<?xml version="1.0" encoding="UTF-8"?>
<urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9" xmlns:image="http://www.google.com/schemas/sitemap-image/1.1" xmlns:video="http://www.google.com/schemas/sitemap-video/1.1">
   <url>
      <loc>https://webinars.sonatype.com/wcc/eh/5011667/lp/5045732/best_practices_for_firewall/?partnerref=on24seo</loc>
      <image:image>
         <image:loc>https://webinars.sonatype.com/media/cv/video_library/client/54/28/0/rt/16/04/48/1/rt/SONMalwareMonthlyBestPracticesFirewall1200x675_J2bt2_resized_medium.png</image:loc>
         <image:caption>Best Practices for Firewall</image:caption>
      </image:image>
   </url>
   <url>
      <loc>https://webinars.sonatype.com/wcc/eh/5011667/lp/5045819/using_sboms_to_power_scas/?partnerref=on24seo</loc>
      <image:image>
         <image:loc>https://webinars.sonatype.com/media/cv/video_library/client/54/28/0/rt/16/18/91/5/rt/TopTeamsUseSBOMsPowerSCA1_7KbQq_resized_medium.png</image:loc>
         <image:caption>Using SBOMs to Power SCAs</image:caption>
      </image:image>
   </url>
   <url>
      <loc>https://webinars.sonatype.com/wcc/eh/5011667/lp/5074952/fortifying_your_container_supply_chain_with_docker__sonatype/?partnerref=on24seo</loc>
      <image:image>
         <image:loc>https://webinars.sonatype.com/media/cv/video_library/client/54/28/0/rt/16/07/74/0/rt/SonatypeDockerWebinar1_Wr9UD_resized_medium.png</image:loc>
         <image:caption>Fortifying Your Container Supply Chain with Docker + Sonatype</image:caption>
      </image:image>
   </url>
   <url>
      <loc>https://webinars.sonatype.com/wcc/eh/5011667/lp/5115382/the_open_letter_on_sustainable_stewardship_why_responsible_open_source_matters/?partnerref=on24seo</loc>
      <image:image>
         <image:loc>https://webinars.sonatype.com/media/cv/video_library/client/54/28/0/rt/16/36/41/0/rt/OpenLetterPanel7_i479U_resized_medium.png</image:loc>
         <image:caption>The Open Letter on Sustainable Stewardship: Why Responsible Open Source Matters</image:caption>
      </image:image>
   </url>
   <url>
      <loc>https://webinars.sonatype.com/wcc/eh/5011667/lp/5121584/cra_and_ai_regulation_whats_next_for_software_compliance/?partnerref=on24seo</loc>
      <image:image>
         <image:loc>https://webinars.sonatype.com/media/cv/video_library/client/54/28/0/rt/16/39/36/4/rt/CRAandAIRegulations2_Wmfsm_resized_medium.png</image:loc>
         <image:caption>CRA and AI Regulation: What’s Next for Software Compliance</image:caption>
      </image:image>
   </url>
   <url>
      <loc>https://webinars.sonatype.com/wcc/eh/5011667/lp/5038004/open_source_workforce_the_state_of_maintainers/?partnerref=on24seo</loc>
      <video:video>
         <video:thumbnail_loc>https://webinars.sonatype.com/media/cv/video_library/client/54/28/0/rt/15/81/93/6/rt/image67_sk7Ks_resized_medium.png</video:thumbnail_loc>
         <video:title>Open Source Workforce: The State of Maintainers</video:title>
         <video:content_loc>https://webinars.sonatype.com/media/cv/video_library/client/54/28/0/rt/15/21/71/9/rt/output_1753814814829_T4J8J.mp4</video:content_loc>
         <video:duration>1646</video:duration>
      </video:video>
      <image:image>
         <image:loc>https://webinars.sonatype.com/media/cv/video_library/client/54/28/0/rt/15/81/93/6/rt/image67_sk7Ks_resized_medium.png</image:loc>
         <image:caption>Open Source Workforce: The State of Maintainers</image:caption>
      </image:image>
   </url>
   <url>
      <loc>https://webinars.sonatype.com/wcc/eh/5011667/lp/5036516/insights_from_the_9th_annual_state_of_the_software_supply_chain_report/?partnerref=on24seo</loc>
      <video:video>
         <video:thumbnail_loc>https://webinars.sonatype.com/media/cv/video_library/client/54/28/0/rt/15/20/23/2/rt/output_1753720785731_mmUDb_resized_medium.png</video:thumbnail_loc>
         <video:title>Insights from the 9th Annual State of the Software Supply Chain Report</video:title>
         <video:content_loc>https://webinars.sonatype.com/media/cv/video_library/client/54/28/0/rt/15/20/23/2/rt/output_1753720785731_mmUDb.mp4</video:content_loc>
         <video:duration>1133</video:duration>
      </video:video>
      <image:image>
         <image:loc>https://webinars.sonatype.com/media/cv/video_library/client/54/28/0/rt/15/20/23/2/rt/output_1753720785731_mmUDb_resized_medium.png</image:loc>
         <image:caption>Insights from the 9th Annual State of the Software Supply Chain Report</image:caption>
      </image:image>
   </url>
   <url>
      <loc>https://webinars.sonatype.com/wcc/eh/5011667/lp/5164729/autonomous_development_meets_autonomous_security_the_future_of_dependency_management/?partnerref=on24seo</loc>
      <image:image>
         <image:loc>https://webinars.sonatype.com/media/cv/video_library/client/54/28/0/rt/17/20/18/1/rt/AutonomousDevelopmentMeetsAutonomousSecurity_TheFutureofDependencyManagementLiveWebinar_CPbHY_resized_medium.png</image:loc>
         <image:caption>Autonomous Development Meets Autonomous Security: The Future of Dependency Management</image:caption>
      </image:image>
   </url>
   <url>
      <loc>https://webinars.sonatype.com/wcc/eh/5011667/lp/5173769/react2shell_uncovered_what_the_critical_rce_means__and_what_you_must_do/?partnerref=on24seo</loc>
      <image:image>
         <image:loc>https://webinars.sonatype.com/media/cv/video_library/client/54/28/0/rt/17/01/95/5/rt/React2ShellUncovered4_NCGjF_resized_medium.png</image:loc>
         <image:caption>React2Shell Uncovered: What the Critical RCE Means - And What You Must Do</image:caption>
      </image:image>
   </url>
   <url>
      <loc>https://webinars.sonatype.com/wcc/eh/5011667/lp/5036566/mastering_sboms_best_practices/?partnerref=on24seo</loc>
      <video:video>
         <video:thumbnail_loc>https://webinars.sonatype.com/media/cv/video_library/client/54/28/0/rt/15/20/32/9/rt/output_1753724682725_EZ7qO_resized_medium.png</video:thumbnail_loc>
         <video:title>Mastering SBOMs: Best Practices</video:title>
         <video:content_loc>https://webinars.sonatype.com/media/cv/video_library/client/54/28/0/rt/15/20/32/9/rt/output_1753724682725_EZ7qO.mp4</video:content_loc>
         <video:duration>2220</video:duration>
      </video:video>
      <image:image>
         <image:loc>https://webinars.sonatype.com/media/cv/video_library/client/54/28/0/rt/15/20/32/9/rt/output_1753724682725_EZ7qO_resized_medium.png</image:loc>
         <image:caption>Mastering SBOMs: Best Practices</image:caption>
      </image:image>
   </url>
   <url>
      <loc>https://webinars.sonatype.com/wcc/eh/5011667/lp/5038116/nis2_compliance_demystified_insights_with_sap_and_sonatype/?partnerref=on24seo</loc>
      <video:video>
         <video:thumbnail_loc>https://webinars.sonatype.com/media/cv/video_library/client/54/28/0/rt/15/81/94/2/rt/image71_RPrJv_resized_medium.png</video:thumbnail_loc>
         <video:title>NIS2 Compliance Demystified_ Insights with SAP and Sonatype</video:title>
         <video:content_loc>https://webinars.sonatype.com/media/cv/video_library/client/54/28/0/rt/15/21/82/4/rt/output_1753816716023_IcBvL.mp4</video:content_loc>
         <video:duration>2344</video:duration>
      </video:video>
      <image:image>
         <image:loc>https://webinars.sonatype.com/media/cv/video_library/client/54/28/0/rt/15/81/94/2/rt/image71_RPrJv_resized_medium.png</image:loc>
         <image:caption>NIS2 Compliance Demystified_ Insights with SAP and Sonatype</image:caption>
      </image:image>
   </url>
   <url>
      <loc>https://webinars.sonatype.com/wcc/eh/5011667/lp/5018283/futureproof_your_software_supply_chain_2025_sca_best_practices/?partnerref=on24seo</loc>
      <image:image>
         <image:loc>https://webinars.sonatype.com/media/cv/video_library/client/54/28/0/rt/15/81/84/2/rt/image31_KJW7S_resized_medium.png</image:loc>
         <image:caption>Future-Proof Your Software Supply Chain: 2025 SCA Best Practices</image:caption>
      </image:image>
   </url>
   <url>
      <loc>https://webinars.sonatype.com/wcc/eh/5011667/lp/5220204/autonomous_development_meets_realworld_risk/?partnerref=on24seo</loc>
      <image:image>
         <image:loc>https://webinars.sonatype.com/media/cv/video_library/client/54/28/0/rt/17/46/63/2/rt/SONSSCR26WebinarAutonomousDev1200x63021_nj4U1_resized_medium.png</image:loc>
         <image:caption>Autonomous Development Meets Real-World Risk</image:caption>
      </image:image>
   </url>
   <url>
      <loc>https://webinars.sonatype.com/wcc/eh/5011667/lp/5239822/preparing_for_cra_enforcements_steps_for_software_teams/?partnerref=on24seo</loc>
      <image:image>
         <image:loc>https://webinars.sonatype.com/media/cv/video_library/client/54/28/0/rt/17/76/14/2/rt/CRAENFORCEMENTS_ZdhtZ_resized_medium.jpg</image:loc>
         <image:caption>Preparing for CRA Enforcements: Steps for Software Teams</image:caption>
      </image:image>
   </url>
   <url>
      <loc>https://webinars.sonatype.com/wcc/eh/5011667/lp/5038203/automation_you_can_count_on/?partnerref=on24seo</loc>
