<?xml version="1.0" encoding="UTF-8"?>
<urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9">
<url>
<loc>https://seciq.pl</loc>
<lastmod>2026-04-09T19:06:23.265Z</lastmod>
<changefreq>weekly</changefreq>
<priority>1</priority>
</url>
<url>
<loc>https://seciq.pl/demo</loc>
<lastmod>2026-04-09T19:06:23.265Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://seciq.pl/pakiety</loc>
<lastmod>2026-04-09T19:06:23.265Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://seciq.pl/dla-zarzadu</loc>
<lastmod>2026-04-09T19:06:23.265Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://seciq.pl/uslugi/dokumentacja-nis2</loc>
<lastmod>2026-04-09T19:06:23.265Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://seciq.pl/uslugi/szkolenia</loc>
<lastmod>2026-04-09T19:06:23.265Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://seciq.pl/uslugi/zero-trust</loc>
<lastmod>2026-04-09T19:06:23.265Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://seciq.pl/uslugi/ochrona-poczty</loc>
<lastmod>2026-04-09T19:06:23.265Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://seciq.pl/uslugi/ochrona-komputerow</loc>
<lastmod>2026-04-09T19:06:23.265Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://seciq.pl/uslugi/ochrona-tozsamosci</loc>
<lastmod>2026-04-09T19:06:23.265Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://seciq.pl/uslugi/zarzadzanie-urzadzeniami</loc>
<lastmod>2026-04-09T19:06:23.265Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://seciq.pl/uslugi/szyfrowanie-danych</loc>
<lastmod>2026-04-09T19:06:23.265Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://seciq.pl/uslugi/ochrona-cloud</loc>
<lastmod>2026-04-09T19:06:23.265Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://seciq.pl/uslugi/siem-soc</loc>
<lastmod>2026-04-09T19:06:23.265Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://seciq.pl/uslugi/hardening-cis</loc>
<lastmod>2026-04-09T19:06:23.265Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://seciq.pl/uslugi/vciso</loc>
<lastmod>2026-04-09T19:06:23.265Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://seciq.pl/uslugi/incident-response</loc>
<lastmod>2026-04-09T19:06:23.265Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://seciq.pl/newsletter</loc>
<lastmod>2026-04-09T19:06:23.265Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://seciq.pl/soc</loc>
<lastmod>2026-04-09T19:06:23.265Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://seciq.pl/nis2</loc>
<lastmod>2026-04-09T19:06:23.265Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://seciq.pl/nis2-iq</loc>
<lastmod>2026-04-09T19:06:23.265Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://seciq.pl/iq-score-mini</loc>
<lastmod>2026-04-09T19:06:23.265Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://seciq.pl/cyberradar</loc>
<lastmod>2026-04-09T19:06:23.265Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://seciq.pl/blog</loc>
<lastmod>2026-04-09T19:06:23.265Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://seciq.pl/wydarzenia</loc>
<lastmod>2026-04-09T19:06:23.265Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://seciq.pl/cyber-talks</loc>
<lastmod>2026-04-09T19:06:23.265Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.9</priority>
</url>
<url>
<loc>https://seciq.pl/o-nas</loc>
<lastmod>2026-04-09T19:06:23.265Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://seciq.pl/polityka-prywatnosci</loc>
<lastmod>2026-04-09T19:06:23.265Z</lastmod>
<changefreq>yearly</changefreq>
<priority>0.3</priority>
</url>
<url>
<loc>https://seciq.pl/encyklopedia-atakow</loc>
<lastmod>2026-04-09T19:06:23.265Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.8</priority>
</url>
<url>
<loc>https://seciq.pl/blog/cyberatak-rodzaje-scenariusze-ochrona</loc>
<lastmod>2026-04-09T00:00:00.000Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://seciq.pl/blog/cyberbezpieczenstwo-dla-firm-kompletny-przewodnik</loc>
<lastmod>2026-04-09T00:00:00.000Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://seciq.pl/blog/ksc-2-0-ustawa-co-musisz-wiedziec</loc>
<lastmod>2026-04-09T00:00:00.000Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://seciq.pl/blog/soc-as-a-service-co-to-jest-ile-kosztuje</loc>
<lastmod>2026-04-09T00:00:00.000Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://seciq.pl/blog/qilin-ransomware-edr-bypass-dlaczego-sam-antywirus-nie-wystarczy</loc>
<lastmod>2026-04-04T00:00:00.000Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://seciq.pl/blog/nis2-kary-vs-koszt-soc-roi</loc>
<lastmod>2026-03-22T00:00:00.000Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://seciq.pl/blog/nis2-soc-dlaczego-monitoring-obowiazkowy</loc>
