<?xml version="1.0" encoding="UTF-8"?>
<urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9"><url><loc>https://jan-karel.com/</loc><priority>1.0</priority></url><url><loc>https://jan-karel.com/premium-library</loc><priority>0.9</priority></url><url><loc>https://jan-karel.com/premium/templates</loc><priority>0.8</priority></url><url><loc>https://jan-karel.com/premium/runbooks</loc><priority>0.8</priority></url><url><loc>https://jan-karel.com/premium/briefings</loc><priority>0.8</priority></url><url><loc>https://jan-karel.com/premium/essays</loc><priority>0.8</priority></url><url><loc>https://jan-karel.com/tools</loc><priority>0.7</priority></url><url><loc>https://jan-karel.com/tools/risico-calculator</loc><priority>0.7</priority></url><url><loc>https://jan-karel.com/tools/nis2-check</loc><priority>0.7</priority></url><url><loc>https://jan-karel.com/tools/datalek-kosten</loc><priority>0.7</priority></url><url><loc>https://jan-karel.com/tools/ransomware-readiness</loc><priority>0.7</priority></url><url><loc>https://jan-karel.com/tools/fair-analyse</loc><priority>0.7</priority></url><url><loc>https://jan-karel.com/tools/phishing-score</loc><priority>0.7</priority></url><url><loc>https://jan-karel.com/tools/security-budget</loc><priority>0.7</priority></url><url><loc>https://jan-karel.com/tools/incident-response-plan</loc><priority>0.7</priority></url><url><loc>https://jan-karel.com/tools/supply-chain-risico</loc><priority>0.7</priority></url><url><loc>https://jan-karel.com/tools/security-maturity</loc><priority>0.7</priority></url><url><loc>https://jan-karel.com/tools/cyberverzekering-check</loc><priority>0.7</priority></url><url><loc>https://jan-karel.com/tools/risico-calculator/uitleg</loc><priority>0.6</priority></url><url><loc>https://jan-karel.com/tools/nis2-check/uitleg</loc><priority>0.6</priority></url><url><loc>https://jan-karel.com/tools/datalek-kosten/uitleg</loc><priority>0.6</priority></url><url><loc>https://jan-karel.com/tools/ransomware-readiness/uitleg</loc><priority>0.6</priority></url><url><loc>https://jan-karel.com/tools/fair-analyse/uitleg</loc><priority>0.6</priority></url><url><loc>https://jan-karel.com/tools/phishing-score/uitleg</loc><priority>0.6</priority></url><url><loc>https://jan-karel.com/tools/security-budget/uitleg</loc><priority>0.6</priority></url><url><loc>https://jan-karel.com/tools/incident-response-plan/uitleg</loc><priority>0.6</priority></url><url><loc>https://jan-karel.com/tools/supply-chain-risico/uitleg</loc><priority>0.6</priority></url><url><loc>https://jan-karel.com/tools/security-maturity/uitleg</loc><priority>0.6</priority></url><url><loc>https://jan-karel.com/tools/cyberverzekering-check/uitleg</loc><priority>0.6</priority></url><url><loc>https://jan-karel.com/sm-web</loc><priority>0.6</priority><lastmod>2026-04-11</lastmod></url><url><loc>https://jan-karel.com/sm-web-01-sql-injection-preventie</loc><priority>0.6</priority><lastmod>2026-04-11</lastmod></url><url><loc>https://jan-karel.com/sm-netwerk-01-initiele-toegang-voorkomen</loc><priority>0.6</priority><lastmod>2026-04-11</lastmod></url><url><loc>https://jan-karel.com/sm-cloud-01-cloud-reconnaissance-voorkomen</loc><priority>0.6</priority><lastmod>2026-04-11</lastmod></url><url><loc>https://jan-karel.com/sm-bestuurders-01-cybersecurity-bestuursverantwoordelijkheid</loc><priority>0.6</priority><lastmod>2026-04-11</lastmod></url><url><loc>https://jan-karel.com/sm-consumenten-01-phishing-en-oplichting</loc><priority>0.6</priority><lastmod>2026-04-11</lastmod></url><url><loc>https://jan-karel.com/sm-referentie-01-aanval-verdediging-mapping</loc><priority>0.