<?xml version="1.0" encoding="UTF-8"?>
<urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9">
  <url>
    <loc>https://cciso.baremetalcyber.com/</loc>
    <lastmod>2026-03-17T20:57:52Z</lastmod>
    <priority>1.0</priority>
  </url>
  <url>
    <loc>https://cciso.baremetalcyber.com/episodes</loc>
    <lastmod>2026-03-17T20:57:52Z</lastmod>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://cciso.baremetalcyber.com/study-guide</loc>
    <lastmod>2026-03-17T20:57:52Z</lastmod>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://cciso.baremetalcyber.com/flash-cards</loc>
    <lastmod>2026-03-17T20:57:52Z</lastmod>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://cciso.baremetalcyber.com/all-in-one-course-hub</loc>
    <lastmod>2026-03-17T20:57:52Z</lastmod>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://cciso.baremetalcyber.com/recommended</loc>
    <lastmod>2026-03-17T20:57:52Z</lastmod>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://cciso.baremetalcyber.com/contact-us</loc>
    <lastmod>2026-03-17T20:57:52Z</lastmod>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://cciso.baremetalcyber.com/subscribe</loc>
    <lastmod>2026-03-17T20:57:52Z</lastmod>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://cciso.baremetalcyber.com/episodes/episode-1-welcome-to-the-cisa-certification</loc>
    <lastmod>2025-10-11T19:10:51Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cciso.baremetalcyber.com/episodes/episode-2-cciso-exam-structure-domains-and-cognitive-levels</loc>
    <lastmod>2025-10-11T19:10:59Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cciso.baremetalcyber.com/episodes/episode-3-cciso-exam-eligibility-and-experience-requirements</loc>
    <lastmod>2025-10-11T19:11:10Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cciso.baremetalcyber.com/episodes/episode-4-cciso-exam-registration-scheduling-and-costs</loc>
    <lastmod>2025-10-11T19:11:17Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cciso.baremetalcyber.com/episodes/episode-5-key-acronyms-and-terminology-for-the-cciso-exam</loc>
    <lastmod>2025-10-11T19:11:25Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cciso.baremetalcyber.com/episodes/episode-6-proven-exam-day-tips-and-time-management-strategies</loc>
    <lastmod>2025-10-11T19:11:35Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cciso.baremetalcyber.com/episodes/episode-7-information-security-governance-basics</loc>
    <lastmod>2025-10-11T19:11:43Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cciso.baremetalcyber.com/episodes/episode-8-organizational-structures-in-information-security</loc>
    <lastmod>2025-10-11T19:11:51Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cciso.baremetalcyber.com/episodes/episode-9-information-security-roles-and-responsibilities</loc>
    <lastmod>2025-10-11T19:12:00Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cciso.baremetalcyber.com/episodes/episode-10-risk-management-fundamentals</loc>
    <lastmod>2025-10-11T19:12:08Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cciso.baremetalcyber.com/episodes/episode-11-iso-27005-risk-assessment-essentials</loc>
    <lastmod>2025-10-11T19:12:17Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cciso.baremetalcyber.com/episodes/episode-12-nist-rmf-essentials-for-executives</loc>
    <lastmod>2025-10-11T19:12:23Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cciso.baremetalcyber.com/episodes/episode-13-fair-quantitative-risk-management-overview</loc>
    <lastmod>2025-10-11T19:12:31Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cciso.baremetalcyber.com/episodes/episode-14-compliance-essentials-for-cisos</loc>
    <lastmod>2025-10-11T19:12:40Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cciso.baremetalcyber.com/episodes/episode-15-legal-and-regulatory-requirements</loc>
    <lastmod>2025-10-11T19:12:48Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cciso.baremetalcyber.com/episodes/episode-16-gdpr-essentials-for-cisos</loc>
    <lastmod>2025-10-11T19:12:56Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cciso.baremetalcyber.com/episodes/episode-17-information-security-policy-development</loc>
    <lastmod>2025-10-11T19:13:05Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cciso.baremetalcyber.com/episodes/episode-18-framework-alignment-strategies</loc>
    <lastmod>2025-10-11T19:13:13Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cciso.baremetalcyber.com/episodes/episode-19-auditing-security-governance</loc>
