<?xml version="1.0" encoding="UTF-8"?>
<urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9" xmlns:image="http://www.google.com/schemas/sitemap-image/1.1">
  <url>
    <loc>https://www.cashelgroup.com.au/blog</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2018-06-14</lastmod>
  </url>
  <url>
    <loc>https://www.cashelgroup.com.au/professional-services</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2018-05-28</lastmod>
    <image:image>
      <image:loc>https://static1.squarespace.com/static/55d55a81e4b099f9b43d6d02/t/566bbee940667a1cc168bad9/1449901809976/</image:loc>
      <image:title>Network Security Professional Services</image:title>
    </image:image>
    <image:image>
      <image:loc>https://static1.squarespace.com/static/55d55a81e4b099f9b43d6d02/t/566f9225e0327c1bbc56d18d/1450152494074/</image:loc>
      <image:title>Network Security Professional Services</image:title>
    </image:image>
    <image:image>
      <image:loc>https://static1.squarespace.com/static/55d55a81e4b099f9b43d6d02/t/56683c451115e07461e3b6ca/1472186936117/One-day-I-will-run-this-place-000020573651_Full.jpg</image:loc>
      <image:title>Network Security Professional Services</image:title>
    </image:image>
  </url>
  <url>
    <loc>https://www.cashelgroup.com.au/contact-us</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2018-07-10</lastmod>
    <image:image>
      <image:loc>https://static1.squarespace.com/static/55d55a81e4b099f9b43d6d02/t/568c85d7dc5cb4a5b51863bd/1452049883522/Small+Two-businessmen-talking-while-looking-at-notes-000029245606_Full.jpg</image:loc>
      <image:title>Contact Us</image:title>
    </image:image>
  </url>
  <url>
    <loc>https://www.cashelgroup.com.au/downloads-1</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2018-11-04</lastmod>
    <image:image>
      <image:loc>https://static1.squarespace.com/static/55d55a81e4b099f9b43d6d02/t/576630916b8f5b316be62e2f/1468971167022/</image:loc>
      <image:title>Downloads</image:title>
    </image:image>
    <image:image>
      <image:loc>https://static1.squarespace.com/static/55d55a81e4b099f9b43d6d02/t/57bff85a9f7456b465a632fc/1472198759233/iStock_72775839_MEDIUM.jpg</image:loc>
      <image:title>Downloads</image:title>
    </image:image>
  </url>
  <url>
    <loc>https://www.cashelgroup.com.au/about-us</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2018-05-28</lastmod>
    <image:image>
      <image:loc>https://static1.squarespace.com/static/55d55a81e4b099f9b43d6d02/t/56f365fc1711079ff4922ab5/1468971238095/</image:loc>
      <image:title>About Us</image:title>
    </image:image>
    <image:image>
      <image:loc>https://static1.squarespace.com/static/55d55a81e4b099f9b43d6d02/t/56e903bf2fe131bddbd1e9f5/1458112080206/</image:loc>
      <image:title>About Us</image:title>
    </image:image>
    <image:image>
      <image:loc>https://static1.squarespace.com/static/55d55a81e4b099f9b43d6d02/t/5935424e59cc687cc797b30f/1496662617396/group-of-smiling-businesspeople-meeting-in-office-000066255555_Full.jpg</image:loc>
      <image:title>About Us</image:title>
    </image:image>
  </url>
  <url>
    <loc>https://www.cashelgroup.com.au/observeit</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2018-06-28</lastmod>
    <image:image>
      <image:loc>https://static1.squarespace.com/static/55d55a81e4b099f9b43d6d02/t/587af27dff7c50c9f5e45414/1484542147764/</image:loc>
      <image:title>Insider Threat Management &amp; Incident Response Solutions</image:title>
    </image:image>
    <image:image>
      <image:loc>https://static1.squarespace.com/static/55d55a81e4b099f9b43d6d02/t/5935ef2e86e6c01fc1bec453/1506059521609/</image:loc>
      <image:title>Insider Threat Management &amp; Incident Response Solutions</image:title>
      <image:caption>    With over a decade of experience in hiring highly sought after IT Security resources, we can find the right resource for your business  </image:caption>
