<?xml version="1.0" encoding="UTF-8"?>
<!-- generator="wordpress.com" -->
<urlset xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xmlns="http://www.sitemaps.org/schemas/sitemap/0.9" xmlns:image="http://www.google.com/schemas/sitemap-image/1.1" xsi:schemaLocation="http://www.sitemaps.org/schemas/sitemap/0.9 http://www.sitemaps.org/schemas/sitemap/0.9/sitemap.xsd"><url><loc>https://henrikparkkinen.com/2026/01/27/security-strategy-execution-what-why/</loc><image:image><image:loc>https://henrikparkkinen.com/wp-content/uploads/2026/01/security_strategy_communication_what_why.png</image:loc><image:title>security_strategy_communication_what_why</image:title></image:image><image:image><image:loc>https://henrikparkkinen.com/wp-content/uploads/2026/01/security_strategy_communication_what_why_mic.png</image:loc><image:title>security_strategy_communication_what_why_mic</image:title></image:image><image:image><image:loc>https://henrikparkkinen.com/wp-content/uploads/2026/01/security_strategy_communication_what_why_cinema.png</image:loc><image:title>security_strategy_communication_what_why_cinema</image:title></image:image><lastmod>2026-01-27T10:25:19+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://henrikparkkinen.com/brag-wall/</loc><image:image><image:loc>https://henrikparkkinen.com/wp-content/uploads/2025/12/2025_grc_fpw_certificate_henrik_parkkinen.png</image:loc><image:title>2025_GRC_FPW_Certificate_Henrik_Parkkinen</image:title></image:image><image:image><image:loc>https://henrikparkkinen.com/wp-content/uploads/2025/12/2025_grc_fincrime__prevention_winner_henrik_parkkinen.png</image:loc><image:title>2025_GRC_Fincrime__Prevention_Winner_Henrik_Parkkinen</image:title></image:image><image:image><image:loc>https://henrikparkkinen.com/wp-content/uploads/2025/10/henrik_parkkinen_top_voice_2025_-emea.png</image:loc><image:title>Henrik_Parkkinen_Top_Voice_2025_ EMEA</image:title></image:image><image:image><image:loc>https://henrikparkkinen.com/wp-content/uploads/2025/10/henrik_parkkinen_htb_zephyr_pro_labs.png</image:loc><image:title>Henrik_Parkkinen_HTB_Zephyr_Pro_Labs</image:title></image:image><image:image><image:loc>https://henrikparkkinen.com/wp-content/uploads/2025/08/top_100_cybersecurity_thinkers360_henrik_parkkinen.png</image:loc><image:title>Top_100_Cybersecurity_Thinkers360_Henrik_Parkkinen</image:title></image:image><image:image><image:loc>https://henrikparkkinen.com/wp-content/uploads/2025/08/top_50_grc_thinkers360_henrik_parkkinen.png</image:loc><image:title>Top_50_GRC_Thinkers360_Henrik_Parkkinen</image:title></image:image><image:image><image:loc>https://henrikparkkinen.com/wp-content/uploads/2025/07/top-25-cisos-henrik_parkkinen_info.png</image:loc><image:title>Top-25-CISOs-Henrik_Parkkinen_Info</image:title></image:image><image:image><image:loc>https://henrikparkkinen.com/wp-content/uploads/2025/07/top-25-cisos-henrik_parkkinen.png</image:loc><image:title>Top-25-CISOs-Henrik_Parkkinen</image:title></image:image><image:image><image:loc>https://henrikparkkinen.com/wp-content/uploads/2025/07/henrikparkkinen_top_9_cybersecurity_strategy_leadership_grackerai.png</image:loc><image:title>henrikparkkinen_top_9_cybersecurity_strategy_leadership_grackerai</image:title></image:image><image:image><image:loc>https://henrikparkkinen.com/wp-content/uploads/2025/07/henrikparkkinen_top_50_cybersecurity_influencers_experts_gracerai.png</image:loc><image:title>henrikparkkinen_top_50_cybersecurity_influencers_experts_gracerai</image:title></image:image><lastmod>2026-01-18T17:47:30+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://henrikparkkinen.com/artifacts/puppet-mini-pro-lab-from-hack-the-box/</loc><image:image><image:loc>https://henrikparkkinen.com/wp-content/uploads/2026/01/henrik_parkkinen_htb_puppet_mini_pro_labs.png</image:loc><image:title>henrik_parkkinen_htb_puppet_mini_pro_labs</image:title></image:image><lastmod>2026-01-18T17:43:30+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://henrikparkkinen.com/artifacts/p-o-o-mini-pro-lab-from-hack-the-box/</loc><image:image><image:loc>https://henrikparkkinen.com/wp-content/uploads/2026/01/henrik_parkkinen_htb_poo_mini_pro_labs.png</image:loc><image:title>henrik_parkkinen_htb_poo_mini_pro_labs</image:title></image:image><lastmod>2026-01-18T17:41:12+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://henrikparkkinen.com/artifacts/rastalabs-pro-lab-from-hack-the-box/</loc><image:image><image:loc>https://henrikparkkinen.com/wp-content/uploads/2026/01/henrik_parkkinen_htb_rastalabs_pro_labs.png</image:loc><image:title>henrik_parkkinen_htb_rastalabs_pro_labs</image:title></image:image><lastmod>2026-01-18T17:37:37+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://henrikparkkinen.com/media/</loc><image:image><image:loc>https://henrikparkkinen.com/wp-content/uploads/2025/12/ciso_whisperer_henrik_parkkinen.png</image:loc><image:title>CISO_Whisperer_Henrik_Parkkinen</image:title></image:image><lastmod>2025-12-16T08:17:43+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://henrikparkkinen.com/henrik-parkkinen/</loc><image:image><image:loc>https://henrikparkkinen.com/wp-content/uploads/2025/11/henrik-parkkinen-certified-red-teamer-crteamer.png</image:loc><image:title>henrik-parkkinen-certified-red-teamer-crteamer</image:title></image:image><image:image><image:loc>https://henrikparkkinen.com/wp-content/uploads/2025/11/henrik_parkkinen_cwlad-rts.png</image:loc><image:title>Henrik_Parkkinen_CWLAD-RTS</image:title></image:image><image:image><image:loc>https://henrikparkkinen.com/wp-content/uploads/2025/10/henrik-parkkinen-certified-network-pentester-c-adenx.png</image:loc><image:title>Henrik-Parkkinen-certified-network-pentester-c-adenx</image:title></image:image><image:image><image:loc>https://henrikparkkinen.com/wp-content/uploads/2025/09/henrik-parkkinen-certified-network-pentester-cnpen.png</image:loc><image:title>Henrik-Parkkinen-certified-network-pentester-cnpen</image:title></image:image><image:image><image:loc>https://henrikparkkinen.com/wp-content/uploads/2025/05/henrik_parkkinen_crta_cwl.png</image:loc><image:title>Henrik_Parkkinen_CRTA_CWL</image:title></image:image><image:image><image:loc>https://henrikparkkinen.com/wp-content/uploads/2025/05/henrik_parkkinen_mcrta_cwl-1.png</image:loc><image:title>Henrik_Parkkinen_MCRTA_CWL</image:title></image:image><image:image><image:loc>https://henrikparkkinen.com/wp-content/uploads/2025/05/henrik_parkkinen_mcrta_cwl.png</image:loc><image:title>Henrik_Parkkinen_MCRTA_CWL</image:title></image:image><image:image><image:loc>https://henrikparkkinen.com/wp-content/uploads/2025/04/pnpt-tcm-security-henrikparkkinen.png</image:loc><image:title>pnpt-tcm-security-henrikparkkinen</image:title></image:image><image:image><image:loc>https://henrikparkkinen.com/wp-content/uploads/2025/02/sabsa-scf-certificate-sabsa-henrikparkkinen.png</image:loc><image:title>sabsa-scf-certificate-sabsa-henrikparkkinen</image:title></image:image><image:image><image:loc>https://henrikparkkinen.com/wp-content/uploads/2024/10/cobit2019f-certificate-isaca-henrikparkkinen.png</image:loc><image:title>cobit2019f-certificate-isaca-henrikparkkinen</image:title></image:image><lastmod>2025-12-03T08:24:05+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://henrikparkkinen.com/2025/11/04/security-strategy-myth-buster-part-5/</loc><image:image><image:loc>https://henrikparkkinen.com/wp-content/uploads/2025/10/security-strategy-myth-buster-part-5-ft.png</image:loc><image:title>security-strategy-myth-buster-part-5-ft</image:title></image:image><image:image><image:loc>https://henrikparkkinen.com/wp-content/uploads/2025/10/security-strategy-myth-buster-part-5-aw.png</image:loc><image:title>security-strategy-myth-buster-part-5-aw</image:title></image:image><image:image><image:loc>https://henrikparkkinen.com/wp-content/uploads/2025/10/security-strategy-myth-buster-part-5-fary-tail.png</image:loc><image:title>security-strategy-myth-buster-part-5-fary-tail</image:title></image:image><lastmod>2025-11-04T19:20:10+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://henrikparkkinen.com/artifacts/zephyr-pro-lab-from-hack-the-box/</loc><lastmod>2025-10-21T13:25:19+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://henrikparkkinen.com/artifacts/</loc><lastmod>2025-10-21T13:24:59+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://henrikparkkinen.com/2025/08/26/slayer-labs-kinetic-range-review/</loc><image:image><image:loc>https://henrikparkkinen.com/wp-content/uploads/2025/08/slayer-labs-kintetic-range-ffb.png</image:loc><image:title>Slayer-Labs-Kintetic-Range-FFB</image:title></image:image><image:image><image:loc>https://henrikparkkinen.com/wp-content/uploads/2025/08/slayer-labs-kintetic-range-vwh.png</image:loc><image:title>Slayer-Labs-Kintetic-Range-VWH</image:title></image:image><image:image><image:loc>https://henrikparkkinen.com/wp-content/uploads/2025/08/slayer-labs-kintetic-range-review-spire-corp.png</image:loc><image:title>Slayer-Labs-Kintetic-Range-Review-Spire-Corp</image:title></image:image><image:image><image:loc>https://henrikparkkinen.com/wp-content/uploads/2025/08/slayerlabs-kintetic-range-finale-txt.png</image:loc><image:title>SlayerLabs-Kintetic-Range-Finale-txt</image:title></image:image><image:image><image:loc>https://henrikparkkinen.com/wp-content/uploads/2025/08/slayerlabs-kintetic-range-hp-completed.png</image:loc><image:title>SlayerLabs-Kintetic-Range-HP-Completed</image:title></image:image><image:image><image:loc>https://henrikparkkinen.com/wp-content/uploads/2025/08/slayer-labs-kintetic-range-review-cherrytree-full.png</image:loc><image:title>Slayer-Labs-Kintetic-Range-Review-CherryTree-Full</image:title></image:image><image:image><image:loc>https://henrikparkkinen.com/wp-content/uploads/2025/08/slayer-labs-kintetic-range-review-cherrytree.png</image:loc><image:title>Slayer-Labs-Kintetic-Range-Review-CherryTree</image:title></image:image><image:image><image:loc>https://henrikparkkinen.com/wp-content/uploads/2025/07/slayer-labs-kintetic-range-review.png</image:loc><image:title>Slayer-Labs-Kintetic-Range-Review</image:title></image:image><lastmod>2025-08-26T15:21:13+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://henrikparkkinen.com/about-us/</loc><image:image><image:loc>https://henrikparkkinen.com/wp-content/uploads/2022/07/about.jpg</image:loc><image:title>About</image:title></image:image><lastmod>2025-07-30T12:17:59+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://henrikparkkinen.com/2025/07/12/pnpt-is-it-for-you/</loc><image:image><image:loc>https://henrikparkkinen.com/wp-content/uploads/2025/07/pnpt-is-it-for-you-certificate.png</image:loc><image:title>PNPT-is-it-for-you-certificate</image:title></image:image><image:image><image:loc>https://henrikparkkinen.com/wp-content/uploads/2025/07/pnpt-is-it-for-you-htw.png</image:loc><image:title>PNPT-is-it-for-you-htw</image:title></image:image><image:image><image:loc>https://henrikparkkinen.com/wp-content/uploads/2025/07/pnpt-is-it-for-yiu-hacking.jpg</image:loc><image:title>PNPT-is-it-for-yiu-hacking</image:title></image:image><image:image><image:loc>https://henrikparkkinen.com/wp-content/uploads/2025/07/pnpt-is-it-for-you.png</image:loc><image:title>PNPT-is-it-for-you</image:title></image:image><lastmod>2025-07-12T20:52:17+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://henrikparkkinen.com/2022/10/03/gaming-for-security-enthusiasts/</loc><image:image><image:loc>https://henrikparkkinen.com/wp-content/uploads/2022/09/gaming-for-security-enthusiasts-ethical-hacker.png</image:loc><image:title>gaming-for-security-enthusiasts-ethical-hacker</image:title></image:image><image:image><image:loc>https://henrikparkkinen.com/wp-content/uploads/2022/09/gaming-for-security-enthusiasts-ethical-hacking.png</image:loc><image:title>gaming-for-security-enthusiasts-ethical-hacking</image:title></image:image><image:image><image:loc>https://henrikparkkinen.com/wp-content/uploads/2022/08/gaming-for-security-enthusiasts.jpg</image:loc><image:title>Gaming-for-security-enthusiasts</image:title></image:image><lastmod>2025-07-12T18:41:27+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://henrikparkkinen.com/2022/10/03/the-dark-side-ethical-hacking/</loc><image:image><image:loc>https://henrikparkkinen.com/wp-content/uploads/2022/09/ethical-hacking-offensive-vs-defensive.jpg</image:loc><image:title>ethical-hacking-offensive-vs-defensive</image:title></image:image><image:image><image:loc>https://henrikparkkinen.com/wp-content/uploads/2022/09/the-power-of-ethical-hacking-darth-vader.png</image:loc><image:title>the-power-of-ethical-hacking-darth-vader</image:title></image:image><image:image><image:loc>https://henrikparkkinen.com/wp-content/uploads/2022/08/offensive-vs-deffensive.jpg</image:loc><image:title>offensive-vs-deffensive</image:title></image:image><image:image><image:loc>https://henrikparkkinen.com/wp-content/uploads/2022/08/why-how-when-what.jpg</image:loc><image:title>why-how-when-what</image:title></image:image><image:image><image:loc>https://henrikparkkinen.com/wp-content/uploads/2022/08/ethical-hacking-process.jpg</image:loc><image:title>ethical-hacking-process</image:title></image:image><lastmod>2025-07-12T18:41:12+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://henrikparkkinen.com/2023/02/05/who-should-learn-ethical-hacking/</loc><image:image><image:loc>https://henrikparkkinen.com/wp-content/uploads/2022/09/who-should-learn-ethical-hacking-man.jpg</image:loc><image:title>Who-should-learn-ethical-hacking-man</image:title></image:image><image:image><image:loc>https://henrikparkkinen.com/wp-content/uploads/2022/12/the-ethical-hacking-rabbit-hole.png</image:loc><image:title>the-ethical-hacking-rabbit-hole</image:title></image:image><image:image><image:loc>https://henrikparkkinen.com/wp-content/uploads/2022/08/journey-of-personal-growth.jpg</image:loc><image:title>journey-of-personal-growth</image:title></image:image><image:image><image:loc>https://henrikparkkinen.com/wp-content/uploads/2022/08/wisdom-knowledge-information-data.jpg</image:loc><image:title>wisdom-knowledge-information-data</image:title></image:image><image:image><image:loc>https://henrikparkkinen.com/wp-content/uploads/2022/08/who-should-learn-ethical-hacking.jpg</image:loc><image:title>Who-should-learn-ethical-hacking</image:title></image:image><lastmod>2025-07-12T18:40:56+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://henrikparkkinen.com/whoami/</loc><lastmod>2025-06-25T04:37:15+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://henrikparkkinen.com/2025/04/30/sabsa-a-compass-for-security-leaders/</loc><image:image><image:loc>https://henrikparkkinen.com/wp-content/uploads/2025/04/sabsa-a-compass-for-security-leaders-fi.png</image:loc><image:title>sabsa-a-compass-for-security-leaders-fi</image:title></image:image><image:image><image:loc>https://henrikparkkinen.com/wp-content/uploads/2025/04/sabsa-a-compass-for-security-leaders-practical.png</image:loc><image:title>sabsa-a-compass-for-security-leaders-practical</image:title></image:image><image:image><image:loc>https://henrikparkkinen.com/wp-content/uploads/2025/04/sabsa-a-compass-for-security-leaders-business.png</image:loc><image:title>sabsa-a-compass-for-security-leaders-business</image:title></image:image><image:image><image:loc>https://henrikparkkinen.com/wp-content/uploads/2025/04/sabsa-a-compass-for-security-leaders-compass.png</image:loc><image:title>sabsa-a-compass-for-security-leaders-compass</image:title></image:image><lastmod>2025-04-30T19:47:11+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://henrikparkkinen.com/2025/03/30/security-leadership-leading-leaders/</loc><image:image><image:loc>https://henrikparkkinen.com/wp-content/uploads/2025/03/security-leadership-leading-leaders-action.png</image:loc><image:title>security-leadership-leading-leaders-action</image:title></image:image><image:image><image:loc>https://henrikparkkinen.com/wp-content/uploads/2025/03/security-leadership-leading-leaders-teamwork.png</image:loc><image:title>security-leadership-leading-leaders-teamwork</image:title></image:image><image:image><image:loc>https://henrikparkkinen.com/wp-content/uploads/2025/03/security-leadership-leading-leaders.png</image:loc><image:title>security-leadership-leading-leaders</image:title></image:image><lastmod>2025-03-30T19:08:30+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://henrikparkkinen.com/2025/02/27/security-strategy-myth-buster-part-4/</loc><image:image><image:loc>https://henrikparkkinen.com/wp-content/uploads/2025/02/security-strategy-myth-buster-part-4.png</image:loc><image:title>Security-strategy-myth-buster-part-4</image:title></image:image><image:image><image:loc>https://henrikparkkinen.com/wp-content/uploads/2025/02/security-strategy-myth-buster-part-4-icarus.png</image:loc><image:title>Security-strategy-myth-buster-part-4-icarus</image:title></image:image><lastmod>2025-02-27T15:08:17+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://henrikparkkinen.com/2025/01/26/cobit-for-security-leaders/</loc><image:image><image:loc>https://henrikparkkinen.com/wp-content/uploads/2025