<?xml version="1.0" encoding="UTF-8"?><?xml-stylesheet type="text/xsl" href="//cybersecurityinnovation.dk/wp-content/plugins/wordpress-seo/css/main-sitemap.xsl"?>
<urlset xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xmlns:image="http://www.google.com/schemas/sitemap-image/1.1" xsi:schemaLocation="http://www.sitemaps.org/schemas/sitemap/0.9 http://www.sitemaps.org/schemas/sitemap/0.9/sitemap.xsd http://www.google.com/schemas/sitemap-image/1.1 http://www.google.com/schemas/sitemap-image/1.1/sitemap-image.xsd" xmlns="http://www.sitemaps.org/schemas/sitemap/0.9">
	<url>
		<loc>https://cybersecurityinnovation.dk/lektion/viden-om-agile-arbejdsmetoder/</loc>
		<lastmod>2022-12-07T13:38:27+00:00</lastmod>
	</url>
	<url>
		<loc>https://cybersecurityinnovation.dk/lektion/det-nyeste-inden-for-it-sikkerhed/</loc>
		<lastmod>2022-12-07T13:38:28+00:00</lastmod>
	</url>
	<url>
		<loc>https://cybersecurityinnovation.dk/lektion/hvad-er-den-nyeste-viden/</loc>
		<lastmod>2022-12-07T13:38:28+00:00</lastmod>
	</url>
	<url>
		<loc>https://cybersecurityinnovation.dk/lektion/hvad-er-it-sikkerhed/</loc>
		<lastmod>2022-12-29T10:25:08+00:00</lastmod>
	</url>
	<url>
		<loc>https://cybersecurityinnovation.dk/lektion/hvad-skal-man-vaere-opmaerksom-pa/</loc>
		<lastmod>2022-12-29T10:25:10+00:00</lastmod>
	</url>
	<url>
		<loc>https://cybersecurityinnovation.dk/lektion/kanban-to-do/</loc>
		<lastmod>2022-12-29T10:25:10+00:00</lastmod>
	</url>
	<url>
		<loc>https://cybersecurityinnovation.dk/lektion/visualiser-dit-fremskridt/</loc>
		<lastmod>2022-12-29T10:25:10+00:00</lastmod>
	</url>
	<url>
		<loc>https://cybersecurityinnovation.dk/lektion/visualiser-dit-fremskridt-ii/</loc>
		<lastmod>2022-12-29T10:25:10+00:00</lastmod>
	</url>
	<url>
		<loc>https://cybersecurityinnovation.dk/lektion/agenda/</loc>
		<lastmod>2022-12-29T10:34:15+00:00</lastmod>
	</url>
	<url>
		<loc>https://cybersecurityinnovation.dk/lektion/starter-om-lidt/</loc>
		<lastmod>2023-01-16T09:09:42+00:00</lastmod>
	</url>
	<url>
		<loc>https://cybersecurityinnovation.dk/lektion/opgave-og-quiz/</loc>
		<lastmod>2023-01-16T10:01:51+00:00</lastmod>
	</url>
	<url>
		<loc>https://cybersecurityinnovation.dk/lektion/introduktion-til-scrum/</loc>
		<lastmod>2023-01-17T21:50:28+00:00</lastmod>
	</url>
	<url>
		<loc>https://cybersecurityinnovation.dk/lektion/download-pdf/</loc>
		<lastmod>2023-01-17T21:50:28+00:00</lastmod>
	</url>
	<url>
		<loc>https://cybersecurityinnovation.dk/lektion/multi-factor-authentication-video/</loc>
		<lastmod>2023-01-19T13:35:58+00:00</lastmod>
	</url>
	<url>
		<loc>https://cybersecurityinnovation.dk/lektion/genbrug-af-passwords/</loc>
		<lastmod>2023-01-19T13:35:58+00:00</lastmod>
	</url>
	<url>
		<loc>https://cybersecurityinnovation.dk/lektion/multifactor-aithentication/</loc>
		<lastmod>2023-01-19T13:35:58+00:00</lastmod>
	</url>
	<url>