    </image:image>
    <image:image>
      <image:loc>https://static1.squarespace.com/static/55d55a81e4b099f9b43d6d02/t/587aea9b2e69cf99452969e5/1484455194349/</image:loc>
      <image:title>Insider Threat Management &amp; Incident Response Solutions</image:title>
      <image:caption>  Windows Exploitation course Reverse Engineering course Web Application Security training Red Teaming Master Course Executive &amp; Board Member Security Training  </image:caption>
    </image:image>
    <image:image>
      <image:loc>https://static1.squarespace.com/static/55d55a81e4b099f9b43d6d02/t/587aed1117bffc8c1ec70907/1484456937556/Small+front+pic_0006_consulting.jpg</image:loc>
      <image:title>Insider Threat Management &amp; Incident Response Solutions</image:title>
      <image:caption>Source and consume IT resources on demand Enable agile resource 'surging' for urgent project delivery Fixed Price or Time &amp; Materials engagement models Convert our resources to permanent staff if needed at a fraction of the normal cost</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://static1.squarespace.com/static/55d55a81e4b099f9b43d6d02/t/587afb00ff7c50c9f5e4a0d3/1484454681170/</image:loc>
      <image:title>Insider Threat Management &amp; Incident Response Solutions</image:title>
    </image:image>
    <image:image>
      <image:loc>https://static1.squarespace.com/static/55d55a81e4b099f9b43d6d02/t/587aebdba5790ab82b937043/1484455274480/</image:loc>
      <image:title>Insider Threat Management &amp; Incident Response Solutions</image:title>
      <image:caption>  IT Security Engineering, Consulting &amp; Architecture Program &amp; Project Management    </image:caption>
    </image:image>
    <image:image>
      <image:loc>https://static1.squarespace.com/static/55d55a81e4b099f9b43d6d02/t/587ae9e8d2b857926895e85b/1484450326885/</image:loc>
      <image:title>Insider Threat Management &amp; Incident Response Solutions</image:title>
      <image:caption>Access Manager (OAM) &amp; Single Sign-on Suite (OESSO) implementation Enterprise Gateway (OEG) &amp; Web Services Manager (OWSM) implementation Directory Integration Platform (DIP), Identity Directory (OID) &amp; Virtual Directory (OVD) implementation Identity Manager (OIM), Role Manager and Identity Analytics (OIA) development</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://static1.squarespace.com/static/55d55a81e4b099f9b43d6d02/t/587ae8888419c288638b080e/1484455236135/Small+Virus-search-000019991994_Full.jpg</image:loc>
      <image:title>Insider Threat Management &amp; Incident Response Solutions</image:title>
      <image:caption>Targeted Threat Hunting External &amp; Internal Penetration testing Wireless &amp; VoIP Penetration testing Vulnerability Assessments &amp; Password Auditing Application Architecture Security review Security Source Code review</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://static1.squarespace.com/static/55d55a81e4b099f9b43d6d02/t/587ada381e5b6cf13b809e70/1484446277023/Small+Futuristic-smart-glasses-000052024674_Full.jpg</image:loc>
      <image:title>Insider Threat Management &amp; Incident Response Solutions</image:title>
    </image:image>
  </url>
  <url>
    <loc>https://www.cashelgroup.com.au/penetration-testing</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2018-06-28</lastmod>
    <image:image>
      <image:loc>https://static1.squarespace.com/static/55d55a81e4b099f9b43d6d02/t/591159f117bffce40d76c57b/1468970824167/</image:loc>
      <image:title>Penetration Testing Experts Melbourne | IT Security Assessment Services</image:title>
    </image:image>
    <image:image>
      <image:loc>https://static1.squarespace.com/static/55d55a81e4b099f9b43d6d02/t/591159f117bffce40d76c57a/1468970788406/</image:loc>
      <image:title>Penetration Testing Experts Melbourne | IT Security Assessment Services</image:title>