/01/cobit-for-security-leaders-goals-cascade.png</image:loc><image:title>Cobit-for-security-leaders-goals-cascade</image:title></image:image><image:image><image:loc>https://henrikparkkinen.com/wp-content/uploads/2025/01/cobit-for-security-leaders-balanced-scorecard.png</image:loc><image:title>Cobit-for-security-leaders-balanced-scorecard</image:title></image:image><image:image><image:loc>https://henrikparkkinen.com/wp-content/uploads/2025/01/cobit-for-security-leaders.png</image:loc><image:title>Cobit-for-security-leaders</image:title></image:image><lastmod>2025-01-24T20:42:53+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://henrikparkkinen.com/2024/12/15/security-leadership-the-team/</loc><image:image><image:loc>https://henrikparkkinen.com/wp-content/uploads/2024/12/security-leadership-the-team-trust.png</image:loc><image:title>Security-leadership-the-team-trust</image:title></image:image><image:image><image:loc>https://henrikparkkinen.com/wp-content/uploads/2024/12/security-leadership-the-team-goals-togehter.png</image:loc><image:title>Security-leadership-the-team-goals-togehter</image:title></image:image><image:image><image:loc>https://henrikparkkinen.com/wp-content/uploads/2024/12/security-leadership-the-team-help.png</image:loc><image:title>Security-leadership-the-team-help</image:title></image:image><image:image><image:loc>https://henrikparkkinen.com/wp-content/uploads/2024/12/security-leadership-the-team_concept.png</image:loc><image:title>Security-leadership-the-team_concept</image:title></image:image><image:image><image:loc>https://henrikparkkinen.com/wp-content/uploads/2024/12/security-leadership-the-team_together.png</image:loc><image:title>Security-leadership-the-team_together</image:title></image:image><image:image><image:loc>https://henrikparkkinen.com/wp-content/uploads/2024/09/security-leadership-the-team.png</image:loc><image:title>Security-leadership-the-team</image:title></image:image><lastmod>2024-12-14T11:37:52+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://henrikparkkinen.com/2024/11/18/security-strategy-myth-buster-part-3/</loc><image:image><image:loc>https://henrikparkkinen.com/wp-content/uploads/2024/11/security-strategy-myth-buster-part-3-legend.png</image:loc><image:title>Security-strategy-myth-buster-part-3-legend</image:title></image:image><image:image><image:loc>https://henrikparkkinen.com/wp-content/uploads/2024/10/security-strategy-myth-buster-part-3-rocket.png</image:loc><image:title>Security-strategy-myth-buster-part-3-rocket</image:title></image:image><image:image><image:loc>https://henrikparkkinen.com/wp-content/uploads/2024/10/security-strategy-myth-buster-part-3.png</image:loc><image:title>Security-strategy-myth-buster-part-3</image:title></image:image><lastmod>2024-11-18T13:08:59+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://henrikparkkinen.com/2024/10/28/security-leadership-where-to-start/</loc><image:image><image:loc>https://henrikparkkinen.com/wp-content/uploads/2024/10/security-leadership-where-to-start-concept.png</image:loc><image:title>Security-leadership-where-to-start-concept</image:title></image:image><image:image><image:loc>https://henrikparkkinen.com/wp-content/uploads/2024/06/security-leadership-where-to-start-you.png</image:loc><image:title>security-leadership-where-to-start-you</image:title></image:image><image:image><image:loc>https://henrikparkkinen.com/wp-content/uploads/2024/06/security-leadership-where-to-start.png</image:loc><image:title>Security-leadership-where-to-start</image:title></image:image><lastmod>2024-10-28T19:49:17+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://henrikparkkinen.com/2024/09/29/security-strategy-myth-buster-part-2/</loc><image:image><image:loc>https://henrikparkkinen.com/wp-content/uploads/2024/08/security-strategy-myth-buster-part-2-future-preparedness.png</image:loc><image:title>Security-strategy-myth-buster-part-2-future-preparedness</image:title></image:image><image:image><image:loc>https://henrikparkkinen.com/wp-content/uploads/2024/08/security-strategy-myth-buster-part-2-future.png</image:loc><image:title>Security-strategy-myth-buster-part-2-future</image:title></image:image><image:image><image:loc>https://henrikparkkinen.com/wp-content/uploads/2024/05/security-strategy-myth-buster-part-2.png</image:loc><image:title>Security-strategy-myth-buster-part-2</image:title></image:image><lastmod>2024-09-29T13:58:16+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://henrikparkkinen.com/2024/08/22/security-leadership-the-journey-creation/</loc><image:image><image:loc>https://henrikparkkinen.com/wp-content/uploads/2024/08/security-leadership-the-journey-creation-figure.png</image:loc><image:title>Security-leadership-the-journey-creation-figure</image:title></image:image><image:image><image:loc>https://henrikparkkinen.com/wp-content/uploads/2024/08/security-leadership-the-journey-creation-concept.png</image:loc><image:title>Security-leadership-the-journey-creation-concept</image:title></image:image><image:image><image:loc>https://henrikparkkinen.com/wp-content/uploads/2024/08/security-leadership-the-journey-creation.png</image:loc><image:title>Security-leadership-the-journey-creation</image:title></image:image><image:image><image:loc>https://henrikparkkinen.com/wp-content/uploads/2024/08/security-leadership-the-journey-creation-model.png</image:loc><image:title>Security-leadership-the-journey-creation-model</image:title></image:image><image:image><image:loc>https://henrikparkkinen.com/wp-content/uploads/2024/08/security-leadership-the-journey-creation-circus.png</image:loc><image:title>Security-leadership-the-journey-creation-circus</image:title></image:image><lastmod>2024-08-22T15:50:03+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://henrikparkkinen.com/2024/07/18/security-grc-what-why-how-when/</loc><image:image><image:loc>https://henrikparkkinen.com/wp-content/uploads/2024/07/grc-what-why-how-when-adaptable.png</image:loc><image:title>GRC-What-Why-How-When-Adaptable</image:title></image:image><image:image><image:loc>https://henrikparkkinen.com/wp-content/uploads/2024/06/grc-what-why-how-when-grc-change.png</image:loc><image:title>GRC-What-Why-How-When-GRC-change</image:title></image:image><image:image><image:loc>https://henrikparkkinen.com/wp-content/uploads/2024/06/grc-what-why-how-when-grc-expalined.png</image:loc><image:title>GRC-What-Why-How-When-GRC-expalined</image:title></image:image><image:image><image:loc>https://henrikparkkinen.com/wp-content/uploads/2024/06/grc-what-why-how-when.png</image:loc><image:title>GRC-What-Why-How-When</image:title></image:image><image:image><image:loc>https://henrikparkkinen.com/wp-content/uploads/2024/06/grc-what-why-how-when-corporate-grc.png</image:loc><image:title>GRC-What-Why-How-When-Corporate-GRC</image:title></image:image><lastmod>2024-07-27T19:36:57+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://henrikparkkinen.com/2024/06/24/what-is-a-threat-modeled-explained/</loc><image:image><image:loc>https://henrikparkkinen.com/wp-content/uploads/2024/06/what-is-a-threat-modeled-and-explained-snake.png</image:loc><image:title>What-is-a-threat-modeled-and-explained-snake</image:title></image:image><image:image><image:loc>https://henrikparkkinen.com/wp-content/uploads/2022/09/what-is-a-threat-modeled-and-explained-examples.png</image:loc><image:title>What-is-a-threat-modeled-and-explained-examples</image:title></image:image><image:image><image:loc>https://henrikparkkinen.com/wp-content/uploads/2022/09/what-is-a-threat-modeled-and-explained-threat.png</image:loc><image:title>What-is-a-threat-modeled-and-explained-threat</image:title></image:image><image:image><image:loc>https://henrikparkkinen.com/wp-content/uploads/2022/09/what-is-a-threat-modeled-and-explained-micro-perspective-threat.png</image:loc><image:title>What-is-a-threat-modeled-and-explained-micro-perspective-threat</image:title></image:image><image:image><image:loc>https://henrikparkkinen.com/wp-content/uploads/2022/09/what-is-a-threat-explained-modeled-jaguar-dark.jpg</image:loc><image:title>What-is-a-threat-explained-modeled-jaguar-dark</image:title></image:image><lastmod>2024-06-24T09:10:22+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://henrikparkkinen.com/2024/05/31/security-strategy-myth-buster-part-1/</loc><image:image><image:loc>https://henrikparkkinen.com/wp-content/uploads/2024/04/security-strategy-myth-buster-part-1-adaptability.png</image:loc><image:title>security-strategy-myth-buster-part-1-adaptability</image:title></image:image><image:image><image