
<?xml version="1.0" encoding="UTF-8"?><?xml-stylesheet type="text/xsl" href="//basecybersecurity.com/main-sitemap.xsl"?>
<urlset xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xmlns:image="http://www.google.com/schemas/sitemap-image/1.1" xsi:schemaLocation="http://www.sitemaps.org/schemas/sitemap/0.9 http://www.sitemaps.org/schemas/sitemap/0.9/sitemap.xsd http://www.google.com/schemas/sitemap-image/1.1 http://www.google.com/schemas/sitemap-image/1.1/sitemap-image.xsd" xmlns="http://www.sitemaps.org/schemas/sitemap/0.9">
	<url>
		<loc>https://basecybersecurity.com/</loc>
		<lastmod>2026-03-31T18:10:29+00:00</lastmod>
		<image:image>
			<image:loc>https://basecybersecurity.com/wp-content/uploads/2025/12/Group-1261154646.svg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://basecybersecurity.com/wp-content/uploads/2025/12/Group-12611546461.svg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://basecybersecurity.com/wp-content/uploads/2025/12/Reworc.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://basecybersecurity.com/wp-content/uploads/2025/12/Reworc.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://basecybersecurity.com/wp-content/uploads/2025/12/pexels-kindelmedia-6774432-1.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://basecybersecurity.com/wp-content/uploads/2025/12/Group-1261154560.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://basecybersecurity.com/wp-content/uploads/2025/12/Timo_Michael.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://basecybersecurity.com/wp-content/uploads/2025/12/Group-1261154562.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://basecybersecurity.com/wp-content/uploads/2025/12/Group-1261154563.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://basecybersecurity.com/wp-content/uploads/2025/12/Group-1261154562.svg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://basecybersecurity.com/wp-content/uploads/2025/12/Group-1261154663.svg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://basecybersecurity.com/wp-content/uploads/2025/12/Group-12611545561.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://basecybersecurity.com/wp-content/uploads/2025/12/Group-12611545561.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://basecybersecurity.com/wp-content/uploads/2025/12/Group-1261154664.svg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://basecybersecurity.com/wp-content/uploads/2025/12/Group-12611545651.svg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://basecybersecurity.com/wp-content/uploads/2025/12/Group-1261154642.svg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://basecybersecurity.com/wp-content/uploads/2025/12/Group-1261154667.svg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://basecybersecurity.com/wp-content/uploads/2025/12/Group-1261154835.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://basecybersecurity.com/wp-content/uploads/2025/12/Aramco.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://basecybersecurity.com/wp-content/uploads/2025/12/Rabobank.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://basecybersecurity.com/wp-content/uploads/2025/12/kpn.svg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://basecybersecurity.com/wp-content/uploads/2025/12/Aramco.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://basecybersecurity.com/wp-content/uploads/2025/12/Rabobank.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://basecybersecurity.com/wp-content/uploads/2025/12/kpn.svg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://basecybersecurity.com/events/</loc>
		<lastmod>2026-03-27T08:37:17+00:00</lastmod>
		<image:image>
			<image:loc>https://basecybersecurity.com/wp-content/uploads/2017/01/Events-BCS-SecTalks-InfoSec-monthly-Rotterdam-1-1024x576.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://basecybersecurity.com/wp-content/uploads/2026/02/Screenshot-2026-02-20-104718.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://basecybersecurity.com/wp-content/uploads/2017/01/Events-BCS-SecTalks-InfoSec-monthly-Rotterdam-1-1024x576.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://basecybersecurity.com/wp-content/uploads/2024/06/logo_orange.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://basecybersecurity.com/wp-content/uploads/2017/01/Events-BCS-SecTalks-InfoSec-monthly-Rotterdam-1-1024x576.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://basecybersecurity.com/wp-content/uploads/2024/12/why2025.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://basecybersecurity.com/wp-content/uploads/2025/05/images.jpeg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://basecybersecurity.com/wp-content/uploads/2025/05/cybersec_horizontal_midnightblue-1024x429.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://basecybersecurity.com/wp-content/uploads/2026/02/Logo-492x328-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://basecybersecurity.com/wp-content/uploads/2017/01/Events-BCS-SecTalks-InfoSec-monthly-Rotterdam-1-1024x576.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://basecybersecurity.com/wp-content/uploads/2017/01/Events-BCS-SecTalks-InfoSec-monthly-Rotterdam-1-1024x576.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://basecybersecurity.com/wp-content/uploads/2017/01/Events-BCS-SecTalks-InfoSec-monthly-Rotterdam-1-1024x576.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://basecybersecurity.com/wp-content/uploads/2017/01/Events-BCS-SecTalks-InfoSec-monthly-Rotterdam-1-1024x576.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://basecybersecurity.com/wp-content/uploads/2023/09/WICCA.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://basecybersecurity.com/wp-content/uploads/2017/01/Events-BCS-SecTalks-InfoSec-monthly-Rotterdam-1-1024x576.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://basecybersecurity.com/wp-content/uploads/2017/01/Events-BCS-SecTalks-InfoSec-monthly-Rotterdam-1-1024x576.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://basecybersecurity.com/wp-content/uploads/2024/06/logo_orange.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://basecybersecurity.com/wp-content/uploads/2017/01/Events-BCS-SecTalks-InfoSec-monthly-Rotterdam-1-1024x576.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://basecybersecurity.com/wp-content/uploads/2023/10/logo.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://basecybersecurity.com/wp-content/uploads/2017/01/Events-BCS-SecTalks-InfoSec-monthly-Rotterdam-1-1024x576.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://basecybersecurity.com/wp-content/uploads/2017/01/Events-BCS-SecTalks-InfoSec-monthly-Rotterdam-1-1024x576.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://basecybersecurity.com/wp-content/uploads/2024/03/sptkJSzW_400x400.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://basecybersecurity.com/wp-content/uploads/2017/01/Events-BCS-SecTalks-InfoSec-monthly-Rotterdam-1-1024x576.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://basecybersecurity.com/wp-content/uploads/2024/03/vNGYRTIE_400x400_gH9VYHB.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://basecybersecurity.com/wp-content/uploads/2024/03/fosdem-logo-1024x602-1-1.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://basecybersecurity.com/wp-content/uploads/2017/01/Events-BCS-SecTalks-InfoSec-monthly-Rotterdam-1-1024x576.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://basecybersecurity.com/wp-content/uploads/2024/01/Chrysalis-IV-1024x647.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://basecybersecurity.com/wp-content/uploads/2017/01/Events-BCS-SecTalks-InfoSec-monthly-Rotterdam-1-1024x576.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://basecybersecurity.com/wp-content/uploads/2020/01/36C3-Chaos-Computer-Club-December-2019-Leipzig-Germany-4-e1578565503652.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://basecybersecurity.com/wp-content/uploads/2017/01/Events-BCS-SecTalks-InfoSec-monthly-Rotterdam-1-1024x576.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://basecybersecurity.com/wp-content/uploads/2023/09/Calendar-2023_ISACA_Risk_Event_2023.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://basecybersecurity.com/wp-content/uploads/2025/05/cybersec_horizontal_midnightblue-1024x429.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://basecybersecurity.com/wp-content/uploads/2023/09/WICCA.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://basecybersecurity.com/wp-content/uploads/2017/01/Events-BCS-SecTalks-InfoSec-monthly-Rotterdam-1-1024x576.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://basecybersecurity.com/wp-content/uploads/2023/09/hack.lu-2023-min-2.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://basecybersecurity.com/wp-content/uploads/2023/09/Photo-ONE-Conference.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://basecybersecurity.com/wp-content/uploads/2022/06/2022-Calendar-Hack-in-Paris-Paris-min.