		<loc>https://cybersecurityinnovation.dk/lektion/agil-vs-traditionel/</loc>
		<lastmod>2023-01-20T12:10:19+00:00</lastmod>
	</url>
	<url>
		<loc>https://cybersecurityinnovation.dk/lektion/scrum-team/</loc>
		<lastmod>2023-01-20T12:10:19+00:00</lastmod>
	</url>
	<url>
		<loc>https://cybersecurityinnovation.dk/lektion/sprint-iteration/</loc>
		<lastmod>2023-01-20T12:10:19+00:00</lastmod>
	</url>
	<url>
		<loc>https://cybersecurityinnovation.dk/lektion/kanban/</loc>
		<lastmod>2023-01-20T12:10:19+00:00</lastmod>
	</url>
	<url>
		<loc>https://cybersecurityinnovation.dk/lektion/user-stories-i/</loc>
		<lastmod>2023-01-20T12:10:19+00:00</lastmod>
	</url>
	<url>
		<loc>https://cybersecurityinnovation.dk/lektion/agile-thinking/</loc>
		<lastmod>2023-01-20T12:10:19+00:00</lastmod>
	</url>
	<url>
		<loc>https://cybersecurityinnovation.dk/lektion/daily-standup/</loc>
		<lastmod>2023-01-20T12:10:19+00:00</lastmod>
	</url>
	<url>
		<loc>https://cybersecurityinnovation.dk/lektion/iteration-planning/</loc>
		<lastmod>2023-01-20T12:10:19+00:00</lastmod>
	</url>
	<url>
		<loc>https://cybersecurityinnovation.dk/lektion/iteration-review/</loc>
		<lastmod>2023-01-20T12:10:19+00:00</lastmod>
	</url>
	<url>
		<loc>https://cybersecurityinnovation.dk/lektion/iteration-retro/</loc>
		<lastmod>2023-01-20T12:10:19+00:00</lastmod>
	</url>
	<url>
		<loc>https://cybersecurityinnovation.dk/lektion/scrum-master-i/</loc>
		<lastmod>2023-01-20T12:10:19+00:00</lastmod>
	</url>
	<url>
		<loc>https://cybersecurityinnovation.dk/lektion/backlog/</loc>
		<lastmod>2023-01-20T12:10:19+00:00</lastmod>
	</url>
	<url>
		<loc>https://cybersecurityinnovation.dk/lektion/user-stories-ii/</loc>
		<lastmod>2023-01-20T12:10:19+00:00</lastmod>
	</url>
	<url>
		<loc>https://cybersecurityinnovation.dk/lektion/story-eestimation/</loc>
		<lastmod>2023-01-20T12:10:19+00:00</lastmod>
	</url>
	<url>
		<loc>https://cybersecurityinnovation.dk/lektion/features/</loc>
		<lastmod>2023-01-20T12:10:19+00:00</lastmod>
	</url>
	<url>
		<loc>https://cybersecurityinnovation.dk/lektion/enablers/</loc>
		<lastmod>2023-01-20T12:10:19+00:00</lastmod>
	</url>
	<url>
		<loc>https://cybersecurityinnovation.dk/lektion/epics/</loc>
		<lastmod>2023-01-20T12:10:19+00:00</lastmod>
	</url>
	<url>
		<loc>https://cybersecurityinnovation.dk/lektion/program-objectives/</loc>
		<lastmod>2023-01-20T12:10:19+00:00</lastmod>
	</url>
	<url>
		<loc>https://cybersecurityinnovation.dk/lektion/theory-of-mvp-and-wsjf/</loc>
		<lastmod>2023-01-20T12:10:19+00:00</lastmod>
	</url>
	<url>
		<loc>https://cybersecurityinnovation.dk/lektion/scaled-scrum/</loc>
		<lastmod>2023-01-20T12:10:19+00:00</lastmod>
	</url>
	<url>
		<loc>https://cybersecurityinnovation.dk/lektion/safe/</loc>
		<lastmod>2023-01-20T12:10:19+00:00</lastmod>
	</url>
	<url>
		<loc>https://cybersecurityinnovation.dk/lektion/arts-agile-release-trains/</loc>