:loc>https://henrikparkkinen.com/wp-content/uploads/2024/04/security-strategy-myth-buster-part-1-perspective.png</image:loc><image:title>security-strategy-myth-buster-part-1-perspective</image:title></image:image><image:image><image:loc>https://henrikparkkinen.com/wp-content/uploads/2024/04/security-strategy-myth-buster-part-1.png</image:loc><image:title>Security-strategy-myth-buster-part-1</image:title></image:image><lastmod>2024-06-01T05:25:27+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://henrikparkkinen.com/2024/04/29/risk-appetite-the-good-bad-ugly/</loc><image:image><image:loc>https://henrikparkkinen.com/wp-content/uploads/2024/04/risk-appetite-the-good-bad-ugly-cowboys-1.png</image:loc><image:title>risk-appetite-the-good-bad-ugly-cowboys-1</image:title></image:image><image:image><image:loc>https://henrikparkkinen.com/wp-content/uploads/2024/04/risk-appetite-the-good-bad-ugly-2.png</image:loc><image:title>risk-appetite-the-good-bad-ugly</image:title></image:image><image:image><image:loc>https://henrikparkkinen.com/wp-content/uploads/2024/02/risk-appetite-the-unicorn.png</image:loc><image:title>risk-appetite-the-unicorn</image:title></image:image><lastmod>2024-04-29T12:15:06+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://henrikparkkinen.com/2024/03/26/security-strategy-reality-vs-theory/</loc><image:image><image:loc>https://henrikparkkinen.com/wp-content/uploads/2024/03/security-strategy-reality-vs-theory-investments.png</image:loc><image:title>security-strategy-reality-vs-theory-investments</image:title></image:image><image:image><image:loc>https://henrikparkkinen.com/wp-content/uploads/2024/03/security-strategy-reality-vs-theory-development.png</image:loc><image:title>security-strategy-reality-vs-theory-development</image:title></image:image><image:image><image:loc>https://henrikparkkinen.com/wp-content/uploads/2024/03/security-strategy-reality-vs-theory-emotions.png</image:loc><image:title>security-strategy-reality-vs-theory-emotions</image:title></image:image><image:image><image:loc>https://henrikparkkinen.com/wp-content/uploads/2024/03/security-strategy-reality-vs-theory-unicorn.png</image:loc><image:title>security-strategy-reality-vs-theory-unicorn</image:title></image:image><image:image><image:loc>https://henrikparkkinen.com/wp-content/uploads/2024/03/security-strategy-reality-vs-theory-model.png</image:loc><image:title>security-strategy-reality-vs-theory-model</image:title></image:image><image:image><image:loc>https://henrikparkkinen.com/wp-content/uploads/2023/07/security-strategy-reality-vs-theory.png</image:loc><image:title>Security-strategy-reality-vs-theory</image:title></image:image><lastmod>2024-03-26T07:26:39+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://henrikparkkinen.com/2023/06/08/emerging-risks-how-to-forecast-the-future/</loc><image:image><image:loc>https://henrikparkkinen.com/wp-content/uploads/2023/07/emerging-risks-management-wizard-zoltar.png</image:loc><image:title>emerging-risks-management-wizard-zoltar</image:title></image:image><image:image><image:loc>https://henrikparkkinen.com/wp-content/uploads/2023/07/emerging-risks-and-how-to-forecast-the-future-tarot-cards.png</image:loc><image:title>emerging-risks-and-how-to-forecast-the-future-tarot-cards</image:title></image:image><image:image><image:loc>https://henrikparkkinen.com/wp-content/uploads/2023/05/emerging-risks-and-how-to-forecast-the-future-tarot.png</image:loc><image:title>emerging-risks-and-how-to-forecast-the-future-tarot</image:title></image:image><image:image><image:loc>https://henrikparkkinen.com/wp-content/uploads/2023/05/emerging-risks-and-how-to-forecast-the-future-robot.png</image:loc><image:title>emerging-risks-and-how-to-forecast-the-future-robot</image:title></image:image><image:image><image:loc>https://henrikparkkinen.com/wp-content/uploads/2023/05/emerging-risks-and-how-to-forecast-the-future.png</image:loc><image:title>Emerging-risks-and-how-to-forecast-the-future</image:title></image:image><image:image><image:loc>https://henrikparkkinen.com/wp-content/uploads/2023/04/emerging-risks-management-wizard.png</image:loc><image:title>emerging-risks-management-wizard</image:title></image:image><lastmod>2024-03-12T14:42:23+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://henrikparkkinen.com/2024/02/29/risk-appetite-tolerance-capacity-explained/</loc><image:image><image:loc>https://henrikparkkinen.com/wp-content/uploads/2024/02/risk-appetite-tolerance-capacity-donut.png</image:loc><image:title>risk-appetite-tolerance-capacity-donut</image:title></image:image><image:image><image:loc>https://henrikparkkinen.com/wp-content/uploads/2024/01/risk-appetite-tolerance-capacity-orgxyz.png</image:loc><image:title>risk-appetite-tolerance-capacity-orgxyz</image:title></image:image><image:image><image:loc>https://henrikparkkinen.com/wp-content/uploads/2022/05/risk-appetite-risk-tolerance-risk-capacity-burger-1.jpg</image:loc><image:title>Risk-appetite-Risk-tolerance-Risk-capacity-burger</image:title></image:image><image:image><image:loc>https://henrikparkkinen.com/wp-content/uploads/2022/12/risk-appetite-tolerance-capacity-org-1.jpg</image:loc><image:title>risk-appetite-tolerance-capacity-org-1</image:title></image:image><image:image><image:loc>https://henrikparkkinen.com/wp-content/uploads/2022/12/risk-appetite-tolerance-capacity-bpabc.jpg</image:loc><image:title>risk-appetite-tolerance-capacity-bpabc</image:title></image:image><image:image><image:loc>https://henrikparkkinen.com/wp-content/uploads/2022/12/risk-appetite-tolerance-capacity-bpc.jpg</image:loc><image:title>risk-appetite-tolerance-capacity-bpc</image:title></image:image><image:image><image:loc>https://henrikparkkinen.com/wp-content/uploads/2022/12/risk-appetite-tolerance-capacity-bpb.jpg</image:loc><image:title>risk-appetite-tolerance-capacity-bpb</image:title></image:image><image:image><image:loc>https://henrikparkkinen.com/wp-content/uploads/2022/12/risk-appetite-tolerance-capacity-bpa.jpg</image:loc><image:title>risk-appetite-tolerance-capacity-bpa</image:title></image:image><image:image><image:loc>https://henrikparkkinen.com/wp-content/uploads/2022/12/risk-appetite-risk-tolerance-risk-capacity-concept.jpg</image:loc><image:title>risk-appetite-risk-tolerance-risk-capacity-concept</image:title></image:image><image:image><image:loc>https://henrikparkkinen.com/wp-content/uploads/2022/08/risk-appetite-on-heatmap.jpg</image:loc><image:title>risk-appetite-on-heatmap</image:title></image:image><lastmod>2024-03-12T14:28:38+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://henrikparkkinen.com/2024/01/21/security-strategy-creating-value/</loc><image:image><image:loc>https://henrikparkkinen.com/wp-content/uploads/2023/07/security-strategy-creating-value-jewelry.png</image:loc><image:title>security-strategy-creating-value-jewelry</image:title></image:image><image:image><image:loc>https://henrikparkkinen.com/wp-content/uploads/2023/07/security-strategy-creating-value-treasure-map.png</image:loc><image:title>security-strategy-creating-value-treasure-map</image:title></image:image><image:image><image:loc>https://henrikparkkinen.com/wp-content/uploads/2023/07/security-strategy-creating-value.png</image:loc><image:title>Security-strategy-creating-value</image:title></image:image><lastmod>2024-01-21T16:19:14+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://henrikparkkinen.com/2023/12/19/kpi-kri-kci-modeled-explained/</loc><image:image><image:loc>https://henrikparkkinen.com/wp-content/uploads/2023/12/what-is-a-kri-kpi-kci-modeled-speed-1.png</image:loc><image:title>what-is-a-kri-kpi-kci-modeled-speed-1</image:title></image:image><image:image><image:loc>https://henrikparkkinen.com/wp-content/uploads/2023/12/what-is-a-kri-kpi-kci-modeled-instrument-panel.png</image:loc><image:title>what-is-a-kri-kpi-kci-modeled-instrument-panel</image:title></image:image><image:image><image:loc>https://henrikparkkinen.com/wp-content/uploads/2023/12/what-is-a-kri-kpi-kci-modeled-speed.png</image:loc><image:title>what-is-a-kri-kpi-kci-modeled-speed</image:title></image:image><image:image><image:loc>https://henrikparkkinen.com/wp-content/uploads/2022/10/kpi-kri-kci-compass-1.jpg</image:loc><image:title>KPI-KRI-KCI-Compass</image:title></image:image><image:image><image:loc>https://henrikparkkinen.com/wp-content/uploads/2022/10/kpi-kri-kci-interrelationship.jpg</image:loc><image:title>KPI-KRI-KCI-interrelationship</image:title></image:image><image:image><image:loc>https://henrikparkkinen.com/wp-content/uploads/2022/10/kpi-kri-kci-conceptual-model