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://basecybersecurity.com/wp-content/uploads/2017/01/Events-BCS-SecTalks-InfoSec-monthly-Rotterdam-1-1024x576.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://basecybersecurity.com/wp-content/uploads/2023/09/Events-page-IoT-Tech-Expo-Europe_Amsterdam_Netherlands_26-27-September-2023.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://basecybersecurity.com/wp-content/uploads/2023/09/NULLCON-e1695649802603.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://basecybersecurity.com/wp-content/uploads/2023/09/borderless-2023.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://basecybersecurity.com/wp-content/uploads/2023/09/Calendar-2023_MCTTP-Clean.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://basecybersecurity.com/wp-content/uploads/2017/01/Events-BCS-SecTalks-InfoSec-monthly-Rotterdam-1-1024x576.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://basecybersecurity.com/wp-content/uploads/2023/09/Chaos-Communication-Camp.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://basecybersecurity.com/wp-content/uploads/2017/01/Events-BCS-SecTalks-InfoSec-monthly-Rotterdam-1-1024x576.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://basecybersecurity.com/wp-content/uploads/2023/09/Calendar-2023_Troopers.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://basecybersecurity.com/wp-content/uploads/2017/01/Events-BCS-SecTalks-InfoSec-monthly-Rotterdam-1-1024x576.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://basecybersecurity.com/wp-content/uploads/2021/08/Calendar-2022_RuhrSec_3-6-May-2022_Bochum-Germany-min.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://basecybersecurity.com/wp-content/uploads/2017/01/Events-BCS-SecTalks-InfoSec-monthly-Rotterdam-1-1024x576.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://basecybersecurity.com/wp-content/uploads/2017/01/Events-BCS-SecTalks-InfoSec-monthly-Rotterdam-1-1024x576.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://basecybersecurity.com/wp-content/uploads/2017/01/Events-Hack-in-the-box-Security-Conference-HITB-SecConf-Amsterdam-Netherlands.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://basecybersecurity.com/wp-content/uploads/2023/09/FIC-2023.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://basecybersecurity.com/wp-content/uploads/2017/01/Events-BCS-SecTalks-InfoSec-monthly-Rotterdam-1-1024x576.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://basecybersecurity.com/wp-content/uploads/2017/01/Events-BCS-SecTalks-InfoSec-monthly-Rotterdam-1-1024x576.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://basecybersecurity.com/wp-content/uploads/2017/01/Events-BCS-SecTalks-InfoSec-monthly-Rotterdam-1-1024x576.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://basecybersecurity.com/wp-content/uploads/2023/01/Events-2023_Elastic-Security-Labs_18-Janauary.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://basecybersecurity.com/wp-content/uploads/2017/01/Events-BCS-SecTalks-InfoSec-monthly-Rotterdam-1-1024x576.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://basecybersecurity.com/wp-content/uploads/2021/12/2021-Caledar_eth0-Netherlands-Physical.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://basecybersecurity.com/wp-content/uploads/2017/01/Events-BCS-SecTalks-InfoSec-monthly-Rotterdam-1-1024x576.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://basecybersecurity.com/wp-content/uploads/2022/10/Events-2022_One-Conference-2022_18-19-October_The-Hague-the-Netherlands-min5.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://basecybersecurity.com/wp-content/uploads/2021/08/Calendar-2022_hardwear-io-ladybug_2022-1024x1024.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://basecybersecurity.com/wp-content/uploads/2017/01/Events-BCS-SecTalks-InfoSec-monthly-Rotterdam-1-1024x576.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://basecybersecurity.com/wp-content/uploads/2017/01/Events-BCS-SecTalks-InfoSec-monthly-Rotterdam-1-1024x576.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://basecybersecurity.com/wp-content/uploads/2022/02/Calendar-2022-MCH-MayContainHackers-Logo-Amsterdam-.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://basecybersecurity.com/wp-content/uploads/2017/01/Events-BCS-SecTalks-InfoSec-monthly-Rotterdam-1-1024x576.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://basecybersecurity.com/wp-content/uploads/2021/12/2022-Calendar-Nullcon-Berlin.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://basecybersecurity.com/wp-content/uploads/2017/01/Events-BCS-SecTalks-InfoSec-monthly-Rotterdam-1-1024x576.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://basecybersecurity.com/wp-content/uploads/2021/08/Calendar-2022-Pancakes-Con-16-January-2022.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://basecybersecurity.com/wp-content/uploads/2026/03/Screenshot-2026-03-03-110930.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://basecybersecurity.com/wp-content/uploads/2017/01/Events-BCS-SecTalks-InfoSec-monthly-Rotterdam-1-1024x576.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://basecybersecurity.com/wp-content/uploads/2021/08/Calendar-2022_hardwear-io-ladybug_2022-1024x1024.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://basecybersecurity.com/wp-content/uploads/2021/08/Event-2021_BRUCON-TRAINING-AND-CONFERENCE_04-08-Oct-2021-min.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://basecybersecurity.com/wp-content/uploads/2021/09/Calendar-2021_-Layer-8-Conference_logo_Virtual_8-October-2021.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://basecybersecurity.com/wp-content/uploads/2017/01/Events-ATTCK-community.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://basecybersecurity.com/wp-content/uploads/2017/01/Events-Base-at-HITB-conference-europe-virtual.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://basecybersecurity.com/wp-content/uploads/2021/05/Calendar-2021_SAMM-User-Day_27-May-2021-1024x615.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://basecybersecurity.com/wp-content/uploads/2021/02/Nullcon_GOA_1-4-March_2021_Online.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://basecybersecurity.com/wp-content/uploads/2021/01/Events-RC3-Remote-Chaos-Experience-CCC-Chaos-Communication-Congress-Online-27th-30th-December-2020.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://basecybersecurity.com/wp-content/uploads/2021/08/Calendar-2022_hardwear-io-ladybug_2022-1024x1024.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://basecybersecurity.com/wp-content/uploads/2020/02/HITB-2020-Amsterdam-Base-Cyber-Security-1024x685.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://basecybersecurity.com/wp-content/uploads/2017/01/Events-ATTCK-community.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://basecybersecurity.com/wp-content/uploads/2017/01/Events-Base-at-HITB-conference-europe-virtual.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://basecybersecurity.com/wp-content/uploads/2017/01/Events-BCS-SecTalks-InfoSec-monthly-Rotterdam-1-1024x576.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://basecybersecurity.com/wp-content/uploads/2020/02/NGOA20.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://basecybersecurity.com/wp-content/uploads/2017/01/Events-BCS-SecTalks-InfoSec-monthly-Rotterdam-1-1024x576.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://basecybersecurity.com/wp-content/uploads/2017/01/Events-BCS-SecTalks-InfoSec-monthly-Rotterdam-1-1024x576.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://basecybersecurity.com/wp-content/uploads/2017/01/Events-Chaos-Computer-Club-CCC.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://basecybersecurity.com/wp-content/uploads/2017/01/Events-BCS-SecTalks-InfoSec-monthly-Rotterdam-1-1024x576.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://basecybersecurity.com/wp-content/uploads/2021/02/Events-ISO-IEC-Rotterdam-Netherlands-26-November-2019.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://basecybersecurity.com/wp-content/uploads/2017/01/Events-BCS-SecTalks-InfoSec-monthly-Rotterdam-1-1024x576.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://basecybersecurity.com/wp-content/uploads/2017/01/Events-InfoSecurity-Netherlands.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://basecybersecurity.com/wp-content/uploads/2017/01/Events-BCS-SecTalks-InfoSec-monthly-Rotterdam-1-1024x576.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://basecybersecurity.com/wp-content/uploads/2021/08/Calendar-2022_hardwear-io-ladybug_2022-1024x1024.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://basecybersecurity.com/wp-content/uploads/2017/01/Events-BCS-SecTalks-InfoSec-monthly-Rotterdam-1-1024x576.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://basecybersecurity.com/wp-content/uploads/2017/01/Events-BCS-SecTalks-InfoSec-monthly-Rotterdam-1-1024x576.