<lastmod>2026-03-22T00:00:00.000Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://seciq.pl/blog/48h-po-ataku-ransomware-krok-po-kroku</loc>
<lastmod>2026-03-21T00:00:00.000Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://seciq.pl/blog/business-email-compromise-jak-rozpoznac</loc>
<lastmod>2026-03-21T00:00:00.000Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://seciq.pl/blog/ai-w-soc-czy-zastapi-analitykow</loc>
<lastmod>2026-03-20T00:00:00.000Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://seciq.pl/blog/ransomware-2026-statystyki-trendy-polska</loc>
<lastmod>2026-03-20T00:00:00.000Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://seciq.pl/blog/sla-na-uslugi-soc</loc>
<lastmod>2026-03-19T00:00:00.000Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://seciq.pl/blog/soc-microsoft-sentinel-jak-to-dziala</loc>
<lastmod>2026-03-19T00:00:00.000Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://seciq.pl/blog/jak-wybrac-dostawce-soc</loc>
<lastmod>2026-03-18T00:00:00.000Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://seciq.pl/blog/koszty-soc-ile-kosztuje-ochrona-24-7</loc>
<lastmod>2026-03-18T00:00:00.000Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://seciq.pl/blog/co-to-jest-soc</loc>
<lastmod>2026-03-17T00:00:00.000Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://seciq.pl/blog/soc-vs-mdr-vs-mssp</loc>
<lastmod>2026-03-17T00:00:00.000Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://seciq.pl/blog/quishing-qr-code-phishing</loc>
<lastmod>2026-02-23T00:00:00.000Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://seciq.pl/blog/nis2-iso-27001-mapowanie</loc>
<lastmod>2026-02-22T00:00:00.000Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://seciq.pl/blog/nis2-kary-zarzad</loc>
<lastmod>2026-02-22T00:00:00.000Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://seciq.pl/blog/nis2-kogo-dotyczy</loc>
<lastmod>2026-02-22T00:00:00.000Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://seciq.pl/blog/nis2-raportowanie-incydentow</loc>
<lastmod>2026-02-22T00:00:00.000Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://seciq.pl/blog/nis2-wdrozenie-krok-po-kroku</loc>
<lastmod>2026-02-22T00:00:00.000Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://seciq.pl/blog/nis2-terminy-2026</loc>
<lastmod>2026-02-15T00:00:00.000Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://seciq.pl/blog/phishing-trendy-2026</loc>
<lastmod>2026-02-10T00:00:00.000Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://seciq.pl/wydarzenia/cyber-talks-s01e01-ksc-nie-drugie-rodo</loc>
<lastmod>2026-04-16T00:00:00.000Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://seciq.pl/wydarzenia/nis2-praktyczny-przewodnik-wdrozenia</loc>
<lastmod>2026-03-22T00:00:00.000Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://seciq.pl/wydarzenia/czy-twoja-firma-przetrwa-2026</loc>
<lastmod>2026-03-15T00:00:00.000Z</lastmod>
<changefreq>weekly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://seciq.pl/encyklopedia-atakow/supply-chain-attack</loc>
<lastmod>2026-02-23T00:00:00.000Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://seciq.pl/encyklopedia-atakow/deepfake-ai-social-engineering</loc>
<lastmod>2026-02-23T00:00:00.000Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://seciq.pl/encyklopedia-atakow/ransomware</loc>
<lastmod>2026-02-23T00:00:00.000Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://seciq.pl/encyklopedia-atakow/spear-phishing-bec</loc>
<lastmod>2026-02-23T00:00:00.000Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://seciq.pl/encyklopedia-atakow/credential-stuffing</loc>
<lastmod>2026-02-23T00:00:00.000Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://seciq.pl/encyklopedia-atakow/man-in-the-middle</loc>
<lastmod>2026-02-23T00:00:00.000Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://seciq.pl/encyklopedia-atakow/phishing</loc>
<lastmod>2026-02-23T00:00:00.000Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://seciq.pl/encyklopedia-atakow/quishing</loc>
<lastmod>2026-02-23T00:00:00.000Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://seciq.pl/encyklopedia-atakow/sim-swapping</loc>
<lastmod>2026-02-23T00:00:00.000Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://seciq.pl/encyklopedia-atakow/vishing</loc>
<lastmod>2026-02-23T00:00:00.000Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://seciq.pl/encyklopedia-atakow/evil-twin-wifi</loc>
<lastmod>2026-02-23T00:00:00.000Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
<url>
<loc>https://seciq.pl/encyklopedia-atakow/smishing</loc>
<lastmod>2026-02-23T00:00:00.000Z</lastmod>
<changefreq>monthly</changefreq>
<priority>0.7</priority>
</url>
</urlset>
