<?xml version="1.0" encoding="UTF-8"?>
<urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9">
  <url><loc>https://s2i2.com/</loc><lastmod>2026-05-17</lastmod><priority>1.0</priority></url>
  <url><loc>https://s2i2.com/about/</loc><lastmod>2026-05-17</lastmod><priority>0.8</priority></url>
  <url><loc>https://s2i2.com/author/manager_s2i2/</loc><lastmod>2026-05-17</lastmod><priority>0.5</priority></url>
  <url><loc>https://s2i2.com/capabilities/</loc><lastmod>2026-05-17</lastmod><priority>0.8</priority></url>
  <url><loc>https://s2i2.com/careers/</loc><lastmod>2026-05-17</lastmod><priority>0.8</priority></url>
  <url><loc>https://s2i2.com/category/latest-news/</loc><lastmod>2026-05-17</lastmod><priority>0.5</priority></url>
  <url><loc>https://s2i2.com/category/team-spotlight/</loc><lastmod>2026-05-17</lastmod><priority>0.5</priority></url>
  <url><loc>https://s2i2.com/cloud-technologies/</loc><lastmod>2026-05-17</lastmod><priority>0.8</priority></url>
  <url><loc>https://s2i2.com/contact/</loc><lastmod>2026-05-17</lastmod><priority>0.8</priority></url>
  <url><loc>https://s2i2.com/cots-gots-product-solutions/</loc><lastmod>2026-05-17</lastmod><priority>0.8</priority></url>
  <url><loc>https://s2i2.com/cybersecurity/</loc><lastmod>2026-05-17</lastmod><priority>0.8</priority></url>
  <url><loc>https://s2i2.com/data-science-dacum-chart/</loc><lastmod>2026-05-17</lastmod><priority>0.8</priority></url>
  <url><loc>https://s2i2.com/five-public-sector-trends-in-ecosystem-services/</loc><lastmod>2022-11-24</lastmod><priority>0.8</priority></url>
  <url><loc>https://s2i2.com/from-frontier-models-to-frontline-networks-what-the-may-2026-ai-security-push-means-for-federal-it-programs/</loc><lastmod>2026-05-14</lastmod><priority>0.8</priority></url>
  <url><loc>https://s2i2.com/how-ai-is-helping-stop-ransomware-as-a-service-raas-in-federal-agencies/</loc><lastmod>2025-05-27</lastmod><priority>0.8</priority></url>
  <url><loc>https://s2i2.com/how-cloud-computing-is-transforming-the-way-national-security-organizations-operate-a-cybersecurity-companys-role/</loc><lastmod>2023-10-17</lastmod><priority>0.8</priority></url>
  <url><loc>https://s2i2.com/identity-and-access-management-modernization-what-phishing-resistant-mfa-means-for-you/</loc><lastmod>2025-07-01</lastmod><priority>0.8</priority></url>
  <url><loc>https://s2i2.com/innovative-solutions-for-complex-challenges-how-s2i2-delivers-results-for-government-clients/</loc><lastmod>2023-04-04</lastmod><priority>0.8</priority></url>
  <url><loc>https://s2i2.com/it-services-management/</loc><lastmod>2026-05-17</lastmod><priority>0.8</priority></url>
  <url><loc>https://s2i2.com/it-strategy-roadmap-design/</loc><lastmod>2026-05-17</lastmod><priority>0.8</priority></url>
  <url><loc>https://s2i2.com/its-time-for-dow-to-build-one-cyber-workforce-system-and-mean-it/</loc><lastmod>2026-03-31</lastmod><priority>0.8</priority></url>
  <url><loc>https://s2i2.com/leveraging-ai-in-cybersecurity-staying-ahead-of-digital-threats/</loc><lastmod>2024-12-16</lastmod><priority>0.8</priority></url>
  <url><loc>https://s2i2.com/looking-back-to-look-ahead-to-2023/</loc><lastmod>2022-12-19</lastmod><priority>0.8</priority></url>
  <url><loc>https://s2i2.com/managing-the-pros-and-cons-of-big-data-in-national-security/</loc><lastmod>2023-09-19</lastmod><priority>0.8</priority></url>
  <url><loc>https://s2i2.com/mastering-the-cybersecurity-talent-maze-navigating-challenges-and-crafting-winning-strategies/</loc><lastmod>2024-02-27</lastmod><priority>0.8</priority></url>
  <url><loc>https://s2i2.com/navigating-the-ai-workforce-insights-into-opms-new-skill-set-requirements/</loc><lastmod>2024-06-11</lastmod><priority>0.8</priority></url>
  <url><loc>https://s2i2.com/navigating-the-hybrid-cloud-maze-mastering-monitoring-in-a-complex-it-landscape/</loc><lastmod>2024-07-29</lastmod><priority>0.8</priority></url>
  <url><loc>https://s2i2.com/news/</loc><lastmod>2026-05-17</lastmod><priority>0.8</priority></url>
  <url><loc>https://s2i2.com/our-culture/</loc><lastmod>2026-05-17</lastmod><priority>0.8</priority></url>
  <url><loc>https://s2i2.com/our-team/</loc><lastmod>2026-05-17</lastmod><priority>0.8</priority></url>
  <url><loc>https://s2i2.com/privacy-policy/</loc><lastmod>2026-05-17</lastmod><priority>0.8</priority></url>
  <url><loc>https://s2i2.com/reflecting-on-a-visit-to-the-vfw/</loc><lastmod>2022-12-19</lastmod><priority>0.8</priority></url>