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://basecybersecurity.com/wp-content/uploads/2022/06/2022-Calendar-Hack-in-Paris-Paris-min.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://basecybersecurity.com/wp-content/uploads/2017/01/Events-BCS-SecTalks-InfoSec-monthly-Rotterdam-1-1024x576.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://basecybersecurity.com/wp-content/uploads/2017/01/Events-Base-at-HITB-conference-europe-virtual.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://basecybersecurity.com/wp-content/uploads/2017/01/Events-BCS-SecTalks-InfoSec-monthly-Rotterdam-1-1024x576.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://basecybersecurity.com/wp-content/uploads/2017/01/Events-BCS-SecTalks-InfoSec-monthly-Rotterdam-1-1024x576.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://basecybersecurity.com/wp-content/uploads/2017/01/Events-First-Cyber-Threat-Intelligence-Symposium-2019-1024x1024.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://basecybersecurity.com/wp-content/uploads/2017/01/Events-NullCon-GOA-2019-NGOA-1024x1024.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://basecybersecurity.com/wp-content/uploads/2024/03/fosdem-logo-1024x602-1-1.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://basecybersecurity.com/wp-content/uploads/2017/01/Events-BCS-at-35C3-informationsec.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://basecybersecurity.com/wp-content/uploads/2017/01/Events-Erasmus-University-Education-Lab-for-cyber-security-1024x576.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://basecybersecurity.com/wp-content/uploads/2017/01/Events-BCS-SecTalks-InfoSec-monthly-Rotterdam-1-1024x576.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://basecybersecurity.com/wp-content/uploads/2021/06/CALENDAR-2021-Infosecurity-Data-Cloud-Expo-Jaarbeurs-Utrecht-Netherlands-November-3rd-4th.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://basecybersecurity.com/wp-content/uploads/2017/01/Events-Cyber-Kids-Day-1024x427.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://basecybersecurity.com/wp-content/uploads/2021/08/Event-2021_BRUCON-TRAINING-AND-CONFERENCE_04-08-Oct-2021-min.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://basecybersecurity.com/wp-content/uploads/2017/01/Events-BCS-SecTalks-InfoSec-monthly-Rotterdam-1-1024x576.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://basecybersecurity.com/wp-content/uploads/2021/08/Calendar-2022_hardwear-io-ladybug_2022-1024x1024.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://basecybersecurity.com/wp-content/uploads/2017/01/Events-BCS-SecTalks-InfoSec-monthly-Rotterdam-1-1024x576.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://basecybersecurity.com/wp-content/uploads/2017/01/Events-Hack-in-Paris-France-2018.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://basecybersecurity.com/wp-content/uploads/2017/01/Events-BCS-SecTalks-InfoSec-monthly-Rotterdam-1-1024x576.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://basecybersecurity.com/wp-content/uploads/2017/01/Events-AVG-GDPR-Ready-1024x576.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://basecybersecurity.com/wp-content/uploads/2017/01/Events-BCS-SecTalks-InfoSec-monthly-Rotterdam-1-1024x576.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://basecybersecurity.com/wp-content/uploads/2017/01/Events-Loyens-Loeff-GDPR-Workshop-Netherlands-Canada-1024x576.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://basecybersecurity.com/wp-content/uploads/2017/01/Events-Sleepnet-wiv-referendum-session-CIC-Netherlands.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://basecybersecurity.com/wp-content/uploads/2017/01/Events-PotXL-World-port-Accelerator-Rottedam-Netherlands.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://basecybersecurity.com/wp-content/uploads/2017/01/Events-The-Swedish-Chamber-and-Young-Professionals-Entrepeneurs-Cafe-Amsterdam-The-Netherlands.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://basecybersecurity.com/wp-content/uploads/2017/01/Events-Hack-in-the-box-Security-Conference-HITB-SecConf-Amsterdam-Netherlands-1.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://basecybersecurity.com/wp-content/uploads/2017/01/Events-Nullcon-GOA-2018-conference-India.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://basecybersecurity.com/wp-content/uploads/2017/01/Events-Codemotion-Amsterdam-Tech-conference-Security-Professionals.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://basecybersecurity.com/wp-content/uploads/2017/01/Events-34C3-tuwat-Leipzig-Germany-Chaos-Communication-Congress-Conference.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://basecybersecurity.com/wp-content/uploads/2021/06/CALENDAR-2021-Infosecurity-Data-Cloud-Expo-Jaarbeurs-Utrecht-Netherlands-November-3rd-4th.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://basecybersecurity.com/wp-content/uploads/2017/01/Base-at-us-senate-cyber-security-1.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://basecybersecurity.com/wp-content/uploads/2017/01/Events-Amsterdam-Security-Expo-Netherlands.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://basecybersecurity.com/wp-content/uploads/2017/01/Events-The-Resilient-City-Venture-Cafe-CIC-Rotterdam-Netherlands.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://basecybersecurity.com/wp-content/uploads/2017/01/Events-Cyber-Resilience-Innovation-2017-Rotterdam-Netherlands.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://basecybersecurity.com/wp-content/uploads/2017/01/Events-SHA2017-Zeewolde-The-Netherlands-hacker-camp-event.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://basecybersecurity.com/wp-content/uploads/2017/01/Events-BSides-Amsterdam-2017-information-security-events.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://basecybersecurity.com/wp-content/uploads/2017/01/Events-Black-Hat-information-security-Las-Vegas-United-States.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://basecybersecurity.com/wp-content/uploads/2017/01/Events-Defcon-25-Las-Vegas-The-United-States-of-America-workshops-capture-the-flag-conferences.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://basecybersecurity.com/wp-content/uploads/2017/01/Events-Hack-in-Paris-Conf%C3%A9rence-sur-la-cybers%C3%A9curit%C3%A9.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://basecybersecurity.com/wp-content/uploads/2017/01/Events-Deloitte-Innovation-Event-IN2-Cybersecurity.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://basecybersecurity.com/wp-content/uploads/2017/01/Events-LOGIN-2017-tech-conference-Lithuania-Baltics.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://basecybersecurity.com/wp-content/uploads/2017/01/Events-Codemotion-Amsterdam-Tech-conference-Security-Professionals.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://basecybersecurity.com/wp-content/uploads/2017/01/Events-Its-insecure-hack-it-Hacking-Workshop-Rotterdam-Netherlands.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://basecybersecurity.com/wp-content/uploads/2017/01/Events-Hack-in-the-box-Security-Conference-HITB-SecConf-Amsterdam-Netherlands-1.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://basecybersecurity.com/wp-content/uploads/2017/01/Events-Nullcon-GOA-2017-infosec-conference.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://basecybersecurity.com/wp-content/uploads/2017/01/Events-Cyber-Security-Awareness-Rotterdam.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://basecybersecurity.com/wp-content/uploads/2017/01/Events-Codmotion-Tech-Pills-Security-Development-technology-event.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://basecybersecurity.com/march-edition-hackers-defenders-of-the-cyber-security-arena/</loc>
		<lastmod>2026-03-25T14:28:32+00:00</lastmod>
		<image:image>
			<image:loc>https://basecybersecurity.com/wp-content/uploads/2017/01/Events-BCS-SecTalks-InfoSec-monthly-Rotterdam-1024x576.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://basecybersecurity.com/services/security-management-and-data-privacy/</loc>
		<lastmod>2026-03-20T20:31:22+00:00</lastmod>
		<image:image>
			<image:loc>https://basecybersecurity.com/wp-content/uploads/2025/12/Group-1261154772.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://basecybersecurity.com/wp-content/uploads/2025/12/Group-1261154569.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://basecybersecurity.com/wp-content/uploads/2025/12/Group-1261154798.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://basecybersecurity.com/wp-content/uploads/2025/12/Group-1261154562.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://basecybersecurity.com/wp-content/uploads/2023/11/2-e1701351472417.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://basecybersecurity.com/wp-content/uploads/2025/12/Group-1261154736.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://basecybersecurity.com/wp-content/uploads/2025/12/Group-1261154574.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://basecybersecurity.com/base-bsides-the-hague-2026/</loc>