		<lastmod>2023-01-20T12:10:19+00:00</lastmod>
	</url>
	<url>
		<loc>https://cybersecurityinnovation.dk/lektion/pis/</loc>
		<lastmod>2023-01-20T12:10:19+00:00</lastmod>
	</url>
	<url>
		<loc>https://cybersecurityinnovation.dk/lektion/pi-planning/</loc>
		<lastmod>2023-01-20T12:10:19+00:00</lastmod>
	</url>
	<url>
		<loc>https://cybersecurityinnovation.dk/lektion/lean-agile/</loc>
		<lastmod>2023-01-20T12:10:19+00:00</lastmod>
	</url>
	<url>
		<loc>https://cybersecurityinnovation.dk/lektion/built-in-quality/</loc>
		<lastmod>2023-01-20T12:10:19+00:00</lastmod>
	</url>
	<url>
		<loc>https://cybersecurityinnovation.dk/lektion/cd-ce-ci/</loc>
		<lastmod>2023-01-20T12:10:19+00:00</lastmod>
	</url>
	<url>
		<loc>https://cybersecurityinnovation.dk/lektion/inspect-and-adapt/</loc>
		<lastmod>2023-01-20T12:10:19+00:00</lastmod>
	</url>
	<url>
		<loc>https://cybersecurityinnovation.dk/lektion/product-delivery/</loc>
		<lastmod>2023-01-20T12:10:19+00:00</lastmod>
	</url>
	<url>
		<loc>https://cybersecurityinnovation.dk/lektion/team-agility/</loc>
		<lastmod>2023-01-20T12:10:19+00:00</lastmod>
	</url>
	<url>
		<loc>https://cybersecurityinnovation.dk/lektion/org-agility/</loc>
		<lastmod>2023-01-20T12:10:19+00:00</lastmod>
	</url>
	<url>
		<loc>https://cybersecurityinnovation.dk/lektion/portfolio-management/</loc>
		<lastmod>2023-01-20T12:10:19+00:00</lastmod>
	</url>
	<url>
		<loc>https://cybersecurityinnovation.dk/lektion/delivery-pipeline/</loc>
		<lastmod>2023-01-20T12:10:19+00:00</lastmod>
	</url>
	<url>
		<loc>https://cybersecurityinnovation.dk/lektion/system-arch-rte-product-management/</loc>
		<lastmod>2023-01-20T12:10:19+00:00</lastmod>
	</url>
	<url>
		<loc>https://cybersecurityinnovation.dk/lektion/solution-train/</loc>
		<lastmod>2023-01-20T12:10:19+00:00</lastmod>
	</url>
	<url>
		<loc>https://cybersecurityinnovation.dk/lektion/implementation-roadmap/</loc>
		<lastmod>2023-01-20T12:10:19+00:00</lastmod>
	</url>
	<url>
		<loc>https://cybersecurityinnovation.dk/lektion/scrum-master-ii/</loc>
		<lastmod>2023-01-20T12:10:19+00:00</lastmod>
	</url>
	<url>
		<loc>https://cybersecurityinnovation.dk/lektion/scrum-master-iii/</loc>
		<lastmod>2023-01-20T12:10:19+00:00</lastmod>
	</url>
	<url>
		<loc>https://cybersecurityinnovation.dk/lektion/product-owner-ii/</loc>
		<lastmod>2023-01-20T12:10:19+00:00</lastmod>
	</url>
	<url>
		<loc>https://cybersecurityinnovation.dk/lektion/product-owner-iii/</loc>
		<lastmod>2023-01-20T12:10:19+00:00</lastmod>
	</url>
	<url>
		<loc>https://cybersecurityinnovation.dk/lektion/product-owner-i/</loc>
		<lastmod>2023-01-20T12:10:19+00:00</lastmod>
	</url>
	<url>
		<loc>https://cybersecurityinnovation.dk/lektion/product-owner-i-2/</loc>
		<lastmod>2023-01-24T13:08:14+00:00</lastmod>
	</url>
	<url>
		<loc>https://cybersecurityinnovation.dk/lektion/register/</loc>
