<?xml version="1.0" encoding="UTF-8"?>
<urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9" generatedBy="WIX">
<url>
<loc>https://www.junorisk.com/case-studies/shifting-from-reactive-to-proactive-security-in-federal-institutions</loc>
<lastmod>2026-04-08</lastmod>
</url>
<url>
<loc>https://www.junorisk.com/case-studies/how-rapid-resilience-turned-risk-into-strength</loc>
<lastmod>2026-04-08</lastmod>
</url>
<url>
<loc>https://www.junorisk.com/case-studies/building-a-unified-brand-crisis-response-model</loc>
<lastmod>2026-04-08</lastmod>
</url>
<url>
<loc>https://www.junorisk.com/case-studies/advancing-financial-sector-resilience</loc>
<lastmod>2026-04-08</lastmod>
</url>
<url>
<loc>https://www.junorisk.com/case-studies/national-security-tradecraft-applied-to-workforce-screening</loc>
<lastmod>2026-04-08</lastmod>
</url>
<url>
<loc>https://www.junorisk.com/case-studies/helping-a-canadian-firm-outsmart-foreign-espionage</loc>
<lastmod>2026-04-08</lastmod>
</url>
<url>
<loc>https://www.junorisk.com/case-studies/exonerating-the-accused</loc>
<lastmod>2026-04-08</lastmod>
</url>
<url>
<loc>https://www.junorisk.com/case-studies/disrupting-organized-crime-recruitment-in-the-workplace</loc>
<lastmod>2026-04-08</lastmod>
</url>
<url>
<loc>https://www.junorisk.com/case-studies/turning-toxicity-into-trust</loc>
<lastmod>2026-04-07</lastmod>
</url>
<url>
<loc>https://www.junorisk.com/case-studies/transforming-workplace-culture</loc>
<lastmod>2026-04-14</lastmod>
</url>
<url>
<loc>https://www.junorisk.com/case-studies/safeguarding-workplace-well%E2%80%91being-in-a-sensitive-environment</loc>
<lastmod>2026-04-07</lastmod>
</url>
<url>
<loc>https://www.junorisk.com/case-studies/restoring-trust-in-a-sensitive-workplace-investigation</loc>
<lastmod>2026-04-07</lastmod>
</url>
<url>
<loc>https://www.junorisk.com/case-studies/building-cyber-resilience-for-critical-infrastructure-</loc>
<lastmod>2026-04-07</lastmod>
</url>
<url>
<loc>https://www.junorisk.com/case-studies/turning-compliance-into-capability</loc>
<lastmod>2026-04-08</lastmod>
</url>
<url>
<loc>https://www.junorisk.com/case-studies/navigating-cyber-risk-across-shared-systems-and-responsibilities</loc>
<lastmod>2026-04-08</lastmod>
</url>
<url>
<loc>https://www.junorisk.com/case-studies/from-data-cleanup-to-ongoing-third-party-data-governance</loc>
<lastmod>2026-04-08</lastmod>
</url>
</urlset>