		<lastmod>2026-02-20T16:03:19+00:00</lastmod>
		<image:image>
			<image:loc>https://basecybersecurity.com/wp-content/uploads/2026/02/Screenshot-2026-02-20-104718.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://basecybersecurity.com/orangecon-2026/</loc>
		<lastmod>2026-02-20T16:03:13+00:00</lastmod>
		<image:image>
			<image:loc>https://basecybersecurity.com/wp-content/uploads/2024/06/logo_orange.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://basecybersecurity.com/base-sectalks-holland-january-2026/</loc>
		<lastmod>2026-02-20T16:03:07+00:00</lastmod>
		<image:image>
			<image:loc>https://basecybersecurity.com/wp-content/uploads/2017/01/Events-BCS-SecTalks-InfoSec-monthly-Rotterdam-1024x576.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://basecybersecurity.com/sectalks_february2026/</loc>
		<lastmod>2026-02-20T16:02:59+00:00</lastmod>
		<image:image>
			<image:loc>https://basecybersecurity.com/wp-content/uploads/2017/01/Events-BCS-SecTalks-InfoSec-monthly-Rotterdam-1024x576.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://basecybersecurity.com/cyber-security-consultant-jobs-in-den-haag/</loc>
		<lastmod>2026-02-17T08:21:02+00:00</lastmod>
	</url>
	<url>
		<loc>https://basecybersecurity.com/base-sectalks-26-07-2018/</loc>
		<lastmod>2026-02-17T08:18:06+00:00</lastmod>
	</url>
	<url>
		<loc>https://basecybersecurity.com/sectalks-netherlands-infosec-monthly-meetup-august-2018-honeypots/</loc>
		<lastmod>2026-02-16T15:23:43+00:00</lastmod>
	</url>
	<url>
		<loc>https://basecybersecurity.com/sectalks-holland-april-2025-infosec-and-ai/</loc>
		<lastmod>2026-02-16T15:23:15+00:00</lastmod>
	</url>
	<url>
		<loc>https://basecybersecurity.com/sectalks-holland-0x0d-summer-session-sectalks-holland/</loc>
		<lastmod>2026-02-16T15:22:20+00:00</lastmod>
	</url>
	<url>
		<loc>https://basecybersecurity.com/one-conference-2022/</loc>
		<lastmod>2026-02-16T15:21:07+00:00</lastmod>
	</url>
	<url>
		<loc>https://basecybersecurity.com/nullcon-information-security-goa-2017/</loc>
		<lastmod>2026-02-16T15:20:28+00:00</lastmod>
	</url>
	<url>
		<loc>https://basecybersecurity.com/base-fic-2023/</loc>
		<lastmod>2026-02-16T15:19:36+00:00</lastmod>
	</url>
	<url>
		<loc>https://basecybersecurity.com/base-elastic-security-meetup-elastic-security-labs-the-elastic-container-project/</loc>
		<lastmod>2026-02-16T15:15:56+00:00</lastmod>
	</url>
	<url>
		<loc>https://basecybersecurity.com/hardware-security-conference-training-netherlands-2020-virtual/</loc>
		<lastmod>2026-02-16T15:15:16+00:00</lastmod>
	</url>
	<url>
		<loc>https://basecybersecurity.com/base-at-nullcon-goa-2023/</loc>
		<lastmod>2026-02-16T14:49:07+00:00</lastmod>
	</url>
	<url>
		<loc>https://basecybersecurity.com/base-wiccon-2023/</loc>
		<lastmod>2026-02-16T14:46:23+00:00</lastmod>
	</url>
	<url>
		<loc>https://basecybersecurity.com/base-sectalks-holland-monthly-security-gathering-november-edition/</loc>
		<lastmod>2026-02-16T14:45:03+00:00</lastmod>
	</url>
	<url>
		<loc>https://basecybersecurity.com/base-sectalks-holland-monthly-security-gathering-june-edition-ai-security/</loc>
		<lastmod>2026-02-16T14:43:36+00:00</lastmod>
	</url>
	<url>
		<loc>https://basecybersecurity.com/base-sectalks-holland-monthly-security-gathering-january-edition-windows-login-bypassing/</loc>
		<lastmod>2026-02-16T14:40:48+00:00</lastmod>
	</url>
	<url>
		<loc>https://basecybersecurity.com/base-at-hitb-security-conference-amsterdam-2018/</loc>
		<lastmod>2026-02-16T13:38:34+00:00</lastmod>
	</url>
	<url>
		<loc>https://basecybersecurity.com/base-one-conference-2023/</loc>
		<lastmod>2026-02-16T13:37:16+00:00</lastmod>
	</url>
	<url>
		<loc>https://basecybersecurity.com/base-nullcon-goa-2021/</loc>
		<lastmod>2026-02-16T13:35:21+00:00</lastmod>
	</url>
	<url>
		<loc>https://basecybersecurity.com/base-hack-in-the-box-2020-amsterdam/</loc>
		<lastmod>2026-02-16T08:14:54+00:00</lastmod>
	</url>
	<url>
		<loc>https://basecybersecurity.com/base-at-hack-in-paris-conference-2018/</loc>
		<lastmod>2026-02-16T08:03:51+00:00</lastmod>
	</url>
	<url>
		<loc>https://basecybersecurity.com/base-login-2017/</loc>
		<lastmod>2026-02-12T15:14:29+00:00</lastmod>
	</url>
	<url>
		<loc>https://basecybersecurity.com/base-hack-in-paris-2019/</loc>
		<lastmod>2026-02-12T15:13:06+00:00</lastmod>
	</url>
	<url>
		<loc>https://basecybersecurity.com/base-swedish-chamber-young-professionals-entrepeneurs-cafe/</loc>
		<lastmod>2026-02-12T05:44:20+00:00</lastmod>
	</url>
	<url>
		<loc>https://basecybersecurity.com/expertise/hardware-and-iot/</loc>
		<lastmod>2026-02-02T10:59:38+00:00</lastmod>
		<image:image>
			<image:loc>https://basecybersecurity.com/wp-content/uploads/2025/12/Group-1261154772.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://basecybersecurity.com/wp-content/uploads/2025/12/Group-1261154569.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://basecybersecurity.com/wp-content/uploads/2025/12/Group-1261154562.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://basecybersecurity.com/wp-content/uploads/2025/12/Report-Pages-1-to-3-1024x765.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://basecybersecurity.com/wp-content/uploads/2025/12/Group-1261154736.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://basecybersecurity.com/wp-content/uploads/2025/12/Group-1261154574.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://basecybersecurity.com/cyber-security-events-infosec-conferences-it-security-trainings-europe-2021-calendar/</loc>
		<lastmod>2026-01-30T13:32:26+00:00</lastmod>
	</url>
	<url>
		<loc>https://basecybersecurity.com/cyber-security-events-infosec-conferences-it-security-trainings-europe-2018-calendar/</loc>
		<lastmod>2026-01-30T12:48:35+00:00</lastmod>
	</url>
	<url>
		<loc>https://basecybersecurity.com/cyber-security-events-infosec-conferences-it-security-trainings-europe-2017-calendar/</loc>
		<lastmod>2026-01-28T13:06:04+00:00</lastmod>
	</url>
	<url>
		<loc>https://basecybersecurity.com/base-sectalks-holland-monthly-security-gathering-november2024-edition/</loc>
		<lastmod>2026-01-26T14:27:21+00:00</lastmod>
	</url>
	<url>
		<loc>https://basecybersecurity.com/why2025/</loc>
		<lastmod>2026-01-26T14:26:01+00:00</lastmod>
	</url>
	<url>
		<loc>https://basecybersecurity.com/base-wiccon-2024/</loc>
		<lastmod>2026-01-26T14:24:39+00:00</lastmod>
	</url>
	<url>
		<loc>https://basecybersecurity.com/base-sectalks-holland-monthly-security-gathering-october2024-edition/</loc>
		<lastmod>2026-01-26T14:23:39+00:00</lastmod>
	</url>
	<url>
		<loc>https://basecybersecurity.com/base-sectalks-holland-monthly-security-gathering-september2024-edition/</loc>
		<lastmod>2026-01-26T14:22:17+00:00</lastmod>
	</url>
	<url>
		<loc>https://basecybersecurity.com/base-sectalks-holland-monthly-security-gathering-august2024-edition/</loc>
		<lastmod>2026-01-26T14:19:01+00:00</lastmod>
	</url>
	<url>
		<loc>https://basecybersecurity.com/base-defcon-32/</loc>
		<lastmod>2026-01-26T14:17:43+00:00</lastmod>
	</url>
	<url>
		<loc>https://basecybersecurity.com/base-sectalks-holland-monthly-security-gathering-july2024-edition/</loc>
		<lastmod>2026-01-26T14:16:20+00:00</lastmod>
	</url>
	<url>
		<loc>https://basecybersecurity.com/base-sectalks-holland-monthly-security-gathering-april2024-edition/</loc>
		<lastmod>2026-01-26T14:14:48+00:00</lastmod>
	</url>
	<url>
		<loc>https://basecybersecurity.com/base-sectalks-holland-monthly-security-gathering-march2024-edition/</loc>
		<lastmod>2026-01-26T14:13:21+00:00</lastmod>
	</url>
	<url>
		<loc>https://basecybersecurity.com/fosdem-2024/</loc>
		<lastmod>2026-01-26T14:11:28+00:00</lastmod>
	</url>
	<url>
		<loc>https://basecybersecurity.com/base-sectalks-holland-monthly-security-gathering-february2024-edition/</loc>
		<lastmod>2026-01-26T14:09:46+00:00</lastmod>
	</url>
	<url>
		<loc>https://basecybersecurity.com/base-sectalks-holland-monthly-security-gathering-january-edition-cryptography/</loc>
		<lastmod>2026-01-26T14:07:03+00:00</lastmod>
	</url>
	<url>
		<loc>https://basecybersecurity.com/test-senna/</loc>
		<lastmod>2026-01-26T13:10:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://basecybersecurity.com/services/managed-security-defense/</loc>
		<lastmod>2026-01-26T09:13:57+00:00</lastmod>
		<image:image>