		<lastmod>2024-03-05T09:27:06+00:00</lastmod>
	</url>
	<url>
		<loc>https://cybersecurityinnovation.dk/lektion/test3/</loc>
		<lastmod>2024-03-05T09:27:06+00:00</lastmod>
	</url>
	<url>
		<loc>https://cybersecurityinnovation.dk/lektion/introduktionsvideo/</loc>
		<lastmod>2024-03-06T07:27:27+00:00</lastmod>
	</url>
	<url>
		<loc>https://cybersecurityinnovation.dk/lektion/downloads/</loc>
		<lastmod>2024-03-06T07:27:27+00:00</lastmod>
	</url>
	<url>
		<loc>https://cybersecurityinnovation.dk/lektion/skriv-en-user-story/</loc>
		<lastmod>2024-03-06T07:27:27+00:00</lastmod>
	</url>
	<url>
		<loc>https://cybersecurityinnovation.dk/lektion/scrum-level-2/</loc>
		<lastmod>2024-03-06T07:27:27+00:00</lastmod>
	</url>
	<url>
		<loc>https://cybersecurityinnovation.dk/lektion/refleksionsspoergsmaal/</loc>
		<lastmod>2024-03-07T14:33:47+00:00</lastmod>
	</url>
	<url>
		<loc>https://cybersecurityinnovation.dk/lektion/hvad-er-digitalisering/</loc>
		<lastmod>2024-03-07T14:39:33+00:00</lastmod>
	</url>
	<url>
		<loc>https://cybersecurityinnovation.dk/lektion/hvad-gor-du-for-at-sikre-dine-born-digitalt/</loc>
		<lastmod>2024-03-07T14:39:33+00:00</lastmod>
	</url>
	<url>
		<loc>https://cybersecurityinnovation.dk/lektion/hvad-har-vi-laert/</loc>
		<lastmod>2024-03-07T14:39:33+00:00</lastmod>
	</url>
	<url>
		<loc>https://cybersecurityinnovation.dk/lektion/hvad-er-naeste-skridt/</loc>
		<lastmod>2024-03-07T14:39:33+00:00</lastmod>
	</url>
	<url>
		<loc>https://cybersecurityinnovation.dk/lektion/kilder/</loc>
		<lastmod>2024-03-07T14:39:49+00:00</lastmod>
	</url>
	<url>
		<loc>https://cybersecurityinnovation.dk/lektion/refleksionsspoergsmaal-2/</loc>
		<lastmod>2024-03-07T14:45:08+00:00</lastmod>
	</url>
	<url>
		<loc>https://cybersecurityinnovation.dk/lektion/video-2/</loc>
		<lastmod>2024-03-07T14:45:46+00:00</lastmod>
	</url>
	<url>
		<loc>https://cybersecurityinnovation.dk/lektion/video/</loc>
		<lastmod>2024-03-07T14:46:51+00:00</lastmod>
	</url>
	<url>
		<loc>https://cybersecurityinnovation.dk/lektion/se-vores-forste-video/</loc>
		<lastmod>2024-03-07T14:47:38+00:00</lastmod>
	</url>
	<url>
		<loc>https://cybersecurityinnovation.dk/lektion/videointroduktion/</loc>
		<lastmod>2024-03-08T16:20:10+00:00</lastmod>
		<image:image>
			<image:loc>https://cybersecurityinnovation.dk/wp-content/uploads/2024/03/David-Multicam-1_01_03_37_16.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://cybersecurityinnovation.dk/lektion/video-nr-2-2/</loc>
		<lastmod>2024-03-08T16:20:10+00:00</lastmod>
		<image:image>
			<image:loc>https://cybersecurityinnovation.dk/wp-content/uploads/2024/03/Techdesigns.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://cybersecurityinnovation.dk/lektion/summespoergsmaal-om-techdesign/</loc>
		<lastmod>2024-03-08T16:20:10+00:00</lastmod>
		<image:image>