  <url><loc>https://s2i2.com/s2i2-and-smoking-shields-unite-to-support-deployed-service-members/</loc><lastmod>2023-07-24</lastmod><priority>0.8</priority></url>
  <url><loc>https://s2i2.com/s2i2-celebrates-the-holidays-by-volunteering-for-wreaths-across-america/</loc><lastmod>2023-12-20</lastmod><priority>0.8</priority></url>
  <url><loc>https://s2i2.com/s2i2-inc-appoints-james-scobey-as-chief-technology-officer-and-vice-president-of-operations/</loc><lastmod>2025-11-17</lastmod><priority>0.8</priority></url>
  <url><loc>https://s2i2.com/s2i2-new-hire-builds-on-a-rock-solid-foundation/</loc><lastmod>2023-05-16</lastmod><priority>0.8</priority></url>
  <url><loc>https://s2i2.com/s2i2-partners-with-hacc-to-share-the-key-skills-to-succeed-in-federal-data-arena/</loc><lastmod>2023-06-27</lastmod><priority>0.8</priority></url>
  <url><loc>https://s2i2.com/s2i2-safeguards-federal-agencies-from-looming-cyberwarfare-threats/</loc><lastmod>2023-08-21</lastmod><priority>0.8</priority></url>
  <url><loc>https://s2i2.com/securing-the-future-how-ai-is-transforming-nist-guidelines-for-federal-agencies/</loc><lastmod>2025-05-05</lastmod><priority>0.8</priority></url>
  <url><loc>https://s2i2.com/services/</loc><lastmod>2026-05-17</lastmod><priority>0.8</priority></url>
  <url><loc>https://s2i2.com/streamlining-cybersecurity-how-to-avoid-data-overload-and-focus-on-what-matters/</loc><lastmod>2024-08-30</lastmod><priority>0.8</priority></url>
  <url><loc>https://s2i2.com/strengthening-national-security-with-forward-looking-it-threat-research/</loc><lastmod>2024-01-05</lastmod><priority>0.8</priority></url>
  <url><loc>https://s2i2.com/team-spotlight-christine-bikoi-leading-with-integrity-in-cybersecurity/</loc><lastmod>2025-10-27</lastmod><priority>0.8</priority></url>
  <url><loc>https://s2i2.com/team-spotlight-kwadjo-dickson/</loc><lastmod>2026-02-26</lastmod><priority>0.8</priority></url>
  <url><loc>https://s2i2.com/team-spotlight-meet-alethia-ally-tippin/</loc><lastmod>2025-02-18</lastmod><priority>0.8</priority></url>
  <url><loc>https://s2i2.com/team-spotlight-meet-anthea-moran/</loc><lastmod>2025-09-25</lastmod><priority>0.8</priority></url>
  <url><loc>https://s2i2.com/team-spotlight-meet-charles-brookhart/</loc><lastmod>2026-03-27</lastmod><priority>0.8</priority></url>
  <url><loc>https://s2i2.com/team-spotlight-meet-cristina-torres-stout/</loc><lastmod>2024-07-16</lastmod><priority>0.8</priority></url>
  <url><loc>https://s2i2.com/team-spotlight-meet-grey-scobey/</loc><lastmod>2025-05-21</lastmod><priority>0.8</priority></url>
  <url><loc>https://s2i2.com/team-spotlight-meet-jeff-gaston/</loc><lastmod>2026-05-08</lastmod><priority>0.8</priority></url>
  <url><loc>https://s2i2.com/team-spotlight-meet-john-aron-hinson/</loc><lastmod>2025-04-11</lastmod><priority>0.8</priority></url>
  <url><loc>https://s2i2.com/team-spotlight-meet-timothy-matthews/</loc><lastmod>2024-01-24</lastmod><priority>0.8</priority></url>
  <url><loc>https://s2i2.com/team-spotlight-meet-visuttiphan-kato-chantaphakul/</loc><lastmod>2024-08-26</lastmod><priority>0.8</priority></url>
  <url><loc>https://s2i2.com/team-spotlight-meet-yanira-vanegas/</loc><lastmod>2023-12-15</lastmod><priority>0.8</priority></url>
  <url><loc>https://s2i2.com/the-ai-vulnerability-storm/</loc><lastmod>2026-04-17</lastmod><priority>0.8</priority></url>
  <url><loc>https://s2i2.com/the-future-of-cyber-defense-how-ai-is-revolutionizing-threat-detection/</loc><lastmod>2024-10-24</lastmod><priority>0.8</priority></url>
  <url><loc>https://s2i2.com/the-intersection-of-cybersecurity-and-supply-chain-risk-management/</loc><lastmod>2025-03-11</lastmod><priority>0.8</priority></url>
  <url><loc>https://s2i2.com/the-quantum-countdown-preparing-cyber-defenses-for-2035-and-beyond/</loc><lastmod>2024-05-03</lastmod><priority>0.8</priority></url>
  <url><loc>https://s2i2.com/the-road-to-cmmc-level-2-benefits-lessons-learned-and-advice-from-the-trenches/</loc><lastmod>2026-03-11</lastmod><priority>0.8</priority></url>
  <url><loc>https://s2i2.com/top-5-everyday-habits-that-strengthen-cybersecurity/</loc><lastmod>2026-02-11</lastmod><priority>0.8</priority></url>
  <url><loc>https://s2i2.com/when-software-starts-acting-on-its-own-reading-the-new-multinational-guidance-on-agentic-ai-security/</loc><lastmod>2026-05-04</lastmod><priority>0.8</priority></url>
</urlset>
