<?xml version="1.0" encoding="UTF-8"?><urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9" xmlns:news="http://www.google.com/schemas/sitemap-news/0.9" xmlns:xhtml="http://www.w3.org/1999/xhtml" xmlns:mobile="http://www.google.com/schemas/sitemap-mobile/1.0" xmlns:image="http://www.google.com/schemas/sitemap-image/1.1" xmlns:video="http://www.google.com/schemas/sitemap-video/1.1"><url><loc>https://www.nrdcs.eu/new/socshare-cybersecurity-landscape-in-february-2026/</loc></url><url><loc>https://www.nrdcs.eu/new/socshare-january-2026-cybersecurity-landscape-review/</loc></url><url><loc>https://www.nrdcs.eu/new/socshare-cybersecurity-landscape-in-december-2025/</loc></url><url><loc>https://www.nrdcs.eu/new/cti-ai-project-end-of-year-update/</loc></url><url><loc>https://www.nrdcs.eu/new/the-most-common-myths-related-to-the-implementation-of-the-dora-regulation/</loc></url><url><loc>https://www.nrdcs.eu/new/soccare-december-2025-rondodox-campaign-routers-beware/</loc></url><url><loc>https://www.nrdcs.eu/new/engaging-management-and-operational-teams-to-do-trainings-ttxs-practice-sessions-etc/</loc></url><url><loc>https://www.nrdcs.eu/new/designing-an-engaging-and-realistic-ttx-for-an-organisation/</loc></url><url><loc>https://www.nrdcs.eu/new/weekly-cyber-drills-how-to-make-them-a-mission-possible/</loc></url><url><loc>https://www.nrdcs.eu/new/how-to-design-and-lead-multi-organisational-and-multi-national-ttxs/</loc></url><url><loc>https://www.nrdcs.eu/new/nrd-cyber-security-liquidates-nrd-bangladesh/</loc></url><url><loc>https://www.nrdcs.eu/new/soccare-august-2025-cracking-the-archive/</loc></url><url><loc>https://www.nrdcs.eu/new/what-impact-might-nis2-have-on-africa/</loc></url><url><loc>https://www.nrdcs.eu/new/what-impact-might-nis2-have-on-south-america/</loc></url><url><loc>https://www.nrdcs.eu/new/how-lithuania-stepped-up-its-game-with-the-nis2-directive/</loc></url><url><loc>https://www.nrdcs.eu/new/security-automation-from-idea-to-tool/</loc></url><url><loc>https://www.nrdcs.eu/new/soccare-may-2025-malpeek-analysis-of-a-copyright-infringement-malware/</loc></url><url><loc>https://www.nrdcs.eu/new/nrd-cyber-security-recorded-strong-growth-and-international-expansion-in-2024/</loc></url><url><loc>https://www.nrdcs.eu/new/socshare-may-2025-cybersecurity-landscape-review/</loc></url><url><loc>https://www.nrdcs.eu/new/socshare-march-2025-cybersecurity-landscape-review/</loc></url><url><loc>https://www.nrdcs.eu/new/building-awareness-is-a-continuous-effort/</loc></url><url><loc>https://www.nrdcs.eu/new/facilitating-dialogue-on-nis2-within-the-lithuanian-cybersecurity-ecosystem/</loc></url><url><loc>https://www.nrdcs.eu/new/developing-a-culture-of-cti-sharing-in-lithuania/</loc></url><url><loc>https://www.nrdcs.eu/new/socshare-2025-january-cybersecurity-landscape-in-lithuania/</loc></url><url><loc>https://www.nrdcs.eu/new/festivities-in-lithuania-in-8-episodes/</loc></url><url><loc>https://www.nrdcs.eu/new/socshare-december-2024-cyber-threats-for-elderly/</loc></url><url><loc>https://www.nrdcs.eu/new/soccare-november-2024-have-you-noticed-a-stillness/</loc></url><url><loc>https://www.nrdcs.eu/new/socshare-november-2024-cyber-trap/</loc></url><url><loc>https://www.nrdcs.eu/new/socshare-october-2024-talking-with-children-about-security-in-cyberspace/</loc></url><