      <video:video>
         <video:thumbnail_loc>https://webinars.sonatype.com/media/cv/video_library/client/54/28/0/rt/15/81/85/3/rt/image34_vvJHS_resized_medium.png</video:thumbnail_loc>
         <video:title>Automation You Can Count On</video:title>
         <video:content_loc>https://webinars.sonatype.com/media/cv/video_library/client/54/28/0/rt/15/21/98/2/rt/output_1753819769851_nqmlA.mp4</video:content_loc>
         <video:duration>1676</video:duration>
      </video:video>
      <image:image>
         <image:loc>https://webinars.sonatype.com/media/cv/video_library/client/54/28/0/rt/15/81/85/3/rt/image34_vvJHS_resized_medium.png</image:loc>
         <image:caption>Automation You Can Count On</image:caption>
      </image:image>
   </url>
   <url>
      <loc>https://webinars.sonatype.com/wcc/eh/5011667/lp/5036839/integrating_open_source_supply_chain_management_into_your_devops_tool_chain/?partnerref=on24seo</loc>
      <video:video>
         <video:thumbnail_loc>https://webinars.sonatype.com/media/cv/video_library/client/54/28/0/rt/15/81/96/7/rt/image89_o4Xm9_resized_medium.png</video:thumbnail_loc>
         <video:title>Integrating Open Source Supply Chain Management into your DevOps Tool Chain</video:title>
         <video:content_loc>https://webinars.sonatype.com/media/cv/video_library/client/54/28/0/rt/14/83/57/5/rt/output_1751394452438_6uT6Z.mp4</video:content_loc>
         <video:duration>1539</video:duration>
      </video:video>
      <image:image>
         <image:loc>https://webinars.sonatype.com/media/cv/video_library/client/54/28/0/rt/15/81/96/7/rt/image89_o4Xm9_resized_medium.png</image:loc>
         <image:caption>Integrating Open Source Supply Chain Management into your DevOps Tool Chain</image:caption>
      </image:image>
   </url>
   <url>
      <loc>https://webinars.sonatype.com/wcc/eh/5011667/lp/5026296/sboms_the_future_in_healthcare/?partnerref=on24seo</loc>
      <video:video>
         <video:thumbnail_loc>https://webinars.sonatype.com/media/cv/video_library/client/54/28/0/rt/15/81/87/8/rt/image42_zDJhM_resized_medium.png</video:thumbnail_loc>
         <video:title>SBOMs: The Future in Healthcare</video:title>
         <video:content_loc>https://webinars.sonatype.com/media/cv/video_library/client/54/28/0/rt/14/82/11/8/rt/output_1751301801061_yeVYJ.mp4</video:content_loc>
         <video:duration>1526</video:duration>
      </video:video>
      <image:image>
         <image:loc>https://webinars.sonatype.com/media/cv/video_library/client/54/28/0/rt/15/81/87/8/rt/image42_zDJhM_resized_medium.png</image:loc>
         <image:caption>SBOMs: The Future in Healthcare</image:caption>
      </image:image>
   </url>
   <url>
      <loc>https://webinars.sonatype.com/wcc/eh/5011667/lp/5018172/mastering_software_supply_chain_security_with_insights_from_docker_f5nginx_and_sonatype/?partnerref=on24seo</loc>
      <video:video>
         <video:thumbnail_loc>https://webinars.sonatype.com/media/cv/video_library/client/54/28/0/rt/14/89/22/4/rt/output_1752070233440_USY1X_resized_medium.png</video:thumbnail_loc>
         <video:title>Mastering Software Supply Chain Security with Insights from Docker, F5/NGINX, and Sonatype</video:title>
         <video:content_loc>https://webinars.sonatype.com/media/cv/video_library/client/54/28/0/rt/14/89/22/4/rt/output_1752070233440_USY1X.mp4</video:content_loc>
         <video:duration>2851</video:duration>
      </video:video>
      <image:image>
         <image:loc>https://webinars.sonatype.com/media/cv/video_library/client/54/28/0/rt/14/89/22/4/rt/output_1752070233440_USY1X_resized_medium.png</image:loc>
         <image:caption>Mastering Software Supply Chain Security with Insights from Docker, F5/NGINX, and Sonatype</image:caption>
      </image:image>
   </url>
   <url>
      <loc>https://webinars.sonatype.com/wcc/eh/5011667/lp/5036862/new_on_the_naughty_list_unwrapping_the_struts2_vulnerability/?partnerref=on24seo</loc>
      <video:video>
         <video:thumbnail_loc>https://webinars.sonatype.com/media/cv/video_library/client/54/28/0/rt/15/81/89/0/rt/image48_1HfEn_resized_medium.png</video:thumbnail_loc>
         <video:title>New on the Naughty List: Unwrapping the Struts2 Vulnerability</video:title>
         <video:content_loc>https://webinars.sonatype.com/media/cv/video_library/client/54/28/0/rt/15/20/61/2/rt/output_1753737656885_OFcKr.mp4</video:content_loc>
         <video:duration>1900</video:duration>
      </video:video>
      <image:image>
         <image:loc>https://webinars.sonatype.com/media/cv/video_library/client/54/28/0/rt/15/81/89/0/rt/image48_1HfEn_resized_medium.png</image:loc>
         <image:caption>New on the Naughty List: Unwrapping the Struts2 Vulnerability</image:caption>
      </image:image>
   </url>
   <url>
      <loc>https://webinars.sonatype.com/wcc/eh/5011667/lp/5026306/how_to_manage_sboms/?partnerref=on24seo</loc>
      <video:video>
         <video:thumbnail_loc>https://webinars.sonatype.com/media/cv/video_library/client/54/28/0/rt/15/81/95/8/rt/image81_DzPBl_resized_medium.png</video:thumbnail_loc>
         <video:title>How to Manage SBOMs</video:title>
         <video:content_loc>https://webinars.sonatype.com/media/cv/video_library/client/54/28/0/rt/14/82/38/4/rt/output_1751310417291_WjlGi.mp4</video:content_loc>
         <video:duration>1770</video:duration>
      </video:video>
      <image:image>
         <image:loc>https://webinars.sonatype.com/media/cv/video_library/client/54/28/0/rt/15/81/95/8/rt/image81_DzPBl_resized_medium.png</image:loc>
         <image:caption>How to Manage SBOMs</image:caption>
      </image:image>
   </url>
   <url>
      <loc>https://webinars.sonatype.com/wcc/eh/5011667/lp/5019974/oss_malware_101_exposing_the_real_threat_to_your_software_supply_chain/?partnerref=on24seo</loc>
      <image:image>
         <image:loc>https://webinars.sonatype.com/media/cv/video_library/client/54/28/0/rt/15/81/83/6/rt/image29_Y9Rnr_resized_medium.png</image:loc>
         <image:caption>OSS Malware 101: Exposing the Real Threat to Your Software Supply Chain</image:caption>
      </image:image>
   </url>
   <url>
      <loc>https://webinars.sonatype.com/wcc/eh/5011667/lp/5036428/beyond_the_numbers_practices_that_truly_matter_for_cisos__appsec_leaders/?partnerref=on24seo</loc>
      <video:video>
         <video:thumbnail_loc>https://webinars.sonatype.com/media/cv/video_library/client/54/28/0/rt/15/81/88/5/rt/image44_zkNA6_resized_medium.png</video:thumbnail_loc>
         <video:title>Beyond the Numbers: Practices that Truly Matter for CISOs &amp; AppSec Leaders</video:title>
         <video:content_loc>https://webinars.sonatype.com/media/cv/video_library/client/54/28/0/rt/14/82/35/7/rt/output_1751309511179_ntpW9.mp4</video:content_loc>
         <video:duration>3039</video:duration>
      </video:video>
      <image:image>
         <image:loc>https://webinars.sonatype.com/media/cv/video_library/client/54/28/0/rt/15/81/88/5/rt/image44_zkNA6_resized_medium.png</image:loc>
         <image:caption>Beyond the Numbers: Practices that Truly Matter for CISOs &amp; AppSec Leaders</image:caption>
      </image:image>
   </url>
   <url>
      <loc>https://webinars.sonatype.com/wcc/eh/5011667/lp/5036867/how_to_share_sboms/?partnerref=on24seo</loc>
      <video:video>
         <video:thumbnail_loc>https://webinars.sonatype.com/media/cv/video_library/client/54/28/0/rt/15/81/95/3/rt/image77_r3dbS_resized_medium.png</video:thumbnail_loc>
         <video:title>How to Share SBOMs</video:title>
         <video:content_loc>https://webinars.sonatype.com/media/cv/video_library/client/54/28/0/rt/14/83/68/8/rt/output_1751397371714_BuCyP.mp4</video:content_loc>
         <video:duration>1042</video:duration>
      </video:video>
      <image:image>
         <image:loc>https://webinars.sonatype.com/media/cv/video_library/client/54/28/0/rt/15/81/95/3/rt/image77_r3dbS_resized_medium.png</image:loc>
         <image:caption>How to Share SBOMs</image:caption>
      </image:image>
   </url>
   <url>
      <loc>https://webinars.sonatype.com/wcc/eh/5011667/lp/5038017/the_state_of_rust_adoption/?partnerref=on24seo</loc>
      <video:video>
         <video:thumbnail_loc>https://webinars.sonatype.com/media/cv/video_library/client/54/28/0/rt/15/81/91/0/rt/image55_wJMbU_resized_medium.png</video:thumbnail_loc>
         <video:title>The State of Rust Adoption</video:title>
         <video:content_loc>https://webinars.sonatype.com/media/cv/video_library/client/54/28/0/rt/14/82/34/6/rt/output_1751309009651_Uf4DG.mp4</video:content_loc>
         <video:duration>2502</video:duration>
      </video:video>
      <image:image>
         <image:loc>https://webinars.sonatype.com/media/cv/video_library/client/54/28/0/rt/15/81/91/0/rt/image55_wJMbU_resized_medium.png</image:loc>
         <image:caption>The State of Rust Adoption</image:caption>
      </image:image>
   </url>
   <url>
      <loc>https://webinars.sonatype.com/wcc/eh/5011667/lp/5018816/dora_compliance_lessons_learned_gaps_exposed_and_whats_next/?partnerref=on24seo</loc>
      <image:image>
