<?xml version="1.0" encoding="UTF-8"?>
<urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9" xmlns:xhtml="http://www.w3.org/1999/xhtml">
    <url>
        <loc>https://www.conduitsecurity.com</loc>
    </url>
    <url>
        <loc>https://www.conduitsecurity.com/wire-fraud</loc>
    </url>
    <url>
        <loc>https://www.conduitsecurity.com/conduit-platform</loc>
    </url>
    <url>
        <loc>https://www.conduitsecurity.com/case-studies</loc>
    </url>
    <url>
        <loc>https://www.conduitsecurity.com/about</loc>
    </url>
    <url>
        <loc>https://www.conduitsecurity.com/contact-us</loc>
    </url>
    <url>
        <loc>https://www.conduitsecurity.com/contact-us-thank-you</loc>
    </url>
    <url>
        <loc>https://www.conduitsecurity.com/blog</loc>
    </url>
    <url>
        <loc>https://www.conduitsecurity.com/msa</loc>
    </url>
    <url>
        <loc>https://www.conduitsecurity.com/privacy-policy</loc>
    </url>
    <url>
        <loc>https://www.conduitsecurity.com/okta-self-service-configuration</loc>
    </url>
    <url>
        <loc>https://www.conduitsecurity.com/team/brad-morehead</loc>
    </url>
    <url>
        <loc>https://www.conduitsecurity.com/team/brian-novelline</loc>
    </url>
    <url>
        <loc>https://www.conduitsecurity.com/team/casey-clark</loc>
    </url>
    <url>
        <loc>https://www.conduitsecurity.com/team/coleman-greene</loc>
    </url>
    <url>
        <loc>https://www.conduitsecurity.com/team/colin-wood</loc>
    </url>
    <url>
        <loc>https://www.conduitsecurity.com/team/dave-adams</loc>
    </url>
    <url>
        <loc>https://www.conduitsecurity.com/team/dave-sloan</loc>
    </url>
    <url>
        <loc>https://www.conduitsecurity.com/team/jon-vaughn</loc>
    </url>
    <url>
        <loc>https://www.conduitsecurity.com/team/matt-levan</loc>
    </url>
    <url>
        <loc>https://www.conduitsecurity.com/team/melissa-taylor</loc>
    </url>
    <url>
        <loc>https://www.conduitsecurity.com/team/michael-pedersen</loc>
    </url>
    <url>
        <loc>https://www.conduitsecurity.com/team/natalie-connell</loc>
    </url>
    <url>
        <loc>https://www.conduitsecurity.com/team/ryan-castle</loc>
    </url>
    <url>
        <loc>https://www.conduitsecurity.com/team/sam-fischgrund</loc>
    </url>
    <url>
        <loc>https://www.conduitsecurity.com/team/scott-heintzelman</loc>
    </url>
    <url>
        <loc>https://www.conduitsecurity.com/case-studies/dc-based-real-estate-developer</loc>
    </url>
    <url>
        <loc>https://www.conduitsecurity.com/case-studies/florida-based-family-office</loc>
    </url>
    <url>
        <loc>https://www.conduitsecurity.com/case-studies/midwestern-multi-strat-investment-manager</loc>
    </url>
    <url>
        <loc>https://www.conduitsecurity.com/case-studies/nyc-based-credit-hedge-fund</loc>
    </url>
    <url>
        <loc>https://www.conduitsecurity.com/blog/130-million-lost-in-wire-fraud</loc>
    </url>
    <url>
        <loc>https://www.conduitsecurity.com/blog/2024-ic3-report</loc>
    </url>
    <url>
        <loc>https://www.conduitsecurity.com/blog/2026-resolution-protect-your-capital-from-the-16-billion-threat</loc>
    </url>
    <url>
        <loc>https://www.conduitsecurity.com/blog/4-reasons-wire-fraud-criminals-are-thankful</loc>
    </url>
    <url>
        <loc>https://www.conduitsecurity.com/blog/a-50m-warning-shot</loc>
    </url>
    <url>
        <loc>https://www.conduitsecurity.com/blog/a-subtle-change-in-policy-can-stop-wire-fraud-inbound-vs-outbound-calls</loc>
    </url>
    <url>
        <loc>https://www.conduitsecurity.com/blog/ach-vs-wire-transfers-which-is-safer</loc>
    </url>
    <url>
        <loc>https://www.conduitsecurity.com/blog/ai-forgery-epidemic</loc>
    </url>
    <url>
        <loc>https://www.conduitsecurity.com/blog/ark-webinar-securing-capital-flows-data-integrity</loc>
    </url>
    <url>
        <loc>https://www.conduitsecurity.com/blog/checklists-for-wire-fraud</loc>
    </url>
    <url>
        <loc>https://www.conduitsecurity.com/blog/conduit-partners-with-kyriba</loc>
    </url>
    <url>
        <loc>https://www.conduitsecurity.com/blog/construction-wire-fraud-the-hidden-threat-builders-cant-ignore</loc>
    </url>
    <url>
        <loc>https://www.conduitsecurity.com/blog/cyber-insurance-isnt-enough-why-you-still-need-strong-verification-controls</loc>
    </url>
    <url>
        <loc>https://www.conduitsecurity.com/blog/cybercrime-wire-fraud-and-justice</loc>
    </url>
    <url>
        <loc>https://www.conduitsecurity.com/blog/dall-e-2-wire-fraud</loc>
    </url>
    <url>
        <loc>https://www.conduitsecurity.com/blog/evolution-of-bank-heists</loc>
    </url>
    <url>