url><loc>https://www.nrdcs.eu/new/interview-national-csirt-in-a-small-country-the-kingdom-of-bhutan/</loc></url><url><loc>https://www.nrdcs.eu/new/national-csirt-in-a-small-country-the-bahamas-case/</loc></url><url><loc>https://www.nrdcs.eu/new/national-csirt-in-a-small-country-jcsc-case/</loc></url><url><loc>https://www.nrdcs.eu/new/cyber-threats-prior-to-the-us-elections/</loc></url><url><loc>https://www.nrdcs.eu/new/results-for-2024-h1/</loc></url><url><loc>https://www.nrdcs.eu/new/socshare-august-2024-a-year-in-a-nutshell/</loc></url><url><loc>https://www.nrdcs.eu/new/socshare-july-2024-police-virtual-patrol-and-the-cyber-threats-they-see/</loc></url><url><loc>https://www.nrdcs.eu/new/socshare-june-2024-cyber-threat-intelligence-information-gathering-without-vendors/</loc></url><url><loc>https://www.nrdcs.eu/new/socshare-may-the-disclosure-dilemma/</loc></url><url><loc>https://www.nrdcs.eu/new/socshare-whats-new-in-april-2024/</loc></url><url><loc>https://www.nrdcs.eu/new/nrd-cyber-securitys-growth-shows-an-increasing-demand-for-quality-cybersecurity-services/</loc></url><url><loc>https://www.nrdcs.eu/new/the-dangers-of-cybersecurity-jargon-malawi-case/</loc></url><url><loc>https://www.nrdcs.eu/new/socshare-march-2024-cyber-threat-intelligence-through-social-media-channels/</loc></url><url><loc>https://www.nrdcs.eu/new/evaluating-cyber-capacity-building-interview-with-gcscc/</loc></url><url><loc>https://www.nrdcs.eu/new/gender-focused-evaluation-of-cyber-capacity-building-projects/</loc></url><url><loc>https://www.nrdcs.eu/new/socshare-update-2024-february/</loc></url><url><loc>https://www.nrdcs.eu/new/socshare-the-start-of-2024/</loc></url><url><loc>https://www.nrdcs.eu/new/key-cyber-threats-in-lithuania-in-december-2023/</loc></url><url><loc>https://www.nrdcs.eu/new/collective-cybersecurity-newsletter-vol-1-is-out/</loc></url><url><loc>https://www.nrdcs.eu/new/cybersecurity-threat-landscape-in-lithuania-for-november-2023/</loc></url><url><loc>https://www.nrdcs.eu/new/olivier-caleff-on-why-csirt-soc-is-valuable-for-ciso/</loc></url><url><loc>https://www.nrdcs.eu/new/we-are-part-of-the-global-conference-on-cyber-capacity-building-gc3b/</loc></url><url><loc>https://www.nrdcs.eu/new/nrd-cyber-security-and-vilnius-municipalitys-e2-9-million-project-to-strengthen-eu-cyber-resilience/</loc></url><url><loc>https://www.nrdcs.eu/new/zero-day-exploit-cvss3-1-8-3-8-1/</loc></url><url><loc>https://www.nrdcs.eu/new/national-public-lists-on-cybersecurity-hygiene/</loc></url><url><loc>https://www.nrdcs.eu/new/we-have-grown-during-the-h1-of-2023/</loc></url><url><loc>https://www.nrdcs.eu/events/socshare-threat-intelligence-sharing-meeting-10/</loc></url><url><loc>https://www.nrdcs.eu/events/10-questions-to-ask-your-soc-team-or-service-provider/</loc></url><url><loc>https://www.nrdcs.eu/events/effective-security-monitoring/</loc></url><url><loc>https://www.nrdcs.eu/events/nis2-lessons-learnt-in-lithuania-and-what-to-expect-in-germany/</loc></url><url><loc>https://www.nrdcs.eu/events/socshare-threat-intelligence-sharing-meeting-9/</loc></url><url><loc>https://www.nrdcs.eu/events/lithuanian-tf-csirt-ir-first-org-members-meet-up/</loc></url><url><loc>https://www.nrdcs.eu/events/soccare-threat-intelligence-sharing-meeting-6/</loc></url><url><loc>https://www.nrdcs.eu/events/tools