<?xml version="1.0" encoding="UTF-8"?>
<urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9" xmlns:xhtml="http://www.w3.org/1999/xhtml">
    <url>
        <loc>https://www.threatmodelingconnect.com</loc>
    </url>
    <url>
        <loc>https://www.threatmodelingconnect.com/events</loc>
    </url>
    <url>
        <loc>https://www.threatmodelingconnect.com/about-us</loc>
    </url>
    <url>
        <loc>https://www.threatmodelingconnect.com/hackathon</loc>
    </url>
    <url>
        <loc>https://www.threatmodelingconnect.com/resources/all-resources</loc>
    </url>
    <url>
        <loc>https://www.threatmodelingconnect.com/resources/guides</loc>
    </url>
    <url>
        <loc>https://www.threatmodelingconnect.com/resources/blogs</loc>
    </url>
    <url>
        <loc>https://www.threatmodelingconnect.com/resources/on-demand</loc>
    </url>
    <url>
        <loc>https://www.threatmodelingconnect.com/community</loc>
    </url>
    <url>
        <loc>https://www.threatmodelingconnect.com/resources/threat-model-collections</loc>
    </url>
    <url>
        <loc>https://www.threatmodelingconnect.com/join-the-community</loc>
    </url>
    <url>
        <loc>https://www.threatmodelingconnect.com/legal-notice-website-terms-of-service</loc>
    </url>
    <url>
        <loc>https://www.threatmodelingconnect.com/community-guidelines</loc>
    </url>
    <url>
        <loc>https://www.threatmodelingconnect.com/tmc-local-chapters</loc>
    </url>
    <url>
        <loc>https://www.threatmodelingconnect.com/state-of-threat-modeling-2024-25</loc>
    </url>
    <url>
        <loc>https://www.threatmodelingconnect.com/european-regional-development-funding</loc>
    </url>
    <url>
        <loc>https://www.threatmodelingconnect.com/global-threat-model-together-day</loc>
    </url>
    <url>
        <loc>https://www.threatmodelingconnect.com/state-of-threat-modeling-2025-2026</loc>
    </url>
    <url>
        <loc>https://www.threatmodelingconnect.com/events/an-object-oriented-approach-to-threat-modeling</loc>
    </url>
    <url>
        <loc>https://www.threatmodelingconnect.com/events/automating-threat-modeling-and-ai-solutions</loc>
    </url>
    <url>
        <loc>https://www.threatmodelingconnect.com/events/building-a-security-champion-program</loc>
    </url>
    <url>
        <loc>https://www.threatmodelingconnect.com/events/create-your-first-threat-model-using-a-spreadsheet</loc>
    </url>
    <url>
        <loc>https://www.threatmodelingconnect.com/events/developing-a-threat-modeling-mindset-a-threat-modeling-101-workshop</loc>
    </url>
    <url>
        <loc>https://www.threatmodelingconnect.com/events/high-assurance-threat-modeling-2</loc>
    </url>
    <url>
        <loc>https://www.threatmodelingconnect.com/events/incremental-threat-modeling</loc>
    </url>
    <url>
        <loc>https://www.threatmodelingconnect.com/events/its-game-time-elevation-of-privilege-byte-club</loc>
    </url>
    <url>
        <loc>https://www.threatmodelingconnect.com/events/judges-tell-all---a-look-back-and-forward-at-the-threat-modeling-hackathon</loc>
    </url>
    <url>
        <loc>https://www.threatmodelingconnect.com/events/live-at-threatmodcon-dc-sotm-deep-dive-whats-next</loc>
    </url>
    <url>
        <loc>https://www.threatmodelingconnect.com/events/london-meet-up</loc>
    </url>
    <url>
        <loc>https://www.threatmodelingconnect.com/events/meta-threat-modeling</loc>
    </url>
    <url>
        <loc>https://www.threatmodelingconnect.com/events/open-fair-and-the-roi-for-threat-modeling</loc>
    </url>
    <url>
        <loc>https://www.threatmodelingconnect.com/events/owasp-global-appsec-2024-sf</loc>
    </url>
    <url>
        <loc>https://www.threatmodelingconnect.com/events/privacy-threat-modeling-linddun-in-action</loc>
    </url>
    <url>
        <loc>https://www.threatmodelingconnect.com/events/scaling-a-security-champion-program</loc>
    </url>
    <url>
        <loc>https://www.threatmodelingconnect.com/events/scoping-for-threat-modeling</loc>
    </url>
