<?xml version="1.0" encoding="UTF-8"?>
<?xml-stylesheet type="text/xsl" href="https://victorwingsing.com/wp-sitemap.xsl" ?>
<urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9"><url><loc>https://victorwingsing.com/embrace-change-secure-data-navigating-the-uks-data-protection-evolution-with-microsoft-purview/</loc><lastmod>2024-04-01T22:03:14+00:00</lastmod></url><url><loc>https://victorwingsing.com/creating-an-insider-risk-management-strategy-a-simplified-guide/</loc><lastmod>2024-04-01T22:30:16+00:00</lastmod></url><url><loc>https://victorwingsing.com/lessons-from-the-field-communication/</loc><lastmod>2024-04-07T22:12:28+00:00</lastmod></url><url><loc>https://victorwingsing.com/information-rights-management-vs-encryption-via-sensitivity-labels-why-you-cant-use-both-on-one-document/</loc><lastmod>2024-05-22T22:20:58+00:00</lastmod></url><url><loc>https://victorwingsing.com/dude-wheres-my-data/</loc><lastmod>2024-06-02T20:56:31+00:00</lastmod></url><url><loc>https://victorwingsing.com/take-a-load-off-and-sit-an-oversimplified-explanation-of-using-sit/</loc><lastmod>2024-06-11T22:38:31+00:00</lastmod></url><url><loc>https://victorwingsing.com/from-novice-to-ninja-a-new-cisos-guide-to-dlp/</loc><lastmod>2025-02-03T21:19:03+00:00</lastmod></url><url><loc>https://victorwingsing.com/excluding-a-specific-user-or-group-from-sensitivity-labels/</loc><lastmod>2025-02-03T21:18:12+00:00</lastmod></url><url><loc>https://victorwingsing.com/ai-implementation-failures-what-we-learned-from-2024/</loc><lastmod>2025-01-03T20:19:38+00:00</lastmod></url><url><loc>https://victorwingsing.com/making-the-case-for-optical-content-recognition-ocr-in-your-data-protection-strategy/</loc><lastmod>2025-02-03T21:18:33+00:00</lastmod></url><url><loc>https://victorwingsing.com/in-the-center-of-it-all/</loc><lastmod>2025-02-04T17:14:21+00:00</lastmod></url><url><loc>https://victorwingsing.com/new-built-in-role-in-entra-ai-admin/</loc><lastmod>2025-02-04T18:25:14+00:00</lastmod></url><url><loc>https://victorwingsing.com/when-inheriting-a-label-is-an-issue/</loc><lastmod>2025-02-09T23:15:56+00:00</lastmod></url><url><loc>https://victorwingsing.com/deep-dive-in-pdf-labeling-and-data-protection/</loc><lastmod>2025-03-09T18:42:01+00:00</lastmod></url><url><loc>https://victorwingsing.com/when-to-use-purview-information-barriers-and-purview-dlp/</loc><lastmod>2025-03-09T22:38:06+00:00</lastmod></url><url><loc>https://victorwingsing.com/using-ereaders-with-microsoft-purview-information-protection-a-remarkable-case-study/</loc><lastmod>2025-03-10T22:51:26+00:00</lastmod></url><url><loc>https://victorwingsing.com/when-purview-sit-names-gives-me-headaches/</loc><lastmod>2025-06-07T19:06:25+00:00</lastmod></url><url><loc>https://victorwingsing.com/when-encryption-meets-reality-what-actually-breaks-when-you-deploy-sensitivity-labels/</loc><lastmod>2025-06-09T19:44:08+00:00</lastmod></url><url><loc>https://victorwingsing.com/recommended-solutions-when-encryption-breaks-your-workflows/</loc><lastmod>2025-06-10T13:18:35+00:00</lastmod></url><url><loc>https://victorwingsing.com/protecting-your-data-from-geopolitical-threats-a-practical-dlp-guide/</loc><lastmod>2025-06-13T17:15:46+00:00</lastmod></url><url><loc>https://victorwingsing.com/how-to-actually-delete-data-in-m365/</loc><lastmod>2026-03-08T21:27:36+00:00</lastmod></url><url><loc>https://victorwingsing.com/your-dlp-strategy-is-not-ready-for-shadow-ai/</loc><lastmod>2026-04-06T17:30:32+00:00</lastmod></url><url><loc>https://victorwingsing.com/enhance-your-dlp-to-tackle-shadow-ai/</loc><lastmod>2026-04-06T17:26:42+00:00</lastmod></url></urlset>