-used-by-csirt-soc-vulnerability-management/</loc></url><url><loc>https://www.nrdcs.eu/events/free-online-webinar-on-security-automation-from-idea-to-tool-2/</loc></url><url><loc>https://www.nrdcs.eu/events/itu-academy-training-course-strengthening-cybersecurity-through-effective-csirt-and-soc-models/</loc></url><url><loc>https://www.nrdcs.eu/events/37th-annual-first-conference/</loc></url><url><loc>https://www.nrdcs.eu/events/global-conference-on-cyber-capacity-building-gc3b-2025/</loc></url><url><loc>https://www.nrdcs.eu/events/cyber-threat-monitoring/</loc></url><url><loc>https://www.nrdcs.eu/events/e-conference-technical-demonstrations-of-trending-cybersecurity-solutions/</loc></url><url><loc>https://www.nrdcs.eu/events/cyber-resilience-2025/</loc></url><url><loc>https://www.nrdcs.eu/events/itu-academy-training-national-cyber-crisis-management-2025/</loc></url><url><loc>https://www.nrdcs.eu/events/socshare-threat-intelligence-sharing-meeting-5/</loc></url><url><loc>https://www.nrdcs.eu/events/socsahre-threat-intelligence-sharing-meeting-4/</loc></url><url><loc>https://www.nrdcs.eu/events/soccare-threat-intelligence-sharing-meeting/</loc></url><url><loc>https://www.nrdcs.eu/events/threat-intelligence-sharing-meeting-3/</loc></url><url><loc>https://www.nrdcs.eu/events/we-will-be-a-part-of-the-36th-annual-first-conference-bridging-security-response-gaps/</loc></url><url><loc>https://www.nrdcs.eu/events/itu-academy-training-csirt-soc-establishment-and-modernisation-2025/</loc></url><url><loc>https://www.nrdcs.eu/events/itu-academy-training-national-cyber-crisis-management-2024/</loc></url><url><loc>https://www.nrdcs.eu/events/tools-used-by-csirt-soc/</loc></url><url><loc>https://www.nrdcs.eu/events/threat-intelligence-sharing-meeting-1/</loc></url><url><loc>https://www.nrdcs.eu/events/global-conference-on-cyber-capacity-building-gc3b/</loc></url><url><loc>https://www.nrdcs.eu/events/itu-academy-training-national-cyber-crisis-management/</loc></url><url><loc>https://www.nrdcs.eu/events/itu-academy-training-csirt-soc-establishment-and-modernisation/</loc></url><url><loc>https://www.nrdcs.eu/events/35th-annual-first-conference-empowering-communities/</loc></url><url><loc>https://www.nrdcs.eu/events/2023-first-africacert-symposium-africa-and-arab-regions/</loc></url><url><loc>https://www.nrdcs.eu/events/participation-in-the-34th-annual-first-conference/</loc></url><url><loc>https://www.nrdcs.eu/senior-information-and-cyber-security-expert/</loc></url><url><loc>https://www.nrdcs.eu/business-development-assistant-maternity-cover/</loc></url><url><loc>https://www.nrdcs.eu/nis2v2/</loc></url><url><loc>https://www.nrdcs.eu/natrix-for-msps/</loc></url><url><loc>https://www.nrdcs.eu/incidentron/</loc></url><url><loc>https://www.nrdcs.eu/b2b-marketing-growth-manager/</loc></url><url><loc>https://www.nrdcs.eu/hr-specialist/</loc></url><url><loc>https://www.nrdcs.eu/service-delivery-manager/</loc></url><url><loc>https://www.nrdcs.eu/cybersecurity-assesment-team/</loc></url><url><loc>https://www.nrdcs.eu/notice-on-the-storage-of-candidates-data/</loc></url><url><loc>https://www.nrdcs.eu/cybersecurity-analyst-shift-work/</loc></url><url><loc>https://www.nrdcs.eu/nis2/</loc></url><url><loc>https://www.nrdcs.eu/cti-ai/</loc></url><url><loc>https://www.nrdcs.eu/ciso-advisory-2/</loc