<?xml version="1.0" encoding="UTF-8"?>
<urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9" xmlns:news="http://www.google.com/schemas/sitemap-news/0.9" xmlns:xhtml="http://www.w3.org/1999/xhtml" xmlns:mobile="http://www.google.com/schemas/sitemap-mobile/1.0" xmlns:image="http://www.google.com/schemas/sitemap-image/1.1" xmlns:video="http://www.google.com/schemas/sitemap-video/1.1">
<url><loc>https://elastio.com/webinars/turn-cloud-migration-into-a-ransomware-resilience-upgrade</loc><lastmod>2026-04-09T00:00:00.000Z</lastmod></url>
<url><loc>https://elastio.com/webinars/why-cyber-risk-spikes-during-disasters---and-what-it-means-for-security-infrastructure-and-resilience-teams</loc><lastmod>2026-01-28T00:00:00.000Z</lastmod></url>
<url><loc>https://elastio.com/webinars/understanding-elastio--aws-guardduty-malware-scanning-for-aws-backup</loc><lastmod>2026-01-04T00:00:00.000Z</lastmod></url>
<url><loc>https://elastio.com/webinars/how-modern-ransomware-attacks-your-recovery-path----and-what-you-can-do-about-it-today</loc><lastmod>2025-11-24T00:00:00.000Z</lastmod></url>
<url><loc>https://elastio.com/webinars/cloud-backups-under-attack-how-veeam-and-elastio-control-recovery</loc><lastmod>2025-08-22T00:00:00.000Z</lastmod></url>
<url><loc>https://elastio.com/webinars/ciso-fireside-regulations-now-demand-proof-you-can-recover--are-you-ready</loc><lastmod>2025-07-27T00:00:00.000Z</lastmod></url>
<url><loc>https://elastio.com/webinars/availability-in-the-age-of-ransomware-building-cyber-resilient-disaster-recovery-on-aws</loc><lastmod>2025-05-16T00:00:00.000Z</lastmod></url>
<url><loc>https://elastio.com/webinars/anti-ransomware-for-backups-for-business-continuity-and-compliance</loc><lastmod>2025-04-22T00:00:00.000Z</lastmod></url>
<url><loc>https://elastio.com/webinars/disaster-recovery-for-todays-cyber-threats</loc><lastmod>2025-04-02T00:00:00.000Z</lastmod></url>
<url><loc>https://elastio.com/webinars/protecting-your-aws-s3-data-from-the-ransomware-pandemic</loc><lastmod>2025-01-25T00:00:00.000Z</lastmod></url>
<url><loc>https://elastio.com/webinars/how-to-survive-a-severe-cyber-outage</loc><lastmod>2024-06-01T00:00:00.000Z</lastmod></url>
<url><loc>https://elastio.com/webinars/why-a-secure-data-vault-is-a-business-imperative</loc><lastmod>2024-01-10T00:00:00.000Z</lastmod></url>
<url><loc>https://elastio.com/webinars/why-s3-is-the-biggest-gateway-for-cyber-attacks</loc><lastmod>2024-01-02T00:00:00.000Z</lastmod></url>
<url><loc>https://elastio.com/webinars/immutability-with-integrity-ensuring-your-business-can-recover-from-a-ransomware-attack</loc><lastmod>2023-12-26T00:00:00.000Z</lastmod></url>
<url><loc>https://elastio.com/webinars/why-xdr-is-not-enough-to-stop-ransomware-attacks</loc><lastmod>2023-11-29T00:00:00.000Z</lastmod></url>
<url><loc>https://elastio.com/webinars/proactive-threat-detection-on-aws-backup-with-elastio</loc><lastmod>2023-05-24T00:00:00.000Z</lastmod></url>
<url><loc>https://elastio.com/webinars/the-anatomy-of-a-cyber-attack</loc><lastmod>2023-05-03T00:00:00.000Z</lastmod></url>
</urlset>