    </image:image>
    <image:image>
      <image:loc>https://static1.squarespace.com/static/55d55a81e4b099f9b43d6d02/t/591159f117bffce40d76c579/1453972087330/Woman-use-digital-tablet.jpg</image:loc>
      <image:title>Penetration Testing Experts Melbourne | IT Security Assessment Services</image:title>
    </image:image>
  </url>
  <url>
    <loc>https://www.cashelgroup.com.au/meraki</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2018-06-28</lastmod>
    <image:image>
      <image:loc>https://static1.squarespace.com/static/55d55a81e4b099f9b43d6d02/t/5afea22e70a6ad7131e3c5c0/1526637109236/seccamera.jpg</image:loc>
      <image:title>Meraki Cloud Managed Network System | Cisco Meraki Solutions</image:title>
      <image:caption>    With over a decade of experience in hiring highly sought after IT Security resources, we can find the right resource for your business  </image:caption>
    </image:image>
    <image:image>
      <image:loc>https://static1.squarespace.com/static/55d55a81e4b099f9b43d6d02/t/5afea0c11ae6cff5bd8bc235/1526636747518/Mobile1.jpg</image:loc>
      <image:title>Meraki Cloud Managed Network System | Cisco Meraki Solutions</image:title>
    </image:image>
    <image:image>
      <image:loc>https://static1.squarespace.com/static/55d55a81e4b099f9b43d6d02/t/5afea215f950b72a97ed178a/1526637085095/6.jpg</image:loc>
      <image:title>Meraki Cloud Managed Network System | Cisco Meraki Solutions</image:title>
      <image:caption>  IT Security Engineering, Consulting &amp; Architecture Program &amp; Project Management    </image:caption>
    </image:image>
    <image:image>
      <image:loc>https://static1.squarespace.com/static/55d55a81e4b099f9b43d6d02/t/5afea1fdf950b72a97ed1551/1526637056919/7.jpg</image:loc>
      <image:title>Meraki Cloud Managed Network System | Cisco Meraki Solutions</image:title>
      <image:caption>  Windows Exploitation course Reverse Engineering course Web Application Security training Red Teaming Master Course Executive &amp; Board Member Security Training  </image:caption>
    </image:image>
    <image:image>
      <image:loc>https://static1.squarespace.com/static/55d55a81e4b099f9b43d6d02/t/59c4ae2c4c0dbf55a10206ea/1506061967632/CM_Logo_Color.png</image:loc>
      <image:title>Meraki Cloud Managed Network System | Cisco Meraki Solutions</image:title>
    </image:image>
    <image:image>
      <image:loc>https://static1.squarespace.com/static/55d55a81e4b099f9b43d6d02/t/5afea08b575d1f4238bf6829/1526636692745/laptop1.jpg</image:loc>
      <image:title>Meraki Cloud Managed Network System | Cisco Meraki Solutions</image:title>
    </image:image>
    <image:image>
      <image:loc>https://static1.squarespace.com/static/55d55a81e4b099f9b43d6d02/t/5afea06903ce6445740abed6/1526636660141/Meraki3.jpg</image:loc>
      <image:title>Meraki Cloud Managed Network System | Cisco Meraki Solutions</image:title>
      <image:caption>Cisco Meraki Dashboard accessed via browser</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://static1.squarespace.com/static/55d55a81e4b099f9b43d6d02/t/5afea1076d2a73fbaafacb90/1526636816198/Headup.jpg</image:loc>
      <image:title>Meraki Cloud Managed Network System | Cisco Meraki Solutions</image:title>
    </image:image>
    <image:image>
      <image:loc>https://static1.squarespace.com/static/55d55a81e4b099f9b43d6d02/t/5afea1e32b6a28232e852049/1526637037021/4.jpg</image:loc>
      <image:title>Meraki Cloud Managed Network System | Cisco Meraki Solutions</image:title>
      <image:caption>Access Manager (OAM) &amp; Single Sign-on Suite (OESSO) implementation Enterprise Gateway (OEG) &amp; Web Services Manager (OWSM) implementation Directory Integration Platform (DIP), Identity Directory (OID) &amp; Virtual Directory (OVD) implementation Identity Manager (OIM), Role Manager and Identity Analytics (OIA) development</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://static1.squarespace.com/static/55d55a81e4b099f9b43d6d02/t/5afea148758d466fdfd91361/1526636888320/mobile-app1.png</image:loc>