			<image:loc>https://basecybersecurity.com/wp-content/uploads/2025/12/Group-1261154772.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://basecybersecurity.com/wp-content/uploads/2025/12/Group-1261154569.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://basecybersecurity.com/wp-content/uploads/2025/12/BMDR-Platform-Dec_3.svg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://basecybersecurity.com/wp-content/uploads/2025/12/Group-1261154562.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://basecybersecurity.com/wp-content/uploads/2025/12/BMDR-scaled-1.jpeg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://basecybersecurity.com/wp-content/uploads/2025/12/Report-Pages-1-to-3.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://basecybersecurity.com/wp-content/uploads/2025/12/Group-1261154562.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://basecybersecurity.com/wp-content/uploads/2025/12/Group-1261154736.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://basecybersecurity.com/wp-content/uploads/2025/12/Group-1261154574.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://basecybersecurity.com/services/penetration-testing/</loc>
		<lastmod>2026-01-26T09:12:29+00:00</lastmod>
		<image:image>
			<image:loc>https://basecybersecurity.com/wp-content/uploads/2025/12/Group-1261154772.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://basecybersecurity.com/wp-content/uploads/2025/12/Group-1261154569.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://basecybersecurity.com/wp-content/uploads/2025/12/Group-1261154562.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://basecybersecurity.com/wp-content/uploads/2025/12/Penetration-Test-Attestation-Letter-scaled-1-724x1024.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://basecybersecurity.com/wp-content/uploads/2025/12/Group-1261154736.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://basecybersecurity.com/wp-content/uploads/2025/12/Group-1261154574.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://basecybersecurity.com/case-template/</loc>
		<lastmod>2026-01-24T08:17:33+00:00</lastmod>
		<image:image>
			<image:loc>https://basecybersecurity.com/wp-content/uploads/2025/12/Group-1261154569.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://basecybersecurity.com/wp-content/uploads/2026/01/Telco-scaled.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://basecybersecurity.com/base-portxl-world-port-accelerator/</loc>
		<lastmod>2026-01-19T12:34:47+00:00</lastmod>
	</url>
	<url>
		<loc>https://basecybersecurity.com/base-defcon-31/</loc>
		<lastmod>2026-01-19T12:18:28+00:00</lastmod>
	</url>
	<url>
		<loc>https://basecybersecurity.com/commercial/</loc>
		<lastmod>2026-01-19T12:01:03+00:00</lastmod>
	</url>
	<url>
		<loc>https://basecybersecurity.com/governance/</loc>
		<lastmod>2026-01-19T10:35:31+00:00</lastmod>
	</url>
	<url>
		<loc>https://basecybersecurity.com/technical/</loc>
		<lastmod>2026-01-19T10:32:16+00:00</lastmod>
	</url>
	<url>
		<loc>https://basecybersecurity.com/about/</loc>
		<lastmod>2026-01-10T14:48:32+00:00</lastmod>
		<image:image>
			<image:loc>https://basecybersecurity.com/wp-content/uploads/2025/12/image-25486.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://basecybersecurity.com/wp-content/uploads/2025/12/image-25486-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://basecybersecurity.com/wp-content/uploads/2025/12/Group-12611547721.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://basecybersecurity.com/wp-content/uploads/2025/12/Mask-group6.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://basecybersecurity.com/wp-content/uploads/2025/12/Mask-group4-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://basecybersecurity.com/wp-content/uploads/2025/12/Mask-group5.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://basecybersecurity.com/wp-content/uploads/2025/12/Mask-group6.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://basecybersecurity.com/wp-content/uploads/2025/12/Mask-group6.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://basecybersecurity.com/wp-content/uploads/2025/12/Professional-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://basecybersecurity.com/wp-content/uploads/2025/12/Group-1261154794.svg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://basecybersecurity.com/home-v4/</loc>
		<lastmod>2026-01-07T11:21:38+00:00</lastmod>
		<image:image>
			<image:loc>https://basecybersecurity.com/wp-content/uploads/2026/01/Group-1261154536.svg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://basecybersecurity.com/wp-content/uploads/2026/01/Group-1261154542.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://basecybersecurity.com/wp-content/uploads/2026/01/Group-1707486263-1-scaled.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://basecybersecurity.com/wp-content/uploads/2025/12/Screenshot_15-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://basecybersecurity.com/wp-content/uploads/2025/12/pexels-rdne-5921496.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://basecybersecurity.com/wp-content/uploads/2025/12/Screenshot_15-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://basecybersecurity.com/wp-content/uploads/2025/12/pexels-rdne-5921496.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://basecybersecurity.com/wp-content/uploads/2026/01/Group-1261154542.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://basecybersecurity.com/home-v3/</loc>
		<lastmod>2026-01-07T10:27:40+00:00</lastmod>
		<image:image>
			<image:loc>https://basecybersecurity.com/wp-content/uploads/2026/01/Group-1261154536-3-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://basecybersecurity.com/wp-content/uploads/2026/01/Group-1261154622.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://basecybersecurity.com/wp-content/uploads/2025/12/pexels-rdne-5921496.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://basecybersecurity.com/wp-content/uploads/2026/01/Mask-group-3.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://basecybersecurity.com/wp-content/uploads/2026/01/Ellipse-144.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://basecybersecurity.com/wp-content/uploads/2026/01/Group-1261154060.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://basecybersecurity.com/wp-content/uploads/2026/01/Group-1261154624.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://basecybersecurity.com/wp-content/uploads/2026/01/Ellipse-145.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://basecybersecurity.com/wp-content/uploads/2026/01/Group-1261154610.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://basecybersecurity.com/wp-content/uploads/2026/01/Image-2.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://basecybersecurity.com/wp-content/uploads/2026/01/Ellipse-146.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://basecybersecurity.com/wp-content/uploads/2026/01/Mask-group.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://basecybersecurity.com/wp-content/uploads/2026/01/Group-1261154541.svg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://basecybersecurity.com/wp-content/uploads/2026/01/Group-1261154542.svg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://basecybersecurity.com/wp-content/uploads/2026/01/Group-1261154544.svg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://basecybersecurity.com/wp-content/uploads/2026/01/Group-1261154617.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://basecybersecurity.com/wp-content/uploads/2026/01/Group-1261154617-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://basecybersecurity.com/wp-content/uploads/2026/01/Group-1261154541.svg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://basecybersecurity.com/wp-content/uploads/2026/01/Group-1261154542.svg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://basecybersecurity.com/wp-content/uploads/2026/01/Group-1261154544.svg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://basecybersecurity.com/wp-content/uploads/2026/01/Group-1261154536-2.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://basecybersecurity.com/wp-content/uploads/2026/01/Ellipse-148.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://basecybersecurity.com/home-v5/</loc>
		<lastmod>2026-01-07T10:25:05+00:00</lastmod>
		<image:image>
			<image:loc>https://basecybersecurity.com/wp-content/uploads/2026/01/Group-1261154536-3-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://basecybersecurity.com/wp-content/uploads/2026/01/Group-1261154622.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://basecybersecurity.com/wp-content/uploads/2025/12/pexels-rdne-5921496.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://basecybersecurity.com/wp-content/uploads/2026/01/Ellipse-144.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://basecybersecurity.com/wp-content/uploads/2026/01/Group-1261154060.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://basecybersecurity.com/wp-content/uploads/2026/01/Group-1261154624.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://basecybersecurity.com/home-v2/</loc>
		<lastmod>2026-01-07T10:19:05+00:00</lastmod>
		<image:image>
