<?xml version="1.0" encoding="UTF-8"?><?xml-stylesheet type="text/xsl" href="//adqtechnologies.pl/wp-content/plugins/wordpress-seo/css/main-sitemap.xsl"?>
<urlset xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xmlns:image="http://www.google.com/schemas/sitemap-image/1.1" xsi:schemaLocation="http://www.sitemaps.org/schemas/sitemap/0.9 http://www.sitemaps.org/schemas/sitemap/0.9/sitemap.xsd http://www.google.com/schemas/sitemap-image/1.1 http://www.google.com/schemas/sitemap-image/1.1/sitemap-image.xsd" xmlns="http://www.sitemaps.org/schemas/sitemap/0.9">
	<url>
		<loc>https://adqtechnologies.pl/en/tag/24-7-soc/</loc>
		<lastmod>2026-04-01T10:16:47+00:00</lastmod>
	</url>
	<url>
		<loc>https://adqtechnologies.pl/en/tag/adq-technologies-en/</loc>
		<lastmod>2026-04-01T10:16:47+00:00</lastmod>
	</url>
	<url>
		<loc>https://adqtechnologies.pl/tag/adq-technologies/</loc>
		<lastmod>2026-04-20T21:06:30+00:00</lastmod>
	</url>
	<url>
		<loc>https://adqtechnologies.pl/en/tag/ai-in-cybersecurity/</loc>
		<lastmod>2026-03-23T18:43:44+00:00</lastmod>
	</url>
	<url>
		<loc>https://adqtechnologies.pl/tag/ai-w-cyberbezpieczenstwie/</loc>
		<lastmod>2026-04-20T20:59:54+00:00</lastmod>
	</url>
	<url>
		<loc>https://adqtechnologies.pl/tag/bezpieczenstwo-infrastruktury-krytycznej/</loc>
		<lastmod>2026-04-20T20:59:54+00:00</lastmod>
	</url>
	<url>
		<loc>https://adqtechnologies.pl/tag/bezpieczenstwo-lancucha-dostaw/</loc>
		<lastmod>2026-04-20T20:59:54+00:00</lastmod>
	</url>
	<url>
		<loc>https://adqtechnologies.pl/tag/bezpieczenstwo-ot/</loc>
		<lastmod>2026-04-20T20:59:54+00:00</lastmod>
	</url>
	<url>
		<loc>https://adqtechnologies.pl/tag/bezpieczenstwo-sieci/</loc>
		<lastmod>2026-04-20T21:06:30+00:00</lastmod>
	</url>
	<url>
		<loc>https://adqtechnologies.pl/en/tag/chp-security/</loc>
		<lastmod>2026-04-07T19:19:34+00:00</lastmod>
	</url>
	<url>
		<loc>https://adqtechnologies.pl/tag/ciagle-szkolenia-bezpieczenstwa/</loc>
		<lastmod>2026-04-20T20:57:31+00:00</lastmod>
	</url>
	<url>
		<loc>https://adqtechnologies.pl/en/tag/commercial-companies-code/</loc>
		<lastmod>2026-03-23T18:43:44+00:00</lastmod>
	</url>
	<url>
		<loc>https://adqtechnologies.pl/en/tag/compliance-en/</loc>
		<lastmod>2026-03-23T18:43:44+00:00</lastmod>
	</url>
	<url>
		<loc>https://adqtechnologies.pl/tag/compliance/</loc>
		<lastmod>2026-04-20T21:01:57+00:00</lastmod>
	</url>
	<url>
		<loc>https://adqtechnologies.pl/en/tag/corporate-cybersecurity/</loc>
		<lastmod>2026-03-23T18:43:44+00:00</lastmod>
	</url>
	<url>
		<loc>https://adqtechnologies.pl/en/tag/corporate-governance/</loc>
		<lastmod>2026-03-23T18:43:44+00:00</lastmod>
	</url>
	<url>
