<?xml version="1.0" encoding="UTF-8"?>
<urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9" xmlns:xhtml="http://www.w3.org/1999/xhtml">
    <url>
        <loc>https://thepurplebook.club</loc>
    </url>
    <url>
        <loc>https://thepurplebook.club/explore-membership</loc>
    </url>
    <url>
        <loc>https://thepurplebook.club/legal/privacy-policy</loc>
    </url>
    <url>
        <loc>https://thepurplebook.club/register</loc>
    </url>
    <url>
        <loc>https://thepurplebook.club/legal/terms-conditions</loc>
    </url>
    <url>
        <loc>https://thepurplebook.club/podcast-blog</loc>
    </url>
    <url>
        <loc>https://thepurplebook.club/media-assets</loc>
    </url>
    <url>
        <loc>https://thepurplebook.club/podcast-guest</loc>
    </url>
    <url>
        <loc>https://thepurplebook.club/contact-us</loc>
    </url>
    <url>
        <loc>https://thepurplebook.club/personalize</loc>
    </url>
    <url>
        <loc>https://thepurplebook.club/the-book</loc>
    </url>
    <url>
        <loc>https://thepurplebook.club/blog</loc>
    </url>
    <url>
        <loc>https://thepurplebook.club/feedback-form</loc>
    </url>
    <url>
        <loc>https://thepurplebook.club/contribute-content</loc>
    </url>
    <url>
        <loc>https://thepurplebook.club/resources</loc>
    </url>
    <url>
        <loc>https://thepurplebook.club/foreword</loc>
    </url>
    <url>
        <loc>https://thepurplebook.club/cyber-soiree</loc>
    </url>
    <url>
        <loc>https://thepurplebook.club/state-of-appsecops</loc>
    </url>
    <url>
        <loc>https://thepurplebook.club/s3m2</loc>
    </url>
    <url>
        <loc>https://thepurplebook.club/appseccon-2023</loc>
    </url>
    <url>
        <loc>https://thepurplebook.club/state-of-appsec-2023</loc>
    </url>
    <url>
        <loc>https://thepurplebook.club/jtam</loc>
    </url>
    <url>
        <loc>https://thepurplebook.club/appseccon-2022</loc>
    </url>
    <url>
        <loc>https://thepurplebook.club/pbc-connect-black-hat-usa-2024</loc>
    </url>
    <url>
        <loc>https://thepurplebook.club/jtam-with-pierre-mouallem</loc>
    </url>
    <url>
        <loc>https://thepurplebook.club/pbc-connect-owasp-welcome</loc>
    </url>
    <url>
        <loc>https://thepurplebook.club/journey-to-appsec-maturity-with-mayank-joshi</loc>
    </url>
    <url>
        <loc>https://thepurplebook.club/jimmanico-security-rules-for-ai-code-generation</loc>
    </url>
    <url>
        <loc>https://thepurplebook.club/pbc-connect-rsac-2025</loc>
    </url>
    <url>
        <loc>https://thepurplebook.club/women-in-security-pioneering-change-and-inspiring-the-future</loc>
    </url>
    <url>
        <loc>https://thepurplebook.club/journey-to-appsec-maturity-with-vivek-venkatachalam-video</loc>
    </url>
    <url>
        <loc>https://thepurplebook.club/exploring-real-world-challenges-insights-from-product-security-leaders</loc>
    </url>
    <url>
        <loc>https://thepurplebook.club/women-in-security</loc>
    </url>
    <url>
        <loc>https://thepurplebook.club/pbc-connect-rsac-welcome</loc>
    </url>
    <url>
        <loc>https://thepurplebook.club/women-in-security-shaping-the-future-of-appsec</loc>
    </url>
    <url>
        <loc>https://thepurplebook.club/women-in-security-changing-the-future</loc>
    </url>
    <url>
        <loc>https://thepurplebook.club/pbc-connect-rsac-2025-securing-at-the-speed-of-ai</loc>
    </url>
    <url>