			<image:loc>https://basecybersecurity.com/wp-content/uploads/2026/01/Group-1261154536-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://basecybersecurity.com/wp-content/uploads/2026/01/Group-1261154620-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://basecybersecurity.com/wp-content/uploads/2026/01/Group-1261154622.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://basecybersecurity.com/wp-content/uploads/2025/12/pexels-rdne-5921496.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://basecybersecurity.com/wp-content/uploads/2026/01/Group-1261154620-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://basecybersecurity.com/wp-content/uploads/2026/01/Image-2.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://basecybersecurity.com/wp-content/uploads/2026/01/Group-1261154562.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://basecybersecurity.com/wp-content/uploads/2026/01/Group-1261154536-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://basecybersecurity.com/wp-content/uploads/2026/01/Group-1261154565-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://basecybersecurity.com/security_monitoring/</loc>
		<lastmod>2026-01-05T07:10:16+00:00</lastmod>
		<image:image>
			<image:loc>https://basecybersecurity.com/wp-content/uploads/2026/01/Group-1707486262-2.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://basecybersecurity.com/wp-content/uploads/2026/01/Group-1707486263-2-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://basecybersecurity.com/wp-content/uploads/2026/01/Group-1707486262-3.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://basecybersecurity.com/talk-to-us/</loc>
		<lastmod>2025-12-31T07:23:28+00:00</lastmod>
		<image:image>
			<image:loc>https://basecybersecurity.com/wp-content/uploads/2025/12/Group-1261154646.svg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://basecybersecurity.com/wp-content/uploads/2025/12/Group-12611546461.svg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://basecybersecurity.com/careers/</loc>
		<lastmod>2025-12-29T12:24:03+00:00</lastmod>
	</url>
	<url>
		<loc>https://basecybersecurity.com/orangecon2024/</loc>
		<lastmod>2025-12-24T10:58:11+00:00</lastmod>
	</url>
	<url>
		<loc>https://basecybersecurity.com/base-fosdem19-brussels/</loc>
		<lastmod>2025-12-24T10:10:15+00:00</lastmod>
	</url>
	<url>
		<loc>https://basecybersecurity.com/base-in2-cybersecurity/</loc>
		<lastmod>2025-12-24T09:50:57+00:00</lastmod>
	</url>
	<url>
		<loc>https://basecybersecurity.com/junior-infosec-jobs-rotterdam/</loc>
		<lastmod>2025-12-24T08:23:29+00:00</lastmod>
	</url>
	<url>
		<loc>https://basecybersecurity.com/professionals/</loc>
		<lastmod>2025-12-24T07:12:25+00:00</lastmod>
		<image:image>
			<image:loc>https://basecybersecurity.com/wp-content/uploads/2016/07/Europe_map_750.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://basecybersecurity.com/brucon-information-cyber-security-2018-event/</loc>
		<lastmod>2025-12-24T06:34:33+00:00</lastmod>
	</url>
	<url>
		<loc>https://basecybersecurity.com/base-black-hat-2020/</loc>
		<lastmod>2025-12-24T06:33:56+00:00</lastmod>
	</url>
	<url>
		<loc>https://basecybersecurity.com/base-black-hat-2017/</loc>
		<lastmod>2025-12-24T06:33:39+00:00</lastmod>
	</url>
	<url>
		<loc>https://basecybersecurity.com/base-sectalks-holland-0x06-open-source-intelligence/</loc>
		<lastmod>2025-12-24T06:32:20+00:00</lastmod>
	</url>
	<url>
		<loc>https://basecybersecurity.com/base-nullcon-goa-2020/</loc>
		<lastmod>2025-12-24T06:32:03+00:00</lastmod>
	</url>
	<url>
		<loc>https://basecybersecurity.com/cyber-security-events-infosec-conferences-it-security-trainings-europe-2019-calendar/</loc>
		<lastmod>2025-12-24T06:31:28+00:00</lastmod>
	</url>
	<url>
		<loc>https://basecybersecurity.com/cyber-security-events-infosec-conferences-it-security-trainings-europe-2020-calendar/</loc>
		<lastmod>2025-12-24T06:30:54+00:00</lastmod>
	</url>
	<url>
		<loc>https://basecybersecurity.com/cyber-security-events-infosec-conferences-it-security-trainings-europe-2025-calendar/</loc>
		<lastmod>2025-12-24T06:30:06+00:00</lastmod>
	</url>
	<url>
		<loc>https://basecybersecurity.com/cyber-security-events-infosec-conferences-it-security-trainings-europe-2024-calendar/</loc>
		<lastmod>2025-12-24T06:28:59+00:00</lastmod>
	</url>
	<url>
		<loc>https://basecybersecurity.com/cyber-security-events-infosec-conferences-it-security-trainings-europe-2023-calendar/</loc>
		<lastmod>2025-12-24T06:28:24+00:00</lastmod>
	</url>
	<url>
		<loc>https://basecybersecurity.com/cyber-security-events-infosec-conferences-it-security-trainings-europe-2022-calendar/</loc>
		<lastmod>2025-12-24T06:26:48+00:00</lastmod>
	</url>
	<url>
		<loc>https://basecybersecurity.com/security-referral-program/</loc>
		<lastmod>2025-12-23T12:11:22+00:00</lastmod>
	</url>
	<url>
		<loc>https://basecybersecurity.com/solutions/</loc>
		<lastmod>2025-12-23T11:57:25+00:00</lastmod>
		<image:image>
			<image:loc>https://basecybersecurity.com/wp-content/uploads/2016/07/Icon_logo_250.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://basecybersecurity.com/wp-content/uploads/2016/07/Icon_logo_250.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://basecybersecurity.com/wp-content/uploads/2016/07/Icon_logo_250.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://basecybersecurity.com/wp-content/uploads/2016/08/solutions2.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://basecybersecurity.com/wp-content/uploads/2016/08/solutions.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://basecybersecurity.com/wp-content/uploads/2016/08/solutions3.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://basecybersecurity.com/wp-content/uploads/2016/07/Europe_map_750.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://basecybersecurity.com/solutions/managed-security/</loc>
		<lastmod>2025-12-23T11:54:30+00:00</lastmod>
	</url>
	<url>
		<loc>https://basecybersecurity.com/expertise/services-b2b-and-b2c/</loc>
		<lastmod>2025-12-20T18:09:16+00:00</lastmod>
		<image:image>
			<image:loc>https://basecybersecurity.com/wp-content/uploads/2025/12/Group-1261154772.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://basecybersecurity.com/wp-content/uploads/2025/12/Group-1261154569.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://basecybersecurity.com/wp-content/uploads/2025/12/Group-1261154562.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://basecybersecurity.com/wp-content/uploads/2025/12/image-25465.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://basecybersecurity.com/wp-content/uploads/2025/12/Mask-group4.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://basecybersecurity.com/wp-content/uploads/2025/12/Group-1261154736.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://basecybersecurity.com/expertise/saas/</loc>
		<lastmod>2025-12-20T18:03:51+00:00</lastmod>
		<image:image>
			<image:loc>https://basecybersecurity.com/wp-content/uploads/2025/12/Group-1261154772.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://basecybersecurity.com/wp-content/uploads/2025/12/Group-1261154569.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://basecybersecurity.com/wp-content/uploads/2025/12/Group-1261154562.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://basecybersecurity.com/wp-content/uploads/2025/12/image-25465.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://basecybersecurity.com/wp-content/uploads/2025/12/Group-1261154574.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://basecybersecurity.com/privacy-statement/</loc>
		<lastmod>2025-12-20T06:17:02+00:00</lastmod>
		<image:image>
			<image:loc>https://basecybersecurity.com/wp-content/uploads/2025/12/Group-1261154562.svg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://basecybersecurity.com/wp-content/uploads/2025/12/Group-1261154663.svg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://basecybersecurity.com/wp-content/uploads/2025/12/Group-12611545651.svg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://basecybersecurity.com/wp-content/uploads/2025/12/Group-1261154642.svg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://basecybersecurity.com/wp-content/uploads/2025/12/Group-1261154667.svg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://basecybersecurity.com/cases/</loc>
		<lastmod>2025-12-20T06:05:48+00:00</lastmod>
		<image:image>
			<image:loc>https://basecybersecurity.com/wp-content/uploads/2025/12/Mask-group5.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://basecybersecurity.com/wp-content/uploads/2025/12/Mask-group2-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://basecybersecurity.com/wp-content/uploads/2025/12/GHG.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://basecybersecurity.com/services/baseone-managed-security-solution/</loc>
		<lastmod>2025-12-20T05:50:08+00:00</lastmod>
		<image:image>