         <image:loc>https://webinars.sonatype.com/media/cv/video_library/client/54/28/0/rt/15/81/84/1/rt/image30_5UC7q_resized_medium.png</image:loc>
         <image:caption>DORA Compliance: Lessons Learned, Gaps Exposed, and What’s Next</image:caption>
      </image:image>
   </url>
   <url>
      <loc>https://webinars.sonatype.com/wcc/eh/5011667/lp/5110283/open_source_malware_defending_your_software_supply_chain_from_evolving_threats/?partnerref=on24seo</loc>
      <image:image>
         <image:loc>https://webinars.sonatype.com/media/cv/video_library/client/54/28/0/rt/16/46/57/3/rt/OpenSourceMalware8_mPBGI_resized_medium.png</image:loc>
         <image:caption>Open Source Malware: Defending Your Software Supply Chain From Evolving Threats</image:caption>
      </image:image>
   </url>
   <url>
      <loc>https://webinars.sonatype.com/wcc/eh/5011667/lp/5192419/first_look_the_state_of_global_software_compliance/?partnerref=on24seo</loc>
      <image:image>
         <image:loc>https://webinars.sonatype.com/media/cv/video_library/client/54/28/0/rt/17/38/37/0/rt/SONSSCR25ThumbWebinarAuthorsPanel1200x630_2ffw6_resized_medium.png</image:loc>
         <image:caption>First Look: The State of Global Software Compliance</image:caption>
      </image:image>
   </url>
   <url>
      <loc>https://webinars.sonatype.com/wcc/eh/5011667/lp/5038034/securitys_single_point_of_failure_cve_wakeup_call/?partnerref=on24seo</loc>
      <video:video>
         <video:thumbnail_loc>https://webinars.sonatype.com/media/cv/video_library/client/54/28/0/rt/15/81/87/0/rt/image39_tUvsV_resized_medium.png</video:thumbnail_loc>
         <video:title>Security’s Single Point of Failure: CVE Wake-Up Call</video:title>
         <video:content_loc>https://webinars.sonatype.com/media/cv/video_library/client/54/28/0/rt/15/06/58/8/rt/output_1752680430058_fho6C.mp4</video:content_loc>
         <video:duration>3616</video:duration>
      </video:video>
      <image:image>
         <image:loc>https://webinars.sonatype.com/media/cv/video_library/client/54/28/0/rt/15/81/87/0/rt/image39_tUvsV_resized_medium.png</image:loc>
         <image:caption>Security’s Single Point of Failure: CVE Wake-Up Call</image:caption>
      </image:image>
   </url>
   <url>
      <loc>https://webinars.sonatype.com/wcc/eh/5011667/lp/5036499/revolutionizing_financial_services_through_devsecops/?partnerref=on24seo</loc>
      <video:video>
         <video:thumbnail_loc>https://webinars.sonatype.com/media/cv/video_library/client/54/28/0/rt/15/81/88/6/rt/image45_McZ4g_resized_medium.png</video:thumbnail_loc>
         <video:title>Revolutionizing Financial Services through DevSecOps</video:title>
         <video:content_loc>https://webinars.sonatype.com/media/cv/video_library/client/54/28/0/rt/15/20/22/9/rt/output_1753720446184_1Ij0Q.mp4</video:content_loc>
         <video:duration>4752</video:duration>
      </video:video>
      <image:image>
         <image:loc>https://webinars.sonatype.com/media/cv/video_library/client/54/28/0/rt/15/81/88/6/rt/image45_McZ4g_resized_medium.png</image:loc>
         <image:caption>Revolutionizing Financial Services through DevSecOps</image:caption>
      </image:image>
   </url>
   <url>
      <loc>https://webinars.sonatype.com/wcc/eh/5011667/lp/5015808/securing_financial_services_from_malware_threats/?partnerref=on24seo</loc>
      <video:video>
         <video:thumbnail_loc>https://webinars.sonatype.com/media/cv/video_library/client/54/28/0/rt/15/81/85/8/rt/image35_qmq5o_resized_medium.png</video:thumbnail_loc>
         <video:title>Securing Financial Services from Malware Threats</video:title>
         <video:content_loc>https://webinars.sonatype.com/media/cv/video_library/client/54/28/0/rt/14/81/04/7/rt/output_1751039212012_3xCl7.mp4</video:content_loc>
         <video:duration>3218</video:duration>
      </video:video>
      <image:image>
         <image:loc>https://webinars.sonatype.com/media/cv/video_library/client/54/28/0/rt/15/81/85/8/rt/image35_qmq5o_resized_medium.png</image:loc>
         <image:caption>Securing Financial Services from Malware Threats</image:caption>
      </image:image>
   </url>
   <url>
      <loc>https://webinars.sonatype.com/wcc/eh/5011667/lp/5036658/the_power_of_sboms_regulations_looming/?partnerref=on24seo</loc>
      <video:video>
         <video:thumbnail_loc>https://webinars.sonatype.com/media/cv/video_library/client/54/28/0/rt/15/81/89/4/rt/image49_vZEOI_resized_medium.png</video:thumbnail_loc>
         <video:title>The Power of SBOMs: Regulations Looming</video:title>
         <video:content_loc>https://webinars.sonatype.com/media/cv/video_library/client/54/28/0/rt/15/20/33/5/rt/output_1753725188863_FUbNR.mp4</video:content_loc>
         <video:duration>2500</video:duration>
      </video:video>
      <image:image>
         <image:loc>https://webinars.sonatype.com/media/cv/video_library/client/54/28/0/rt/15/81/89/4/rt/image49_vZEOI_resized_medium.png</image:loc>
         <image:caption>The Power of SBOMs: Regulations Looming</image:caption>
      </image:image>
   </url>
   <url>
      <loc>https://webinars.sonatype.com/wcc/eh/5011667/lp/5027070/sbom_manager_new_features/?partnerref=on24seo</loc>
      <image:image>
         <image:loc>https://webinars.sonatype.com/media/cv/video_library/client/54/28/0/rt/15/81/84/5/rt/image32_C3vvB_resized_medium.png</image:loc>
         <image:caption>SBOM Manager New Features</image:caption>
      </image:image>
   </url>
   <url>
      <loc>https://webinars.sonatype.com/wcc/eh/5011667/lp/5041818/the_false_sense_of_security/?partnerref=on24seo</loc>
      <image:image>
         <image:loc>https://webinars.sonatype.com/media/cv/video_library/client/54/28/0/rt/16/18/70/9/rt/image8_rqi9g_resized_medium.png</image:loc>
         <image:caption>The False Sense of Security</image:caption>
      </image:image>
   </url>
   <url>
      <loc>https://webinars.sonatype.com/wcc/eh/5011667/lp/5087615/missionready_sboms/?partnerref=on24seo</loc>
      <image:image>
         <image:loc>https://webinars.sonatype.com/media/cv/video_library/client/54/28/0/rt/16/11/03/9/rt/image41_OefP5_resized_medium.png</image:loc>
         <image:caption>Mission-Ready SBOMs</image:caption>
      </image:image>
   </url>
   <url>
      <loc>https://webinars.sonatype.com/wcc/eh/5011667/lp/5015700/how_to_protect_your_development_environment_from_malicious_and_vulnerable_components/?partnerref=on24seo</loc>
      <video:video>
         <video:thumbnail_loc>https://webinars.sonatype.com/media/cv/video_library/client/54/28/0/rt/15/81/96/5/rt/image87_7m8iB_resized_medium.png</video:thumbnail_loc>
         <video:title>How to Protect Your Development Environment From Malicious and Vulnerable Components</video:title>
         <video:content_loc>https://webinars.sonatype.com/media/cv/video_library/client/54/28/0/rt/14/85/86/7/rt/output_1751577374567_wt98f.mp4</video:content_loc>
         <video:duration>2252</video:duration>
      </video:video>
      <image:image>
         <image:loc>https://webinars.sonatype.com/media/cv/video_library/client/54/28/0/rt/15/81/96/5/rt/image87_7m8iB_resized_medium.png</image:loc>
         <image:caption>How to Protect Your Development Environment From Malicious and Vulnerable Components</image:caption>
      </image:image>
   </url>
   <url>
      <loc>https://webinars.sonatype.com/wcc/eh/5011667/lp/5015803/state_of_sbom__whats_coming_in_standards_and_regulations/?partnerref=on24seo</loc>
      <video:video>
         <video:thumbnail_loc>https://webinars.sonatype.com/media/cv/video_library/client/54/28/0/rt/15/81/92/1/rt/image60_hj8iM_resized_medium.png</video:thumbnail_loc>
         <video:title>State of SBOM - What's Coming in Standards and Regulations</video:title>
         <video:content_loc>https://webinars.sonatype.com/media/cv/video_library/client/54/28/0/rt/14/86/68/2/rt/output_1751906866709_pqebK.mp4</video:content_loc>
         <video:duration>1718</video:duration>
      </video:video>
      <image:image>
         <image:loc>https://webinars.sonatype.com/media/cv/video_library/client/54/28/0/rt/15/81/92/1/rt/image60_hj8iM_resized_medium.png</image:loc>
         <image:caption>State of SBOM - What's Coming in Standards and Regulations</image:caption>
      </image:image>
   </url>
   <url>
      <loc>https://webinars.sonatype.com/wcc/eh/5011667/lp/5026333/rust_in_the_enterprise_best_practices_and_security_considerations/?partnerref=on24seo</loc>
      <video:video>
         <video:thumbnail_loc>https://webinars.sonatype.com/media/cv/video_library/client/54/28/0/rt/15/81/90/8/rt/image53_vjVNI_resized_medium.png</video:thumbnail_loc>
         <video:title>Rust in the Enterprise_ Best Practices and Security Considerations</video:title>
         <video:content_loc>https://webinars.sonatype.com/media/cv/video_library/client/54/28/0/rt/14/82/03/9/rt/output_1751297642662_HNlWE.mp4</video:content_loc>
         <video:duration>2098</video:duration>
      </video:video>
      <image:image>
