<?xml version="1.0" encoding="UTF-8"?>
<ListBucketResult xmlns="http://s3.amazonaws.com/doc/2006-03-01/"><Name>security-architecture-consulting</Name><Prefix></Prefix><Marker></Marker><MaxKeys>1000</MaxKeys><IsTruncated>false</IsTruncated><Contents><Key>role-of-security-architecture-in-cybersecurity-risk-management.html</Key><LastModified>2024-01-23T13:17:17.000Z</LastModified><ETag>&#34;2e0f70f4bd68ccdd709d579259f17611&#34;</ETag><Size>47425</Size><Owner><DisplayName>77494526-504d-4003-a7fc-c629bcebe5e6:77494526-504d-4003-a7fc-c629bcebe5e6</DisplayName><ID>77494526-504d-4003-a7fc-c629bcebe5e6:77494526-504d-4003-a7fc-c629bcebe5e6</ID></Owner><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>test.txt</Key><LastModified>2024-01-23T13:16:22.000Z</LastModified><ETag>&#34;d41d8cd98f00b204e9800998ecf8427e&#34;</ETag><Size>0</Size><Owner><DisplayName>77494526-504d-4003-a7fc-c629bcebe5e6:77494526-504d-4003-a7fc-c629bcebe5e6</DisplayName><ID>77494526-504d-4003-a7fc-c629bcebe5e6:77494526-504d-4003-a7fc-c629bcebe5e6</ID></Owner><StorageClass>STANDARD</StorageClass></Contents><Contents><Key>what-is-your-companys-achilles-heel-in-terms-of-data-protection-let-us-strengthen-it-through-security-architecture-consulting.html</Key><LastModified>2024-01-23T13:17:07.000Z</LastModified><ETag>&#34;c9e027459470d64a19544754d2396d9c&#34;</ETag><Size>43192</Size><Owner><DisplayName>77494526-504d-4003-a7fc-c629bcebe5e6:77494526-504d-4003-a7fc-c629bcebe5e6</DisplayName><ID>77494526-504d-4003-a7fc-c629bcebe5e6:77494526-504d-4003-a7fc-c629bcebe5e6</ID></Owner><StorageClass>STANDARD</StorageClass></Contents></ListBucketResult>