			<image:loc>https://basecybersecurity.com/wp-content/uploads/2025/12/Group-1261154772.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://basecybersecurity.com/wp-content/uploads/2025/12/Group-1261154569.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://basecybersecurity.com/wp-content/uploads/2025/12/Group-1261154562.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://basecybersecurity.com/wp-content/uploads/2025/12/Report-Pages-1-to-3-1024x765.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://basecybersecurity.com/wp-content/uploads/2025/12/Mask-group4.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://basecybersecurity.com/wp-content/uploads/2025/12/Group-1261154736.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://basecybersecurity.com/wp-content/uploads/2025/12/Mask-group2-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://basecybersecurity.com/wp-content/uploads/2025/12/Group-1261154574.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://basecybersecurity.com/expertise/</loc>
		<lastmod>2025-12-12T13:03:43+00:00</lastmod>
	</url>
	<url>
		<loc>https://basecybersecurity.com/services/</loc>
		<lastmod>2025-12-12T13:01:20+00:00</lastmod>
	</url>
	<url>
		<loc>https://basecybersecurity.com/home-old/</loc>
		<lastmod>2025-12-12T05:58:29+00:00</lastmod>
		<image:image>
			<image:loc>https://basecybersecurity.com/wp-content/uploads/2016/07/Icon_logo_250.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://basecybersecurity.com/about-old/</loc>
		<lastmod>2025-12-12T05:45:30+00:00</lastmod>
	</url>
	<url>
		<loc>https://basecybersecurity.com/base-lehack-2025/</loc>
		<lastmod>2025-05-21T15:52:31+00:00</lastmod>
	</url>
	<url>
		<loc>https://basecybersecurity.com/base-infosecurity-europe-2025/</loc>
		<lastmod>2025-05-21T15:28:38+00:00</lastmod>
	</url>
	<url>
		<loc>https://basecybersecurity.com/base-cybersec-europe-2025/</loc>
		<lastmod>2025-05-21T15:25:21+00:00</lastmod>
	</url>
	<url>
		<loc>https://basecybersecurity.com/sectalks-holland-february-2025-privacy-matters-the-right-to-be-forgotten/</loc>
		<lastmod>2025-02-27T11:26:54+00:00</lastmod>
	</url>
	<url>
		<loc>https://basecybersecurity.com/vacancies/</loc>
		<lastmod>2025-02-17T08:42:16+00:00</lastmod>
	</url>
	<url>
		<loc>https://basecybersecurity.com/base-sectalks-holland-monthly-security-gathering-january2025-edition/</loc>
		<lastmod>2025-01-21T15:30:35+00:00</lastmod>
	</url>
	<url>
		<loc>https://basecybersecurity.com/contact/</loc>
		<lastmod>2024-11-13T14:41:50+00:00</lastmod>
	</url>
	<url>
		<loc>https://basecybersecurity.com/success-stories/</loc>
		<lastmod>2024-10-15T07:59:29+00:00</lastmod>
	</url>
	<url>
		<loc>https://basecybersecurity.com/pancakescon-2024/</loc>
		<lastmod>2024-03-15T15:54:10+00:00</lastmod>
	</url>
	<url>
		<loc>https://basecybersecurity.com/chrysalis-iv/</loc>
		<lastmod>2024-01-15T14:20:25+00:00</lastmod>
		<image:image>
			<image:loc>https://basecybersecurity.com/wp-content/uploads/2024/01/Chrysalis-IV.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://basecybersecurity.com/37c3-ccc-germany/</loc>
		<lastmod>2024-01-08T16:20:47+00:00</lastmod>
		<image:image>
			<image:loc>https://basecybersecurity.com/wp-content/uploads/2020/01/36C3-Chaos-Computer-Club-December-2019-Leipzig-Germany.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://basecybersecurity.com/base-sectalks-holland-monthly-security-gathering-november-edition-security-awareness-campaigns/</loc>
		<lastmod>2023-12-01T10:48:49+00:00</lastmod>
	</url>
	<url>
		<loc>https://basecybersecurity.com/base-sectalks-holland-monthly-security-gathering-october-edition/</loc>
		<lastmod>2023-10-25T08:24:35+00:00</lastmod>
	</url>
	<url>
		<loc>https://basecybersecurity.com/base-sectalks-october/</loc>
		<lastmod>2023-10-13T13:44:10+00:00</lastmod>
	</url>
	<url>
		<loc>https://basecybersecurity.com/base-sectalks-holland-monthly-security-gathering-september-edition/</loc>
		<lastmod>2023-09-27T10:45:08+00:00</lastmod>
	</url>
	<url>
		<loc>https://basecybersecurity.com/information-security-events-privacy-infosec-conferences-base-cyber-security-more-events/</loc>
		<lastmod>2023-09-26T12:56:07+00:00</lastmod>
	</url>
	<url>
		<loc>https://basecybersecurity.com/cyber-security-events-infosec-conferences-it-security-trainings-2024-virtual-calendar/</loc>
		<lastmod>2023-09-25T12:02:39+00:00</lastmod>
	</url>
	<url>
		<loc>https://basecybersecurity.com/cyber-security-events-infosec-conferences-it-security-trainings-2023-virtual-calendar/</loc>
		<lastmod>2023-09-25T12:02:21+00:00</lastmod>
	</url>
	<url>
		<loc>https://basecybersecurity.com/base-cybersec-netherlands-2023/</loc>
		<lastmod>2023-09-18T13:17:17+00:00</lastmod>
	</url>
	<url>
		<loc>https://basecybersecurity.com/base-troopers-2023/</loc>
		<lastmod>2023-09-18T08:41:01+00:00</lastmod>
	</url>
	<url>
		<loc>https://basecybersecurity.com/base-isaca-risk-event-2023/</loc>
		<lastmod>2023-09-15T13:55:52+00:00</lastmod>
	</url>
	<url>
		<loc>https://basecybersecurity.com/base-chaos-communication-camp-2023/</loc>
		<lastmod>2023-09-15T12:32:16+00:00</lastmod>
	</url>
	<url>
		<loc>https://basecybersecurity.com/base-borderless-cyber-2023/</loc>
		<lastmod>2023-09-15T11:28:35+00:00</lastmod>
	</url>
	<url>
		<loc>https://basecybersecurity.com/base-mcttp-2023/</loc>
		<lastmod>2023-09-15T11:07:23+00:00</lastmod>
	</url>
	<url>
		<loc>https://basecybersecurity.com/base-hack-lu-2023/</loc>
		<lastmod>2023-09-15T09:18:55+00:00</lastmod>
	</url>
	<url>
		<loc>https://basecybersecurity.com/base-iot-tech-expo-europe/</loc>
		<lastmod>2023-09-11T08:53:02+00:00</lastmod>
	</url>
	<url>
		<loc>https://basecybersecurity.com/base-sectalks-holland-monthly-security-gathering-august-edition-events/</loc>
		<lastmod>2023-08-17T14:50:41+00:00</lastmod>
	</url>
	<url>
		<loc>https://basecybersecurity.com/base-sectalks-holland-monthly-security-gathering-july-edition/</loc>
		<lastmod>2023-07-07T07:41:41+00:00</lastmod>
	</url>
	<url>
		<loc>https://basecybersecurity.com/base-sectalks-holland-monthly-security-gathering-may-edition-threat-detection-malware-analysis-research-time/</loc>
		<lastmod>2023-05-02T11:02:59+00:00</lastmod>
	</url>
	<url>
		<loc>https://basecybersecurity.com/base-sectalks-holland-monthly-security-gathering-april-edition/</loc>
		<lastmod>2023-04-05T13:31:19+00:00</lastmod>
	</url>
	<url>
		<loc>https://basecybersecurity.com/base-sectalks-holland-monthly-security-gathering-march-edition/</loc>
		<lastmod>2023-03-02T15:36:46+00:00</lastmod>
	</url>
	<url>
		<loc>https://basecybersecurity.com/base-sectalks-holland-monthly-security-gathering-february-edition/</loc>
		<lastmod>2023-03-02T15:22:47+00:00</lastmod>
	</url>
	<url>
		<loc>https://basecybersecurity.com/base-hack-in-paris-2023-cyber-security-conference/</loc>
		<lastmod>2023-02-13T16:45:24+00:00</lastmod>
	</url>
	<url>
		<loc>https://basecybersecurity.com/sectalks-september/</loc>
		<lastmod>2022-11-22T13:35:51+00:00</lastmod>
	</url>
	<url>
		<loc>https://basecybersecurity.com/base-sectalks-holland-monthly-security-gathering-november-edition-modern-threat-landscape-for-the-financial-world/</loc>
		<lastmod>2022-11-16T09:22:36+00:00</lastmod>
	</url>
	<url>
		<loc>https://basecybersecurity.com/hardwear-security-conference-training-netherlands-2022/</loc>
		<lastmod>2022-09-26T13:23:40+00:00</lastmod>
	</url>
	<url>
		<loc>https://basecybersecurity.com/eth02022-autumn-edition/</loc>
		<lastmod>2022-09-26T11:44:45+00:00</lastmod>
	</url>
	<url>
		<loc>https://basecybersecurity.com/base-sectalks-holland-monthly-security-gathering-august-topic-quantum/</loc>
		<lastmod>2022-08-24T17:14:59+00:00</lastmod>
	</url>
	<url>
		<loc>https://basecybersecurity.com/base-mch2022-may-contain-hackers/</loc>
		<lastmod>2022-07-13T15:22:26+00:00</lastmod>
	</url>
	<url>
		<loc>https://basecybersecurity.com/base-sectalks-holland-monthly-security-gathering-april-topic-osint/</loc>
		<lastmod>2022-04-25T13:41:16+00:00</lastmod>
	</url>
	<url>
		<loc>https://basecybersecurity.com/base-sectalks-holland-monthly-security-gathering/</loc>
		<lastmod>2022-03-31T13:02:07+00:00</lastmod>
	</url>
	<url>
		<loc>https://basecybersecurity.com/base-sectalks-holland-monthly-security-gethering/</loc>
		<lastmod>2022-03-29T15:23:53+00:00</lastmod>
	</url>
	<url>
		<loc>https://basecybersecurity.com/rc3-remote-chaos-experience/</loc>
		<lastmod>2022-01-31T08:55:05+00:00</lastmod>
	</url>
	<url>
		<loc>https://basecybersecurity.com/cyber-security-events-infosec-conferences-it-security-trainings-2022-virtual-calendar/</loc>
		<lastmod>2021-12-03T16:01:56+00:00</lastmod>
	</url>
	<url>
		<loc>https://basecybersecurity.com/base-infosecurity-nl/</loc>
		<lastmod>2021-11-04T11:28:18+00:00</lastmod>
	</url>
	<url>
		<loc>https://basecybersecurity.com/base-defcon-29/</loc>
		<lastmod>2021-10-29T10:25:52+00:00</lastmod>
	</url>
	<url>
		<loc>https://basecybersecurity.com/base-the-layer-8/</loc>
		<lastmod>2021-09-02T12:35:23+00:00</lastmod>
	</url>
	<url>
		<loc>https://basecybersecurity.com/base-brucon-2021/</loc>
		<lastmod>2021-08-27T15:03:47+00:00</lastmod>
	</url>
	<url>
		<loc>https://basecybersecurity.com/7th-eu-mitre-attck-community-workshop/</loc>
		<lastmod>2021-05-31T14:47:08+00:00</lastmod>
	</url>