         <image:loc>https://webinars.sonatype.com/media/cv/video_library/client/54/28/0/rt/15/81/90/8/rt/image53_vjVNI_resized_medium.png</image:loc>
         <image:caption>Rust in the Enterprise_ Best Practices and Security Considerations</image:caption>
      </image:image>
   </url>
   <url>
      <loc>https://webinars.sonatype.com/wcc/eh/5011667/lp/5015682/a_better_way_to_sca_industry_best_practices_and_how_to_prepare_for_the_future/?partnerref=on24seo</loc>
      <video:video>
         <video:thumbnail_loc>https://webinars.sonatype.com/media/cv/video_library/client/54/28/0/rt/15/81/91/9/rt/image59_W3z7B_resized_medium.png</video:thumbnail_loc>
         <video:title>A Better Way to SCA Industry Best Practices and How to Prepare for the Future</video:title>
         <video:content_loc>https://webinars.sonatype.com/media/cv/video_library/client/54/28/0/rt/14/81/19/4/rt/output_1751045263782_VFun1.mp4</video:content_loc>
         <video:duration>2526</video:duration>
      </video:video>
      <image:image>
         <image:loc>https://webinars.sonatype.com/media/cv/video_library/client/54/28/0/rt/15/81/91/9/rt/image59_W3z7B_resized_medium.png</image:loc>
         <image:caption>A Better Way to SCA Industry Best Practices and How to Prepare for the Future</image:caption>
      </image:image>
   </url>
   <url>
      <loc>https://webinars.sonatype.com/wcc/eh/5011667/lp/5026307/how_to_comply_with_sbom_regulations/?partnerref=on24seo</loc>
      <video:video>
         <video:thumbnail_loc>https://webinars.sonatype.com/media/cv/video_library/client/54/28/0/rt/15/81/95/7/rt/image80_1R4VH_resized_medium.png</video:thumbnail_loc>
         <video:title>How to Comply with SBOM Regulations</video:title>
         <video:content_loc>https://webinars.sonatype.com/media/cv/video_library/client/54/28/0/rt/14/82/36/2/rt/output_1751309764457_Q0QRu.mp4</video:content_loc>
         <video:duration>1767</video:duration>
      </video:video>
      <image:image>
         <image:loc>https://webinars.sonatype.com/media/cv/video_library/client/54/28/0/rt/15/81/95/7/rt/image80_1R4VH_resized_medium.png</image:loc>
         <image:caption>How to Comply with SBOM Regulations</image:caption>
      </image:image>
   </url>
   <url>
      <loc>https://webinars.sonatype.com/wcc/eh/5011667/lp/5012830/dodready_software_navigating_the_evolving_swft_initiative/?partnerref=on24seo</loc>
      <image:image>
         <image:loc>https://webinars.sonatype.com/media/cv/video_library/client/54/28/0/rt/15/81/86/4/rt/image38_EbRfn_resized_medium.png</image:loc>
         <image:caption>DoD-Ready Software: Navigating the Evolving SWFT Initiative</image:caption>
      </image:image>
   </url>
   <url>
      <loc>https://webinars.sonatype.com/wcc/eh/5011667/lp/5038115/preparing_for_the_cyber_resilience_act/?partnerref=on24seo</loc>
      <video:video>
         <video:thumbnail_loc>https://webinars.sonatype.com/media/cv/video_library/client/54/28/0/rt/15/81/97/4/rt/image94_aot7R_resized_medium.png</video:thumbnail_loc>
         <video:title>Preparing for the Cyber Resilience Act</video:title>
         <video:content_loc>https://webinars.sonatype.com/media/cv/video_library/client/54/28/0/rt/15/21/84/3/rt/output_1753816771714_242sM.mp4</video:content_loc>
         <video:duration>2383</video:duration>
      </video:video>
      <image:image>
         <image:loc>https://webinars.sonatype.com/media/cv/video_library/client/54/28/0/rt/15/81/97/4/rt/image94_aot7R_resized_medium.png</image:loc>
         <image:caption>Preparing for the Cyber Resilience Act</image:caption>
      </image:image>
   </url>
   <url>
      <loc>https://webinars.sonatype.com/wcc/eh/5011667/lp/5026439/looking_ahead_top_5_trends_every_devops_manager_needs_to_know_for_2024/?partnerref=on24seo</loc>
      <video:video>
         <video:thumbnail_loc>https://webinars.sonatype.com/media/cv/video_library/client/54/28/0/rt/15/81/88/8/rt/image46_iyJzz_resized_medium.png</video:thumbnail_loc>
         <video:title>Looking Ahead_ Top 5 Trends every DevOps Manager needs to know for 2024</video:title>
         <video:content_loc>https://webinars.sonatype.com/media/cv/video_library/client/54/28/0/rt/14/82/12/1/rt/output_1751301980589_nv5U4.mp4</video:content_loc>
         <video:duration>991</video:duration>
      </video:video>
      <image:image>
         <image:loc>https://webinars.sonatype.com/media/cv/video_library/client/54/28/0/rt/15/81/88/8/rt/image46_iyJzz_resized_medium.png</image:loc>
         <image:caption>Looking Ahead_ Top 5 Trends every DevOps Manager needs to know for 2024</image:caption>
      </image:image>
   </url>
   <url>
      <loc>https://webinars.sonatype.com/wcc/eh/5011667/lp/5036651/lifecycle_101/?partnerref=on24seo</loc>
      <video:video>
         <video:thumbnail_loc>https://webinars.sonatype.com/media/cv/video_library/client/54/28/0/rt/15/81/97/0/rt/image90_Jt9Nx_resized_medium.png</video:thumbnail_loc>
         <video:title>Lifecycle 101</video:title>
         <video:content_loc>https://webinars.sonatype.com/media/cv/video_library/client/54/28/0/rt/14/81/21/9/rt/output_1751046118124_dItLz.mp4</video:content_loc>
         <video:duration>1661</video:duration>
      </video:video>
      <image:image>
         <image:loc>https://webinars.sonatype.com/media/cv/video_library/client/54/28/0/rt/15/81/97/0/rt/image90_Jt9Nx_resized_medium.png</image:loc>
         <image:caption>Lifecycle 101</image:caption>
      </image:image>
   </url>
   <url>
      <loc>https://webinars.sonatype.com/wcc/eh/5011667/lp/5023672/understanding_dora_compliance_insights_from_surepay_and_sonatype/?partnerref=on24seo</loc>
      <video:video>
         <video:thumbnail_loc>https://webinars.sonatype.com/media/cv/video_library/client/54/28/0/rt/15/81/94/5/rt/image73_MicsZ_resized_medium.png</video:thumbnail_loc>
         <video:title>Understanding DORA Compliance Insights from SurePay and Sonatype</video:title>
         <video:content_loc>https://webinars.sonatype.com/media/cv/video_library/client/54/28/0/rt/14/81/16/8/rt/output_1751044155512_Y7xxN.mp4</video:content_loc>
         <video:duration>2183</video:duration>
      </video:video>
      <image:image>
         <image:loc>https://webinars.sonatype.com/media/cv/video_library/client/54/28/0/rt/15/81/94/5/rt/image73_MicsZ_resized_medium.png</image:loc>
         <image:caption>Understanding DORA Compliance Insights from SurePay and Sonatype</image:caption>
      </image:image>
   </url>
   <url>
      <loc>https://webinars.sonatype.com/wcc/eh/5011667/lp/5038224/ai_fireside_chat_with_forrester/?partnerref=on24seo</loc>
      <image:image>
         <image:loc>https://webinars.sonatype.com/media/cv/video_library/client/54/28/0/rt/15/81/84/8/rt/image33_3iYPi_resized_medium.png</image:loc>
         <image:caption>AI Fireside Chat with Forrester</image:caption>
      </image:image>
   </url>
   <url>
      <loc>https://webinars.sonatype.com/wcc/eh/5011667/lp/5151488/first_look_unboxing_guardrails_for_aigenerated_code/?partnerref=on24seo</loc>
      <image:image>
         <image:loc>https://webinars.sonatype.com/media/cv/video_library/client/54/28/0/rt/16/92/98/5/rt/UnboxingGuardrails1_U5cTQ_resized_medium.png</image:loc>
         <image:caption>First Look: Unboxing Guardrails for AI-Generated Code</image:caption>
      </image:image>
   </url>
   <url>
      <loc>https://webinars.sonatype.com/wcc/eh/5011667/lp/5216592/modern_vulnerability_management/?partnerref=on24seo</loc>
      <image:image>
         <image:loc>https://webinars.sonatype.com/media/cv/video_library/client/54/28/0/rt/17/60/17/8/rt/SONSSCR26WebinarHeroDevsOpenSSF1200x630_Ih1aw_resized_medium.png</image:loc>
         <image:caption>Modern Vulnerability Management</image:caption>
      </image:image>
   </url>
   <url>
      <loc>https://webinars.sonatype.com/wcc/eh/5011667/lp/5015832/looking_ahead_top_5_trends_every_ciso_needs_to_know_for_2024/?partnerref=on24seo</loc>
      <video:video>
         <video:thumbnail_loc>https://webinars.sonatype.com/media/cv/video_library/client/54/28/0/rt/15/81/88/9/rt/image47_Nbqvh_resized_medium.png</video:thumbnail_loc>
         <video:title>Looking Ahead_ Top 5 trends every CISO needs to know for 2024</video:title>
         <video:content_loc>https://webinars.sonatype.com/media/cv/video_library/client/54/28/0/rt/14/81/09/4/rt/output_1751041176268_5gcp7.mp4</video:content_loc>
         <video:duration>956</video:duration>
      </video:video>
      <image:image>
         <image:loc>https://webinars.sonatype.com/media/cv/video_library/client/54/28/0/rt/15/81/88/9/rt/image47_Nbqvh_resized_medium.png</image:loc>
         <image:caption>Looking Ahead_ Top 5 trends every CISO needs to know for 2024</image:caption>
      </image:image>
   </url>
   <url>
      <loc>https://webinars.sonatype.com/wcc/eh/5011667/lp/5038025/theyre_in_the_room_with_us_assessing_your_open_source_security_efficacy/?partnerref=on24seo</loc>
      <video:video>
         <video:thumbnail_loc>https://webinars.sonatype.com/media/cv/video_library/client/54/28/0/rt/15/81/90/7/rt/image52_2H7sd_resized_medium.png</video:thumbnail_loc>