      <image:title>Meraki Cloud Managed Network System | Cisco Meraki Solutions - The Meraki dashboard mobile app for network management on the go.</image:title>
      <image:caption>Monitor Monitor wireless, switching, and security infrastructure. See network status and usage. Receive push notifications for network outages. Deploy Scan a switch barcode to add it to your network. Use the phone’s camera to document the switch location. Pinpoint the installation location using GPS. Troubleshoot Verify connectivity using live tools. Measure network throughput remotely. Reboot devices without on-site staff.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://static1.squarespace.com/static/55d55a81e4b099f9b43d6d02/t/5afea0a5562fa77bef2483e7/1526636716979/tablet1.jpg</image:loc>
      <image:title>Meraki Cloud Managed Network System | Cisco Meraki Solutions</image:title>
    </image:image>
    <image:image>
      <image:loc>https://static1.squarespace.com/static/55d55a81e4b099f9b43d6d02/t/5afea0e0f950b72a97ecfec5/1526636776983/wifi1.jpg</image:loc>
      <image:title>Meraki Cloud Managed Network System | Cisco Meraki Solutions</image:title>
    </image:image>
    <image:image>
      <image:loc>https://static1.squarespace.com/static/55d55a81e4b099f9b43d6d02/t/5afea123352f530714ea6112/1526636844483/city.jpg</image:loc>
      <image:title>Meraki Cloud Managed Network System | Cisco Meraki Solutions</image:title>
    </image:image>
    <image:image>
      <image:loc>https://static1.squarespace.com/static/55d55a81e4b099f9b43d6d02/t/5afea044f950b72a97ecf281/1526636616640/cloud2.jpg</image:loc>
      <image:title>Meraki Cloud Managed Network System | Cisco Meraki Solutions</image:title>
    </image:image>
  </url>
  <url>
    <loc>https://www.cashelgroup.com.au/free-demo</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2018-06-01</lastmod>
  </url>
  <url>
    <loc>https://www.cashelgroup.com.au/cymulate-1</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2018-11-03</lastmod>
    <image:image>
      <image:loc>https://static1.squarespace.com/static/55d55a81e4b099f9b43d6d02/t/5bd6a7727817f7eb11931c53/1540794271438/Screen+Shot+2018-10-29+at+5.14.56+pm.png</image:loc>
      <image:title>Cymulate</image:title>
    </image:image>
    <image:image>
      <image:loc>https://static1.squarespace.com/static/55d55a81e4b099f9b43d6d02/t/5bd014408165f5cc5f838042/1527123023019/Binoculars.jpg</image:loc>
      <image:title>Cymulate</image:title>
      <image:caption>Access Manager (OAM) &amp; Single Sign-on Suite (OESSO) implementation Enterprise Gateway (OEG) &amp; Web Services Manager (OWSM) implementation Directory Integration Platform (DIP), Identity Directory (OID) &amp; Virtual Directory (OVD) implementation Identity Manager (OIM), Role Manager and Identity Analytics (OIA) development</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://static1.squarespace.com/static/55d55a81e4b099f9b43d6d02/t/5bd014408165f5cc5f838050/1527123580224/Data-Safe-Box-596384360_2003x1502.jpg</image:loc>
      <image:title>Cymulate - Analyse and remediate</image:title>
      <image:caption>Comprehensive report details successful attacks and suggests remediation actions</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://static1.squarespace.com/static/55d55a81e4b099f9b43d6d02/t/5bd018bf104c7b8dc21f1fcb/1540364492047/Cymulate1.png</image:loc>
      <image:title>Cymulate</image:title>
    </image:image>
    <image:image>
      <image:loc>https://static1.squarespace.com/static/55d55a81e4b099f9b43d6d02/t/5bdbd4f6575d1f7287009467/1541133565237/Cymulate-logo.png</image:loc>
      <image:title>Cymulate</image:title>
    </image:image>
    <image:image>
