<?xml version="1.0" encoding="UTF-8"?>
<urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9"
xmlns:image="http://www.google.com/schemas/sitemap-image/1.1" generatedBy="WIX">
<url>
<loc>https://www.aegisnorth.ca/product-page/secure-coding-handbook</loc>
<lastmod>2026-03-19</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/7fb000_5ca2022d104e43f099d91dcf3464b9c2~mv2.jpg</image:loc>
<image:title>Secure Coding Handbook</image:title>
</image:image>
</url>
<url>
<loc>https://www.aegisnorth.ca/product-page/iso-27001-compliance-map</loc>
<lastmod>2026-03-19</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/7fb000_fc60566424fe4932b8b6ee0dad70c71d~mv2.jpg</image:loc>
<image:title>ISO 27001 Compliance Map</image:title>
</image:image>
</url>
<url>
<loc>https://www.aegisnorth.ca/product-page/phishing-awareness-module</loc>
<lastmod>2026-03-19</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/7fb000_bdcce5d4de904bf6959e94d819f794dc~mv2.jpg</image:loc>
<image:title>Phishing Awareness Module</image:title>
</image:image>
</url>
<url>
<loc>https://www.aegisnorth.ca/product-page/compliance-gap-analysis-tool</loc>
<lastmod>2026-03-19</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/7fb000_a204f77f14f049c39cb862ff45b58f89~mv2.jpg</image:loc>
<image:title>Compliance Gap Analysis Tool</image:title>
</image:image>
</url>
<url>
<loc>https://www.aegisnorth.ca/product-page/security-culture-champion-pack</loc>
<lastmod>2026-03-19</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/7fb000_b2369ca8aa84425d835c3641b8117de7~mv2.jpg</image:loc>
<image:title>Security Culture Champion Pack</image:title>
</image:image>
</url>
<url>
<loc>https://www.aegisnorth.ca/product-page/cyber-risk-assessment-kit</loc>
<lastmod>2026-03-19</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/7fb000_d4d04fad4c6344a49707863a292b0b56~mv2.jpg</image:loc>
<image:title>Cyber Risk Assessment Kit</image:title>
</image:image>
</url>
<url>
<loc>https://www.aegisnorth.ca/product-page/nist-csf-implementation-guide</loc>
<lastmod>2026-03-19</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/7fb000_6d77ce2f605e4883bd58ef3cf1430d27~mv2.jpg</image:loc>
<image:title>NIST CSF Implementation Guide</image:title>
</image:image>
</url>
<url>
<loc>https://www.aegisnorth.ca/product-page/security-audit-logbook</loc>
<lastmod>2026-03-19</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/7fb000_070f16b1c5854c6182ee06935e3d2623~mv2.jpg</image:loc>
<image:title>Security Audit Logbook</image:title>
</image:image>
</url>
<url>
<loc>https://www.aegisnorth.ca/product-page/grc-policy-framework</loc>
<lastmod>2026-03-19</lastmod>
<image:image>
<image:loc>https://static.wixstatic.com/media/7fb000_6c7cf696363747d09026fc102598c199~mv2.jpg</image:loc>
<image:title>GRC Policy Framework</image:title>
</image:image>
</url>
</urlset>