        <loc>https://www.conduitsecurity.com/blog/finance-teams-who-stop-wire-fraud-should-get-a-medal-or-a-trophy</loc>
    </url>
    <url>
        <loc>https://www.conduitsecurity.com/blog/fraud-wont-wait-misalignment-costs-millions</loc>
    </url>
    <url>
        <loc>https://www.conduitsecurity.com/blog/have-you-noticed-more-phishing-attacks-than-usual</loc>
    </url>
    <url>
        <loc>https://www.conduitsecurity.com/blog/hfr-webinar-payments-security</loc>
    </url>
    <url>
        <loc>https://www.conduitsecurity.com/blog/how-to-recover-a-wire-transfer</loc>
    </url>
    <url>
        <loc>https://www.conduitsecurity.com/blog/money-mules-how-criminals-move-money-overseas</loc>
    </url>
    <url>
        <loc>https://www.conduitsecurity.com/blog/nachas-2026-ach-rules-raising-the-bar-on-scam-prevention</loc>
    </url>
    <url>
        <loc>https://www.conduitsecurity.com/blog/netdiligence-interview</loc>
    </url>
    <url>
        <loc>https://www.conduitsecurity.com/blog/part-1-linedata-interview</loc>
    </url>
    <url>
        <loc>https://www.conduitsecurity.com/blog/plausible-deniability-and-who-absorbs-a-wire-fraud-loss</loc>
    </url>
    <url>
        <loc>https://www.conduitsecurity.com/blog/ransomware-vs-bec</loc>
    </url>
    <url>
        <loc>https://www.conduitsecurity.com/blog/ransomware-vs-wire-fraud</loc>
    </url>
    <url>
        <loc>https://www.conduitsecurity.com/blog/rapid-deployment-helps-private-equity-firm-prevent-wire-fraud</loc>
    </url>
    <url>
        <loc>https://www.conduitsecurity.com/blog/seinfeld-the-beach-and-stopping-wire-fraud</loc>
    </url>
    <url>
        <loc>https://www.conduitsecurity.com/blog/socially-engineered-wire-fraud-spikes-over-thanksgiving-insights-from-a-victim</loc>
    </url>
    <url>
        <loc>https://www.conduitsecurity.com/blog/svb-and-wire-fraud-risk</loc>
    </url>
    <url>
        <loc>https://www.conduitsecurity.com/blog/the-2025-ic3-report-the-staggering-data-behind-wire-fraud-and-bec</loc>
    </url>
    <url>
        <loc>https://www.conduitsecurity.com/blog/the-4-million-wire-fraud-case-every-finance-team-should-study</loc>
    </url>
    <url>
        <loc>https://www.conduitsecurity.com/blog/the-accountants-vs-skynet</loc>
    </url>
    <url>
        <loc>https://www.conduitsecurity.com/blog/the-fourth-of-july-scammers-hard-at-work-during-your-vacation</loc>
    </url>
    <url>
        <loc>https://www.conduitsecurity.com/blog/the-friday-before-a-long-holiday-weekend</loc>
    </url>
    <url>
        <loc>https://www.conduitsecurity.com/blog/the-lobster-lesson-dont-move-assets-without-verification</loc>
    </url>
    <url>
        <loc>https://www.conduitsecurity.com/blog/the-louvre-heist-that-feels-like-a-movie---and-why-the-real-criminals-stay-in-the-shadows</loc>
    </url>
    <url>
        <loc>https://www.conduitsecurity.com/blog/the-student-mule-economy</loc>
    </url>
    <url>
        <loc>https://www.conduitsecurity.com/blog/the-wakeup-call-from-ai-insiders</loc>
    </url>
    <url>
        <loc>https://www.conduitsecurity.com/blog/understand-your-insurance-coverage</loc>
    </url>
    <url>
        <loc>https://www.conduitsecurity.com/blog/unless-you-use-conduit-wait-to-wire-funds-until-july-10th</loc>
    </url>
    <url>
        <loc>https://www.conduitsecurity.com/blog/webinar-insurance-wire-fraud</loc>
    </url>
    <url>
        <loc>https://www.conduitsecurity.com/blog/what-is-the-fbi-telling-us-about-business-email-compromise</loc>
    </url>
    <url>
        <loc>https://www.conduitsecurity.com/blog/what-scambodia-reveals-about-next-gen-cyber-fraud</loc>
    </url>
    <url>
        <loc>https://www.conduitsecurity.com/blog/when-lps-ask-what-are-you-doing-about-wire-fraud</loc>
    </url>
    <url>
        <loc>https://www.conduitsecurity.com/blog/why-every-business-is-now-in-at-risk-of-payment-fraud</loc>
    </url>
    <url>
        <loc>https://www.conduitsecurity.com/blog/why-fraud-risk-is-spiking-in-2026</loc>
    </url>
    <url>
        <loc>https://www.conduitsecurity.com/blog/wire-fraud-2025-update</loc>
    </url>
    <url>
        <loc>https://www.conduitsecurity.com/blog/wire-fraud-bad-guys-not-hackers-stole-2-3-million-from-wisconsin-republicans-in-an-epic-wire-fraud-case</loc>
    </url>
    <url>
        <loc>https://www.conduitsecurity.com/blog/wire-fraud-happens-to-the-best-of-us</loc>
    </url>
    <url>
        <loc>https://www.conduitsecurity.com/blog/wire-fraud-new-years-resolutions</loc>
    </url>
    <url>
        <loc>https://www.conduitsecurity.com/blog/wsj-pig-butchering</loc>
    </url>
    <url>
        <loc>https://www.conduitsecurity.com/blog/year-end-wires-executive-imposters-real-losses-how-conduit-helps-accounting-fight-bec</loc>
    </url>
</urlset>