		<loc>https://adqtechnologies.pl/en/tag/critical-infrastructure/</loc>
		<lastmod>2026-04-07T19:19:34+00:00</lastmod>
	</url>
	<url>
		<loc>https://adqtechnologies.pl/en/tag/critical-infrastructure-security/</loc>
		<lastmod>2026-03-23T18:43:44+00:00</lastmod>
	</url>
	<url>
		<loc>https://adqtechnologies.pl/tag/cyber-kill-chain/</loc>
		<lastmod>2026-04-20T21:06:30+00:00</lastmod>
	</url>
	<url>
		<loc>https://adqtechnologies.pl/en/tag/cyber-kill-chain-en/</loc>
		<lastmod>2026-04-01T10:16:47+00:00</lastmod>
	</url>
	<url>
		<loc>https://adqtechnologies.pl/en/tag/cyber-resilience-en/</loc>
		<lastmod>2026-04-07T19:19:34+00:00</lastmod>
	</url>
	<url>
		<loc>https://adqtechnologies.pl/tag/cyber-resilience/</loc>
		<lastmod>2026-04-20T20:56:20+00:00</lastmod>
	</url>
	<url>
		<loc>https://adqtechnologies.pl/en/tag/cyber-risk-management/</loc>
		<lastmod>2026-03-23T18:43:44+00:00</lastmod>
	</url>
	<url>
		<loc>https://adqtechnologies.pl/tag/cyberatak/</loc>
		<lastmod>2026-04-20T21:06:30+00:00</lastmod>
	</url>
	<url>
		<loc>https://adqtechnologies.pl/en/tag/cyberattack/</loc>
		<lastmod>2026-04-01T10:16:47+00:00</lastmod>
	</url>
	<url>
		<loc>https://adqtechnologies.pl/tag/cyberbezpieczenstwo/</loc>
		<lastmod>2026-03-23T18:43:22+00:00</lastmod>
	</url>
	<url>
		<loc>https://adqtechnologies.pl/tag/cyberbezpieczenstwo-cieplownictwa/</loc>
		<lastmod>2026-04-20T20:56:20+00:00</lastmod>
	</url>
	<url>
		<loc>https://adqtechnologies.pl/tag/cyberbezpieczenstwo-energetyki/</loc>
		<lastmod>2026-04-20T20:59:54+00:00</lastmod>
	</url>
	<url>
		<loc>https://adqtechnologies.pl/tag/cyberbezpieczenstwo-spolki/</loc>
		<lastmod>2026-04-20T21:01:57+00:00</lastmod>
	</url>
	<url>
		<loc>https://adqtechnologies.pl/tag/cyberhigiena/</loc>
		<lastmod>2026-03-23T18:43:22+00:00</lastmod>
	</url>
	<url>
		<loc>https://adqtechnologies.pl/en/tag/cybersecurity-readiness/</loc>
		<lastmod>2026-03-23T18:43:44+00:00</lastmod>
	</url>
	<url>
		<loc>https://adqtechnologies.pl/en/tag/district-heating-cybersecurity/</loc>
		<lastmod>2026-04-07T19:19:34+00:00</lastmod>
	</url>
	<url>
		<loc>https://adqtechnologies.pl/en/tag/domain-spoofing/</loc>
		<lastmod>2026-03-23T18:43:44+00:00</lastmod>
	</url>
	<url>
		<loc>https://adqtechnologies.pl/tag/dostawca-wysokiego-ryzyka/</loc>
		<lastmod>2026-04-20T20:54:23+00:00</lastmod>
	</url>
	<url>
		<loc>https://adqtechnologies.pl/tag/elektrocieplownie/</loc>
		<lastmod>2026-04-20T20:56:20+00:00</lastmod>
	</url>
	<url>
		<loc>https://adqtechnologies.pl/en/tag/endpoint-protection/</loc>
		<lastmod>2026-04-01T10:16:47+00:00</lastmod>
	</url>
	<url>
		<loc>https://adqtechnologies.pl/tag/energetyka/</loc>
		<lastmod>2026-04-20T20:56:20+00:00</lastmod>