        <loc>https://thepurplebook.club/pbc-connect-rsac-2025-women-in-security</loc>
    </url>
    <url>
        <loc>https://thepurplebook.club/pbc-connect-rsac-2025-ai-in-appsec</loc>
    </url>
    <url>
        <loc>https://thepurplebook.club/welcome-to-pbc-connect</loc>
    </url>
    <url>
        <loc>https://thepurplebook.club/exploring-real-world-challenges-product-security-insights</loc>
    </url>
    <url>
        <loc>https://thepurplebook.club/the-cyber-resilience-act-cra</loc>
    </url>
    <url>
        <loc>https://thepurplebook.club/pbc-virtual-ai-in-appsec</loc>
    </url>
    <url>
        <loc>https://thepurplebook.club/from-appsec-to-the-ciso-seat-preparing-for-the-next-big-move</loc>
    </url>
    <url>
        <loc>https://thepurplebook.club/product-security</loc>
    </url>
    <url>
        <loc>https://thepurplebook.club/pbc-connect-black-hat-usa-rethinking-risk</loc>
    </url>
    <url>
        <loc>https://thepurplebook.club/pbc-connect-black-hat-usa-cra</loc>
    </url>
    <url>
        <loc>https://thepurplebook.club/welcome-to-pbc-connect-black-hat-usa-2025</loc>
    </url>
    <url>
        <loc>https://thepurplebook.club/appseccon-2025</loc>
    </url>
    <url>
        <loc>https://thepurplebook.club/ai</loc>
    </url>
    <url>
        <loc>https://thepurplebook.club/appsec-starter-pack-what-i-wish-they-told-me</loc>
    </url>
    <url>
        <loc>https://thepurplebook.club/exceptions-management</loc>
    </url>
    <url>
        <loc>https://thepurplebook.club/security-primer-on-vibe-coding-for-non-developers</loc>
    </url>
    <url>
        <loc>https://thepurplebook.club/pbc-connect-rsac</loc>
    </url>
    <url>
        <loc>https://thepurplebook.club/security-primer-on-vibe-coding-for-developers</loc>
    </url>
    <url>
        <loc>https://thepurplebook.club/state-of-ai-risk-management-2026</loc>
    </url>
    <url>
        <loc>https://thepurplebook.club/pbc-connect-rsac-2026-the-state-of-ai-risk-management</loc>
    </url>
    <url>
        <loc>https://thepurplebook.club/pbc-connect-rsac-2026-preparing-for-the-cyber-resilience-act</loc>
    </url>
    <url>
        <loc>https://thepurplebook.club/pbc-connect-rsac-2026-derisking-your-ai-adoption</loc>
    </url>
    <url>
        <loc>https://thepurplebook.club/ebola-response-to-ai-safety-how-security-engineers-can-change-the-world</loc>
    </url>
    <url>
        <loc>https://thepurplebook.club/claude-mythos-decoded</loc>
    </url>
    <url>
        <loc>https://thepurplebook.club/the-purple-book-chapters/capability-maturity-model-and-security-metrics</loc>
    </url>
    <url>
        <loc>https://thepurplebook.club/the-purple-book-chapters/culture-and-organization</loc>
    </url>
    <url>
        <loc>https://thepurplebook.club/the-purple-book-chapters/foreword</loc>
    </url>
    <url>
        <loc>https://thepurplebook.club/the-purple-book-chapters/governance-risk-and-compliance-framework</loc>
    </url>
    <url>
        <loc>https://thepurplebook.club/the-purple-book-chapters/key-takeaways-and-conclusions</loc>
    </url>
    <url>
        <loc>https://thepurplebook.club/the-purple-book-chapters/making-the-business-case</loc>
    </url>
    <url>
        <loc>https://thepurplebook.club/the-purple-book-chapters/mergers-and-acquisitions</loc>
    </url>
    <url>
        <loc>https://thepurplebook.club/the-purple-book-chapters/process</loc>
    </url>
    <url>
        <loc>https://thepurplebook.club/the-purple-book-chapters/software-supply-chain-security</loc>
    </url>
    <url>