         <video:title>They’re in the Room With Us: Assessing your Open Source Security Efficacy</video:title>
         <video:content_loc>https://webinars.sonatype.com/media/cv/video_library/client/54/28/0/rt/14/83/49/5/rt/output_1751392768529_uQMwp.mp4</video:content_loc>
         <video:duration>3572</video:duration>
      </video:video>
      <image:image>
         <image:loc>https://webinars.sonatype.com/media/cv/video_library/client/54/28/0/rt/15/81/90/7/rt/image52_2H7sd_resized_medium.png</image:loc>
         <image:caption>They’re in the Room With Us: Assessing your Open Source Security Efficacy</image:caption>
      </image:image>
   </url>
   <url>
      <loc>https://webinars.sonatype.com/wcc/eh/5011667/lp/5038113/protecting_your_software_supply_chain_key_insights_from_sonatypes_10th_annual_report/?partnerref=on24seo</loc>
      <video:video>
         <video:thumbnail_loc>https://webinars.sonatype.com/media/cv/video_library/client/54/28/0/rt/15/81/93/4/rt/image65_Jxffk_resized_medium.png</video:thumbnail_loc>
         <video:title>Protecting Your Software Supply Chain: Key Insights from Sonatype's 10th Annual Report</video:title>
         <video:content_loc>https://webinars.sonatype.com/media/cv/video_library/client/54/28/0/rt/15/21/84/7/rt/output_1753816928382_MNzOR.mp4</video:content_loc>
         <video:duration>1531</video:duration>
      </video:video>
      <image:image>
         <image:loc>https://webinars.sonatype.com/media/cv/video_library/client/54/28/0/rt/15/81/93/4/rt/image65_Jxffk_resized_medium.png</image:loc>
         <image:caption>Protecting Your Software Supply Chain: Key Insights from Sonatype's 10th Annual Report</image:caption>
      </image:image>
   </url>
   <url>
      <loc>https://webinars.sonatype.com/wcc/eh/5011667/lp/5026293/how_to_audit_sboms/?partnerref=on24seo</loc>
      <video:video>
         <video:thumbnail_loc>https://webinars.sonatype.com/media/cv/video_library/client/54/28/0/rt/15/81/95/5/rt/image78_piCzR_resized_medium.png</video:thumbnail_loc>
         <video:title>How to Audit SBOMs</video:title>
         <video:content_loc>https://webinars.sonatype.com/media/cv/video_library/client/54/28/0/rt/14/82/08/7/rt/output_1751299435316_BbJEY.mp4</video:content_loc>
         <video:duration>1737</video:duration>
      </video:video>
      <image:image>
         <image:loc>https://webinars.sonatype.com/media/cv/video_library/client/54/28/0/rt/15/81/95/5/rt/image78_piCzR_resized_medium.png</image:loc>
         <image:caption>How to Audit SBOMs</image:caption>
      </image:image>
   </url>
   <url>
      <loc>https://webinars.sonatype.com/wcc/eh/5011667/lp/5036341/easily_stop_malware_before_your_company_become_liable/?partnerref=on24seo</loc>
      <video:video>
         <video:thumbnail_loc>https://webinars.sonatype.com/media/cv/video_library/client/54/28/0/rt/15/20/10/4/rt/Screenshot20250728095232_Wkfli_resized_medium.png</video:thumbnail_loc>
         <video:title>Easily Stop Malware, Before Your Company Become Liable</video:title>
         <video:content_loc>https://webinars.sonatype.com/media/cv/video_library/client/54/28/0/rt/14/83/61/6/rt/output_1751395283546_993d3.mp4</video:content_loc>
         <video:duration>1730</video:duration>
      </video:video>
      <image:image>
         <image:loc>https://webinars.sonatype.com/media/cv/video_library/client/54/28/0/rt/15/20/10/4/rt/Screenshot20250728095232_Wkfli_resized_medium.png</image:loc>
         <image:caption>Easily Stop Malware, Before Your Company Become Liable</image:caption>
      </image:image>
   </url>
   <url>
      <loc>https://webinars.sonatype.com/wcc/eh/5011667/lp/5026305/why_you_need_both_sca_and_sbom_management/?partnerref=on24seo</loc>
      <video:video>
         <video:thumbnail_loc>https://webinars.sonatype.com/media/cv/video_library/client/54/28/0/rt/15/81/95/6/rt/image79_Fj5kr_resized_medium.png</video:thumbnail_loc>
         <video:title>Why You Need Both SCA and SBOM Management</video:title>
         <video:content_loc>https://webinars.sonatype.com/media/cv/video_library/client/54/28/0/rt/14/83/34/1/rt/output_1751387078785_lK1TW.mp4</video:content_loc>
         <video:duration>1660</video:duration>
      </video:video>
      <image:image>
         <image:loc>https://webinars.sonatype.com/media/cv/video_library/client/54/28/0/rt/15/81/95/6/rt/image79_Fj5kr_resized_medium.png</image:loc>
         <image:caption>Why You Need Both SCA and SBOM Management</image:caption>
      </image:image>
   </url>
   <url>
      <loc>https://webinars.sonatype.com/wcc/eh/5011667/lp/5043242/securing_airgapped_supply_chains/?partnerref=on24seo</loc>
      <image:image>
         <image:loc>https://webinars.sonatype.com/media/cv/video_library/client/54/28/0/rt/15/81/82/9/rt/image26_up7i7_resized_medium.png</image:loc>
         <image:caption>Securing Air-Gapped Supply Chains</image:caption>
      </image:image>
   </url>
   <url>
      <loc>https://webinars.sonatype.com/wcc/eh/5011667/lp/5056850/outpace_malware_build_faster_safer_software/?partnerref=on24seo</loc>
      <image:image>
         <image:loc>https://webinars.sonatype.com/media/cv/video_library/client/54/28/0/rt/16/55/99/2/rt/SONMalwareMonthlyOutpaceMalware1200x675_2Fp7n_resized_medium.png</image:loc>
         <image:caption>Outpace Malware: Build Faster, Safer Software</image:caption>
      </image:image>
   </url>
   <url>
      <loc>https://webinars.sonatype.com/wcc/eh/5011667/lp/5203367/one_year_of_dora_what_resilience_looks_like_now/?partnerref=on24seo</loc>
      <image:image>
         <image:loc>https://webinars.sonatype.com/media/cv/video_library/client/54/28/0/rt/17/28/97/3/rt/DORAOneYear1_IgMeP_resized_medium.png</image:loc>
         <image:caption>One Year of DORA: What Resilience Looks Like Now</image:caption>
      </image:image>
   </url>
   <url>
      <loc>https://webinars.sonatype.com/wcc/eh/5011667/lp/5036381/threat_actors_want_access_to_your_sdlc__heres_how_to_secure_them/?partnerref=on24seo</loc>
      <video:video>
         <video:thumbnail_loc>https://webinars.sonatype.com/media/cv/video_library/client/54/28/0/rt/15/81/88/2/rt/image43_CvcRk_resized_medium.png</video:thumbnail_loc>
         <video:title>Threat Actors Want Access to Your SDLC:  Here's How to Secure Them</video:title>
         <video:content_loc>https://webinars.sonatype.com/media/cv/video_library/client/54/28/0/rt/14/82/04/7/rt/output_1751298021361_kLaHi.mp4</video:content_loc>
         <video:duration>1848</video:duration>
      </video:video>
      <image:image>
         <image:loc>https://webinars.sonatype.com/media/cv/video_library/client/54/28/0/rt/15/81/88/2/rt/image43_CvcRk_resized_medium.png</image:loc>
         <image:caption>Threat Actors Want Access to Your SDLC:  Here's How to Secure Them</image:caption>
      </image:image>
   </url>
   <url>
      <loc>https://webinars.sonatype.com/wcc/eh/5011667/lp/5026344/the_invisible_threat_open_source_malware_is_silently_sabotaging_your_software/?partnerref=on24seo</loc>
      <video:video>
         <video:thumbnail_loc>https://webinars.sonatype.com/media/cv/video_library/client/54/28/0/rt/15/81/94/1/rt/image70_ERxpn_resized_medium.png</video:thumbnail_loc>
         <video:title>The Invisible Threat: Open Source Malware is Silently Sabotaging Your Software</video:title>
         <video:content_loc>https://webinars.sonatype.com/media/cv/video_library/client/54/28/0/rt/14/82/13/0/rt/output_1751302958485_FgVf0.mp4</video:content_loc>
         <video:duration>3508</video:duration>
      </video:video>
      <image:image>
         <image:loc>https://webinars.sonatype.com/media/cv/video_library/client/54/28/0/rt/15/81/94/1/rt/image70_ERxpn_resized_medium.png</image:loc>
         <image:caption>The Invisible Threat: Open Source Malware is Silently Sabotaging Your Software</image:caption>
      </image:image>
   </url>
   <url>
      <loc>https://webinars.sonatype.com/wcc/eh/5011667/lp/5038048/managing_sscm_and_sbom_in_the_world_of_system_engineering_and_embedded_software/?partnerref=on24seo</loc>
      <video:video>
         <video:thumbnail_loc>https://webinars.sonatype.com/media/cv/video_library/client/54/28/0/rt/15/81/92/6/rt/image61_YKzHP_resized_medium.png</video:thumbnail_loc>
         <video:title>Managing SSCM and SBOM in the World of System Engineering and Embedded Software</video:title>
         <video:content_loc>https://webinars.sonatype.com/media/cv/video_library/client/54/28/0/rt/15/21/75/1/rt/output_1753815662031_7PFQM.mp4</video:content_loc>
         <video:duration>1346</video:duration>
      </video:video>
      <image:image>
         <image:loc>https://webinars.sonatype.com/media/cv/video_library/client/54/28/0/rt/15/81/92/6/rt/image61_YKzHP_resized_medium.png</image:loc>
         <image:caption>Managing SSCM and SBOM in the World of System Engineering and Embedded Software</image:caption>
      </image:image>
   </url>
   <url>
      <loc>https://webinars.sonatype.com/wcc/eh/5011667/lp/5026721/ai_and_the_future_of_open_source_security/?partnerref=on24seo</loc>
      <video:video>