	</url>
	<url>
		<loc>https://adqtechnologies.pl/en/tag/energy-cybersecurity/</loc>
		<lastmod>2026-03-23T18:43:44+00:00</lastmod>
	</url>
	<url>
		<loc>https://adqtechnologies.pl/en/tag/energy-sector/</loc>
		<lastmod>2026-04-07T19:19:34+00:00</lastmod>
	</url>
	<url>
		<loc>https://adqtechnologies.pl/tag/fortinet-report-pdf/</loc>
		<lastmod>2026-04-20T20:57:31+00:00</lastmod>
	</url>
	<url>
		<loc>https://adqtechnologies.pl/tag/gov-pl/</loc>
		<lastmod>2026-03-23T18:43:22+00:00</lastmod>
	</url>
	<url>
		<loc>https://adqtechnologies.pl/en/tag/government-impersonation-phishing/</loc>
		<lastmod>2026-03-23T18:43:44+00:00</lastmod>
	</url>
	<url>
		<loc>https://adqtechnologies.pl/en/tag/high-risk-supplier/</loc>
		<lastmod>2026-03-23T18:43:44+00:00</lastmod>
	</url>
	<url>
		<loc>https://adqtechnologies.pl/en/tag/ict-supply-chain-security/</loc>
		<lastmod>2026-03-23T18:43:44+00:00</lastmod>
	</url>
	<url>
		<loc>https://adqtechnologies.pl/en/tag/incident-response/</loc>
		<lastmod>2026-04-01T10:16:47+00:00</lastmod>
	</url>
	<url>
		<loc>https://adqtechnologies.pl/tag/infrastruktura-krytyczna/</loc>
		<lastmod>2026-04-20T20:56:20+00:00</lastmod>
	</url>
	<url>
		<loc>https://adqtechnologies.pl/en/tag/isms/</loc>
		<lastmod>2026-03-23T18:43:44+00:00</lastmod>
	</url>
	<url>
		<loc>https://adqtechnologies.pl/en/tag/it-ot-segmentation/</loc>
		<lastmod>2026-04-07T19:19:34+00:00</lastmod>
	</url>
	<url>
		<loc>https://adqtechnologies.pl/tag/ksc/</loc>
		<lastmod>2026-04-20T20:57:31+00:00</lastmod>
	</url>
	<url>
		<loc>https://adqtechnologies.pl/en/tag/ksc-amendment-nis2/</loc>
		<lastmod>2026-03-23T18:43:44+00:00</lastmod>
	</url>
	<url>
		<loc>https://adqtechnologies.pl/tag/ksh/</loc>
		<lastmod>2026-04-20T21:01:57+00:00</lastmod>
	</url>
	<url>
		<loc>https://adqtechnologies.pl/tag/lancuch-dostaw/</loc>
		<lastmod>2026-03-23T18:43:22+00:00</lastmod>
	</url>
	<url>
		<loc>https://adqtechnologies.pl/tag/lancuch-dostaw-ict/</loc>
		<lastmod>2026-04-20T20:54:23+00:00</lastmod>
	</url>
	<url>
		<loc>https://adqtechnologies.pl/en/tag/link-verification/</loc>
		<lastmod>2026-03-23T18:43:44+00:00</lastmod>
	</url>
	<url>
		<loc>https://adqtechnologies.pl/en/tag/malicious-links/</loc>
		<lastmod>2026-03-23T18:43:44+00:00</lastmod>
	</url>
	<url>
		<loc>https://adqtechnologies.pl/tag/mobywatel/</loc>
		<lastmod>2026-03-23T18:43:22+00:00</lastmod>
	</url>
	<url>
		<loc>https://adqtechnologies.pl/tag/monitoring-bezpieczenstwa/</loc>
		<lastmod>2026-04-20T21:06:30+00:00</lastmod>
	</url>
	<url>
		<loc>https://adqtechnologies.pl/tag/monitoring-it/</loc>
		<lastmod>2026-04-20T20:57:31+00:00</lastmod>
	</url>
	<url>