        <loc>https://thepurplebook.club/the-purple-book-chapters/technology</loc>
    </url>
    <url>
        <loc>https://thepurplebook.club/the-purple-book-chapters/the-role-of-ai-in-appsec</loc>
    </url>
    <url>
        <loc>https://thepurplebook.club/the-purple-book-chapters/why-software-security</loc>
    </url>
    <url>
        <loc>https://thepurplebook.club/blog-posts/4-grc-mistakes-that-can-derail-your-risk-management-plan</loc>
    </url>
    <url>
        <loc>https://thepurplebook.club/blog-posts/5-ways-to-make-2022-more-secure</loc>
    </url>
    <url>
        <loc>https://thepurplebook.club/blog-posts/a-non-tech-founders-guide-to-cybersecurity</loc>
    </url>
    <url>
        <loc>https://thepurplebook.club/blog-posts/an-introduction-to-appsec-and-why-its-important-to-you</loc>
    </url>
    <url>
        <loc>https://thepurplebook.club/blog-posts/appsec-moving-the-collective-needle</loc>
    </url>
    <url>
        <loc>https://thepurplebook.club/blog-posts/appsec-programs-tips-on-how-to-implement-them-and-convince-leadership</loc>
    </url>
    <url>
        <loc>https://thepurplebook.club/blog-posts/appsecops-an-astute-business-approach-to-security</loc>
    </url>
    <url>
        <loc>https://thepurplebook.club/blog-posts/architecting-iot-security-in-the-zero-trust-paradigm</loc>
    </url>
    <url>
        <loc>https://thepurplebook.club/blog-posts/avoiding-common-vulnerability-management-errors-cisos-still-make</loc>
    </url>
    <url>
        <loc>https://thepurplebook.club/blog-posts/beefing-up-the-software-supply-chain-for-security</loc>
    </url>
    <url>
        <loc>https://thepurplebook.club/blog-posts/best-practices-to-cyber-proof-your-business-for-holidays</loc>
    </url>
    <url>
        <loc>https://thepurplebook.club/blog-posts/breaking-organizational-silos</loc>
    </url>
    <url>
        <loc>https://thepurplebook.club/blog-posts/bringing-security-to-the-iot</loc>
    </url>
    <url>
        <loc>https://thepurplebook.club/blog-posts/decoding-the-complex-landscape-of-application-security-in-mergers-and-acquisitions</loc>
    </url>
    <url>
        <loc>https://thepurplebook.club/blog-posts/devsecops-four-pillars-for-success</loc>
    </url>
    <url>
        <loc>https://thepurplebook.club/blog-posts/embracing-new-business-frontiers-with-zero-trust-security</loc>
    </url>
    <url>
        <loc>https://thepurplebook.club/blog-posts/exploring-real-world-challenges-insights-from-product-security-leaders</loc>
    </url>
    <url>
        <loc>https://thepurplebook.club/blog-posts/external-attack-surface-management</loc>
    </url>
    <url>
        <loc>https://thepurplebook.club/blog-posts/factorial-separation-of-duties-for-modern-appsec-compliance</loc>
    </url>
    <url>
        <loc>https://thepurplebook.club/blog-posts/four-cybersecurity-trends-in-2023-from-a-digital-transformation-perspective</loc>
    </url>
    <url>
        <loc>https://thepurplebook.club/blog-posts/how-ai-ml-transform-devsecops</loc>
    </url>
    <url>
        <loc>https://thepurplebook.club/blog-posts/how-establishing-guardrails-can-improve-appsec-posture-and-your-holidays</loc>
    </url>
    <url>
        <loc>https://thepurplebook.club/blog-posts/how-to-address-security-threats-in-m-a</loc>
    </url>
    <url>
        <loc>https://thepurplebook.club/blog-posts/how-to-convince-leadership-to-prioritize-security-for-your-business</loc>
    </url>
    <url>
