<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" xmlns:slash="http://purl.org/rss/1.0/modules/slash/">
  <channel>
    <title>Blog</title>
    <description>concrete5 Blog</description>
    <generator>Zend_Feed_Writer 2 (http://framework.zend.com)</generator>
    <link>http://savantadvisory.com/index.php</link>
    <item>
      <title>Leadership - MBA vs MAL</title>
      <description><![CDATA[<p><img src="http://savantadvisory.com/application/files/6614/7371/8707/subway.jpg" /></p>Understanding the makeup of great leaders]]></description>
      <pubDate>Wed, 08 Feb 2017 22:19:04 +0000</pubDate>
      <link>http://savantadvisory.com/index.php/blog/leadership-mba-vs-mal</link>
      <guid>http://savantadvisory.com/index.php/blog/leadership-mba-vs-mal</guid>
      <slash:comments>0</slash:comments>
    </item>
    <item>
      <title>4 Ways to Improve Information Security Engagement</title>
      <description><![CDATA[<p><img src="http://savantadvisory.com/application/files/6514/8001/4119/stonecarver.jpg" /></p>Some suggestions on improving the permeability of information security within organizations]]></description>
      <pubDate>Tue, 06 Dec 2016 00:00:00 +0000</pubDate>
      <link>http://savantadvisory.com/index.php/blog/4-ways-improve-information-security-engagement</link>
      <guid>http://savantadvisory.com/index.php/blog/4-ways-improve-information-security-engagement</guid>
      <slash:comments>0</slash:comments>
    </item>
    <item>
      <title>Presenting IT Security to the Board</title>
      <description><![CDATA[<p><img src="http://savantadvisory.com/application/files/5614/7552/2667/CS.jpg" /></p>A description on how to present IT Security to the Board of Directors.]]></description>
      <pubDate>Fri, 30 Sep 2016 16:53:00 +0000</pubDate>
      <link>http://savantadvisory.com/index.php/blog/presenting-it-security-baord</link>
      <guid>http://savantadvisory.com/index.php/blog/presenting-it-security-baord</guid>
      <slash:comments>0</slash:comments>
    </item>
  </channel>
</rss>