.jpg</image:loc><image:title>kpi-kri-kci-conceptual-model</image:title></image:image><image:image><image:loc>https://henrikparkkinen.com/wp-content/uploads/2022/10/kpi-kri-kci-holistic-model.jpg</image:loc><image:title>kpi-kri-kci-holistic-model</image:title></image:image><image:image><image:loc>https://henrikparkkinen.com/wp-content/uploads/2022/10/image.png</image:loc><image:title>image</image:title></image:image><image:image><image:loc>https://henrikparkkinen.com/wp-content/uploads/2022/10/what-is-a-kri-kpi-kci-modeled-explained-1.jpg</image:loc><image:title>What-is-a-KRI-KPI-KCI-modeled-explained</image:title></image:image><lastmod>2023-12-19T08:24:54+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://henrikparkkinen.com/2023/11/21/security-in-reality/</loc><image:image><image:loc>https://henrikparkkinen.com/wp-content/uploads/2023/11/security-in-reality-tools.png</image:loc><image:title>security-in-reality-tools</image:title></image:image><image:image><image:loc>https://henrikparkkinen.com/wp-content/uploads/2023/11/security-in-reality-thinker.png</image:loc><image:title>security-in-reality-thinker</image:title></image:image><image:image><image:loc>https://henrikparkkinen.com/wp-content/uploads/2023/11/security-in-reality-toolbox.png</image:loc><image:title>security-in-reality-toolbox</image:title></image:image><image:image><image:loc>https://henrikparkkinen.com/wp-content/uploads/2023/11/security-in-reality.png</image:loc><image:title>security-in-reality</image:title></image:image><lastmod>2023-11-21T08:25:56+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://henrikparkkinen.com/2023/10/31/security-strategy-direction/</loc><image:image><image:loc>https://henrikparkkinen.com/wp-content/uploads/2023/07/security-strategy-the-direction-compass-map.png</image:loc><image:title>security-strategy-the-direction-compass-map</image:title></image:image><image:image><image:loc>https://henrikparkkinen.com/wp-content/uploads/2023/07/security-strategy-the-direction.png</image:loc><image:title>Security-strategy-the-direction</image:title></image:image><image:image><image:loc>https://henrikparkkinen.com/wp-content/uploads/2023/07/security-strategy-the-direction-difficult-roads.png</image:loc><image:title>security-strategy-the-direction-difficult-roads</image:title></image:image><lastmod>2023-10-31T20:01:48+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://henrikparkkinen.com/2023/08/03/language-communication-security/</loc><image:image><image:loc>https://henrikparkkinen.com/wp-content/uploads/2023/04/speaking-security-communication-and-language-projector.jpg</image:loc><image:title>speaking-security-communication-and-language-projector</image:title></image:image><image:image><image:loc>https://henrikparkkinen.com/wp-content/uploads/2023/04/speaking-security-communication-and-language-listen.jpg</image:loc><image:title>speaking-security-communication-and-language-listen</image:title></image:image><image:image><image:loc>https://henrikparkkinen.com/wp-content/uploads/2022/01/speaking-security-communication-and-language.jpg</image:loc><image:title>Speaking-security-communication-and-language</image:title></image:image><image:image><image:loc>https://henrikparkkinen.com/wp-content/uploads/2023/04/speaking-security-communication-and-language-words.jpg</image:loc><image:title>speaking-security-communication-and-language-words</image:title></image:image><image:image><image:loc>https://henrikparkkinen.com/wp-content/uploads/2022/11/language-communication-of-security-c3po-superhero.png</image:loc><image:title>language-communication-of-security-c3po-superhero</image:title></image:image><image:image><image:loc>https://henrikparkkinen.com/wp-content/uploads/2022/11/language-communication-of-security-c3po-2.png</image:loc><image:title>language-communication-of-security-c3po-2</image:title></image:image><image:image><image:loc>https://henrikparkkinen.com/wp-content/uploads/2022/01/language-and-communication-of-security.jpg</image:loc><image:title>Language and Communication of Security</image:title></image:image><image:image><image:loc>https://henrikparkkinen.com/wp-content/uploads/2022/06/image-43.png</image:loc><image:title>image-43</image:title></image:image><lastmod>2023-10-21T13:58:41+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://henrikparkkinen.com/2023/09/28/cgeit-why-you-should-take-it/</loc><image:image><image:loc>https://henrikparkkinen.com/wp-content/uploads/2023/09/cgeit-why-you-should-take-it-security.png</image:loc><image:title>cgeit-why-you-should-take-it-security</image:title></image:image><image:image><image:loc>https://henrikparkkinen.com/wp-content/uploads/2023/09/cgeit-why-you-should-take-it-role.png</image:loc><image:title>cgeit-why-you-should-take-it-role</image:title></image:image><image:image><image:loc>https://henrikparkkinen.com/wp-content/uploads/2023/09/cgeit-why-you-should-take-it-henrikparkkinen.png</image:loc><image:title>cgeit-why-you-should-take-it-henrikparkkinen</image:title></image:image><image:image><image:loc>https://henrikparkkinen.com/wp-content/uploads/2023/09/cgeit-why-you-should-take-it.png</image:loc><image:title>CGEIT-why-you-should-take-it</image:title></image:image><lastmod>2023-09-28T07:36:51+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://henrikparkkinen.com/2023/09/11/security-strategy-long-term-plan/</loc><image:image><image:loc>https://henrikparkkinen.com/wp-content/uploads/2023/09/security-strategy-long-term-plan-change.png</image:loc><image:title>security-strategy-long-term-plan-change</image:title></image:image><image:image><image:loc>https://henrikparkkinen.com/wp-content/uploads/2023/09/security-strategy-long-term-plan-1.png</image:loc><image:title>Security-strategy-long-term-plan</image:title></image:image><image:image><image:loc>https://henrikparkkinen.com/wp-content/uploads/2023/07/security-strategy-long-term-plan-road.png</image:loc><image:title>security-strategy-long-term-plan-road</image:title></image:image><image:image><image:loc>https://henrikparkkinen.com/wp-content/uploads/2023/07/security-strategy-long-term-plan-lao-tzu-1.png</image:loc><image:title>Security-strategy-long-term-plan-Lao-Tzu</image:title></image:image><lastmod>2023-09-11T04:25:34+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://henrikparkkinen.com/2023/07/04/security-strategy-what-is-that/</loc><image:image><image:loc>https://henrikparkkinen.com/wp-content/uploads/2023/07/security-strategy-what-is-that-featured.png</image:loc><image:title>Security-strategy-what-is-that-featured</image:title></image:image><image:image><image:loc>https://henrikparkkinen.com/wp-content/uploads/2023/07/security-strategy-what-is-it-direction.png</image:loc><image:title>security-strategy-what-is-it-direction</image:title></image:image><image:image><image:loc>https://henrikparkkinen.com/wp-content/uploads/2023/06/security-strategy-what-is-it-sign.png</image:loc><image:title>security-strategy-what-is-it-sign</image:title></image:image><image:image><image:loc>https://henrikparkkinen.com/wp-content/uploads/2023/06/security-strategy-what-is-that-banff.png</image:loc><image:title>security-strategy-what-is-that-banff</image:title></image:image><image:image><image:loc>https://henrikparkkinen.com/wp-content/uploads/2023/05/security-strategy-what-is-it-long-term-plan.png</image:loc><image:title>security-strategy-what-is-it-long-term-plan</image:title></image:image><image:image><image:loc>https://henrikparkkinen.com/wp-content/uploads/2023/01/security-strategy-what-is-it.png</image:loc><image:title>Security-strategy-what-is-it</image:title></image:image><image:image><image:loc>https://henrikparkkinen.com/wp-content/uploads/2023/01/security-strategy-how-to-build-one.jpg</image:loc><image:title>Security-strategy-how-to-build-one</image:title></image:image><lastmod>2023-09-11T04:21:55+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://henrikparkkinen.com/2022/06/28/a-day-at-work-as-a-ciso-part-1-extended/</loc><image:image><image:loc>https://henrikparkkinen.com/wp-content/uploads/2023/06/a-day-at-work-as-a-ciso-part-1-extended-team-work.png</image:loc><image:title>a-day-at-work-as-a-ciso-part-1-extended-team-work</image:title></image:image><image:image><image:loc>https://henrikparkkinen.com/wp-content/uploads/2022/07/ciso-help-organize-lead-communicate.jpg</image:loc><image:title>ciso-help-organize-lead-communicate</image:title></image:image><image:image><image:loc>https://henrikparkkinen.com/wp-content/uploads/2022/07/ciso-leadership-assets-threats-vulnerabilities-risks-team.jpg</image:loc><image:title>ciso-leadership-assets-threats-vulnerabilities-risks-team</image:title></image:image><image:image><image:loc>https://henrikparkkinen.com/wp-content/uploads/2022/06/ciso-is-about-leadership-and-helping-the-business.jpg</image:loc><image:title>CISO-is-about-leadership-and-helping-the-business</image:title></image:image><image:image><image:loc>https://henrikparkkinen.com/wp-content/uploads/2022/06/a-day-at-work-as-ciso-part-1-extended.jpg</image:loc><image:title>A