	<url>
		<loc>https://basecybersecurity.com/base-at-hack-in-paris-2021-cyber-security-conference/</loc>
		<lastmod>2021-05-28T14:42:03+00:00</lastmod>
	</url>
	<url>
		<loc>https://basecybersecurity.com/base-at-samm-owasp-2021-user-day-virtual/</loc>
		<lastmod>2021-05-06T09:32:39+00:00</lastmod>
	</url>
	<url>
		<loc>https://basecybersecurity.com/base-at-hack-in-the-box-amsterdam-2021-security-conference/</loc>
		<lastmod>2021-02-15T15:24:45+00:00</lastmod>
	</url>
	<url>
		<loc>https://basecybersecurity.com/cyber-security-events-infosec-conferences-it-security-trainings-2021-virtual-calendar/</loc>
		<lastmod>2020-12-16T16:32:30+00:00</lastmod>
	</url>
	<url>
		<loc>https://basecybersecurity.com/hitb-cyberweek-2020-virtual-edition/</loc>
		<lastmod>2020-11-16T18:21:21+00:00</lastmod>
	</url>
	<url>
		<loc>https://basecybersecurity.com/base-hack-in-the-box-2020-singapore/</loc>
		<lastmod>2020-07-03T13:36:23+00:00</lastmod>
	</url>
	<url>
		<loc>https://basecybersecurity.com/5th-eu-attack-community-workshop/</loc>
		<lastmod>2020-05-18T14:44:16+00:00</lastmod>
	</url>
	<url>
		<loc>https://basecybersecurity.com/base-sectalks-holland-0xb1-security-gathering/</loc>
		<lastmod>2020-02-24T14:23:32+00:00</lastmod>
	</url>
	<url>
		<loc>https://basecybersecurity.com/base-sectalks-holland-0xb0-keyloggers-hitb/</loc>
		<lastmod>2020-01-28T14:37:55+00:00</lastmod>
	</url>
	<url>
		<loc>https://basecybersecurity.com/36c3-ccc-germany/</loc>
		<lastmod>2020-01-09T10:48:11+00:00</lastmod>
		<image:image>
			<image:loc>https://basecybersecurity.com/wp-content/uploads/2020/01/36C3-Chaos-Computer-Club-December-2019-Leipzig-Germany.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://basecybersecurity.com/isoiec-27701-de-ontbrekende-schakel-tussen-informatiebeveiliging-en-avg/</loc>
		<lastmod>2019-11-25T16:21:28+00:00</lastmod>
	</url>
	<url>
		<loc>https://basecybersecurity.com/sectalks-holland-0x13-hardware-hacking/</loc>
		<lastmod>2019-11-25T13:18:11+00:00</lastmod>
	</url>
	<url>
		<loc>https://basecybersecurity.com/base-sectalks-holland-0x10-hackers-gathering/</loc>
		<lastmod>2019-10-29T09:20:56+00:00</lastmod>
	</url>
	<url>
		<loc>https://basecybersecurity.com/sectalks-september-26th/</loc>
		<lastmod>2019-09-30T13:18:27+00:00</lastmod>
	</url>
	<url>
		<loc>https://basecybersecurity.com/base-at-infosecurity-2019/</loc>
		<lastmod>2019-09-26T08:53:22+00:00</lastmod>
	</url>
	<url>
		<loc>https://basecybersecurity.com/hardware-security-conference-training-netherlands-2019/</loc>
		<lastmod>2019-09-13T14:12:07+00:00</lastmod>
	</url>
	<url>
		<loc>https://basecybersecurity.com/sectalks-holland-0x0d-pre-summer-session-sectalks-holland-2/</loc>
		<lastmod>2019-08-27T13:21:39+00:00</lastmod>
	</url>
	<url>
		<loc>https://basecybersecurity.com/base-sectalks-holland-0x0c-hacking-tool/</loc>
		<lastmod>2019-05-18T18:13:27+00:00</lastmod>
	</url>
	<url>
		<loc>https://basecybersecurity.com/base-hitbsecconf2019-amsterdam-2/</loc>
		<lastmod>2019-05-16T14:18:23+00:00</lastmod>
	</url>
	<url>
		<loc>https://basecybersecurity.com/base-sectalks-holland0xc2-hackingtoolsrevisited/</loc>
		<lastmod>2019-05-16T11:53:59+00:00</lastmod>
	</url>
	<url>
		<loc>https://basecybersecurity.com/base-nullcon-goa-2019/</loc>
		<lastmod>2019-03-11T10:44:55+00:00</lastmod>
	</url>
	<url>
		<loc>https://basecybersecurity.com/base-hitbsecconf2019-amsterdam/</loc>
		<lastmod>2019-03-11T10:31:37+00:00</lastmod>
	</url>
	<url>
		<loc>https://basecybersecurity.com/base-sectalks-holland-0x05-first-meetup-2019-lets-talk/</loc>
		<lastmod>2019-02-01T14:00:10+00:00</lastmod>
	</url>
	<url>
		<loc>https://basecybersecurity.com/erasmus-university-education-lab-2018-event/</loc>
		<lastmod>2019-02-01T13:45:45+00:00</lastmod>
	</url>
	<url>
		<loc>https://basecybersecurity.com/base-kids-cyber-day/</loc>
		<lastmod>2019-02-01T13:44:27+00:00</lastmod>
	</url>
	<url>
		<loc>https://basecybersecurity.com/base-sectalks-2/</loc>
		<lastmod>2019-01-30T12:54:47+00:00</lastmod>
	</url>
	<url>
		<loc>https://basecybersecurity.com/base-hardwear-io-2018/</loc>
		<lastmod>2019-01-30T12:50:30+00:00</lastmod>
	</url>
	<url>
		<loc>https://basecybersecurity.com/base-sectalks-holland-0x04-welcome-noobs-information-cybersecurity-2018/</loc>
		<lastmod>2019-01-30T12:40:11+00:00</lastmod>
	</url>
	<url>
		<loc>https://basecybersecurity.com/base-infosecurity-nl-information-cybersecurity-event/</loc>
		<lastmod>2019-01-30T12:38:43+00:00</lastmod>
	</url>
	<url>
		<loc>https://basecybersecurity.com/soc-information-security-jobs-in-amsterdam/</loc>
		<lastmod>2018-12-12T15:27:34+00:00</lastmod>
	</url>
	<url>
		<loc>https://basecybersecurity.com/soc-information-security-jobs-rotterdam/</loc>
		<lastmod>2018-12-12T15:27:33+00:00</lastmod>
	</url>
	<url>
		<loc>https://basecybersecurity.com/security-operations-center-infosec-jobs-utrecht/</loc>
		<lastmod>2018-12-12T15:27:32+00:00</lastmod>
	</url>
	<url>
		<loc>https://basecybersecurity.com/soc-information-security-jobs-hague/</loc>
		<lastmod>2018-12-12T15:27:31+00:00</lastmod>
	</url>
	<url>
		<loc>https://basecybersecurity.com/cyber-security-events-infosec-conferences-it-security-trainings-europe-2018-calendar-trainings/</loc>
		<lastmod>2018-12-12T15:02:26+00:00</lastmod>
	</url>
	<url>
		<loc>https://basecybersecurity.com/cyber-security-events-infosec-conferences-it-security-trainings-europe-2018-calendar-offensive/</loc>
		<lastmod>2018-12-12T15:02:22+00:00</lastmod>
	</url>
	<url>
		<loc>https://basecybersecurity.com/cyber-security-events-infosec-conferences-it-security-trainings-europe-2018-calendar-privacy/</loc>
		<lastmod>2018-12-12T15:02:22+00:00</lastmod>
	</url>
	<url>
		<loc>https://basecybersecurity.com/insecure-hack-it-hacking-workshop/</loc>
		<lastmod>2018-12-12T15:02:19+00:00</lastmod>
	</url>
	<url>
		<loc>https://basecybersecurity.com/informal-sleepnetwiv-referendum-gathering/</loc>
		<lastmod>2018-12-12T15:02:18+00:00</lastmod>
	</url>
	<url>
		<loc>https://basecybersecurity.com/hack-in-paris-contact/</loc>
		<lastmod>2018-12-12T15:02:17+00:00</lastmod>
	</url>
	<url>
		<loc>https://basecybersecurity.com/hack-in-paris-2018-security-trainings-infosec-conference/</loc>
		<lastmod>2018-12-12T15:02:17+00:00</lastmod>
	</url>
	<url>
		<loc>https://basecybersecurity.com/cyber-security-events-infosec-conferences-it-security-trainings-europe-2018-calendar-defensive/</loc>
		<lastmod>2018-12-12T15:02:16+00:00</lastmod>
	</url>
	<url>
		<loc>https://basecybersecurity.com/cyber-securtity-awareness/</loc>
		<lastmod>2018-12-12T15:00:57+00:00</lastmod>
	</url>
	<url>
		<loc>https://basecybersecurity.com/cyber-resilience-innovation-creating-it-together/</loc>
		<lastmod>2018-12-12T15:00:56+00:00</lastmod>
	</url>
	<url>
		<loc>https://basecybersecurity.com/cyber-security-events-infosec-conferences-it-security-trainings-europe-2018-calendar-cryptography/</loc>
		<lastmod>2018-12-12T15:00:49+00:00</lastmod>
	</url>
	<url>
		<loc>https://basecybersecurity.com/codemotion-tech-pills/</loc>
		<lastmod>2018-12-12T15:00:49+00:00</lastmod>
	</url>
	<url>
		<loc>https://basecybersecurity.com/avg-gdpr-healthcare-life-sciences-information-security-event-may-2018/</loc>
		<lastmod>2018-12-12T15:00:48+00:00</lastmod>
	</url>
	<url>
		<loc>https://basecybersecurity.com/base-u-s-embassy-cyber-security-awareness/</loc>
		<lastmod>2018-12-12T15:00:46+00:00</lastmod>
	</url>
	<url>
		<loc>https://basecybersecurity.com/base-the-resilient-city/</loc>
		<lastmod>2018-12-12T15:00:45+00:00</lastmod>
	</url>
	<url>
		<loc>https://basecybersecurity.com/base-sha2017/</loc>
		<lastmod>2018-12-12T15:00:44+00:00</lastmod>
	</url>
	<url>
		<loc>https://basecybersecurity.com/base-sectalks/</loc>
		<lastmod>2018-12-12T15:00:42+00:00</lastmod>
	</url>
	<url>
		<loc>https://basecybersecurity.com/base-at-nullcon-goa-2018/</loc>
		<lastmod>2018-12-12T15:00:40+00:00</lastmod>
	</url>
	<url>
		<loc>https://basecybersecurity.com/base-hitb-secconf-2017/</loc>
		<lastmod>2018-12-12T15:00:35+00:00</lastmod>
	</url>
	<url>
		<loc>https://basecybersecurity.com/base-hardwear-io/</loc>
		<lastmod>2018-12-12T15:00:33+00:00</lastmod>
	</url>
	<url>
		<loc>https://basecybersecurity.com/base-hack-in-paris/</loc>
		<lastmod>2018-12-12T15:00:32+00:00</lastmod>
	</url>
	<url>
		<loc>https://basecybersecurity.com/base-general-data-protection-regulation-gdpr-security-workshop/</loc>
		<lastmod>2018-12-12T15:00:31+00:00</lastmod>
	</url>
	<url>
		<loc>https://basecybersecurity.com/base-defcon-25/</loc>
		<lastmod>2018-12-12T15:00:29+00:00</lastmod>
	</url>
	<url>
		<loc>https://basecybersecurity.com/base-codemotion-amsterdam-tech-conference/</loc>
		<lastmod>2018-12-12T15:00:24+00:00</lastmod>
	</url>
	<url>
		<loc>https://basecybersecurity.com/base-codemotion-amsterdam-2018/</loc>
		<lastmod>2018-12-12T15:00:23+00:00</lastmod>
	</url>
</urlset>
<!-- XML Sitemap generated by Rank Math SEO Plugin (c) Rank Math - rankmath.com -->