      <image:loc>https://static1.squarespace.com/static/55d55a81e4b099f9b43d6d02/t/5bd014408165f5cc5f838044/1527123052806/Tablet2.jpg</image:loc>
      <image:title>Cymulate</image:title>
      <image:caption>Windows Exploitation course Reverse Engineering course Web Application Security training Red Teaming Master Course Executive &amp; Board Member Security Training</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://static1.squarespace.com/static/55d55a81e4b099f9b43d6d02/t/5bdbd5312b6a2830934c5a8d/1541133646067/Cymulate-logo.png</image:loc>
      <image:title>Cymulate</image:title>
    </image:image>
    <image:image>
      <image:loc>https://static1.squarespace.com/static/55d55a81e4b099f9b43d6d02/t/5bde15be2b6a28f991369205/1541281504107/Download+1.jpg</image:loc>
      <image:title>Cymulate - Install the agent</image:title>
      <image:caption>Register for a free trial, download and install the agent.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://static1.squarespace.com/static/55d55a81e4b099f9b43d6d02/t/5bd014408165f5cc5f838046/1527123077401/Eye1.jpg</image:loc>
      <image:title>Cymulate</image:title>
      <image:caption>Targeted Threat Hunting External &amp; Internal Penetration testing Wireless &amp; VoIP Penetration testing Vulnerability Assessments &amp; Password Auditing Application Architecture Security review Security Source Code review</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://static1.squarespace.com/static/55d55a81e4b099f9b43d6d02/t/5bd014408165f5cc5f83804a/1527123414568/Data.jpg</image:loc>
      <image:title>Cymulate</image:title>
    </image:image>
    <image:image>
      <image:loc>https://static1.squarespace.com/static/55d55a81e4b099f9b43d6d02/t/5bde2988f950b7feaf4707d6/1541286288408/Code.jpg</image:loc>
      <image:title>Cymulate - Run the attack simulations</image:title>
      <image:caption>Run the attack simulations via the Cloud based SaaS Dashboard</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://static1.squarespace.com/static/55d55a81e4b099f9b43d6d02/t/5bd014408165f5cc5f83803e/1527122985667/Hoodie.jpg</image:loc>
      <image:title>Cymulate</image:title>
    </image:image>
  </url>
  <url>
    <loc>https://www.cashelgroup.com.au/cashel-group</loc>
    <changefreq>daily</changefreq>
    <priority>1.0</priority>
    <lastmod>2018-11-04</lastmod>
    <image:image>
      <image:loc>https://static1.squarespace.com/static/55d55a81e4b099f9b43d6d02/t/5bde2dff8a922de6f7b37d6e/1527471786717/</image:loc>
      <image:title>Cashel Group</image:title>
    </image:image>
    <image:image>
      <image:loc>https://static1.squarespace.com/static/55d55a81e4b099f9b43d6d02/t/5bde2dff8a922de6f7b37d74/1533537480242/Firewall.jpg</image:loc>
      <image:title>Cashel Group</image:title>
    </image:image>
    <image:image>
      <image:loc>https://static1.squarespace.com/static/55d55a81e4b099f9b43d6d02/t/5bde2dff8a922de6f7b37d52/1527471786694/Password.jpg</image:loc>
      <image:title>Cashel Group</image:title>
      <image:caption>Access Manager (OAM) &amp; Single Sign-on Suite (OESSO) implementation Enterprise Gateway (OEG) &amp; Web Services Manager (OWSM) implementation Directory Integration Platform (DIP), Identity Directory (OID) &amp; Virtual Directory (OVD) implementation Identity Manager (OIM), Role Manager and Identity Analytics (OIA) development</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://static1.squarespace.com/static/55d55a81e4b099f9b43d6d02/t/5bde319f575d1f0d19285a3c/1541288363115/Investigate1.jpg</image:loc>
      <image:title>Cashel Group</image:title>
    </image:image>
    <image:image>
      <image:loc>https://static1.squarespace.com/static/55d55a81e4b099f9b43d6d02/t/5bde2dff8a922de6f7b37d56/1527471786697/Thumb.jpg</image:loc>
      <image:title>Cashel Group</image:title>