6</priority><lastmod>2026-04-11</lastmod></url><url><loc>https://jan-karel.com/premium-the-password-is-dead</loc><priority>0.8</priority><lastmod>2026-04-12</lastmod></url><url><loc>https://jan-karel.com/premium-compliance-theatre</loc><priority>0.8</priority><lastmod>2026-04-12</lastmod></url><url><loc>https://jan-karel.com/premium-the-mediocre-hacker</loc><priority>0.8</priority><lastmod>2026-04-12</lastmod></url><url><loc>https://jan-karel.com/premium-your-backup-is-a-lie</loc><priority>0.8</priority><lastmod>2026-04-12</lastmod></url><url><loc>https://jan-karel.com/premium-lastpass-and-the-lie-of-the-vault</loc><priority>0.8</priority><lastmod>2026-04-12</lastmod></url><url><loc>https://jan-karel.com/premium-nis2-the-reality-check</loc><priority>0.8</priority><lastmod>2026-04-12</lastmod></url><url><loc>https://jan-karel.com/premium-the-crowdstrike-weekend</loc><priority>0.8</priority><lastmod>2026-04-12</lastmod></url><url><loc>https://jan-karel.com/premium-the-questionnaire-that-proves-nothing</loc><priority>0.8</priority><lastmod>2026-04-12</lastmod></url><url><loc>https://jan-karel.com/premium-gdpr-data-processing-agreement-template</loc><priority>0.8</priority><lastmod>2026-04-12</lastmod></url><url><loc>https://jan-karel.com/premium-iso27001-information-security-policy-en</loc><priority>0.8</priority><lastmod>2026-04-12</lastmod></url><url><loc>https://jan-karel.com/premium-nis2-incident-response-runbook-en</loc><priority>0.8</priority><lastmod>2026-04-12</lastmod></url><url><loc>https://jan-karel.com/premium-data-breach-procedure-template</loc><priority>0.8</priority><lastmod>2026-04-12</lastmod></url><url><loc>https://jan-karel.com/premium-ai-usage-policy-template</loc><priority>0.8</priority><lastmod>2026-04-12</lastmod></url><url><loc>https://jan-karel.com/premium-ransomware-recovery-playbook-en</loc><priority>0.8</priority><lastmod>2026-04-12</lastmod></url><url><loc>https://jan-karel.com/premium-threat-briefing-april-2026-en</loc><priority>0.8</priority><lastmod>2026-04-12</lastmod></url><url><loc>https://jan-karel.com/premium-snowflake-and-the-door-you-left-open</loc><priority>0.8</priority><lastmod>2026-04-12</lastmod></url><url><loc>https://jan-karel.com/premium-the-cyber-insurance-fairy-tale</loc><priority>0.8</priority><lastmod>2026-04-12</lastmod></url><url><loc>https://jan-karel.com/premium-mfa-fatigue-and-the-teenager-from-argentina</loc><priority>0.8</priority><lastmod>2026-04-13</lastmod></url><url><loc>https://jan-karel.com/premium-the-logs-nobody-reads</loc><priority>0.8</priority><lastmod>2026-04-13</lastmod></url><url><loc>https://jan-karel.com/premium-the-insider-nobody-saw-coming</loc><priority>0.8</priority><lastmod>2026-04-13</lastmod></url><url><loc>https://jan-karel.com/premium-security-awareness-theater-en</loc><priority>0.8</priority><lastmod>2026-04-13</lastmod></url><url><loc>https://jan-karel.com/premium-we-use-aws-so-we-are-secure</loc><priority>0.8</priority><lastmod>2026-04-13</lastmod></url><url><loc>https://jan-karel.com/premium-the-patch-you-cannot-apply</loc><priority>0.8</priority><lastmod>2026-04-13</lastmod></url><url><loc>https://jan-karel.com/premium-moveit-and-the-door-already-open</loc><priority>0.8</priority><lastmod>2026-04-14</lastmod></url><url><loc>https://jan-karel.com/premium-security-theatre-and-the-airport</loc><priority>0.8</priority><lastmod>2026-04-14</lastmod></url><url><loc>https://jan-karel.com/premium-zero-day-as-a-marketing-term</loc><priority>0.8</priority><lastmod>2026-04-14</lastmod></url><url><loc>https://jan-karel.com/premium-we-are-pentested-so-we-are-secure</loc><priority>0.8</priority><lastmod>2026-04-14</lastmod></url><url><loc>https://jan-karel.com/sm-netwerk</loc><priority>0.6</priority><lastmod>2026-04-11</lastmod></url><url><loc>https://jan-karel.com/sm-web-02-xss-preventie</loc><priority>0.6</priority><lastmod>2026-04-11</lastmod></url><url><loc>https://jan-karel.com/sm-netwerk-02-detectie-evasion-stoppen</loc><priority>0.6</priority><lastmod>2026-04-11</lastmod></url><url><loc>https://jan-karel.com/sm-cloud-02-aws-hardening</loc><priority>0.6</priority><lastmod>2026-04-11</lastmod></url><url><loc>https://jan-karel.com/sm-bestuurders-02-risicomanagement-risicoanalyse</loc><priority>0.6</priority><lastmod>2026-04-11</lastmod></url><url><loc>https://jan-karel.com/sm-consumenten-02-wachtwoorden-en-inloggen</loc><priority>0.6</priority><lastmod>2026-04-11</lastmod></url><url><loc>https://jan-karel.com/sm-referentie-02-implementatie-prioriteiten</loc><priority>0.6</priority><lastmod>2026-04-11</lastmod></url><url><loc>https://jan-karel.com/sm-cloud</loc><priority>0.6</priority><lastmod>2026-04-11</lastmod></url><url><loc>https://jan-karel.com/sm-web-03-command-injection-preventie</loc><priority>0.6</priority><lastmod>2026-04-11</lastmod></url><url><loc>https://jan-karel.com/sm-netwerk-03-privilege-escalatie-voorkomen</loc><priority>0.6</priority><lastmod>2026-04-11</lastmod></url><url><loc>https://jan-karel.com/sm-cloud-03-azure-entra-id-hardening</loc><priority>0.6</priority><lastmod>2026-04-11</lastmod></url><url><loc>https://jan-karel.com/sm-bestuurders-03-nis2-europese-cyberwetgeving</loc><priority>0.6</priority><lastmod>2026-04-11</lastmod></url><url><loc>https://jan-karel.com/sm-consumenten-03-telefoon-beveiligen</loc><priority>0.6</priority><lastmod>2026-04-11</lastmod></url><url><loc>https://jan-karel.com/sm-referentie-03-incidentrespons</loc><priority>0.6</priority><lastmod>2026-04-11</lastmod></url><url><loc>https://jan-karel.com/sm-bestuurders</loc><priority>0.6</priority><lastmod>2026-04-11</lastmod></url><url><loc>https://jan-karel.com/sm-web-04-path-traversal-preventie</loc><priority>0.6</priority><lastmod>2026-04-11</lastmod></url><url><loc>https://jan-karel.com/sm-netwerk-04-active-directory-hardening</loc><priority>0.6</priority><lastmod>2026-04-11</lastmod></url><url><loc>https://jan-karel.com/sm-cloud-04-gcp-hardening</loc><priority>0.6</priority><lastmod>2026-04-11</lastmod></url><url><loc>https://jan-karel.com/sm-bestuurders-04-avg-gdpr-privacy-compliance</loc><priority>0.6</priority><lastmod>2026-04-11</lastmod></url><url><loc>https://jan-karel.com/sm-consumenten-04-computer-beschermen</loc><priority>0.6</priority><lastmod>2026-04-11</lastmod></url><url><loc>https://jan-karel.com/sm-referentie-04-compliance-governance</loc><priority>0.6</priority><lastmod>2026-04-11</lastmod></url><url><loc>https://jan-karel.com/sm-consumenten</loc><priority>0.6</priority><lastmod>2026-04-11</lastmod></url><url><loc>https://jan-karel.com/sm-web-05-ssti-preventie</loc><priority>0.6</priority><lastmod>2026-04-11</lastmod></url><url><loc>https://jan-karel.com/sm-netwerk-05-kerberos-hardening</loc><priority>0.6</priority><lastmod>2026-04-11</lastmod></url><url><loc>https://jan-karel.com/sm-cloud-05-container-hardening</loc><priority>0.6</priority><lastmod>2026-04-11</lastmod></url><url><loc>https://jan-karel.com/sm-bestuurders-05-bestuurdersaansprakelijkheid</loc><priority>0.6</priority><lastmod>2026-04-11</lastmod></url><url><loc>https://jan-karel.com/sm-consumenten-05-veilig-internetten-en-wifi</loc><priority>0.6</priority><lastmod>2026-04-11</lastmod></url><url><loc>https://jan-karel.com/sm-referentie-05-hardening-checklists</