		<loc>https://adqtechnologies.pl/tag/monitoring-ot/</loc>
		<lastmod>2026-04-20T20:56:20+00:00</lastmod>
	</url>
	<url>
		<loc>https://adqtechnologies.pl/tag/nadzor-korporacyjny/</loc>
		<lastmod>2026-04-20T21:01:57+00:00</lastmod>
	</url>
	<url>
		<loc>https://adqtechnologies.pl/en/tag/network-security/</loc>
		<lastmod>2026-04-01T10:16:47+00:00</lastmod>
	</url>
	<url>
		<loc>https://adqtechnologies.pl/tag/nis2/</loc>
		<lastmod>2026-04-20T21:01:57+00:00</lastmod>
	</url>
	<url>
		<loc>https://adqtechnologies.pl/en/tag/nis2-en/</loc>
		<lastmod>2026-03-23T18:43:44+00:00</lastmod>
	</url>
	<url>
		<loc>https://adqtechnologies.pl/en/tag/nis2-compliance/</loc>
		<lastmod>2026-03-23T18:43:44+00:00</lastmod>
	</url>
	<url>
		<loc>https://adqtechnologies.pl/en/tag/nis2-implementation-poland/</loc>
		<lastmod>2026-03-23T18:43:44+00:00</lastmod>
	</url>
	<url>
		<loc>https://adqtechnologies.pl/tag/nowelizacja-ksc/</loc>
		<lastmod>2026-04-20T20:57:31+00:00</lastmod>
	</url>
	<url>
		<loc>https://adqtechnologies.pl/tag/ochrona-punktow-koncowych/</loc>
		<lastmod>2026-04-20T21:06:30+00:00</lastmod>
	</url>
	<url>
		<loc>https://adqtechnologies.pl/en/tag/ot-monitoring/</loc>
		<lastmod>2026-04-07T19:19:34+00:00</lastmod>
	</url>
	<url>
		<loc>https://adqtechnologies.pl/en/tag/ot-security/</loc>
		<lastmod>2026-04-07T19:19:34+00:00</lastmod>
	</url>
	<url>
		<loc>https://adqtechnologies.pl/tag/phishing/</loc>
		<lastmod>2026-03-23T18:43:22+00:00</lastmod>
	</url>
	<url>
		<loc>https://adqtechnologies.pl/tag/phishing-szkolenia/</loc>
		<lastmod>2026-04-20T20:57:31+00:00</lastmod>
	</url>
	<url>
		<loc>https://adqtechnologies.pl/tag/podszywanie-sie/</loc>
		<lastmod>2026-03-23T18:43:22+00:00</lastmod>
	</url>
	<url>
		<loc>https://adqtechnologies.pl/tag/program-awareness/</loc>
		<lastmod>2026-04-20T20:57:31+00:00</lastmod>
	</url>
	<url>
		<loc>https://adqtechnologies.pl/en/tag/public-institution-impersonation/</loc>
		<lastmod>2026-03-23T18:43:44+00:00</lastmod>
	</url>
	<url>
		<loc>https://adqtechnologies.pl/tag/rada-nadzorcza/</loc>
		<lastmod>2026-04-20T21:01:57+00:00</lastmod>
	</url>
	<url>
		<loc>https://adqtechnologies.pl/en/tag/ransomware-en/</loc>
		<lastmod>2026-04-01T10:16:47+00:00</lastmod>
	</url>
	<url>
		<loc>https://adqtechnologies.pl/tag/ransomware/</loc>
		<lastmod>2026-04-20T21:06:30+00:00</lastmod>
	</url>
	<url>
		<loc>https://adqtechnologies.pl/tag/raport-fortinet-2025/</loc>
		<lastmod>2026-04-20T20:57:31+00:00</lastmod>
	</url>
	<url>
		<loc>https://adqtechnologies.pl/tag/reakcja-na-incydenty/</loc>
		<lastmod>2026-04-20T21:06:30+00:00</lastmod>
	</url>
	<url>
		<loc>https://adqtechnologies.pl/en/tag/remote-access-security/</loc>