        <loc>https://thepurplebook.club/blog-posts/how-to-improve-collaboration-between-developers-and-security-professionals</loc>
    </url>
    <url>
        <loc>https://thepurplebook.club/blog-posts/how-to-improve-your-appsec-with-security-champions</loc>
    </url>
    <url>
        <loc>https://thepurplebook.club/blog-posts/its-all-in-the-numbers-decoding-appsec</loc>
    </url>
    <url>
        <loc>https://thepurplebook.club/blog-posts/join-us-at-appseccon-2022-the-premier-appsec-conference</loc>
    </url>
    <url>
        <loc>https://thepurplebook.club/blog-posts/movement-to-foster-continuous-security</loc>
    </url>
    <url>
        <loc>https://thepurplebook.club/blog-posts/practice-makes-business-better</loc>
    </url>
    <url>
        <loc>https://thepurplebook.club/blog-posts/product-security-exploring-wireless-security-bluetooth-rf</loc>
    </url>
    <url>
        <loc>https://thepurplebook.club/blog-posts/prompt-engineering-in-cybersecurity-a-strategic-guide-for-security-experts</loc>
    </url>
    <url>
        <loc>https://thepurplebook.club/blog-posts/sdlc-security-controls</loc>
    </url>
    <url>
        <loc>https://thepurplebook.club/blog-posts/security-champions-why-do-we-need-them-and-what-role-do-they-play</loc>
    </url>
    <url>
        <loc>https://thepurplebook.club/blog-posts/security-metrics-that-make-a-difference</loc>
    </url>
    <url>
        <loc>https://thepurplebook.club/blog-posts/shifting-left-and-rethinking-features-for-secure-quality-software</loc>
    </url>
    <url>
        <loc>https://thepurplebook.club/blog-posts/technology-in-an-appsec-maturity-model</loc>
    </url>
    <url>
        <loc>https://thepurplebook.club/blog-posts/the-conundrum-of-security-remediation</loc>
    </url>
    <url>
        <loc>https://thepurplebook.club/blog-posts/the-future-of-application-security-aspm-and-the-rise-of-ai</loc>
    </url>
    <url>
        <loc>https://thepurplebook.club/blog-posts/the-human-side-of-security</loc>
    </url>
    <url>
        <loc>https://thepurplebook.club/blog-posts/the-purple-book-community-the-best-education-resource-in-cybersecurity</loc>
    </url>
    <url>
        <loc>https://thepurplebook.club/blog-posts/unlocking-ais-secrets-safeguarding-against-security-breaches</loc>
    </url>
    <url>
        <loc>https://thepurplebook.club/blog-posts/want-to-triple-your-supply-chain-security</loc>
    </url>
    <url>
        <loc>https://thepurplebook.club/blog-posts/what-are-the-top-practices-to-implement-and-transition-to-appsec</loc>
    </url>
    <url>
        <loc>https://thepurplebook.club/blog-posts/what-is-the-purple-book-communitys-scalable-software-security-maturity-model-s3m2</loc>
    </url>
    <url>
        <loc>https://thepurplebook.club/blog-posts/what-parallels-can-we-draw-from-the-nfl-to-take-a-risk-based-approach-for-appsec</loc>
    </url>
    <url>
        <loc>https://thepurplebook.club/blog-posts/why-cybersecurity-is-crucial-for-m-as</loc>
    </url>
    <url>
        <loc>https://thepurplebook.club/blog-posts/why-diversity-is-needed-in-security</loc>
    </url>
    <url>
        <loc>https://thepurplebook.club/blog-posts/why-maturity-models-are-needed-in-the-first-place</loc>
    </url>
    <url>
        <loc>https://thepurplebook.club/blog-posts/why-your-business-needs-to-evolve-to-devsecops-right-now</loc>
    </url>
    <url>
        <loc>https://thepurplebook.club/blog-posts/why-your-security-strategy-must-evolve</loc>
    </url>
    <url>
        <loc>https://thepurplebook.club/featured-topics/ai</loc>
    </url>