></url><url><loc>https://www.nrdcs.eu/dora-compliance-assessment-and-implementation/</loc></url><url><loc>https://www.nrdcs.eu/edr-xdr-ndr-solutions/</loc></url><url><loc>https://www.nrdcs.eu/sales-manager/</loc></url><url><loc>https://www.nrdcs.eu/sales-and-business-development-assistant/</loc></url><url><loc>https://www.nrdcs.eu/sales-project-manager/</loc></url><url><loc>https://www.nrdcs.eu/cyber-threat-intelligence-specialist/</loc></url><url><loc>https://www.nrdcs.eu/it-auditor/</loc></url><url><loc>https://www.nrdcs.eu/cybersecurity-capacity-building-team/</loc></url><url><loc>https://www.nrdcs.eu/advisory-team/</loc></url><url><loc>https://www.nrdcs.eu/cybersecurity-analyst/</loc></url><url><loc>https://www.nrdcs.eu/project-coordinator/</loc></url><url><loc>https://www.nrdcs.eu/soccare/</loc></url><url><loc>https://www.nrdcs.eu/national-cyber-crisis-management/</loc></url><url><loc>https://www.nrdcs.eu/it-administrator/</loc></url><url><loc>https://www.nrdcs.eu/socshare/</loc></url><url><loc>https://www.nrdcs.eu/pasirengimas-nis2/</loc></url><url><loc>https://www.nrdcs.eu/olivier-caleff-on-why-csirt-soc-is-valuable-for-ciso/</loc></url><url><loc>https://www.nrdcs.eu/senior-capacity-building-expert/</loc></url><url><loc>https://www.nrdcs.eu/registration-and-payments/</loc></url><url><loc>https://www.nrdcs.eu/cyber-security-project-manager/</loc></url><url><loc>https://www.nrdcs.eu/cyberset/</loc></url><url><loc>https://www.nrdcs.eu/technology-deployment-group/</loc></url><url><loc>https://www.nrdcs.eu/product-development-team/</loc></url><url><loc>https://www.nrdcs.eu/cybersecurity-group/</loc></url><url><loc>https://www.nrdcs.eu/analysis-using-i2-analysts-notebook/</loc></url><url><loc>https://www.nrdcs.eu/cybersecurity-essentials/</loc></url><url><loc>https://www.nrdcs.eu/intelligence-analysis-from-problem-identification-to-decision-making/</loc></url><url><loc>https://www.nrdcs.eu/incident-response-practice/</loc></url><url><loc>https://www.nrdcs.eu/digital-forensics/</loc></url><url><loc>https://www.nrdcs.eu/csirt-or-soc-establishment-and-modernisation/</loc></url><url><loc>https://www.nrdcs.eu/training-courses/</loc></url><url><loc>https://www.nrdcs.eu/data-loss-prevention-dlp/</loc></url><url><loc>https://www.nrdcs.eu/vulnerability-management/</loc></url><url><loc>https://www.nrdcs.eu/privileged-access-management-pam-deployment-and-management/</loc></url><url><loc>https://www.nrdcs.eu/security-information-event-management-siem/</loc></url><url><loc>https://www.nrdcs.eu/technology-solutions/</loc></url><url><loc>https://www.nrdcs.eu/cybersecurity-capacity-building/</loc></url><url><loc>https://www.nrdcs.eu/development-of-frameworks-for-critical-information-infrastructure-cii-protection/</loc></url><url><loc>https://www.nrdcs.eu/national-cybersecurity-strategy-development-and-legal-framework-improvement/</loc></url><url><loc>https://www.nrdcs.eu/cybersecurity-capacity-maturity-model-for-nations-cmm/</loc></url><url><loc>https://www.nrdcs.eu/iso-27001-standard-implementation/</loc></url><url><loc>https://www.nrdcs.eu/ciso-advisory-services/</loc></url><url><loc>https://www.nrdcs.eu/cloud-security/</loc></url><url><loc>https://www.nrdcs.eu/penetration-and-vulnerability-assessment/</loc></url><url><loc>https://www.nrdcs.eu/it-security-audit/</loc></url><url