24T22:01:46+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://dawidbalut.com/2017/10/22/quitter-mindset-is-killing-your-potential/</loc><lastmod>2017-10-22T22:01:48+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://dawidbalut.com/2017/10/16/manifesto-for-it-and-security-professionals-a-plea-to-do-more-and-contribute/</loc><lastmod>2017-10-17T17:23:31+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://dawidbalut.com/2016/08/22/software-complexity-as-an-enemy-of-security/</loc><image:image><image:loc>https://dawidbalut.com/wp-content/uploads/2017/06/286de-1k0jelj4hdws2pppyeq3q0a.png</image:loc><image:title>286de-1k0jelj4hdws2pppyeq3q0a</image:title></image:image><lastmod>2017-10-16T16:39:10+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://dawidbalut.com/2017/10/12/provide-high-quality-training-and-learn-to-feel-your-people/</loc><lastmod>2017-10-12T22:47:35+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://dawidbalut.com/2017/10/12/devops-i-devsecops-z-czym-to-sie-je-i-jak-to-wdrozyc/</loc><lastmod>2017-10-12T22:46:42+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://dawidbalut.com/2017/10/12/adjust-to-business-reality-and-simplify-your-processes/</loc><lastmod>2017-10-12T22:45:58+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://dawidbalut.com/2017/10/12/waterfall-security-testing-doesnt-scale-anymore-involve-everyone/</loc><lastmod>2017-10-12T22:44:59+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://dawidbalut.com/2017/09/13/standing-on-the-shoulder-of-giants-learning-to-love-the-process/</loc><lastmod>2017-09-13T18:38:25+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://dawidbalut.com/2017/09/12/finding-a-meaning-and-contributing-to-local-social-circles/</loc><lastmod>2017-09-12T23:36:54+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://dawidbalut.com/2017/09/12/securing-software-in-agile-sdlc-allocating-testing-resources/</loc><lastmod>2017-09-12T23:35:47+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://dawidbalut.com/2017/09/12/building-credibility-fake-it-till-you-make-it-is-wrong/</loc><lastmod>2017-09-12T23:31:30+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://dawidbalut.com/2017/09/12/creating-security-culture-in-startups-and-smbs/</loc><lastmod>2017-09-12T23:30:15+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://dawidbalut.com/2017/09/12/taking-baby-steps-with-corporate-security-programme/</loc><lastmod>2017-09-12T23:29:39+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://dawidbalut.com/2017/09/12/reading-is-an-art-and-this-is-how-ive-learnt-it/</loc><lastmod>2017-09-12T23:27:49+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://dawidbalut.com/2017/09/12/i-want-to-be-a-hacker-but-where-do-i-start/</loc><image:image><image:loc>https://dawidbalut.com/wp-content/uploads/2017/09/80b72-1_zfuezxylpauociqdjhcja.jpeg</image:loc><image:title>80b72-1_zfuezxylpauociqdjhcja</image:title></image:image><lastmod>2017-09-12T23:25:36+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://dawidbalut.com/2017/09/12/learn-how-to-run-productive-security-meetings/</loc><image:image><image:loc>https://dawidbalut.com/wp-content/uploads/2017/09/9d9b7-1bkeda3uu1r2onfcbblvq7a.jpeg</image:loc><image:title>9d9b7-1bkeda3uu1r2onfcbblvq7a</image:title></image:image><lastmod>2017-09-12T23:18:36+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://dawidbalut.com/2017/09/12/do-the-work-behind-the-scenes-and-dont-be-a-workflow-bottleneck/</loc><image:image><image:loc>https://dawidbalut.com/wp-content/uploads/2017/09/26c94-1rm7eputvahuzvl6n2edwaw.png</image:loc><image:title>26c94-1rm7eputvahuzvl6n2edwaw</image:title></image:image><lastmod>2017-09-12T23:18:09+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://dawidbalut.com/2016/10/24/hiring-your-first-security-professional/</loc><lastmod>2017-09-12T22:36:40+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://dawidbalut.com/2016/09/25/bugbounties-changed-infosec-world-for-better/</loc><image:image><image:loc>https://dawidbalut.com/wp-content/uploads/2017/06/be521-16qkws4m81e0aftds6-syqg.png</image:loc><image:title>be521-16qkws4m81e0aftds6-syqg</image:title></image:image><lastmod>2017-09-12T22:36:22+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://dawidbalut.com/2017/04/07/start-small-and-early-effective-security-management-part-1/</loc><image:image><image:loc>https://dawidbalut.com/wp-content/uploads/2017/06/629b3-1h-nsgjcmohumdfb1l-6bua.png</image:loc><image:title>629b3-1h-nsgjcmohumdfb1l-6bua</image:title></image:image><lastmod>2017-09-12T22:36:21+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://dawidbalut.com/2017/04/07/guide-into-effective-security-management/</loc><image:image><image:loc>https://dawidbalut.com/wp-content/uploads/2017/06/f0378-1029bzkbopld5uel_6kvfdq.jpeg</image:loc><image:title>f0378-1029bzkbopld5uel_6kvfdq</image:title></image:image><lastmod>2017-09-12T22:36:21+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://dawidbalut.com/2017/04/22/make-security-simple-effective-security-management-part-5/</loc><image:image><image:loc>https://dawidbalut.com/wp-content/uploads/2017/06/3a383-1zzm-1e1imgs1e0iqdoop0g.jpeg</image:loc><image:title>3a383-1zzm-1e1imgs1e0iqdoop0g</image:title></image:image><lastmod>2017-09-12T22:36:21+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://dawidbalut.com/2017/04/08/educate-executives-and-middle-management-first-effective-security-management-part-2/</loc><image:image><image:loc>https://dawidbalut.com/wp-content/uploads/2017/06/4d843-19kfpdqs5t-mkzyddidfosg.jpeg</image:loc><image:title>4d843-19kfpdqs5t-mkzyddidfosg</image:title></image:image><lastmod>2017-09-12T22:36:21+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://dawidbalut.com/2017/04/08/build-credibility-and-learn-business-language-effective-security-management-part-3/</loc><image:image><image:loc>https://dawidbalut.com/wp-content/uploads/2017/06/ce545-1idn77lb508xmevuprjczja.jpeg</image:loc><image:title>ce545-1idn77lb508xmevuprjczja</image:title></image:image><lastmod>2017-09-12T22:36:21+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://dawidbalut.com/2017/04/13/outline-sdlcndlc-improvements-effective-security-management-part-4/</loc><image:image><image:loc>https://dawidbalut.com/wp-content/uploads/2017/06/deaae-1orkwd5cifyt5qegionrupw.png</image:loc><image:title>deaae-1orkwd5cifyt5qegionrupw</image:title></image:image><lastmod>2017-09-12T22:36:21+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://dawidbalut.com/2017/02/07/peerlyst-ebook-essentials-of-cybersecurity/</loc><image:image><image:loc>https://dawidbalut.com/wp-content/uploads/2017/06/c39a5-1kbvqg_v_qzhtppobmjsxlw.jpeg</image:loc><image:title>c39a5-1kbvqg_v_qzhtppobmjsxlw</image:title></image:image><lastmod>2017-09-12T22:36:21+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://dawidbalut.com/2017/02/18/how-to-maximize-roi-of-bug-bounties-and-penetration-tests/</loc><image:image><image:loc>https://dawidbalut.com/wp-content/uploads/2017/06/b6192-1gi7msl6cz2wba7a-c_nezq.png</image:loc><image:title>b6192-1gi7msl6cz2wba7a-c_nezq</image:title></image:image><image:image><image:loc>https://dawidbalut.com/wp-content/uploads/2017/06/9e892-1kp_do-noiacjxrpjwalzaw.png</image:loc><image:title>9e892-1kp_do-noiacjxrpjwalzaw</image:title></image:image><lastmod>2017-09-12T22:36:21+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://dawidbalut.com/2017/04/28/embrace-devsecops-effective-security-management-part-6/</loc><lastmod>2017-09-12T22:36:20+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://dawidbalut.com/2017/05/29/internal-security-trainings-and-awareness-awards-effective-security-management-part-7/</loc><lastmod>2017-09-12T22:36:20+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://dawidbalut.com/2017/06/18/make-security-personal-and-never-play-the-shame-game-esm-part-8/</loc><lastmod>2017-09-12T22:36:20+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://dawidbalut.com/2016/11/21/care-the-most-powerful-quality-in-a-workplace/</loc><lastmod>2017-09-12T21:48:44+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://dawidbalut.com/2016/12/21/trust-is-what-makes-the-team-out-of-a-group-of-co-workers/</loc><lastmod>2017-09-12T21:48:44+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://dawidbalut.com/2016/09/04/pentests-vs-bugbounty-for-startups-and-smbs/</loc><image:image><image:loc>https://dawidbalut.com/wp-content/uploads/2017/06/babad-1lvxgqqh-76b3uybultknqg.jpeg</image:loc><image:title>babad-1lvxgqqh-76b3uybultknqg</image:title></image:image><lastmod>2016-09-04T23:51:37+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://dawidbalut.com</loc><changefreq>daily</changefreq><priority>1.0</priority><lastmod>2022-04-24T10:31:13+00:00</lastmod></url></urlset>