		<lastmod>2026-04-07T19:19:34+00:00</lastmod>
	</url>
	<url>
		<loc>https://adqtechnologies.pl/en/tag/risk-management/</loc>
		<lastmod>2026-03-23T18:43:44+00:00</lastmod>
	</url>
	<url>
		<loc>https://adqtechnologies.pl/tag/s46/</loc>
		<lastmod>2026-04-20T20:54:23+00:00</lastmod>
	</url>
	<url>
		<loc>https://adqtechnologies.pl/en/tag/s46-incident-reporting/</loc>
		<lastmod>2026-03-23T18:43:44+00:00</lastmod>
	</url>
	<url>
		<loc>https://adqtechnologies.pl/tag/security-awareness-training-pl/</loc>
		<lastmod>2026-04-20T20:57:31+00:00</lastmod>
	</url>
	<url>
		<loc>https://adqtechnologies.pl/en/tag/security-awareness-training/</loc>
		<lastmod>2026-03-23T18:43:44+00:00</lastmod>
	</url>
	<url>
		<loc>https://adqtechnologies.pl/en/tag/security-monitoring/</loc>
		<lastmod>2026-04-01T10:16:47+00:00</lastmod>
	</url>
	<url>
		<loc>https://adqtechnologies.pl/tag/segmentacja-it-ot/</loc>
		<lastmod>2026-04-20T20:56:20+00:00</lastmod>
	</url>
	<url>
		<loc>https://adqtechnologies.pl/tag/soc-24-7/</loc>
		<lastmod>2026-04-20T21:06:30+00:00</lastmod>
	</url>
	<url>
		<loc>https://adqtechnologies.pl/en/tag/supervisory-board/</loc>
		<lastmod>2026-03-23T18:43:44+00:00</lastmod>
	</url>
	<url>
		<loc>https://adqtechnologies.pl/tag/supply-chain-security-pl/</loc>
		<lastmod>2026-04-20T20:56:20+00:00</lastmod>
	</url>
	<url>
		<loc>https://adqtechnologies.pl/en/tag/supply-chain-security/</loc>
		<lastmod>2026-03-23T18:43:44+00:00</lastmod>
	</url>
	<url>
		<loc>https://adqtechnologies.pl/tag/swiadomosc-bezpieczenstwa/</loc>
		<lastmod>2026-04-20T20:57:31+00:00</lastmod>
	</url>
	<url>
		<loc>https://adqtechnologies.pl/tag/szbi/</loc>
		<lastmod>2026-04-20T20:54:23+00:00</lastmod>
	</url>
	<url>
		<loc>https://adqtechnologies.pl/tag/szkolenia-cyberbezpieczenstwo/</loc>
		<lastmod>2026-04-20T20:57:31+00:00</lastmod>
	</url>
	<url>
		<loc>https://adqtechnologies.pl/tag/szkolenia-dopasowane-do-rol/</loc>
		<lastmod>2026-04-20T20:57:31+00:00</lastmod>
	</url>
	<url>
		<loc>https://adqtechnologies.pl/en/tag/third-party-risk-management/</loc>
		<lastmod>2026-03-23T18:43:44+00:00</lastmod>
	</url>
	<url>
		<loc>https://adqtechnologies.pl/tag/weryfikacja-linkow/</loc>
		<lastmod>2026-03-23T18:43:22+00:00</lastmod>
	</url>
	<url>
		<loc>https://adqtechnologies.pl/tag/zarzadzanie-ryzykiem/</loc>
		<lastmod>2026-04-20T21:01:57+00:00</lastmod>
	</url>
	<url>
		<loc>https://adqtechnologies.pl/tag/zarzadzanie-ryzykiem-cybernetycznym/</loc>
		<lastmod>2026-04-20T20:59:54+00:00</lastmod>
	</url>
	<url>
		<loc>https://adqtechnologies.pl/tag/zdalny-dostep/</loc>
		<lastmod>2026-04-20T20:56:20+00:00</lastmod>
	</url>
</urlset>
<!-- XML Sitemap generated by Yoast SEO -->