         <video:thumbnail_loc>https://webinars.sonatype.com/media/cv/video_library/client/54/28/0/rt/15/81/91/1/rt/image56_z2fZ3_resized_medium.png</video:thumbnail_loc>
         <video:title>AI and the Future of Open Source Security</video:title>
         <video:content_loc>https://webinars.sonatype.com/media/cv/video_library/client/54/28/0/rt/15/06/60/6/rt/output_1752680817504_aXtAt.mp4</video:content_loc>
         <video:duration>3499</video:duration>
      </video:video>
      <image:image>
         <image:loc>https://webinars.sonatype.com/media/cv/video_library/client/54/28/0/rt/15/81/91/1/rt/image56_z2fZ3_resized_medium.png</image:loc>
         <image:caption>AI and the Future of Open Source Security</image:caption>
      </image:image>
   </url>
   <url>
      <loc>https://webinars.sonatype.com/wcc/eh/5011667/lp/5056495/securing_the_ai_supply_chain/?partnerref=on24seo</loc>
      <image:image>
         <image:loc>https://webinars.sonatype.com/event/50/56/49/5/rt/1/slide/slide/1_8C3BC51EEA188786AC3080B69EF35D54.jpg</image:loc>
         <image:caption>Securing the AI Supply Chain</image:caption>
      </image:image>
   </url>
   <url>
      <loc>https://webinars.sonatype.com/wcc/eh/5011667/lp/5056569/how_lazarus_group_uses_open_source_to_attack_developers/?partnerref=on24seo</loc>
      <image:image>
         <image:loc>https://webinars.sonatype.com/media/cv/video_library/client/54/28/0/rt/15/81/98/2/rt/image6_ERGNd_resized_medium.png</image:loc>
         <image:caption>How Lazarus Group Uses Open Source to Attack Developers</image:caption>
      </image:image>
   </url>
   <url>
      <loc>https://webinars.sonatype.com/wcc/eh/5011667/lp/5038032/from_checklist_to_action__how_sboms_drive_a_stronger_sca_strategy/?partnerref=on24seo</loc>
      <video:video>
         <video:thumbnail_loc>https://webinars.sonatype.com/media/cv/video_library/client/54/28/0/rt/15/81/86/0/rt/image36_Ghvcm_resized_medium.png</video:thumbnail_loc>
         <video:title>From Checklist to Action – How SBOMs Drive a Stronger SCA Strategy</video:title>
         <video:content_loc>https://webinars.sonatype.com/media/cv/video_library/client/54/28/0/rt/15/06/58/9/rt/output_1752680507215_YUcuT.mp4</video:content_loc>
         <video:duration>3645</video:duration>
      </video:video>
      <image:image>
         <image:loc>https://webinars.sonatype.com/media/cv/video_library/client/54/28/0/rt/15/81/86/0/rt/image36_Ghvcm_resized_medium.png</image:loc>
         <image:caption>From Checklist to Action – How SBOMs Drive a Stronger SCA Strategy</image:caption>
      </image:image>
   </url>
   <url>
      <loc>https://webinars.sonatype.com/wcc/eh/5011667/lp/5036330/spring4shell__everything_you_need_to_know/?partnerref=on24seo</loc>
      <video:video>
         <video:thumbnail_loc>https://webinars.sonatype.com/media/cv/video_library/client/54/28/0/rt/15/20/08/2/rt/output_1753712669895_e09Rw_resized_medium.png</video:thumbnail_loc>
         <video:title>Spring4Shell - Everything You Need to Know</video:title>
         <video:content_loc>https://webinars.sonatype.com/media/cv/video_library/client/54/28/0/rt/15/20/08/2/rt/output_1753712669895_e09Rw.mp4</video:content_loc>
         <video:duration>2815</video:duration>
      </video:video>
      <image:image>
         <image:loc>https://webinars.sonatype.com/media/cv/video_library/client/54/28/0/rt/15/20/08/2/rt/output_1753712669895_e09Rw_resized_medium.png</image:loc>
         <image:caption>Spring4Shell - Everything You Need to Know</image:caption>
      </image:image>
   </url>
   <url>
      <loc>https://webinars.sonatype.com/wcc/eh/5011667/lp/5036659/how_to_safeguard_your_software_supply_chain/?partnerref=on24seo</loc>
      <video:video>
         <video:thumbnail_loc>https://webinars.sonatype.com/media/cv/video_library/client/54/28/0/rt/15/81/97/2/rt/image92_BG8qY_resized_medium.png</video:thumbnail_loc>
         <video:title>How to Safeguard Your Software Supply Chain</video:title>
         <video:content_loc>https://webinars.sonatype.com/media/cv/video_library/client/54/28/0/rt/15/20/35/1/rt/output_1753725491342_xsi2t.mp4</video:content_loc>
         <video:duration>55</video:duration>
      </video:video>
      <image:image>
         <image:loc>https://webinars.sonatype.com/media/cv/video_library/client/54/28/0/rt/15/81/97/2/rt/image92_BG8qY_resized_medium.png</image:loc>
         <image:caption>How to Safeguard Your Software Supply Chain</image:caption>
      </image:image>
   </url>
   <url>
      <loc>https://webinars.sonatype.com/wcc/eh/5011667/lp/5036379/software_supply_chain_threat_landscapes_a_moving_target/?partnerref=on24seo</loc>
      <video:video>
         <video:thumbnail_loc>https://webinars.sonatype.com/media/cv/video_library/client/54/28/0/rt/15/81/87/7/rt/image41_n3ARB_resized_medium.png</video:thumbnail_loc>
         <video:title>Software Supply Chain Threat Landscapes: A Moving Target</video:title>
         <video:content_loc>https://webinars.sonatype.com/media/cv/video_library/client/54/28/0/rt/15/20/10/6/rt/output_1753714486233_mgHar.mp4</video:content_loc>
         <video:duration>4493</video:duration>
      </video:video>
      <image:image>
         <image:loc>https://webinars.sonatype.com/media/cv/video_library/client/54/28/0/rt/15/81/87/7/rt/image41_n3ARB_resized_medium.png</image:loc>
         <image:caption>Software Supply Chain Threat Landscapes: A Moving Target</image:caption>
      </image:image>
   </url>
   <url>
      <loc>https://webinars.sonatype.com/wcc/eh/5011667/lp/5040996/securing_your_supply_chain/?partnerref=on24seo</loc>
      <image:image>
         <image:loc>https://webinars.sonatype.com/media/cv/video_library/client/54/28/0/rt/15/81/87/5/rt/image40_DtkK2_resized_medium.png</image:loc>
         <image:caption>Securing Your Supply Chain</image:caption>
      </image:image>
   </url>
   <url>
      <loc>https://webinars.sonatype.com/wcc/eh/5011667/lp/5036567/sboms_in_action_demonstrations/?partnerref=on24seo</loc>
      <video:video>
         <video:thumbnail_loc>https://webinars.sonatype.com/media/cv/video_library/client/54/28/0/rt/15/20/33/0/rt/output_1753724728736_cNk6j_resized_medium.png</video:thumbnail_loc>
         <video:title>SBOMs in Action: Demonstrations</video:title>
         <video:content_loc>https://webinars.sonatype.com/media/cv/video_library/client/54/28/0/rt/15/20/33/0/rt/output_1753724728736_cNk6j.mp4</video:content_loc>
         <video:duration>2296</video:duration>
      </video:video>
      <image:image>
         <image:loc>https://webinars.sonatype.com/media/cv/video_library/client/54/28/0/rt/15/20/33/0/rt/output_1753724728736_cNk6j_resized_medium.png</image:loc>
         <image:caption>SBOMs in Action: Demonstrations</image:caption>
      </image:image>
   </url>
   <url>
      <loc>https://webinars.sonatype.com/wcc/eh/5011667/lp/5036881/aillm_in_the_financial_services_industry/?partnerref=on24seo</loc>
      <video:video>
         <video:thumbnail_loc>https://webinars.sonatype.com/media/cv/video_library/client/54/28/0/rt/15/81/95/9/rt/image83_bewRW_resized_medium.png</video:thumbnail_loc>
         <video:title>AI/LLM in the Financial Services Industry</video:title>
         <video:content_loc>https://webinars.sonatype.com/media/cv/video_library/client/54/28/0/rt/15/20/62/2/rt/output_1753738304108_4mUpU.mp4</video:content_loc>
         <video:duration>3302</video:duration>
      </video:video>
      <image:image>
         <image:loc>https://webinars.sonatype.com/media/cv/video_library/client/54/28/0/rt/15/81/95/9/rt/image83_bewRW_resized_medium.png</image:loc>
         <image:caption>AI/LLM in the Financial Services Industry</image:caption>
      </image:image>
   </url>
   <url>
      <loc>https://webinars.sonatype.com/wcc/eh/5011667/lp/5026283/malware_and_security_threats_in_the_software_supply_chain/?partnerref=on24seo</loc>
      <video:video>
         <video:thumbnail_loc>https://webinars.sonatype.com/media/cv/video_library/client/54/28/0/rt/15/81/91/2/rt/image57_FikgX_resized_medium.png</video:thumbnail_loc>
         <video:title>Malware and Security Threats in the Software Supply Chain</video:title>
         <video:content_loc>https://webinars.sonatype.com/media/cv/video_library/client/54/28/0/rt/14/82/03/4/rt/output_1751297182467_YqmVv.mp4</video:content_loc>
         <video:duration>3449</video:duration>
      </video:video>
      <image:image>
         <image:loc>https://webinars.sonatype.com/media/cv/video_library/client/54/28/0/rt/15/81/91/2/rt/image57_FikgX_resized_medium.png</image:loc>
         <image:caption>Malware and Security Threats in the Software Supply Chain</image:caption>
      </image:image>
   </url>
   <url>
      <loc>https://webinars.sonatype.com/wcc/eh/5011667/lp/5026284/regulations_and_compliance_deep_dive/?partnerref=on24seo</loc>
      <video:video>
         <video:thumbnail_loc>https://webinars.sonatype.com/media/cv/video_library/client/54/28/0/rt/15/81/91/4/rt/image58_hpAZk_resized_medium.png</video:thumbnail_loc>
         <video:title>Regulations and Compliance Deep Dive</video:title>