day at work as CISO Part 1 Extended</image:title></image:image><image:image><image:loc>https://henrikparkkinen.com/wp-content/uploads/2022/06/image-24.png</image:loc><image:title>image-24</image:title></image:image><image:image><image:loc>https://henrikparkkinen.com/wp-content/uploads/2022/06/image-23.png</image:loc><image:title>image-23</image:title></image:image><lastmod>2023-06-28T06:47:45+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://henrikparkkinen.com/2022/06/28/creation-of-resilience-together/</loc><image:image><image:loc>https://henrikparkkinen.com/wp-content/uploads/2023/06/creation-of-resilience-together-planet.png</image:loc><image:title>creation-of-resilience-together-planet</image:title></image:image><image:image><image:loc>https://henrikparkkinen.com/wp-content/uploads/2022/07/the-digital-evolution-and-transformation.jpg</image:loc><image:title>the-digital-evolution-and-transformation</image:title></image:image><image:image><image:loc>https://henrikparkkinen.com/wp-content/uploads/2022/07/the-asymmetricsecurity-landscape-need-resilience.jpg</image:loc><image:title>the-asymmetricsecurity-landscape-need-resilience</image:title></image:image><image:image><image:loc>https://henrikparkkinen.com/wp-content/uploads/2022/07/resilience-is-about-humans-processes-technologies.jpg</image:loc><image:title>resilience-is-about-humans-processes-technologies</image:title></image:image><image:image><image:loc>https://henrikparkkinen.com/wp-content/uploads/2022/06/creating-of-resilience-together.jpg</image:loc><image:title>Creating-of-resilience-together</image:title></image:image><image:image><image:loc>https://henrikparkkinen.com/wp-content/uploads/2022/06/image-56.png</image:loc><image:title>image-56</image:title></image:image><lastmod>2023-06-28T06:36:01+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://henrikparkkinen.com/2023/05/07/safeguarding-the-crown-jewels-information-classification/</loc><image:image><image:loc>https://henrikparkkinen.com/wp-content/uploads/2023/05/securing-the-crown-jewels-analogy.png</image:loc><image:title>securing-the-crown-jewels-analogy</image:title></image:image><image:image><image:loc>https://henrikparkkinen.com/wp-content/uploads/2023/05/securing-the-crown-jewels-dimon-ring.png</image:loc><image:title>securing-the-crown-jewels-dimon-ring</image:title></image:image><image:image><image:loc>https://henrikparkkinen.com/wp-content/uploads/2023/05/securing-the-crown-jewels-finance.png</image:loc><image:title>securing-the-crown-jewels-finance</image:title></image:image><image:image><image:loc>https://henrikparkkinen.com/wp-content/uploads/2023/05/securing-the-crown-jewels-digital-code.png</image:loc><image:title>securing-the-crown-jewels-digital-code</image:title></image:image><image:image><image:loc>https://henrikparkkinen.com/wp-content/uploads/2022/09/information-classification-process.png</image:loc><image:title>information-classification-process</image:title></image:image><image:image><image:loc>https://henrikparkkinen.com/wp-content/uploads/2022/09/information-classification-discipline-process-phases.png</image:loc><image:title>information-classification-discipline-process-phases</image:title></image:image><image:image><image:loc>https://henrikparkkinen.com/wp-content/uploads/2022/05/safeguarding-the-crown-jewels.jpg</image:loc><image:title>Safeguarding the crown jewels</image:title></image:image><lastmod>2023-05-07T20:22:52+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://henrikparkkinen.com/2022/08/14/the-cia-triad-made-practical/</loc><image:image><image:loc>https://henrikparkkinen.com/wp-content/uploads/2022/07/cia-triad-information-classification.jpg</image:loc><image:title>cia-triad-information-classification</image:title></image:image><image:image><image:loc>https://henrikparkkinen.com/wp-content/uploads/2022/07/cia-availability.jpg</image:loc><image:title>cia-availability</image:title></image:image><image:image><image:loc>https://henrikparkkinen.com/wp-content/uploads/2022/07/cia-integrity.jpg</image:loc><image:title>cia-integrity</image:title></image:image><image:image><image:loc>https://henrikparkkinen.com/wp-content/uploads/2022/07/cia-confidentiality.jpg</image:loc><image:title>cia-confidentiality</image:title></image:image><image:image><image:loc>https://henrikparkkinen.com/wp-content/uploads/2022/07/cia-triad.jpg</image:loc><image:title>cia-triad</image:title></image:image><image:image><image:loc>https://henrikparkkinen.com/wp-content/uploads/2022/07/cia-ciat-communication.jpg</image:loc><image:title>cia-ciat-communication</image:title></image:image><image:image><image:loc>https://henrikparkkinen.com/wp-content/uploads/2022/07/image-30.png</image:loc><image:title>image-30</image:title></image:image><image:image><image:loc>https://henrikparkkinen.com/wp-content/uploads/2022/07/image-28.png</image:loc><image:title>image-28</image:title></image:image><image:image><image:loc>https://henrikparkkinen.com/wp-content/uploads/2022/07/image-27.png</image:loc><image:title>image-27</image:title></image:image><image:image><image:loc>https://henrikparkkinen.com/wp-content/uploads/2022/07/image-23.png</image:loc><image:title>image-23</image:title></image:image><lastmod>2023-05-07T20:21:35+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://henrikparkkinen.com/2023/04/17/what-are-emerging-risks/</loc><image:image><image:loc>https://henrikparkkinen.com/wp-content/uploads/2023/04/emerging-risks-are-like-icebergs.png</image:loc><image:title>emerging-risks-are-like-icebergs</image:title></image:image><image:image><image:loc>https://henrikparkkinen.com/wp-content/uploads/2023/04/what-is-emerging-risk-1.png</image:loc><image:title>What-is-emerging-risk</image:title></image:image><lastmod>2023-04-17T11:10:44+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://henrikparkkinen.com/2023/03/21/security-hygiene-done-correctly/</loc><image:image><image:loc>https://henrikparkkinen.com/wp-content/uploads/2023/02/continuous-improvement-pdca.png</image:loc><image:title>continuous-improvement-pdca</image:title></image:image><image:image><image:loc>https://henrikparkkinen.com/wp-content/uploads/2023/02/iam-identity-and-access-management.png</image:loc><image:title>iam-identity-and-access-management</image:title></image:image><image:image><image:loc>https://henrikparkkinen.com/wp-content/uploads/2023/02/security-red-or-blue-pill.png</image:loc><image:title>security-red-or-blue-pill</image:title></image:image><image:image><image:loc>https://henrikparkkinen.com/wp-content/uploads/2023/01/security-hygiene-done-correctly.jpg</image:loc><image:title>Security-hygiene-done-correctly</image:title></image:image><lastmod>2023-03-21T13:13:42+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://henrikparkkinen.com/2023/02/19/threat-modeling-made-simple/</loc><image:image><image:loc>https://henrikparkkinen.com/wp-content/uploads/2023/01/threat-modeling-process-1.jpg</image:loc><image:title>threat-modeling-process-1</image:title></image:image><image:image><image:loc>https://henrikparkkinen.com/wp-content/uploads/2023/01/threat-modeling-construction.jpg</image:loc><image:title>threat-modeling-construction</image:title></image:image><image:image><image:loc>https://henrikparkkinen.com/wp-content/uploads/2023/01/threat-modeling-made-simple-team.jpg</image:loc><image:title>threat-modeling-made-simple-team</image:title></image:image><image:image><image:loc>https://henrikparkkinen.com/wp-content/uploads/2023/01/threat-modeling-made-simple.jpg</image:loc><image:title>Threat-modeling-made-simple</image:title></image:image><lastmod>2023-02-19T16:56:11+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://henrikparkkinen.com/2022/07/11/what-is-risk-management-part-1/</loc><image:image><image:loc>https://henrikparkkinen.com/wp-content/uploads/2022/07/risk-management-explained.jpg</image:loc><image:title>risk-management-explained</image:title></image:image><image:image><image:loc>https://henrikparkkinen.com/wp-content/uploads/2022/07/crisc-certification-isaca-henrikparkkinen-1.jpg</image:loc><image:title>crisc-certification-isaca-henrikparkkinen-1</image:title></image:image><image:image><image:loc>https://henrikparkkinen.com/wp-content/uploads/2022/07/risk-managmenet-explained-and-made-simple.jpg</image:loc><image:title>Risk-managmenet-explained-and-made-simple</image:title></image:image><image:image><image:loc>https://henrikparkkinen.com/wp-content/uploads/2022/07/risk-management-magic-8ball.jpg</image:loc><image:title>Risk-management-magic-8ball</image:title></image:image><image:image><image:loc>https://henrikparkkinen.com/wp-content/uploads/2022/07/risk-management-assets-threats-vulnerabilities.jpg</image:loc><image:title>risk-management-assets-threats-vulnerabilities</image:title></image:image><image:image><image:loc>https://henrikparkkinen.com/wp-content/uploads/2022/07/risk-asset-threat-vulnerability-impact-likelihood.jpg</image:loc><image:title>Risk-asset-threat-vulnerability-impact-likelihood</image:title></image:image><image:image><image:loc>https://henrikparkkinen.com/wp-content/uploads/2022/07/risk-asset-threat-vulnerability.jpg</image:loc><image:title>Risk-asset-threat-vulnerability</image:title></image:image><image:image><image:loc>https://henrikparkkinen.com/wp-content/uploads/2022/07/risk-likeliehood-impact.jpg</image:loc><image:title>Risk-likeliehood-impact</image:title></image:image><image:image><image:loc>https://henrikparkkinen.com/wp-content/uploads/2022/07/crisc.jpg</image:loc><image:title>crisc</image:title></image:image><image:image><image:loc>https://henrikparkkinen.com/wp-content/uploads/2022/07/image-17.png</image:loc><image:title>Risk management discipline</image:title></image:image><lastmod>2023-01-29T16:01:02+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://henrikparkkinen.com/2023/01/23/what-is-threat-modeling/</loc><image:image><image:loc>https://henrikparkkinen.com/wp-content/uploads/2023/01/security-threat-dark-road.jpg</image:loc><image:title>security-threat-dark-road</image:title></image:image><image:image><image:loc>https://henrikparkkinen.com/wp-content/uploads/2023/01/security-threat-car-1.jpg</image:loc><image:title>security-threat-car-1</image:title></image:image><image:image><image:loc>https://henrikparkkinen.com/wp-content/uploads/2022/05/what-is-threat-modeling.jpg</image:loc><image:title>What-is-threat-modeling</image:title></image:image><image:image><image:loc>https://henrikparkkinen.com/wp-content/uploads/2023/01/security-threat-spy.jpg</image:loc><image:title>security-threat-spy</image:title></image:image><image:image><image:loc>https://henrikparkkinen.com/wp-content/uploads/2023/01/the-dreaded-security-rabbit-hole-syndrome.jpg</image:loc><image:title>the-dreaded-security-rabbit-hole-syndrome</image:title></image:image><image:image><image:loc>https://henrikparkkinen.com/wp-content/uploads/2022/05/threat-modeling-sdlc-software-development-life-cycle.jpg</image:loc><image:title>Threat-modeling-SDLC-Software-Development-Life-Cycle</image:title></image:image><image:image><image:loc>https://henrikparkkinen.com/wp-content/uploads/2022/09/threat-modeling-cti-threat-hunting-mitre-attack.jpg</image:loc><image:title>threat-modeling-cti-threat-hunting-mitre-attack</image:title></image:image><image:image><image:loc>https://henrikparkkinen.com/wp-content/uploads/2022/09/threat-modeling-technical-model.jpg</image:loc><image:title>threat-modeling-technical-model</image:title></image:image><image:image><image:loc>https://henrikparkkinen.com/wp-content/uploads/2022/09/threat-model-front-back-end.jpg</image:loc><image:title>threat-model-front-back-end</image:title></image:image><image:image><image:loc>https://henrikparkkinen.com/wp-content/uploads/2022/09/threat-modeling-a-better-example.jpg</image:loc><image:title>threat-modeling-a-better-example</image:title></image:image><lastmod>2023-01-23T13:45:51+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://henrikparkkinen.com/2022/10/26/the-risk-treatment-and-response-phase-explained/</loc><image:image><image:loc>https://henrikparkkinen.com/wp-content/uploads/2022/10/risk-treatment-response-phase-chess.jpg</image:loc><image:title>risk-treatment-response-phase-chess</image:title></image:image><image:image><image:loc>https://henrikparkkinen.com/wp-content/uploads/2022/08/risk-prioritization-scales.jpg</image:loc><image:title>risk-prioritization-scales</image:title></image:image><image:image><image:loc>https://henrikparkkinen.com/wp-content/uploads/2022/08/risk-options.jpg</image:loc><image:title>Risk-options</image:title></image:image><image:image><image:loc>https://henrikparkkinen.com/wp-content/uploads/2022/08/risk-options-avoid-accept-transfer-mitigate.jpg</image:loc><image:title>Risk-options-avoid-accept-transfer-mitigate</image:title></image:image><image:image><image:loc>https://henrikparkkinen.com/wp-content/uploads/2022/08/the-risk-treatment-response-phase.jpg</image:loc><image:title>The-risk-treatment-response-phase</image:title></image:image><lastmod>2023-01-16T13:20:30+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://henrikparkkinen.com/2023/01/01/cism-cisa-crisc-which-one-to-take/</loc><image:image><image:loc>https://henrikparkkinen.com/wp-content/uploads/2022/05/crisc-cism-cisa-which-certification-to-take.png</image:loc><image:title>CRISC-CISM-CISA-Which-certification-to-take</image:title></image:image><image:image><image:loc>https://henrikparkkinen.com/wp-content/uploads/2022/07/cism-cisa-crisc-which-certificate-to-take.jpg</image:loc><image:title>cism-cisa-crisc-which-certificate-to-take</image:title></image:image><image:image><image:loc>https://henrikparkkinen.com/wp-content/uploads/2022/06/image-13.png</image:loc><image:title>image-13</image:title></image:image><image:image><image:loc>https://henrikparkkinen.com/wp-content/uploads/2022/06/image-12.png</image:loc><image:title>image-12</image:title></image:image><image:image><image:loc>https://henrikparkkinen.com/wp-content/uploads/2022/06/image-11.png</image:loc><image:title>image-11</image:title></image:image><image:image><image:loc>https://henrikparkkinen.com/wp-content/uploads/2022/06/image-10.png</image:loc><image:title>image-10</image:title></image:image><image:image><image:loc>https://henrikparkkinen.com/wp-content/uploads/2022/06/image-9.png</image:loc><image:title>image-9</image:title></image:image><lastmod>2023-01-01T22:35:29+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://henrikparkkinen.com/2022/11/20/cloud-security-governance-regulations-compliance-security/</loc><image:image><image:loc>https://henrikparkkinen.com/wp-content/uploads/2022/11/cloud-security-governance-compliance-vs-security.jpg</image:loc><image:title>cloud-security-governance-compliance-vs-security</image:title></image:image><image:image><image:loc>https://henrikparkkinen.com/wp-content/uploads/2022/11/cloud-security-governance-compliance-audit.jpg</image:loc><image:title>cloud-security-governance-compliance-audit</image:title></image:image><image:image><image:loc>https://henrikparkkinen.com/wp-content/uploads/2022/10/cloud-security-governance-regulations-compliance-security.png</image:loc><image:title>Cloud-security-governance-regulations-compliance-security</image:title></image:image><lastmod>2022-12-30T20:49:42+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://henrikparkkinen.com/2022/12/12/the-risk-monitoring-reporting-phase-explained/</loc><image:image><image:loc>https://henrikparkkinen.com/wp-content/uploads/2022/12/the-risk-monitoring-reporting-phase-expalined.png</image:loc><image:title>the-risk-monitoring-reporting-phase-expalined</image:title></image:image><image:image><image:loc>https://henrikparkkinen.com/wp-content/uploads/2022/08/the-risk-monitoring-reporting-phase.jpg</image:loc><image:title>The-risk-monitoring-reporting-phase</image:title></image:image><image:image><image:loc>https://henrikparkkinen.com/wp-content/uploads/2022/08/risk-reporting-heatmap.jpg</image:loc><image:title>risk-reporting-heatmap</image:title></image:image><image:image><image:loc>https://henrikparkkinen.com/wp-content/uploads/2022/08/key-risk-indicator.jpg</image:loc><image:title>key-risk-indicator</image:title></image:image><lastmod>2022-12-12T07:18:51+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://henrikparkkinen.com/2022/08/01/cloud-security-governance-process/</loc><image:image><image:loc>https://henrikparkkinen.com/wp-content/uploads/2022/07/cloud-service-abstratction-configuration-1.jpg</image:loc><image:title>cloud-service-abstratction-configuration-1</image:title></image:image><image:image><image:loc>https://henrikparkkinen.com/wp-content/uploads/2022/07/cloud-security-governance-model-2.jpg</image:loc><image:title>cloud-security-governance-model-2</image:title></image:image><image:image><image:loc>https://henrikparkkinen.com/wp-content/uploads/2022/07/cloud-iaas-paas-saas.jpg</image:loc><image:title>cloud-iaas-paas-saas</image:title></image:image><image:image><image:loc>https://henrikparkkinen.com/wp-content/uploads/2022/07/cloud-service-abstratction-configuration.jpg</image:loc><image:title>cloud-service-abstratction-configuration</image:title></image:image><image:image><image:loc>https://henrikparkkinen.com/wp-content/uploads/2022/05/cloud-security-governance-process-2.jpg</image:loc><image:title>Cloud-security-governance-process</image:title></image:image><image:image><image:loc>https://henrikparkkinen.com/wp-content/uploads/2022/05/cloud-security.