    <url>
        <loc>https://thepurplebook.club/featured-topics/c-suite-view</loc>
    </url>
    <url>
        <loc>https://thepurplebook.club/featured-topics/cloud-security</loc>
    </url>
    <url>
        <loc>https://thepurplebook.club/featured-topics/devsecops</loc>
    </url>
    <url>
        <loc>https://thepurplebook.club/featured-topics/mergers-and-acquisitions</loc>
    </url>
    <url>
        <loc>https://thepurplebook.club/featured-topics/protecting-data</loc>
    </url>
    <url>
        <loc>https://thepurplebook.club/featured-topics/risk-management</loc>
    </url>
    <url>
        <loc>https://thepurplebook.club/featured-topics/s3m2</loc>
    </url>
    <url>
        <loc>https://thepurplebook.club/featured-topics/software-security</loc>
    </url>
    <url>
        <loc>https://thepurplebook.club/featured-topics/zero-trust</loc>
    </url>
    <url>
        <loc>https://thepurplebook.club/resource-categories/members-publications</loc>
    </url>
    <url>
        <loc>https://thepurplebook.club/resource-categories/mentoring</loc>
    </url>
    <url>
        <loc>https://thepurplebook.club/resource-categories/research</loc>
    </url>
    <url>
        <loc>https://thepurplebook.club/resource-categories/sessions</loc>
    </url>
    <url>
        <loc>https://thepurplebook.club/resource-categories/templates</loc>
    </url>
    <url>
        <loc>https://thepurplebook.club/resource-categories/videos</loc>
    </url>
    <url>
        <loc>https://thepurplebook.club/appseccon-2023/day-1-session-1</loc>
    </url>
    <url>
        <loc>https://thepurplebook.club/appseccon-2023/day-1-session-10</loc>
    </url>
    <url>
        <loc>https://thepurplebook.club/appseccon-2023/day-1-session-11</loc>
    </url>
    <url>
        <loc>https://thepurplebook.club/appseccon-2023/day-1-session-12</loc>
    </url>
    <url>
        <loc>https://thepurplebook.club/appseccon-2023/day-1-session-2</loc>
    </url>
    <url>
        <loc>https://thepurplebook.club/appseccon-2023/day-1-session-3</loc>
    </url>
    <url>
        <loc>https://thepurplebook.club/appseccon-2023/day-1-session-4</loc>
    </url>
    <url>
        <loc>https://thepurplebook.club/appseccon-2023/day-1-session-5</loc>
    </url>
    <url>
        <loc>https://thepurplebook.club/appseccon-2023/day-1-session-6</loc>
    </url>
    <url>
        <loc>https://thepurplebook.club/appseccon-2023/day-1-session-7</loc>
    </url>
    <url>
        <loc>https://thepurplebook.club/appseccon-2023/day-1-session-8</loc>
    </url>
    <url>
        <loc>https://thepurplebook.club/appseccon-2023/day-1-session-9</loc>
    </url>
    <url>
        <loc>https://thepurplebook.club/appseccon-2023/day-2-session-1</loc>
    </url>
    <url>
        <loc>https://thepurplebook.club/appseccon-2023/day-2-session-2</loc>
    </url>
    <url>
        <loc>https://thepurplebook.club/appseccon-2023/day-2-session-3</loc>
    </url>
    <url>
        <loc>https://thepurplebook.club/appseccon-2023/day-2-session-4</loc>
    </url>
    <url>
        <loc>https://thepurplebook.club/appseccon-2023/day-2-session-5</loc>
    </url>
    <url>
        <loc>https://thepurplebook.club/appseccon-2023/day-2-session-6</loc>
    </url>
    <url>
        <loc>https://thepurplebook.club/appseccon-2023/day-2-session-7</loc>
    </url>
    <url>
        <loc>https://thepurplebook.club/appseccon-2023/day-2-session-8</loc>
    </url>
    <url>
        <loc>https://thepurplebook.club/videos/ciso-panel-managing-risk-as-the-world-embraces-ai</loc>