      <image:caption>Windows Exploitation course Reverse Engineering course Web Application Security training Red Teaming Master Course Executive &amp; Board Member Security Training</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://static1.squarespace.com/static/55d55a81e4b099f9b43d6d02/t/5bde2dff8a922de6f7b37d54/1527471786695/Cloud1.jpg</image:loc>
      <image:title>Cashel Group</image:title>
      <image:caption>IT Security Engineering, Consulting &amp; Architecture Program &amp; Project Management</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://static1.squarespace.com/static/55d55a81e4b099f9b43d6d02/t/5bde2dff8a922de6f7b37d5e/1527471786704/</image:loc>
      <image:title>Cashel Group - Cloud managed networks &amp; integrated security</image:title>
      <image:caption>WiFi, Firewalls, SD WAN, BYOD &amp; more</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://static1.squarespace.com/static/55d55a81e4b099f9b43d6d02/t/5bde33c340ec9a449db184c6/1541288909644/Cymulatedashboard.png</image:loc>
      <image:title>Cashel Group</image:title>
    </image:image>
    <image:image>
      <image:loc>https://static1.squarespace.com/static/55d55a81e4b099f9b43d6d02/5bde2dff8a922de6f7b37d60/5bde2dff8a922de6f7b37d61/1527471786715/8.jpg</image:loc>
      <image:title>Cashel Group</image:title>
    </image:image>
    <image:image>
      <image:loc>https://static1.squarespace.com/static/55d55a81e4b099f9b43d6d02/5bde2dff8a922de6f7b37d60/5bde2dff8a922de6f7b37d63/1527471786714/7.jpg</image:loc>
      <image:title>Cashel Group</image:title>
    </image:image>
    <image:image>
      <image:loc>https://static1.squarespace.com/static/55d55a81e4b099f9b43d6d02/5bde2dff8a922de6f7b37d60/5bde2dff8a922de6f7b37d65/1527471786712/6.jpg</image:loc>
      <image:title>Cashel Group</image:title>
    </image:image>
    <image:image>
      <image:loc>https://static1.squarespace.com/static/55d55a81e4b099f9b43d6d02/5bde2dff8a922de6f7b37d60/5bde2dff8a922de6f7b37d67/1527471786710/5.jpg</image:loc>
      <image:title>Cashel Group</image:title>
    </image:image>
    <image:image>
      <image:loc>https://static1.squarespace.com/static/55d55a81e4b099f9b43d6d02/5bde2dff8a922de6f7b37d60/5bde2dff8a922de6f7b37d69/1527471786709/4.jpg</image:loc>
      <image:title>Cashel Group</image:title>
    </image:image>
    <image:image>
      <image:loc>https://static1.squarespace.com/static/55d55a81e4b099f9b43d6d02/5bde2dff8a922de6f7b37d60/5bde2dff8a922de6f7b37d6b/1527471786706/1.jpg</image:loc>
      <image:title>Cashel Group</image:title>
    </image:image>
    <image:image>
      <image:loc>https://static1.squarespace.com/static/55d55a81e4b099f9b43d6d02/t/5bde2dff8a922de6f7b37d5a/1527471786701/Lock1.jpg</image:loc>
      <image:title>Cashel Group</image:title>
      <image:caption>Targeted Threat Hunting External &amp; Internal Penetration testing Wireless &amp; VoIP Penetration testing Vulnerability Assessments &amp; Password Auditing Application Architecture Security review Security Source Code review</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://static1.squarespace.com/static/55d55a81e4b099f9b43d6d02/t/5bde34b60e2e728887132c1b/1541292387379/Cymulate-logo.png</image:loc>
      <image:title>Cashel Group</image:title>
    </image:image>
    <image:image>
      <image:loc>https://static1.squarespace.com/static/55d55a81e4b099f9b43d6d02/t/5bde2dff8a922de6f7b37d72/1527471786719/Glasses.jpg</image:loc>
      <image:title>Cashel Group</image:title>
    </image:image>
    <image:image>
      <image:loc>https://static1.squarespace.com/static/55d55a81e4b099f9b43d6d02/t/5bde30f3c2241b7f4fb34c8d/1541288190262/Team1.jpg</image:loc>
      <image:title>Cashel Group</image:title>
    </image:image>
    <image:image>
      <image:loc>https://static1.squarespace.com/static/55d55a81e4b099f9b43d6d02/t/5bde2dff8a922de6f7b37d50/1533533952206/Front+Page+2.jpg</image:loc>
      <image:title>Cashel Group</image:title>
    </image:image>
  </url>
</urlset>