			<image:loc>https://cybersecurityinnovation.dk/wp-content/uploads/2024/03/Techdesigns.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://cybersecurityinnovation.dk/lektion/video-om-kulturen/</loc>
		<lastmod>2024-03-08T16:20:10+00:00</lastmod>
		<image:image>
			<image:loc>https://cybersecurityinnovation.dk/wp-content/uploads/2024/03/Kulturen.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://cybersecurityinnovation.dk/lektion/summeoevelse-om-kulturen/</loc>
		<lastmod>2024-03-08T16:20:10+00:00</lastmod>
		<image:image>
			<image:loc>https://cybersecurityinnovation.dk/wp-content/uploads/2024/03/Kulturen.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://cybersecurityinnovation.dk/lektion/video-om-soevn/</loc>
		<lastmod>2024-03-08T16:20:10+00:00</lastmod>
		<image:image>
			<image:loc>https://cybersecurityinnovation.dk/wp-content/uploads/2024/03/Soevn.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://cybersecurityinnovation.dk/lektion/video-om-psykologiske-traumer/</loc>
		<lastmod>2024-03-08T16:20:10+00:00</lastmod>
		<image:image>
			<image:loc>https://cybersecurityinnovation.dk/wp-content/uploads/2024/03/Psykologiske-Traumer.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://cybersecurityinnovation.dk/lektion/summeoevelse-om-psykologiske-traumer/</loc>
		<lastmod>2024-03-08T16:20:10+00:00</lastmod>
		<image:image>
			<image:loc>https://cybersecurityinnovation.dk/wp-content/uploads/2024/03/Psykologiske-Traumer.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://cybersecurityinnovation.dk/lektion/video-om-neurobiologi/</loc>
		<lastmod>2024-03-08T16:20:10+00:00</lastmod>
		<image:image>
			<image:loc>https://cybersecurityinnovation.dk/wp-content/uploads/2024/03/Neurobiologi.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://cybersecurityinnovation.dk/lektion/summeoevelse-om-neurobiologi/</loc>
		<lastmod>2024-03-08T16:20:10+00:00</lastmod>
		<image:image>
			<image:loc>https://cybersecurityinnovation.dk/wp-content/uploads/2024/03/Neurobiologi.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://cybersecurityinnovation.dk/lektion/video-om-neurobiologi-2/</loc>
		<lastmod>2024-03-08T16:20:10+00:00</lastmod>
		<image:image>
			<image:loc>https://cybersecurityinnovation.dk/wp-content/uploads/2024/03/Neurobiologi.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://cybersecurityinnovation.dk/lektion/video-om-udviklingsmaessige-vinduer/</loc>
		<lastmod>2024-03-08T16:20:10+00:00</lastmod>
		<image:image>
			<image:loc>https://cybersecurityinnovation.dk/wp-content/uploads/2024/03/Udviklingsmaessige-vinduer.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://cybersecurityinnovation.dk/lektion/video-om-dopamin/</loc>
		<lastmod>2024-03-08T16:20:10+00:00</lastmod>
		<image:image>
			<image:loc>https://cybersecurityinnovation.dk/wp-content/uploads/2024/03/Dopamin.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://cybersecurityinnovation.dk/lektion/video-om-vaerktoejer-og-raad/</loc>