    </url>
    <url>
        <loc>https://thepurplebook.club/videos/francis-odum-the-rise-of-application-security-posture-management</loc>
    </url>
    <url>
        <loc>https://thepurplebook.club/videos/journey-to-appsec-maturity-with-pierre-mouallem</loc>
    </url>
    <url>
        <loc>https://thepurplebook.club/videos/journey-to-appsec-maturity-with-renan-dias</loc>
    </url>
    <url>
        <loc>https://thepurplebook.club/videos/maria-schwenger-ai-implementations-and-putting-guardrails-around-them</loc>
    </url>
    <url>
        <loc>https://thepurplebook.club/videos/owasp-top-10-for-llms-and-generative-ai-apps</loc>
    </url>
    <url>
        <loc>https://thepurplebook.club/videos/security-metrics-that-matter-with-tanya-janca</loc>
    </url>
    <url>
        <loc>https://thepurplebook.club/job-roles/application-security-engineer</loc>
    </url>
    <url>
        <loc>https://thepurplebook.club/job-roles/application-security-engineering-manager</loc>
    </url>
    <url>
        <loc>https://thepurplebook.club/job-roles/business-systems-analyst</loc>
    </url>
    <url>
        <loc>https://thepurplebook.club/job-roles/customer-trust-lead</loc>
    </url>
    <url>
        <loc>https://thepurplebook.club/job-roles/data-center-physical-security-lead</loc>
    </url>
    <url>
        <loc>https://thepurplebook.club/job-roles/emea-security-operations-coordinator</loc>
    </url>
    <url>
        <loc>https://thepurplebook.club/job-roles/engineering-manager-cloud-security</loc>
    </url>
    <url>
        <loc>https://thepurplebook.club/job-roles/event-security-program-coordinator</loc>
    </url>
    <url>
        <loc>https://thepurplebook.club/job-roles/head-of-protective-services</loc>
    </url>
    <url>
        <loc>https://thepurplebook.club/job-roles/it-systems-engineer</loc>
    </url>
    <url>
        <loc>https://thepurplebook.club/job-roles/manager-it-support-operations</loc>
    </url>
    <url>
        <loc>https://thepurplebook.club/job-roles/security-development-project-specialist</loc>
    </url>
    <url>
        <loc>https://thepurplebook.club/job-roles/security-engineer-detection-response</loc>
    </url>
    <url>
        <loc>https://thepurplebook.club/job-roles/security-engineer-detection-response-1bce5</loc>
    </url>
    <url>
        <loc>https://thepurplebook.club/job-roles/security-engineer-operating-systems</loc>
    </url>
    <url>
        <loc>https://thepurplebook.club/job-roles/security-grc-specialist</loc>
    </url>
    <url>
        <loc>https://thepurplebook.club/job-roles/security-grc-specialist-public-sector</loc>
    </url>
    <url>
        <loc>https://thepurplebook.club/job-roles/security-software-engineer-dr-platform</loc>
    </url>
    <url>
        <loc>https://thepurplebook.club/job-roles/senior-software-security-engineer</loc>
    </url>
    <url>
        <loc>https://thepurplebook.club/job-roles/senior-software-security-engineer-56593</loc>
    </url>
    <url>
        <loc>https://thepurplebook.club/job-roles/software-security-engineer</loc>
    </url>
    <url>
        <loc>https://thepurplebook.club/job-roles/systems-integrity-security-architect</loc>
    </url>
    <url>
        <loc>https://thepurplebook.club/news/purple-book-community-and-armorcode-announce-new-research-the-rise-of-the-appsec-leader</loc>
    </url>
    <url>
        <loc>https://thepurplebook.club/news/the-purple-book-community-releases-new-research-state-of-ai-risk-management-2026</loc>
    </url>
</urlset>