    <url>
        <loc>https://www.threatmodelingconnect.com/events/security-threat-modeling-stride-in-action</loc>
    </url>
    <url>
        <loc>https://www.threatmodelingconnect.com/events/sotm-release-first-look-at-the-findings</loc>
    </url>
    <url>
        <loc>https://www.threatmodelingconnect.com/events/threat-modeling-connect-rsa-2025-meetup</loc>
    </url>
    <url>
        <loc>https://www.threatmodelingconnect.com/events/threat-modeling-hackathon-2025</loc>
    </url>
    <url>
        <loc>https://www.threatmodelingconnect.com/events/threat-modeling-in-the-age-of-ai</loc>
    </url>
    <url>
        <loc>https://www.threatmodelingconnect.com/events/threat-modeling-in-the-age-of-ai-threat-modeling-hackathon-spring-2024-keynote</loc>
    </url>
    <url>
        <loc>https://www.threatmodelingconnect.com/events/threat-modeling-kata</loc>
    </url>
    <url>
        <loc>https://www.threatmodelingconnect.com/events/threat-modeling-maturity-model-unlocking-business-value</loc>
    </url>
    <url>
        <loc>https://www.threatmodelingconnect.com/events/threat-vs-mitigation-which-to-prioritize-and-how</loc>
    </url>
    <url>
        <loc>https://www.threatmodelingconnect.com/events/threatmodcon-2023-dc</loc>
    </url>
    <url>
        <loc>https://www.threatmodelingconnect.com/events/threatmodcon-2023-retrospective</loc>
    </url>
    <url>
        <loc>https://www.threatmodelingconnect.com/events/threatmodcon-2023-retrospective-2</loc>
    </url>
    <url>
        <loc>https://www.threatmodelingconnect.com/events/threatmodcon-2024-san-francisco</loc>
    </url>
    <url>
        <loc>https://www.threatmodelingconnect.com/events/threatmodcon-2025-barcelona</loc>
    </url>
    <url>
        <loc>https://www.threatmodelingconnect.com/events/threatmodcon-2025-washington-d-c</loc>
    </url>
    <url>
        <loc>https://www.threatmodelingconnect.com/events/tmc-barcelona-meetup</loc>
    </url>
    <url>
        <loc>https://www.threatmodelingconnect.com/events/tmc-dach-owasp-cumulus-und-sicherheitsspiele---threat-modeling-feierabend</loc>
    </url>
    <url>
        <loc>https://www.threatmodelingconnect.com/events/tmc-dach-threat-modeling-feierabend-online-dating-im-tinder-stil</loc>
    </url>
    <url>
        <loc>https://www.threatmodelingconnect.com/events/tmc-dach-threat-modeling-fur-alle-threat-modeling-lagerfeuer</loc>
    </url>
    <url>
        <loc>https://www.threatmodelingconnect.com/events/tmc-global-meetup-success-and-metrics-for-threat-modeling</loc>
    </url>
    <url>
        <loc>https://www.threatmodelingconnect.com/events/tmc-london-meetup-the-c-suite-buy-in-for-threat-modelling</loc>
    </url>
    <url>
        <loc>https://www.threatmodelingconnect.com/events/tmc-london-meetup-threat-modeling-fundamentals-workshop</loc>
    </url>
    <url>
        <loc>https://www.threatmodelingconnect.com/events/tmc-seattle-meetup-the-launch-event</loc>
    </url>
    <url>
        <loc>https://www.threatmodelingconnect.com/events/tmc-singapore-chapter-x-div0-tmq-launch-and-meetup</loc>
    </url>
    <url>
        <loc>https://www.threatmodelingconnect.com/events/tmc-tokyo-local-meetup-threat-modeling-night-8</loc>
    </url>
    <url>
        <loc>https://www.threatmodelingconnect.com/events/tmc-tokyo-local-meetup-threat-modeling-night-9</loc>
    </url>
    <url>
        <loc>https://www.threatmodelingconnect.com/events/tmc-tokyo-meetup</loc>
    </url>
    <url>
        <loc>https://www.threatmodelingconnect.com/events/tmc-toronto-meetup---the-launch-event</loc>
    </url>
    <url>
        <loc>https://www.threatmodelingconnect.com/events/tmc-toronto-meetup-risks-with-agentic-ai</loc>
    </url>
    <url>
        <loc>https://www.threatmodelingconnect.com/events/tmc-toronto-meetup-unfolding-attack-surfaces</loc>
    </url>
    <url>
        <loc>https://www.threatmodelingconnect.com/events/tmc-toronto-meetup-unfolding-attack-surfaces-2</loc>
    </url>
    <url>
        <loc>https://www.threatmodelingconnect.com/events/tmc-wales-midlands-launch-event---threat-modelling-is-easy-right</loc>