         <video:content_loc>https://webinars.sonatype.com/media/cv/video_library/client/54/28/0/rt/14/81/27/3/rt/output_1751047774893_vYOqz.mp4</video:content_loc>
         <video:duration>3020</video:duration>
      </video:video>
      <image:image>
         <image:loc>https://webinars.sonatype.com/media/cv/video_library/client/54/28/0/rt/15/81/91/4/rt/image58_hpAZk_resized_medium.png</image:loc>
         <image:caption>Regulations and Compliance Deep Dive</image:caption>
      </image:image>
   </url>
   <url>
      <loc>https://webinars.sonatype.com/wcc/eh/5011667/lp/5036849/accelerating_dependency_management_in_enterprise_software_development/?partnerref=on24seo</loc>
      <video:video>
         <video:thumbnail_loc>https://webinars.sonatype.com/media/cv/video_library/client/54/28/0/rt/15/81/96/4/rt/image86_OeBrD_resized_medium.png</video:thumbnail_loc>
         <video:title>Accelerating Dependency Management In Enterprise Software Development</video:title>
         <video:content_loc>https://webinars.sonatype.com/media/cv/video_library/client/54/28/0/rt/14/82/17/3/rt/output_1751303976808_3XaUh.mp4</video:content_loc>
         <video:duration>2698</video:duration>
      </video:video>
      <image:image>
         <image:loc>https://webinars.sonatype.com/media/cv/video_library/client/54/28/0/rt/15/81/96/4/rt/image86_OeBrD_resized_medium.png</image:loc>
         <image:caption>Accelerating Dependency Management In Enterprise Software Development</image:caption>
      </image:image>
   </url>
   <url>
      <loc>https://webinars.sonatype.com/wcc/eh/5011667/lp/5026295/how_to_continuously_monitor_sboms/?partnerref=on24seo</loc>
      <video:video>
         <video:thumbnail_loc>https://webinars.sonatype.com/media/cv/video_library/client/54/28/0/rt/15/81/95/0/rt/image76_2PyGa_resized_medium.png</video:thumbnail_loc>
         <video:title>How to Continuously Monitor SBOMs</video:title>
         <video:content_loc>https://webinars.sonatype.com/media/cv/video_library/client/54/28/0/rt/14/82/11/3/rt/output_1751301527319_GMSkQ.mp4</video:content_loc>
         <video:duration>1626</video:duration>
      </video:video>
      <image:image>
         <image:loc>https://webinars.sonatype.com/media/cv/video_library/client/54/28/0/rt/15/81/95/0/rt/image76_2PyGa_resized_medium.png</image:loc>
         <image:caption>How to Continuously Monitor SBOMs</image:caption>
      </image:image>
   </url>
   <url>
      <loc>https://webinars.sonatype.com/wcc/eh/5011667/lp/5015660/innersource_automation/?partnerref=on24seo</loc>
      <video:video>
         <video:thumbnail_loc>https://webinars.sonatype.com/media/cv/video_library/client/54/28/0/rt/14/84/99/6/rt/output_1751494778596_zbtgl_resized_medium.png</video:thumbnail_loc>
         <video:title>InnerSource Automation</video:title>
         <video:content_loc>https://webinars.sonatype.com/media/cv/video_library/client/54/28/0/rt/14/84/99/6/rt/output_1751494778596_zbtgl.mp4</video:content_loc>
         <video:duration>992</video:duration>
      </video:video>
      <image:image>
         <image:loc>https://webinars.sonatype.com/media/cv/video_library/client/54/28/0/rt/14/84/99/6/rt/output_1751494778596_zbtgl_resized_medium.png</image:loc>
         <image:caption>InnerSource Automation</image:caption>
      </image:image>
   </url>
   <url>
      <loc>https://webinars.sonatype.com/wcc/eh/5011667/lp/5037976/licensing_in_the_financial_services_industry/?partnerref=on24seo</loc>
      <video:video>
         <video:thumbnail_loc>https://webinars.sonatype.com/media/cv/video_library/client/54/28/0/rt/15/81/94/4/rt/image72_fzDUs_resized_medium.png</video:thumbnail_loc>
         <video:title>Licensing in the Financial Services Industry</video:title>
         <video:content_loc>https://webinars.sonatype.com/media/cv/video_library/client/54/28/0/rt/15/21/58/5/rt/output_1753811780130_BxLDp.mp4</video:content_loc>
         <video:duration>3033</video:duration>
      </video:video>
      <image:image>
         <image:loc>https://webinars.sonatype.com/media/cv/video_library/client/54/28/0/rt/15/81/94/4/rt/image72_fzDUs_resized_medium.png</image:loc>
         <image:caption>Licensing in the Financial Services Industry</image:caption>
      </image:image>
   </url>
   <url>
      <loc>https://webinars.sonatype.com/wcc/eh/5011667/lp/5026288/how_devops_pioneers_are_leading_the_next_wave_of_organizational_change/?partnerref=on24seo</loc>
      <video:video>
         <video:thumbnail_loc>https://webinars.sonatype.com/media/cv/video_library/client/54/28/0/rt/15/81/96/6/rt/image88_zWzjK_resized_medium.png</video:thumbnail_loc>
         <video:title>How DevOps Pioneers are Leading the Next Wave of Organizational Change</video:title>
         <video:content_loc>https://webinars.sonatype.com/media/cv/video_library/client/54/28/0/rt/14/82/03/6/rt/output_1751297428211_FLywx.mp4</video:content_loc>
         <video:duration>2706</video:duration>
      </video:video>
      <image:image>
         <image:loc>https://webinars.sonatype.com/media/cv/video_library/client/54/28/0/rt/15/81/96/6/rt/image88_zWzjK_resized_medium.png</image:loc>
         <image:caption>How DevOps Pioneers are Leading the Next Wave of Organizational Change</image:caption>
      </image:image>
   </url>
   <url>
      <loc>https://webinars.sonatype.com/wcc/eh/5011667/lp/5015734/understanding_software_development_in_the_age_of_ai/?partnerref=on24seo</loc>
      <video:video>
         <video:thumbnail_loc>https://webinars.sonatype.com/media/cv/video_library/client/54/28/0/rt/15/81/83/0/rt/image24_DTRho_resized_medium.png</video:thumbnail_loc>
         <video:title>Understanding Software Development in the Age of AI</video:title>
         <video:content_loc>https://webinars.sonatype.com/media/cv/video_library/client/54/28/0/rt/14/86/62/0/rt/output_1751903796981_d3Sdh.mp4</video:content_loc>
         <video:duration>1892</video:duration>
      </video:video>
      <image:image>
         <image:loc>https://webinars.sonatype.com/media/cv/video_library/client/54/28/0/rt/15/81/83/0/rt/image24_DTRho_resized_medium.png</image:loc>
         <image:caption>Understanding Software Development in the Age of AI</image:caption>
      </image:image>
   </url>
   <url>
      <loc>https://webinars.sonatype.com/wcc/eh/5011667/lp/5036882/dependency_management_in_the_financial_services_industry/?partnerref=on24seo</loc>
      <video:video>
         <video:thumbnail_loc>https://webinars.sonatype.com/media/cv/video_library/client/54/28/0/rt/15/81/94/9/rt/image75_1H45e_resized_medium.png</video:thumbnail_loc>
         <video:title>Dependency Management in the Financial Services Industry</video:title>
         <video:content_loc>https://webinars.sonatype.com/media/cv/video_library/client/54/28/0/rt/15/20/63/1/rt/output_1753738869274_Umc35.mp4</video:content_loc>
         <video:duration>3366</video:duration>
      </video:video>
      <image:image>
         <image:loc>https://webinars.sonatype.com/media/cv/video_library/client/54/28/0/rt/15/81/94/9/rt/image75_1H45e_resized_medium.png</image:loc>
         <image:caption>Dependency Management in the Financial Services Industry</image:caption>
      </image:image>
   </url>
   <url>
      <loc>https://webinars.sonatype.com/wcc/eh/5011667/lp/5026292/sbom_how_to_secure_your_software_supply_chain/?partnerref=on24seo</loc>
      <video:video>
         <video:thumbnail_loc>https://webinars.sonatype.com/media/cv/video_library/client/54/28/0/rt/15/81/96/3/rt/image85_3CMMA_resized_medium.png</video:thumbnail_loc>
         <video:title>SBOM: How to secure your software supply chain</video:title>
         <video:content_loc>https://webinars.sonatype.com/media/cv/video_library/client/54/28/0/rt/14/81/17/6/rt/output_1751044868050_KEkik.mp4</video:content_loc>
         <video:duration>2894</video:duration>
      </video:video>
      <image:image>
         <image:loc>https://webinars.sonatype.com/media/cv/video_library/client/54/28/0/rt/15/81/96/3/rt/image85_3CMMA_resized_medium.png</image:loc>
         <image:caption>SBOM: How to secure your software supply chain</image:caption>
      </image:image>
   </url>
   <url>
      <loc>https://webinars.sonatype.com/wcc/eh/5011667/lp/5015772/rust_rising_the_journey__current_landscape/?partnerref=on24seo</loc>
      <video:video>
         <video:thumbnail_loc>https://webinars.sonatype.com/media/cv/video_library/client/54/28/0/rt/15/81/90/9/rt/image54_5yFK7_resized_medium.png</video:thumbnail_loc>
         <video:title>Rust Rising: The Journey &amp; Current Landscape</video:title>
         <video:content_loc>https://webinars.sonatype.com/media/cv/video_library/client/54/28/0/rt/14/81/21/6/rt/output_1751045966489_bQQO6.mp4</video:content_loc>
         <video:duration>2781</video:duration>
      </video:video>
      <image:image>
         <image:loc>https://webinars.sonatype.com/media/cv/video_library/client/54/28/0/rt/15/81/90/9/rt/image54_5yFK7_resized_medium.png</image:loc>
         <image:caption>Rust Rising: The Journey &amp; Current Landscape</image:caption>