    <lastmod>2025-10-11T19:13:20Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cciso.baremetalcyber.com/episodes/episode-20-third-party-and-vendor-risk-management</loc>
    <lastmod>2025-10-11T19:13:29Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cciso.baremetalcyber.com/episodes/episode-21-introduction-to-security-controls</loc>
    <lastmod>2025-10-11T19:13:38Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cciso.baremetalcyber.com/episodes/episode-22-designing-effective-security-controls</loc>
    <lastmod>2025-10-11T19:13:48Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cciso.baremetalcyber.com/episodes/episode-23-implementing-security-controls</loc>
    <lastmod>2025-10-11T19:13:56Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cciso.baremetalcyber.com/episodes/episode-24-measuring-and-evaluating-control-effectiveness</loc>
    <lastmod>2025-10-11T19:14:03Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cciso.baremetalcyber.com/episodes/episode-25-compliance-auditing-standards-and-frameworks</loc>
    <lastmod>2025-10-11T19:14:10Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cciso.baremetalcyber.com/episodes/episode-26-internal-audit-process-fundamentals</loc>
    <lastmod>2025-10-11T19:14:18Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cciso.baremetalcyber.com/episodes/episode-27-external-audit-preparation</loc>
    <lastmod>2025-10-11T19:14:26Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cciso.baremetalcyber.com/episodes/episode-28-responding-to-and-managing-audit-findings</loc>
    <lastmod>2025-10-11T19:14:32Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cciso.baremetalcyber.com/episodes/episode-29-reporting-audit-outcomes</loc>
    <lastmod>2025-10-11T19:14:40Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cciso.baremetalcyber.com/episodes/episode-30-metrics-and-kpis-for-security-controls</loc>
    <lastmod>2025-10-11T19:14:46Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cciso.baremetalcyber.com/episodes/episode-31-security-controls-lifecycle-management</loc>
    <lastmod>2025-10-11T19:15:19Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cciso.baremetalcyber.com/episodes/episode-32-continuous-monitoring-of-security-controls</loc>
    <lastmod>2025-10-11T19:15:25Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cciso.baremetalcyber.com/episodes/episode-33-executive-audit-management</loc>
    <lastmod>2025-10-11T19:15:32Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cciso.baremetalcyber.com/episodes/episode-34-crafting-an-effective-security-program-charter</loc>
    <lastmod>2025-10-11T19:15:40Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cciso.baremetalcyber.com/episodes/episode-35-creating-a-security-roadmap</loc>
    <lastmod>2025-10-11T19:15:45Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cciso.baremetalcyber.com/episodes/episode-36-budgeting-fundamentals-planning-and-strategy</loc>
    <lastmod>2025-10-11T19:15:52Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cciso.baremetalcyber.com/episodes/episode-37-resource-allocation-strategies-for-security-leaders</loc>
    <lastmod>2025-10-11T19:15:58Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cciso.baremetalcyber.com/episodes/episode-38-building-effective-security-teams</loc>
    <lastmod>2025-10-11T19:16:04Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cciso.baremetalcyber.com/episodes/episode-39-incident-management-basics</loc>
    <lastmod>2025-10-11T19:16:10Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cciso.baremetalcyber.com/episodes/episode-40-advanced-incident-response-techniques</loc>
    <lastmod>2025-10-11T19:16:16Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cciso.baremetalcyber.com/episodes/episode-41-digital-forensics-essentials-for-executives</loc>
    <lastmod>2025-10-11T19:16:22Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cciso.baremetalcyber.com/episodes/episode-42-business-continuity-planning-fundamentals</loc>
    <lastmod>2025-10-11T19:16:30Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cciso.baremetalcyber.com/episodes/episode-43-disaster-recovery-strategy-essentials</loc>
    <lastmod>2025-10-11T19:16:37Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cciso.baremetalcyber.com/episodes/episode-44-security-operations-center-soc-basics</loc>
    <lastmod>2025-10-11T19:16:43Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cciso.baremetalcyber.com/episodes/episode-45-leveraging-siem-solutions-strategically</loc>