><loc>https://www.nrdcs.eu/social-engineering/</loc></url><url><loc>https://www.nrdcs.eu/swift-assessment/</loc></url><url><loc>https://www.nrdcs.eu/audits-and-assessments/</loc></url><url><loc>https://www.nrdcs.eu/csirt-and-soc-consultancy-services/</loc></url><url><loc>https://www.nrdcs.eu/natrix/</loc></url><url><loc>https://www.nrdcs.eu/cybersoc-team/</loc></url><url><loc>https://www.nrdcs.eu/contacts/</loc></url><url><loc>https://www.nrdcs.eu/about-us/</loc></url><url><loc>https://www.nrdcs.eu/cybersoc/</loc></url><url><loc>https://www.nrdcs.eu/events/</loc></url><url><loc>https://www.nrdcs.eu/career/</loc></url><url><loc>https://www.nrdcs.eu/customer-stories/</loc></url><url><loc>https://www.nrdcs.eu/whats-new/</loc></url><url><loc>https://www.nrdcs.eu/cookie-policy/</loc></url><url><loc>https://www.nrdcs.eu/customer-stories/lemona-electronics-strengthens-the-cyber-resilience-of-its-e-commerce-electronics-business-through-a-partnership-with-nrd-cyber-security/</loc></url><url><loc>https://www.nrdcs.eu/customer-stories/national-health-insurance-fund-vlk-is-working-with-nrd-cyber-security-to-strengthen-its-cyber-resilience/</loc></url><url><loc>https://www.nrdcs.eu/customer-stories/artea-bank-enlisted-the-help-of-nrd-cyber-security-to-monitor-cyber-threats-24-7/</loc></url><url><loc>https://www.nrdcs.eu/customer-stories/staticus-enlisted-the-services-of-nrd-cyber-security-for-its-security-operations-centre-soc/</loc></url><url><loc>https://www.nrdcs.eu/customer-stories/the-acme-group-sets-high-standards-for-cyber-resilience-and-begins-cooperation-with-nrd-cyber-security/</loc></url><url><loc>https://www.nrdcs.eu/customer-stories/teltonika-strengthens-its-competitive-edge-with-a-firm-focus-on-cybersecurity-through-partnership-with-nrd-cyber-security/</loc></url><url><loc>https://www.nrdcs.eu/customer-stories/fostering-cyber-resilience-in-bhutan/</loc></url><url><loc>https://www.nrdcs.eu/customer-stories/national-cybersecurity-strategy-and-action-plan-for-sao-tome-and-principe/</loc></url><url><loc>https://www.nrdcs.eu/customer-stories/ciso-services-for-the-roix-crowdfunding-platform/</loc></url><url><loc>https://www.nrdcs.eu/customer-stories/cybersoc-managed-soc-services-in-the-bank-of-botswana/</loc></url><url><loc>https://www.nrdcs.eu/customer-stories/natrix-and-cyberset-for-csirtmalta/</loc></url><url><loc>https://www.nrdcs.eu/customer-stories/natrix-threat-monitoring-platform-for-egypts-financial-sector/</loc></url><url><loc>https://www.nrdcs.eu/customer-stories/assessment-of-the-technical-and-organisational-security-defences-for-the-central-bank-of-botswanas-infrastructure/</loc></url><url><loc>https://www.nrdcs.eu/customer-stories/assessment-of-the-technical-and-organisational-security-defences-for-the-bank-of-guyanas-infrastructure/</loc></url><url><loc>https://www.nrdcs.eu/customer-stories/sectorial-csirt-for-energy-sector-in-kosovo/</loc></url><url><loc>https://www.nrdcs.eu/customer-stories/cybersecurity-fusion-centre-capacity-building-for-the-central-bank-of-nigeria/</loc></url><url><loc>https://www.nrdcs.eu/customer-stories/european-investment-bank-the-creation-of-a-methodology-to-identify-cyber-security-related-investments/</loc></url><url><loc>https://www.nrdcs.eu/customer-stories/trinidad-and-tobago-national-csirt-modernisation/</loc></url><url><loc>https://www.nrdcs.eu/customer-stories/improving-human-resource-capacity-in-cybersecurity-in-ecuador/</loc></url><url><loc>https://www.nrdcs.eu/customer-stories/kenya-national-csirt-modernisation/</loc></url><url><loc>https://www.nrdcs.eu/customer-stories/cyprus-national-csirt-establishment/</loc></url><url><loc>https://www.nrdcs.eu/customer-stories/analytical-study-analysis-of-cyber-threats-to-lithuanias-critical-energy-infrastructure-and-financial-sector/</loc></url><url><loc>https://www.nrdcs.eu/customer-stories/design-the-sectorial-c-soc-for-the-uganda-bankers-association/</loc></url><url><loc>https://www.nrdcs.eu/customer-stories/assessment-of-the-republic-of-serbias-cybersecurity-ecosystem/</loc></url><url><loc>https://www.nrdcs.eu/customer-stories/rwanda-oxford-cmm-assessment/</loc></url><url><loc>https://www.nrdcs.eu/customer-stories/assessment-of-the-level-of-cybersecurity-governance-and-the-security-of-the-critical-national-infrastructure-in-serbia/</loc></url><url><loc>https://www.nrdcs.eu/customer-stories/the-bahamas-national-cirt-establishment/</loc></url><url><loc>https://www.nrdcs.eu/customer-stories/assessment-of-the-cybersecurity-ecosystem-in-bosnia-and-herzegovina-2/</loc></url><url><loc>https://www.nrdcs.eu/customer-stories/assessment-of-the-cybersecurity-ecosystem-in-bosnia-and-herzegovina/</loc></url><url><loc>https://www.nrdcs.eu/customer-stories/national-cert-establishment-in-malawi/</loc></url><url><loc>https://www.nrdcs.eu/customer-stories/national-critical-information-infrastructure-identification-methodology/</loc></url><url><loc>https://www.nrdcs.eu/customer-stories/it-security-assessment-for-viciunai-group/</loc></url><url><loc>https://www.nrdcs.eu/customer-stories/support-to-cybersecurity-in-ukraine/</loc></url><url><loc>https://www.nrdcs.eu/customer-stories/set-up-and-implementation-of-centralised-digital-forensic-laboratory/</loc></url><url><loc>https://www.nrdcs.eu/customer-stories/secure-soft-security-operation-center-soc-maturity-assessment-in-peru/</loc></url><url><loc>https://www.nrdcs.eu/customer-stories/set-up-of-monitoring-system-at-lithuanias-centre-of-registers/</loc></url><url><loc>https://www.nrdcs.eu/customer-stories/certification-security-audit-of-election-management-system/</loc></url><url><loc>https://www.nrdcs.eu/customer-stories/national-cyber-security-incident-response-team-development/</loc></url><url><loc>https://www.nrdcs.eu/customer-stories/provision-of-mobile-forensic-software-for-competition-council/</loc></url><url><loc>https://www.nrdcs.eu/customer-stories/growing-cybersecurity-maturity-for-the-university-of-cape-town-uct/</loc></url><url><loc>https://www.nrdcs.eu/customer-stories/comprehensive-security-check-for-competition-council/</loc></url><url><loc>https://www.nrdcs.eu/customer-stories/methodology-for-identification-of-national-critical-it-infrastructure-in-public-networks/</loc></url><url><loc>https://www.nrdcs.eu/customer-stories/cobit-5-implementation-at-a-central-bank/</loc></url><url><loc>https://www.nrdcs.eu/customer-stories/nacionalines-bangladeso-kibernetiniu-incidentu-reagavimo-komandos-bgd-e-gov-cirt-kurimas/</loc></url><url><loc>https://www.nrdcs.eu/customer-stories/enhancing-internal-fraud-prevention-for-siauliu-bankas/</loc></url><url><loc>https://www.nrdcs.eu/</loc></url></urlset>