      </image:image>
   </url>
   <url>
      <loc>https://webinars.sonatype.com/wcc/eh/5011667/lp/5038045/proactive_infrastructure_security_with_sbom_and_iac/?partnerref=on24seo</loc>
      <video:video>
         <video:thumbnail_loc>https://webinars.sonatype.com/media/cv/video_library/client/54/28/0/rt/15/81/93/1/rt/image63_WEgVx.png</video:thumbnail_loc>
         <video:title>Proactive Infrastructure Security with SBOM and IaC</video:title>
         <video:content_loc>https://webinars.sonatype.com/media/cv/video_library/client/54/28/0/rt/15/21/74/0/rt/output_1753815483821_Lxmwd.mp4</video:content_loc>
         <video:duration>1253</video:duration>
      </video:video>
      <image:image>
         <image:loc>https://webinars.sonatype.com/media/cv/video_library/client/54/28/0/rt/15/81/93/1/rt/image63_WEgVx.png</image:loc>
         <image:caption>Proactive Infrastructure Security with SBOM and IaC</image:caption>
      </image:image>
   </url>
   <url>
      <loc>https://webinars.sonatype.com/wcc/eh/5011667/lp/5038137/exploring_the_future_of_software_compliance/?partnerref=on24seo</loc>
      <video:video>
         <video:thumbnail_loc>https://webinars.sonatype.com/media/cv/video_library/client/54/28/0/rt/15/81/94/6/rt/image74_PJY8h_resized_medium.png</video:thumbnail_loc>
         <video:title>Exploring the Future of Software Compliance</video:title>
         <video:content_loc>https://webinars.sonatype.com/media/cv/video_library/client/54/28/0/rt/15/21/84/6/rt/output_1753816912511_ZKLNj.mp4</video:content_loc>
         <video:duration>2613</video:duration>
      </video:video>
      <image:image>
         <image:loc>https://webinars.sonatype.com/media/cv/video_library/client/54/28/0/rt/15/81/94/6/rt/image74_PJY8h_resized_medium.png</image:loc>
         <image:caption>Exploring the Future of Software Compliance</image:caption>
      </image:image>
   </url>
   <url>
      <loc>https://webinars.sonatype.com/wcc/eh/5011667/lp/5015732/experience_sbom_manager/?partnerref=on24seo</loc>
      <video:video>
         <video:thumbnail_loc>https://webinars.sonatype.com/media/cv/video_library/client/54/28/0/rt/15/81/96/2/rt/image84_ebv0o_resized_medium.png</video:thumbnail_loc>
         <video:title>Experience SBOM Manager</video:title>
         <video:content_loc>https://webinars.sonatype.com/media/cv/video_library/client/54/28/0/rt/14/86/61/5/rt/output_1751903497905_2K6yn.mp4</video:content_loc>
         <video:duration>2615</video:duration>
      </video:video>
      <image:image>
         <image:loc>https://webinars.sonatype.com/media/cv/video_library/client/54/28/0/rt/15/81/96/2/rt/image84_ebv0o_resized_medium.png</image:loc>
         <image:caption>Experience SBOM Manager</image:caption>
      </image:image>
   </url>
   <url>
      <loc>https://webinars.sonatype.com/wcc/eh/5011667/lp/5038152/enhancing_software_supply_chain_management_a_dorafocused_approach/?partnerref=on24seo</loc>
      <video:video>
         <video:thumbnail_loc>https://webinars.sonatype.com/media/cv/video_library/client/54/28/0/rt/15/81/89/5/rt/image50_uKwIW_resized_medium.png</video:thumbnail_loc>
         <video:title>Enhancing Software Supply Chain Management: A DORA-Focused Approach</video:title>
         <video:description> </video:description>
         <video:content_loc>https://webinars.sonatype.com/media/cv/video_library/client/54/28/0/rt/15/21/86/0/rt/output_1753817185100_oYPIA.mp4</video:content_loc>
         <video:duration>3570</video:duration>
      </video:video>
      <image:image>
         <image:loc>https://webinars.sonatype.com/media/cv/video_library/client/54/28/0/rt/15/81/89/5/rt/image50_uKwIW_resized_medium.png</image:loc>
         <image:caption>Enhancing Software Supply Chain Management: A DORA-Focused Approach</image:caption>
      </image:image>
   </url>
   <url>
      <loc>https://webinars.sonatype.com/wcc/eh/5011667/lp/5049274/developer_velocity_with_sonatype__aws/?partnerref=on24seo</loc>
      <image:image>
         <image:loc>https://webinars.sonatype.com/media/cv/video_library/client/54/28/0/rt/15/81/82/1/rt/image27_zBbXE_resized_medium.png</image:loc>
         <image:caption>Developer Velocity with Sonatype &amp; AWS</image:caption>
      </image:image>
   </url>
   <url>
      <loc>https://webinars.sonatype.com/wcc/eh/5011667/lp/5091379/the_latest_on_npm_supply_chain_attacks/?partnerref=on24seo</loc>
      <video:video>
         <video:thumbnail_loc>https://webinars.sonatype.com/media/cv/video_library/client/54/28/0/rt/15/87/10/6/rt/son-malwaremonday-npmattacks-1200x675_1__C2MfT_resized_medium.png</video:thumbnail_loc>
         <video:title>The Latest on npm Supply Chain Attacks</video:title>
         <video:content_loc>https://webinars.sonatype.com/media/cv/video_library/client/54/28/0/rt/15/87/10/6/rt/output_1758557183073_O5Ydk.mp4</video:content_loc>
         <video:duration>1741</video:duration>
      </video:video>
      <image:image>
         <image:loc>https://webinars.sonatype.com/media/cv/video_library/client/54/28/0/rt/15/87/10/6/rt/son-malwaremonday-npmattacks-1200x675_1__C2MfT_resized_medium.png</image:loc>
         <image:caption>The Latest on npm Supply Chain Attacks</image:caption>
      </image:image>
   </url>
   <url>
      <loc>https://webinars.sonatype.com/wcc/eh/5011667/lp/5023663/keynote_a_decade_of_transformation_video/?partnerref=on24seo</loc>
      <video:video>
         <video:thumbnail_loc>https://webinars.sonatype.com/media/cv/video_library/client/54/28/0/rt/15/81/93/8/rt/image68_RcCGB_resized_medium.png</video:thumbnail_loc>
         <video:title>keynote a decade of transformation video</video:title>
         <video:content_loc>https://webinars.sonatype.com/media/cv/video_library/client/54/28/0/rt/14/81/14/7/rt/output_1751043074340_zKnfU.mp4</video:content_loc>
         <video:duration>3539</video:duration>
      </video:video>
      <image:image>
         <image:loc>https://webinars.sonatype.com/media/cv/video_library/client/54/28/0/rt/15/81/93/8/rt/image68_RcCGB_resized_medium.png</image:loc>
         <image:caption>keynote a decade of transformation video</image:caption>
      </image:image>
   </url>
   <url>
      <loc>https://webinars.sonatype.com/wcc/eh/5011667/lp/5036560/unlocking_cyber_readiness_with_sboms/?partnerref=on24seo</loc>
      <video:video>
         <video:thumbnail_loc>https://webinars.sonatype.com/media/cv/video_library/client/54/28/0/rt/15/81/97/1/rt/image91_UZbeo_resized_medium.png</video:thumbnail_loc>
         <video:title>Unlocking Cyber Readiness with SBOMS</video:title>
         <video:content_loc>https://webinars.sonatype.com/media/cv/video_library/client/54/28/0/rt/14/83/55/6/rt/output_1751394086949_n99vk.mp4</video:content_loc>
         <video:duration>3583</video:duration>
      </video:video>
      <image:image>
         <image:loc>https://webinars.sonatype.com/media/cv/video_library/client/54/28/0/rt/15/81/97/1/rt/image91_UZbeo_resized_medium.png</image:loc>
         <image:caption>Unlocking Cyber Readiness with SBOMS</image:caption>
      </image:image>
   </url>
   <url>
      <loc>https://webinars.sonatype.com/wcc/eh/5011667/lp/5026308/sboms_more_than_just_another_acronym/?partnerref=on24seo</loc>
      <video:video>
         <video:thumbnail_loc>https://webinars.sonatype.com/media/cv/video_library/client/54/28/0/rt/14/83/99/7/rt/output_1751406087957_ov6zS_resized_medium.png</video:thumbnail_loc>
         <video:title>SBOMs: More Than Just Another Acronym</video:title>
         <video:content_loc>https://webinars.sonatype.com/media/cv/video_library/client/54/28/0/rt/14/83/99/7/rt/output_1751406087957_ov6zS.mp4</video:content_loc>
         <video:duration>2619</video:duration>
      </video:video>
      <image:image>
         <image:loc>https://webinars.sonatype.com/media/cv/video_library/client/54/28/0/rt/14/83/99/7/rt/output_1751406087957_ov6zS_resized_medium.png</image:loc>
         <image:caption>SBOMs: More Than Just Another Acronym</image:caption>
      </image:image>
   </url>
   <url>
      <loc>https://webinars.sonatype.com/wcc/eh/5011667/lp/5036675/unlocking_the_power_of_binary_repositories_a_devops_teams_best_friend/?partnerref=on24seo</loc>
      <video:video>
         <video:thumbnail_loc>https://webinars.sonatype.com/media/cv/video_library/client/54/28/0/rt/15/81/97/3/rt/image93_ujMPe_resized_medium.png</video:thumbnail_loc>
         <video:title>Unlocking the Power of Binary Repositories_ A DevOps Team's Best Friend</video:title>
         <video:content_loc>https://webinars.sonatype.com/media/cv/video_library/client/54/28/0/rt/14/83/57/4/rt/output_1751394417491_QV5fE.mp4</video:content_loc>
         <video:duration>1395</video:duration>
      </video:video>
      <image:image>
         <image:loc>https://webinars.sonatype.com/media/cv/video_library/client/54/28/0/rt/15/81/97/3/rt/image93_ujMPe_resized_medium.png</image:loc>
         <image:caption>Unlocking the Power of Binary Repositories_ A DevOps Team's Best Friend</image:caption>
      </image:image>
   </url>
</urlset>