    </url>
    <url>
        <loc>https://www.threatmodelingconnect.com/events/tmc-wien---the-launch-event</loc>
    </url>
    <url>
        <loc>https://www.threatmodelingconnect.com/blog/a-look-back-at-threatmodcon-2025-barcelona-slides-inside</loc>
    </url>
    <url>
        <loc>https://www.threatmodelingconnect.com/blog/becoming-the-martian-how-to-scale-threat-modeling-in-your-organization</loc>
    </url>
    <url>
        <loc>https://www.threatmodelingconnect.com/blog/building-devsecops-culture-no-one-said-it-would-be-easy-without-a-threat-modeling-program</loc>
    </url>
    <url>
        <loc>https://www.threatmodelingconnect.com/blog/defining-threat-modeling-scope-a-pragmatic-philosophy</loc>
    </url>
    <url>
        <loc>https://www.threatmodelingconnect.com/blog/exceptional-threat-modeling</loc>
    </url>
    <url>
        <loc>https://www.threatmodelingconnect.com/blog/forget-threat-modeling</loc>
    </url>
    <url>
        <loc>https://www.threatmodelingconnect.com/blog/global-threat-model-together-day-2025-what-we-modeled-what-we-learned</loc>
    </url>
    <url>
        <loc>https://www.threatmodelingconnect.com/blog/insights-from-threatmodcon-2024-lisbon</loc>
    </url>
    <url>
        <loc>https://www.threatmodelingconnect.com/blog/introducing-the-new-threat-modeling-connect-forum-your-new-space-for-collaboration</loc>
    </url>
    <url>
        <loc>https://www.threatmodelingconnect.com/blog/introducing-threatmodcon-2025-washington-d-c-conference-buddy-program</loc>
    </url>
    <url>
        <loc>https://www.threatmodelingconnect.com/blog/is-threat-modeling-worth-your-time-and-effort</loc>
    </url>
    <url>
        <loc>https://www.threatmodelingconnect.com/blog/my-experience-at-threatmodcon-2024</loc>
    </url>
    <url>
        <loc>https://www.threatmodelingconnect.com/blog/q-a-with-dave-soldera-on-high-assurance-threat-modeling</loc>
    </url>
    <url>
        <loc>https://www.threatmodelingconnect.com/blog/recap-on-threatmodcon-2023-the-first-threat-modeling-conference-ever</loc>
    </url>
    <url>
        <loc>https://www.threatmodelingconnect.com/blog/recap-threatmodcon-2024-lisbon</loc>
    </url>
    <url>
        <loc>https://www.threatmodelingconnect.com/blog/selling-the-yellow-cow-how-to-sell-threat-modeling-to-your-leadership-team-beyond-its-security-benefits</loc>
    </url>
    <url>
        <loc>https://www.threatmodelingconnect.com/blog/shostacks-four-question-framework-for-threat-modeling</loc>
    </url>
    <url>
        <loc>https://www.threatmodelingconnect.com/blog/the-first-tmc-tokyo-meetup</loc>
    </url>
    <url>
        <loc>https://www.threatmodelingconnect.com/blog/the-hitchhikers-guide-for-failing-threat-modeling</loc>
    </url>
    <url>
        <loc>https://www.threatmodelingconnect.com/blog/the-inaugural-community-driven-state-of-threat-modeling-report</loc>
    </url>
    <url>
        <loc>https://www.threatmodelingconnect.com/blog/the-inaugural-community-driven-state-of-threat-modeling-report-1</loc>
    </url>
    <url>
        <loc>https://www.threatmodelingconnect.com/blog/the-value-of-threat-modeling-three-data-points-to-consider</loc>
    </url>
    <url>
        <loc>https://www.threatmodelingconnect.com/blog/threat-modeling-for-kids-keep-your-family-safe-online</loc>
    </url>
    <url>
        <loc>https://www.threatmodelingconnect.com/blog/threat-modeling-for-simplicity</loc>
    </url>
    <url>
        <loc>https://www.threatmodelingconnect.com/blog/threat-modeling-hackathon-finalist-2023-threat-model-02</loc>
    </url>
    <url>
        <loc>https://www.threatmodelingconnect.com/blog/threat-modeling-hackathon-finalist-2023-threat-model-03</loc>
    </url>
    <url>
        <loc>https://www.threatmodelingconnect.com/blog/threat-modeling-hackathon-winner-2023</loc>
    </url>
    <url>
        <loc>https://www.threatmodelingconnect.com/blog/threat-modeling-hackathon-winner-2024</loc>
    </url>
    <url>