    <lastmod>2025-10-11T19:16:51Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cciso.baremetalcyber.com/episodes/episode-46-vulnerability-management-essentials</loc>
    <lastmod>2025-10-11T19:16:57Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cciso.baremetalcyber.com/episodes/episode-47-threat-intelligence-for-executives</loc>
    <lastmod>2025-10-11T19:17:03Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cciso.baremetalcyber.com/episodes/episode-48-threat-hunting-basics-for-executives</loc>
    <lastmod>2025-10-11T19:17:09Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cciso.baremetalcyber.com/episodes/episode-49-advanced-threat-hunting-concepts</loc>
    <lastmod>2025-10-11T19:17:15Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cciso.baremetalcyber.com/episodes/episode-50-access-control-models-overview</loc>
    <lastmod>2025-10-11T19:17:21Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cciso.baremetalcyber.com/episodes/episode-51-best-practices-for-access-control</loc>
    <lastmod>2025-10-11T19:17:50Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cciso.baremetalcyber.com/episodes/episode-52-endpoint-security-essentials</loc>
    <lastmod>2025-10-11T19:17:56Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cciso.baremetalcyber.com/episodes/episode-53-network-security-for-executives</loc>
    <lastmod>2025-10-11T19:18:04Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cciso.baremetalcyber.com/episodes/episode-54-cloud-security-fundamentals</loc>
    <lastmod>2025-10-11T19:18:10Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cciso.baremetalcyber.com/episodes/episode-55-data-security-and-privacy-basics</loc>
    <lastmod>2025-10-11T19:18:18Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cciso.baremetalcyber.com/episodes/episode-56-encryption-principles-and-practices</loc>
    <lastmod>2025-10-11T19:18:26Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cciso.baremetalcyber.com/episodes/episode-57-physical-security-management</loc>
    <lastmod>2025-10-11T19:18:33Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cciso.baremetalcyber.com/episodes/episode-58-mobile-device-security-essentials</loc>
    <lastmod>2025-10-11T19:18:41Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cciso.baremetalcyber.com/episodes/episode-59-virtualization-security-overview</loc>
    <lastmod>2025-10-11T19:18:49Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cciso.baremetalcyber.com/episodes/episode-60-emerging-tech-in-security-ai-and-machine-learning</loc>
    <lastmod>2025-10-11T19:18:55Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cciso.baremetalcyber.com/episodes/episode-61-autonomous-security-operations-centers-and-future-trends</loc>
    <lastmod>2025-10-11T19:19:01Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cciso.baremetalcyber.com/episodes/episode-62-aligning-security-with-organizational-objectives</loc>
    <lastmod>2025-10-11T19:19:09Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cciso.baremetalcyber.com/episodes/episode-63-strategic-security-planning-frameworks-togaf-sabsa</loc>
    <lastmod>2025-10-11T19:19:17Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cciso.baremetalcyber.com/episodes/episode-64-financial-management-principles-for-security-leaders</loc>
    <lastmod>2025-10-11T19:19:23Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cciso.baremetalcyber.com/episodes/episode-65-security-budgeting-essentials-managing-and-adjusting-budgets</loc>
    <lastmod>2025-10-11T19:19:31Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cciso.baremetalcyber.com/episodes/episode-66-roi-and-cost-benefit-analysis-for-security-investments</loc>
    <lastmod>2025-10-11T19:19:42Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cciso.baremetalcyber.com/episodes/episode-67-security-procurement-rfps-rfis-and-vendor-selection</loc>
    <lastmod>2025-10-11T19:19:47Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cciso.baremetalcyber.com/episodes/episode-68-vendor-contracts-slas-and-performance-metrics</loc>
    <lastmod>2025-10-11T19:19:55Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cciso.baremetalcyber.com/episodes/episode-69-vendor-risk-oversight-and-auditing</loc>
    <lastmod>2025-10-11T19:20:04Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cciso.baremetalcyber.com/episodes/episode-70-final-exam-review-and-strategy</loc>
    <lastmod>2025-10-11T19:20:11Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cciso.baremetalcyber.com/episodes/trailer</loc>
    <lastmod>2025-10-26T23:02:34Z</lastmod>
    <priority>0.9</priority>
  </url>
</urlset>