		<lastmod>2024-03-08T16:20:11+00:00</lastmod>
		<image:image>
			<image:loc>https://cybersecurityinnovation.dk/wp-content/uploads/2024/03/Vaerktoejer.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://cybersecurityinnovation.dk/lektion/video-om-afsluttende-kommentar/</loc>
		<lastmod>2024-03-08T16:20:11+00:00</lastmod>
		<image:image>
			<image:loc>https://cybersecurityinnovation.dk/wp-content/uploads/2024/03/Afsluttende-Kommentar.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://cybersecurityinnovation.dk/lektion/kilder-2/</loc>
		<lastmod>2024-03-08T16:20:11+00:00</lastmod>
		<image:image>
			<image:loc>https://cybersecurityinnovation.dk/wp-content/uploads/2024/03/Afsluttende-Kommentar.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://cybersecurityinnovation.dk/lektion/introduktion-af-deltagere/</loc>
		<lastmod>2024-04-22T04:28:26+00:00</lastmod>
	</url>
	<url>
		<loc>https://cybersecurityinnovation.dk/lektion/indhold/</loc>
		<lastmod>2024-04-22T04:28:26+00:00</lastmod>
	</url>
	<url>
		<loc>https://cybersecurityinnovation.dk/lektion/test-af-video-uden-forslag/</loc>
		<lastmod>2025-06-17T19:58:20+00:00</lastmod>
	</url>
	<url>
		<loc>https://cybersecurityinnovation.dk/lektion/mikrovideo-nr-2-2/</loc>
		<lastmod>2025-06-18T05:16:09+00:00</lastmod>
	</url>
	<url>
		<loc>https://cybersecurityinnovation.dk/lektion/mikrovideo-nr-3-2/</loc>
		<lastmod>2025-06-18T05:16:31+00:00</lastmod>
	</url>
	<url>
		<loc>https://cybersecurityinnovation.dk/lektion/mikrovideo-nr-4-2/</loc>
		<lastmod>2025-06-18T05:16:56+00:00</lastmod>
	</url>
	<url>
		<loc>https://cybersecurityinnovation.dk/lektion/mikrovideo-nr-5-2/</loc>
		<lastmod>2025-06-18T05:17:23+00:00</lastmod>
	</url>
	<url>
		<loc>https://cybersecurityinnovation.dk/lektion/mikrovideo-nr-6-2/</loc>
		<lastmod>2025-06-18T05:17:41+00:00</lastmod>
	</url>
	<url>
		<loc>https://cybersecurityinnovation.dk/lektion/mikrovideo-nr-7-2/</loc>
		<lastmod>2025-06-18T05:18:01+00:00</lastmod>
	</url>
	<url>
		<loc>https://cybersecurityinnovation.dk/lektion/bonusvideo-2/</loc>
		<lastmod>2025-06-18T05:18:22+00:00</lastmod>
	</url>
	<url>
		<loc>https://cybersecurityinnovation.dk/lektion/mikrovideo-nr-2/</loc>
		<lastmod>2025-06-18T05:24:12+00:00</lastmod>
	</url>
	<url>
		<loc>https://cybersecurityinnovation.dk/lektion/mikrovideo-nr-3/</loc>
		<lastmod>2025-06-18T05:24:30+00:00</lastmod>
	</url>
	<url>
		<loc>https://cybersecurityinnovation.dk/lektion/mikrovideo-nr-4/</loc>
		<lastmod>2025-06-18T05:24:45+00:00</lastmod>
	</url>
	<url>
		<loc>https://cybersecurityinnovation.dk/lektion/mikrovideo-nr-5/</loc>
		<lastmod>2025-06-18T05:25:01+00:00</lastmod>
	</url>
	<url>
		<loc>https://cybersecurityinnovation.dk/lektion/mikrovideo-nr-6/</loc>
		<lastmod>2025-06-18T05:25:25+00:00</lastmod>