        <loc>https://www.threatmodelingconnect.com/blog/threat-modeling-in-its-right-place</loc>
    </url>
    <url>
        <loc>https://www.threatmodelingconnect.com/blog/threatmodcon-2024-san-francisco-highlights-slides-and-whats-next</loc>
    </url>
    <url>
        <loc>https://www.threatmodelingconnect.com/blog/tmcs-top-5-threat-modeling-resources-of-2025</loc>
    </url>
    <url>
        <loc>https://www.threatmodelingconnect.com/blog/top-10-tips-for-building-an-enterprise-threat-modeling-program</loc>
    </url>
    <url>
        <loc>https://www.threatmodelingconnect.com/blog/what-a-year-tmc-2025-in-review-and-whats-next-in-2026</loc>
    </url>
    <url>
        <loc>https://www.threatmodelingconnect.com/blog/why-and-when-should-we-threat-model</loc>
    </url>
    <url>
        <loc>https://www.threatmodelingconnect.com/guides/a-guide-to-embedding-threat-modeling-in-risk-management-part-1</loc>
    </url>
    <url>
        <loc>https://www.threatmodelingconnect.com/guides/a-step-by-step-guide-to-create-your-first-threat-model-template-included</loc>
    </url>
    <url>
        <loc>https://www.threatmodelingconnect.com/guides/embedding-threat-modeling-in-the-devops-lifecycle-part-2-risk-management</loc>
    </url>
    <url>
        <loc>https://www.threatmodelingconnect.com/guides/embedding-threat-modelling-in-the-devops-lifecycle-part-1-backlog-management</loc>
    </url>
    <url>
        <loc>https://www.threatmodelingconnect.com/member-spotlight/audrey-long</loc>
    </url>
    <url>
        <loc>https://www.threatmodelingconnect.com/member-spotlight/joshua-holmes</loc>
    </url>
    <url>
        <loc>https://www.threatmodelingconnect.com/member-spotlight/luis-servin</loc>
    </url>
    <url>
        <loc>https://www.threatmodelingconnect.com/threat-model-collections/featured-threat-model-01</loc>
    </url>
    <url>
        <loc>https://www.threatmodelingconnect.com/threat-model-collections/featured-threat-model-02</loc>
    </url>
    <url>
        <loc>https://www.threatmodelingconnect.com/threat-model-collections/featured-threat-model-03</loc>
    </url>
    <url>
        <loc>https://www.threatmodelingconnect.com/threat-model-collections/featured-threat-model-04</loc>
    </url>
    <url>
        <loc>https://www.threatmodelingconnect.com/threat-model-collections/featured-threat-model-05</loc>
    </url>
    <url>
        <loc>https://www.threatmodelingconnect.com/threat-model-collections/featured-threat-model-06</loc>
    </url>
    <url>
        <loc>https://www.threatmodelingconnect.com/threat-model-collections/featured-threat-model-07</loc>
    </url>
    <url>
        <loc>https://www.threatmodelingconnect.com/chapter/tmc-bangalore</loc>
    </url>
    <url>
        <loc>https://www.threatmodelingconnect.com/chapter/tmc-barcelona</loc>
    </url>
    <url>
        <loc>https://www.threatmodelingconnect.com/chapter/tmc-benelux</loc>
    </url>
    <url>
        <loc>https://www.threatmodelingconnect.com/chapter/tmc-dach</loc>
    </url>
    <url>
        <loc>https://www.threatmodelingconnect.com/chapter/tmc-lima</loc>
    </url>
    <url>
        <loc>https://www.threatmodelingconnect.com/chapter/tmc-london</loc>
    </url>
    <url>
        <loc>https://www.threatmodelingconnect.com/chapter/tmc-nyc</loc>
    </url>
    <url>
        <loc>https://www.threatmodelingconnect.com/chapter/tmc-okc</loc>
    </url>
    <url>
        <loc>https://www.threatmodelingconnect.com/chapter/tmc-raleigh-durham</loc>
    </url>
    <url>
        <loc>https://www.threatmodelingconnect.com/chapter/tmc-seattle</loc>
    </url>
    <url>
        <loc>https://www.threatmodelingconnect.com/chapter/tmc-singapore</loc>
    </url>
    <url>
        <loc>https://www.threatmodelingconnect.com/chapter/tmc-tokyo</loc>
    </url>
    <url>
        <loc>https://www.threatmodelingconnect.com/chapter/tmc-toronto</loc>
    </url>
    <url>
        <loc>https://www.threatmodelingconnect.com/chapter/tmc-wales-mids</loc>
    </url>
    <url>
        <loc>https://www.threatmodelingconnect.com/chapter/tmc-wien</loc>
    </url>
</urlset>