-a-agnostic-view.jpg</image:loc><image:title>Cloud Security. A agnostic view</image:title></image:image><image:image><image:loc>https://henrikparkkinen.com/wp-content/uploads/2022/07/image-9.png</image:loc><image:title>image-9</image:title></image:image><image:image><image:loc>https://henrikparkkinen.com/wp-content/uploads/2022/07/image-8.png</image:loc><image:title>image-8</image:title></image:image><image:image><image:loc>https://henrikparkkinen.com/wp-content/uploads/2022/07/image-7.png</image:loc><image:title>image-7</image:title></image:image><image:image><image:loc>https://henrikparkkinen.com/wp-content/uploads/2022/07/image-6.png</image:loc><image:title>image-6</image:title></image:image><lastmod>2022-11-20T21:33:52+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://henrikparkkinen.com/2022/09/04/cloud-security-governance-contracts-agreements/</loc><image:image><image:loc>https://henrikparkkinen.com/wp-content/uploads/2022/08/cloud-services-responsibility-shift.jpg</image:loc><image:title>cloud-services-responsibility-shift</image:title></image:image><image:image><image:loc>https://henrikparkkinen.com/wp-content/uploads/2022/08/cloud-services-responsibility-model.jpg</image:loc><image:title>cloud-services-responsibility-model</image:title></image:image><image:image><image:loc>https://henrikparkkinen.com/wp-content/uploads/2022/08/cloud-security-governance-contract-agreement.jpg</image:loc><image:title>cloud-security-governance-contract-agreement</image:title></image:image><image:image><image:loc>https://henrikparkkinen.com/wp-content/uploads/2022/08/cloud-security-governance-contracts-agreements.jpg</image:loc><image:title>Cloud-security-governance-contracts-agreements</image:title></image:image><lastmod>2022-11-20T21:33:28+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://henrikparkkinen.com/contact/</loc><image:image><image:loc>https://henrikparkkinen.com/wp-content/uploads/2022/07/contact.jpg</image:loc><image:title>contact</image:title></image:image><lastmod>2022-10-14T05:25:02+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://henrikparkkinen.com/2022/09/18/what-is-risk-modeled-explained/</loc><image:image><image:loc>https://henrikparkkinen.com/wp-content/uploads/2022/09/what-is-risk-thor.jpg</image:loc><image:title>what-is-risk-thor</image:title></image:image><image:image><image:loc>https://henrikparkkinen.com/wp-content/uploads/2022/09/what-is-risk-modeled-and-explained.jpg</image:loc><image:title>What-is-risk-modeled-and-explained</image:title></image:image><image:image><image:loc>https://henrikparkkinen.com/wp-content/uploads/2022/08/risk-security-incident-management-3.jpg</image:loc><image:title>risk-security-incident-management-3</image:title></image:image><image:image><image:loc>https://henrikparkkinen.com/wp-content/uploads/2022/08/risk-in-security-context.jpg</image:loc><image:title>risk-in-security-context</image:title></image:image><image:image><image:loc>https://henrikparkkinen.com/wp-content/uploads/2022/08/risk-threat-vulnerability-is-asset-org-secc.jpg</image:loc><image:title>risk-threat-vulnerability-is-asset-org-secc</image:title></image:image><image:image><image:loc>https://henrikparkkinen.com/wp-content/uploads/2022/08/risk-threat-vulnerability-is-asset-org.jpg</image:loc><image:title>risk-threat-vulnerability-is-asset-org</image:title></image:image><lastmod>2022-09-18T20:38:26+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://henrikparkkinen.com/2022/08/22/the-risk-analysis-phase-explained/</loc><image:image><image:loc>https://henrikparkkinen.com/wp-content/uploads/2022/08/risk-analysis-techniques-explained-1.jpg</image:loc><image:title>risk-analysis-techniques-explained-1</image:title></image:image><image:image><image:loc>https://henrikparkkinen.com/wp-content/uploads/2022/08/risk-scenario-analysis.jpg</image:loc><image:title>risk-scenario-analysis</image:title></image:image><image:image><image:loc>https://henrikparkkinen.com/wp-content/uploads/2022/08/the-risk-matrix-heatmap.jpg</image:loc><image:title>the-risk-matrix-heatmap</image:title></image:image><image:image><image:loc>https://henrikparkkinen.com/wp-content/uploads/2022/08/the-risk-analysis-phase-explained-1.jpg</image:loc><image:title>The-Risk-Analysis-phase-explained</image:title></image:image><image:image><image:loc>https://henrikparkkinen.com/wp-content/uploads/2022/08/the-risk-analysis-phase-explained.jpg</image:loc><image:title>The-Risk-Analysis-phase-explained</image:title></image:image><lastmod>2022-08-22T07:35:26+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://henrikparkkinen.com/2022/07/28/the-risk-assessment-process-identification/</loc><image:image><image:loc>https://henrikparkkinen.com/wp-content/uploads/2022/05/risk-analysis-techniques-qualitative-quantitative.jpg</image:loc><image:title>Risk-analysis-techniques-qualitative-quantitative</image:title></image:image><image:image><image:loc>https://henrikparkkinen.com/wp-content/uploads/2022/07/risk-analysis-parts.jpg</image:loc><image:title>risk-analysis-parts</image:title></image:image><image:image><image:loc>https://henrikparkkinen.com/wp-content/uploads/2022/07/risk-assessment-parts.jpg</image:loc><image:title>risk-assessment-parts</image:title></image:image><image:image><image:loc>https://henrikparkkinen.com/wp-content/uploads/2022/05/risk-management-part-2.jpg</image:loc><image:title>Risk Management Part 2</image:title></image:image><image:image><image:loc>https://henrikparkkinen.com/wp-content/uploads/2022/06/image-34.png</image:loc><image:title>image-34</image:title></image:image><image:image><image:loc>https://henrikparkkinen.com/wp-content/uploads/2022/06/image-1.png</image:loc><image:title>image-1</image:title></image:image><lastmod>2022-08-20T20:43:14+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://henrikparkkinen.com/2022/06/28/a-day-at-work-as-a-ciso-part-3-extended/</loc><image:image><image:loc>https://henrikparkkinen.com/wp-content/uploads/2022/07/ciso-strategy-tactics-plans-roadmaps.jpg</image:loc><image:title>ciso-strategy-tactics-plans-roadmaps</image:title></image:image><image:image><image:loc>https://henrikparkkinen.com/wp-content/uploads/2022/06/image-31.png</image:loc><image:title>image-31</image:title></image:image><lastmod>2022-08-20T19:33:27+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://henrikparkkinen.com/2022/06/28/a-day-at-work-as-a-ciso-part-2-extended/</loc><image:image><image:loc>https://henrikparkkinen.com/wp-content/uploads/2022/07/ciso-enabling-and-driving-risk-to-success.jpg</image:loc><image:title>ciso-enabling-and-driving-risk-to-success</image:title></image:image><image:image><image:loc>https://henrikparkkinen.com/wp-content/uploads/2022/07/ciso-is-about-business-stakeholders-assets-compliance-risk.jpg</image:loc><image:title>ciso-is-about-business-stakeholders-assets-compliance-risk</image:title></image:image><image:image><image:loc>https://henrikparkkinen.com/wp-content/uploads/2022/07/the-ciso-toolbox-and-skills.jpg</image:loc><image:title>the-ciso-toolbox-and-skills</image:title></image:image><image:image><image:loc>https://henrikparkkinen.com/wp-content/uploads/2022/06/image-51.png</image:loc><image:title>image-51</image:title></image:image><image:image><image:loc>https://henrikparkkinen.com/wp-content/uploads/2022/06/image-29.png</image:loc><image:title>image-29</image:title></image:image><image:image><image:loc>https://henrikparkkinen.com/wp-content/uploads/2022/06/image-27.png</image:loc><image:title>image-27</image:title></image:image><lastmod>2022-08-20T18:50:04+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://henrikparkkinen.com</loc><changefreq>daily</changefreq><priority>1.0</priority><lastmod>2026-01-27T10:25:19+00:00</lastmod></url></urlset>