	</url>
	<url>
		<loc>https://cybersecurityinnovation.dk/lektion/mikrovideo-nr-7/</loc>
		<lastmod>2025-06-18T05:25:48+00:00</lastmod>
	</url>
	<url>
		<loc>https://cybersecurityinnovation.dk/lektion/bonusvideo/</loc>
		<lastmod>2025-06-18T05:26:02+00:00</lastmod>
	</url>
	<url>
		<loc>https://cybersecurityinnovation.dk/lektion/mikrovideo-nr-1/</loc>
		<lastmod>2025-06-27T05:49:11+00:00</lastmod>
	</url>
	<url>
		<loc>https://cybersecurityinnovation.dk/lektion/mikrovideo-nr-1-2/</loc>
		<lastmod>2025-06-28T00:21:43+00:00</lastmod>
	</url>
	<url>
		<loc>https://cybersecurityinnovation.dk/lektion/er-nis2-relevant-for-dig-og-din-virksomhed-video/</loc>
		<lastmod>2025-07-04T09:03:16+00:00</lastmod>
	</url>
	<url>
		<loc>https://cybersecurityinnovation.dk/lektion/hvordan-kan-man-vide-om-man-er-en-del-af-ledelsesorganet-under-nis2-video/</loc>
		<lastmod>2025-07-05T06:34:58+00:00</lastmod>
	</url>
	<url>
		<loc>https://cybersecurityinnovation.dk/lektion/hvad-er-en-pligt-for-medlemmer-af-ledelsesorganet-ifoelge-nis2-%c2%a7-7-stk-2-video/</loc>
		<lastmod>2025-07-05T06:40:51+00:00</lastmod>
	</url>
	<url>
		<loc>https://cybersecurityinnovation.dk/lektion/hvad-skal-ledelsesorganet-goere-ifoelge-nis2-%c2%a7-7-stk-1-video/</loc>
		<lastmod>2025-07-05T06:45:30+00:00</lastmod>
	</url>
	<url>
		<loc>https://cybersecurityinnovation.dk/lektion/hvad-kan-konsekvensen-vaere-hvis-ledelsesorganet-ignorerer-cybersikkerhed-under-nis2-video/</loc>
		<lastmod>2025-07-05T06:48:45+00:00</lastmod>
	</url>
	<url>
		<loc>https://cybersecurityinnovation.dk/lektion/er-nis2-relevant-for-dig-og-din-virksomhed-video-2/</loc>
		<lastmod>2025-07-05T06:55:06+00:00</lastmod>
	</url>
	<url>
		<loc>https://cybersecurityinnovation.dk/e-laering/nis-2-konsultation/lektion/introduktionsvideo-2/</loc>
		<lastmod>2025-07-08T08:03:59+00:00</lastmod>
	</url>
	<url>
		<loc>https://cybersecurityinnovation.dk/lektion/introduktionsvideo-2-2/</loc>
		<lastmod>2025-10-15T08:30:45+00:00</lastmod>
	</url>
	<url>
		<loc>https://cybersecurityinnovation.dk/lektion/download-e-bogen/</loc>
		<lastmod>2025-10-15T11:58:44+00:00</lastmod>
	</url>
	<url>
		<loc>https://cybersecurityinnovation.dk/lektion/introduktion/</loc>
		<lastmod>2025-10-17T09:25:25+00:00</lastmod>
	</url>
	<url>
		<loc>https://cybersecurityinnovation.dk/e-laering/nis-2-e-laeringskursus-for-topledelsen/lektion/download-e-bogen-2/</loc>
		<lastmod>2025-10-20T19:53:37+00:00</lastmod>
	</url>
	<url>
		<loc>https://cybersecurityinnovation.dk/e-laering/nis-2-e-laeringskursus-for-topledelsen/lektion/ordliste-til-kurset/</loc>
		<lastmod>2025-10-27T07:22:16+00:00</lastmod>
	</url>
	<url>
		<loc>https://cybersecurityinnovation.dk/e-laering/nis-2-e-laeringskursus-for-topledelsen/lektion/nis-2-tjek/</loc>
		<lastmod>2026-04-09T13:03:58+00:00</lastmod>
	</url>
</urlset>
<!-- XML Sitemap generated by Yoast SEO -->