loc><priority>0.6</priority><lastmod>2026-04-11</lastmod></url><url><loc>https://jan-karel.com/sm-referentie</loc><priority>0.6</priority><lastmod>2026-04-11</lastmod></url><url><loc>https://jan-karel.com/sm-web-06-xxe-preventie</loc><priority>0.6</priority><lastmod>2026-04-11</lastmod></url><url><loc>https://jan-karel.com/sm-netwerk-06-laterale-beweging-stoppen</loc><priority>0.6</priority><lastmod>2026-04-11</lastmod></url><url><loc>https://jan-karel.com/sm-cloud-06-cicd-pipeline-hardening</loc><priority>0.6</priority><lastmod>2026-04-11</lastmod></url><url><loc>https://jan-karel.com/sm-bestuurders-06-security-budget-investeren</loc><priority>0.6</priority><lastmod>2026-04-11</lastmod></url><url><loc>https://jan-karel.com/sm-consumenten-06-online-winkelen-en-betalen</loc><priority>0.6</priority><lastmod>2026-04-11</lastmod></url><url><loc>https://jan-karel.com/sm-referentie-06-compliance-mapping</loc><priority>0.6</priority><lastmod>2026-04-11</lastmod></url><url><loc>https://jan-karel.com/sm-web-07-ssrf-preventie</loc><priority>0.6</priority><lastmod>2026-04-11</lastmod></url><url><loc>https://jan-karel.com/sm-netwerk-07-credential-bescherming</loc><priority>0.6</priority><lastmod>2026-04-11</lastmod></url><url><loc>https://jan-karel.com/sm-cloud-07-serverless-hardening</loc><priority>0.6</priority><lastmod>2026-04-11</lastmod></url><url><loc>https://jan-karel.com/sm-bestuurders-07-incidentrespons-crisismanagement</loc><priority>0.6</priority><lastmod>2026-04-11</lastmod></url><url><loc>https://jan-karel.com/sm-consumenten-07-privacy-en-sociale-media</loc><priority>0.6</priority><lastmod>2026-04-11</lastmod></url><url><loc>https://jan-karel.com/sm-referentie-07-secret-management-en-key-rotatie</loc><priority>0.6</priority><lastmod>2026-04-11</lastmod></url><url><loc>https://jan-karel.com/sm-web-08-deserialisatie-preventie</loc><priority>0.6</priority><lastmod>2026-04-11</lastmod></url><url><loc>https://jan-karel.com/sm-netwerk-08-adcs-hardening</loc><priority>0.6</priority><lastmod>2026-04-11</lastmod></url><url><loc>https://jan-karel.com/sm-cloud-08-cloud-laterale-beweging-stoppen</loc><priority>0.6</priority><lastmod>2026-04-11</lastmod></url><url><loc>https://jan-karel.com/sm-bestuurders-08-supply-chain-leveranciersrisico</loc><priority>0.6</priority><lastmod>2026-04-11</lastmod></url><url><loc>https://jan-karel.com/sm-consumenten-08-kinderen-en-internet</loc><priority>0.6</priority><lastmod>2026-04-11</lastmod></url><url><loc>https://jan-karel.com/sm-referentie-10-security-architectuur-principes</loc><priority>0.6</priority><lastmod>2026-04-11</lastmod></url><url><loc>https://jan-karel.com/sm-web-09-client-side-beveiliging</loc><priority>0.6</priority><lastmod>2026-04-11</lastmod></url><url><loc>https://jan-karel.com/sm-netwerk-09-persistentie-detecteren</loc><priority>0.6</priority><lastmod>2026-04-11</lastmod></url><url><loc>https://jan-karel.com/sm-cloud-09-cloud-persistentie-voorkomen</loc><priority>0.6</priority><lastmod>2026-04-11</lastmod></url><url><loc>https://jan-karel.com/sm-bestuurders-09-cyberverzekeringen</loc><priority>0.6</priority><lastmod>2026-04-11</lastmod></url><url><loc>https://jan-karel.com/sm-consumenten-09-identiteitsdiefstal-en-datalekken</loc><priority>0.6</priority><lastmod>2026-04-11</lastmod></url><url><loc>https://jan-karel.com/sm-referentie-11-reference-architecturen</loc><priority>0.6</priority><lastmod>2026-04-11</lastmod></url><url><loc>https://jan-karel.com/sm-web-10-authenticatie-hardening</loc><priority>0.6</priority><lastmod>2026-04-11</lastmod></url><url><loc>https://jan-karel.com/sm-netwerk-10-tunneling-voorkomen</loc><priority>0.6</priority><lastmod>2026-04-11</lastmod></url><url><loc>https://jan-karel.com/sm-cloud-10-cloud-detectie-logging</loc><priority>0.6</priority><lastmod>2026-04-11</lastmod></url><url><loc>https://jan-karel.com/sm-bestuurders-10-security-metrics-bestuursrapportage</loc><priority>0.6</priority><lastmod>2026-04-11</lastmod></url><url><loc>https://jan-karel.com/sm-consumenten-10-als-het-misgaat</loc><priority>0.6</priority><lastmod>2026-04-11</lastmod></url><url><loc>https://jan-karel.com/sm-referentie-12-adr-security-besluitvorming</loc><priority>0.6</priority><lastmod>2026-04-11</lastmod></url><url><loc>https://jan-karel.com/securitymaatregelen</loc><priority>0.8</priority><lastmod>2026-04-11</lastmod></url><url><loc>https://jan-karel.com/sm-web-11-security-headers</loc><priority>0.6</priority><lastmod>2026-04-11</lastmod></url><url><loc>https://jan-karel.com/sm-netwerk-11-linux-hardening</loc><priority>0.6</priority><lastmod>2026-04-11</lastmod></url><url><loc>https://jan-karel.com/sm-cloud-11-kubernetes-hardening</loc><priority>0.6</priority><lastmod>2026-04-11</lastmod></url><url><loc>https://jan-karel.com/sm-referentie-13-threat-modeling-praktijk</loc><priority>0.6</priority><lastmod>2026-04-11</lastmod></url><url><loc>https://jan-karel.com/sm-web-12-invoer-uitvoer-validatie</loc><priority>0.6</priority><lastmod>2026-04-11</lastmod></url><url><loc>https://jan-karel.com/sm-netwerk-12-windows-hardening</loc><priority>0.6</priority><lastmod>2026-04-11</lastmod></url><url><loc>https://jan-karel.com/sm-cloud-12-infrastructure-as-code-security</loc><priority>0.6</priority><lastmod>2026-04-11</lastmod></url><url><loc>https://jan-karel.com/sm-web-13-tls-configuratie</loc><priority>0.6</priority><lastmod>2026-04-11</lastmod></url><url><loc>https://jan-karel.com/sm-netwerk-13-email-dns-hardening</loc><priority>0.6</priority><lastmod>2026-04-11</lastmod></url><url><loc>https://jan-karel.com/sm-cloud-13-secrets-management</loc><priority>0.6</priority><lastmod>2026-04-11</lastmod></url><url><loc>https://jan-karel.com/sm-web-14-api-beveiliging</loc><priority>0.6</priority><lastmod>2026-04-11</lastmod></url><url><loc>https://jan-karel.com/sm-netwerk-14-mssql-hardening</loc><priority>0.6</priority><lastmod>2026-04-11</lastmod></url><url><loc>https://jan-karel.com/sm-web-15-file-upload-hardening</loc><priority>0.6</priority><lastmod>2026-04-11</lastmod></url><url><loc>https://jan-karel.com/sm-netwerk-15-netwerksegmentatie-firewall</loc><priority>0.6</priority><lastmod>2026-04-11</lastmod></url><url><loc>https://jan-karel.com/sm-web-16-oauth-openid-connect</loc><priority>0.6</priority><lastmod>2026-04-11</lastmod></url><url><loc>https://jan-karel.com/sm-netwerk-16-logging-monitoring-siem</loc><priority>0.6</priority><lastmod>2026-04-11</lastmod></url><url><loc>https://jan-karel.com/sm-web-17-secure-development-lifecycle</loc><priority>0.6</priority><lastmod>2026-04-11</lastmod></url><url><loc>https://jan-karel.com/sm-netwerk-17-backup-disaster-recovery</loc><priority>0.6</priority><lastmod>2026-04-11</lastmod></url><url><loc>https://jan-karel.com/sm-netwerk-18-vulnerability-management</loc><priority>0.6</priority><lastmod>2026-04-11</lastmod></url><url><loc>https://jan-karel.com/sm-netwerk-19-zero-trust-architectuur</loc><priority>0.6</priority><lastmod>2026-04-11</lastmod></url><url><loc>https://jan-karel.com/sm-netwerk-20-wireless-fysieke-beveiliging</loc><priority>0.6</priority><lastmod>2026-04-11</lastmod></url><url><loc>https://jan-karel.com/sm-netwerk-21-security-awareness</loc><priority>0.6</priority><lastmod>2026-04-11</lastmod></url></urlset>