<?xml version="1.0" encoding="UTF-8"?>
<urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9">
  <url>
    <loc>https://issmp.baremetalcyber.com/</loc>
    <lastmod>2026-04-29T03:52:36Z</lastmod>
    <priority>1.0</priority>
  </url>
  <url>
    <loc>https://issmp.baremetalcyber.com/episodes</loc>
    <lastmod>2026-04-29T03:52:36Z</lastmod>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://issmp.baremetalcyber.com/recommended</loc>
    <lastmod>2026-04-29T03:52:36Z</lastmod>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://issmp.baremetalcyber.com/baremetalcyber</loc>
    <lastmod>2026-04-29T03:52:36Z</lastmod>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://issmp.baremetalcyber.com/course-hub</loc>
    <lastmod>2026-04-29T03:52:36Z</lastmod>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://issmp.baremetalcyber.com/contact-us</loc>
    <lastmod>2026-04-29T03:52:36Z</lastmod>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://issmp.baremetalcyber.com/flash-cards</loc>
    <lastmod>2026-04-29T03:52:36Z</lastmod>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://issmp.baremetalcyber.com/study-guide</loc>
    <lastmod>2026-04-29T03:52:36Z</lastmod>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://issmp.baremetalcyber.com/subscribe</loc>
    <lastmod>2026-04-29T03:52:36Z</lastmod>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://issmp.baremetalcyber.com/episodes/welcome-to-certified-the-isc-2-issmp-audio-course</loc>
    <lastmod>2026-03-29T16:02:09Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://issmp.baremetalcyber.com/episodes/episode-1-decode-the-issmp-blueprint-domain-weights-and-realistic-time-management-tactics</loc>
    <lastmod>2026-03-29T16:02:26Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://issmp.baremetalcyber.com/episodes/episode-2-build-a-spoken-study-plan-that-tracks-every-issmp-objective-precisely</loc>
    <lastmod>2026-03-29T16:02:40Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://issmp.baremetalcyber.com/episodes/episode-3-master-exam-policies-question-mechanics-and-confident-elimination-techniques</loc>
    <lastmod>2026-03-29T16:02:56Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://issmp.baremetalcyber.com/episodes/episode-4-establish-security-s-role-in-culture-vision-mission-and-daily-decisions</loc>
    <lastmod>2026-03-29T16:03:12Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://issmp.baremetalcyber.com/episodes/episode-5-define-the-information-security-program-vision-mission-and-success-measures</loc>
    <lastmod>2026-03-29T16:03:26Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://issmp.baremetalcyber.com/episodes/episode-6-align-security-with-organizational-goals-objectives-and-stated-values</loc>
    <lastmod>2026-03-29T16:03:45Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://issmp.baremetalcyber.com/episodes/episode-7-fit-security-into-enterprise-processes-without-becoming-the-department-of-no</loc>
    <lastmod>2026-03-29T16:04:00Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://issmp.baremetalcyber.com/episodes/episode-8-explain-how-organizational-culture-shapes-security-behavior-and-outcomes</loc>
    <lastmod>2026-03-29T16:04:19Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://issmp.baremetalcyber.com/episodes/episode-9-navigate-governance-structures-and-place-security-authority-in-context</loc>
    <lastmod>2026-03-29T16:04:36Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://issmp.baremetalcyber.com/episodes/episode-10-verify-key-stakeholder-roles-and-responsibilities-without-guesswork</loc>
    <lastmod>2026-03-29T16:04:51Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://issmp.baremetalcyber.com/episodes/episode-11-validate-sources-and-boundaries-of-authorization-for-security-decisions</loc>
    <lastmod>2026-03-29T16:05:08Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://issmp.baremetalcyber.com/episodes/episode-12-advocate-for-security-initiatives-and-win-durable-executive-support</loc>
    <lastmod>2026-03-29T16:05:24Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://issmp.baremetalcyber.com/episodes/episode-13-identify-security-requirements-driven-by-organizational-initiatives-and-change</loc>
    <lastmod>2026-03-29T16:05:38Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://issmp.baremetalcyber.com/episodes/episode-14-evaluate-capability-and-capacity-to-execute-security-strategies-realistically</loc>
    <lastmod>2026-03-29T16:05:54Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://issmp.baremetalcyber.com/episodes/episode-15-prescribe-security-architecture-direction-that-enables-strategy-execution</loc>
    <lastmod>2026-03-29T16:06:10Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://issmp.baremetalcyber.com/episodes/episode-16-manage-implementation-of-security-strategies-across-people-process-technology</loc>
    <lastmod>2026-03-29T16:06:26Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://issmp.baremetalcyber.com/episodes/episode-17-review-and-maintain-security-strategies-as-risks-and-threats-evolve</loc>
    <lastmod>2026-03-29T16:06:41Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://issmp.baremetalcyber.com/episodes/episode-18-determine-applicable-external-standards-laws-and-regulatory-obligations</loc>
    <lastmod>2026-03-29T16:06:56Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://issmp.baremetalcyber.com/episodes/episode-19-determine-data-classification-and-protection-requirements-that-hold-up</loc>
    <lastmod>2026-03-29T16:07:14Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://issmp.baremetalcyber.com/episodes/episode-20-establish-internal-policies-that-are-clear-enforceable-and-auditable</loc>
    <lastmod>2026-03-29T16:07:52Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://issmp.baremetalcyber.com/episodes/episode-21-advocate-for-policy-adoption-and-secure-organization-wide-commitment</loc>
    <lastmod>2026-03-29T16:08:09Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://issmp.baremetalcyber.com/episodes/episode-22-develop-procedures-standards-guidelines-and-baselines-that-operate-together</loc>
    <lastmod>2026-03-29T16:08:24Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://issmp.baremetalcyber.com/episodes/episode-23-evaluate-service-management-agreements-for-risk-cost-and-accountability</loc>
    <lastmod>2026-03-29T16:08:38Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://issmp.baremetalcyber.com/episodes/episode-24-govern-managed-services-and-cloud-services-with-security-built-in</loc>
    <lastmod>2026-03-29T16:08:54Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://issmp.baremetalcyber.com/episodes/episode-25-manage-security-impact-of-mergers-acquisitions-outsourcing-and-reorgs</loc>
    <lastmod>2026-03-29T16:09:10Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://issmp.baremetalcyber.com/episodes/episode-26-embed-regulatory-compliance-requirements-into-contracts-and-service-agreements</loc>
    <lastmod>2026-03-29T16:09:24Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://issmp.baremetalcyber.com/episodes/episode-27-monitor-and-enforce-contractual-security-commitments-without-creating-drag</loc>
    <lastmod>2026-03-29T16:09:39Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://issmp.baremetalcyber.com/episodes/episode-28-promote-security-programs-to-stakeholders-using-their-language-and-incentives</loc>
    <lastmod>2026-03-29T16:09:55Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://issmp.baremetalcyber.com/episodes/episode-29-identify-training-needs-and-implement-programs-by-role-and-target-segment</loc>
    <lastmod>2026-03-29T16:10:15Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://issmp.baremetalcyber.com/episodes/episode-30-monitor-evaluate-and-report-training-effectiveness-with-meaningful-evidence</loc>
    <lastmod>2026-03-29T16:10:44Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://issmp.baremetalcyber.com/episodes/episode-31-identify-kpi-and-kri-metrics-that-reflect-security-performance-and-exposure</loc>
    <lastmod>2026-03-29T16:10:59Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://issmp.baremetalcyber.com/episodes/episode-32-tie-security-metrics-to-risk-posture-and-what-leadership-actually-cares-about</loc>
    <lastmod>2026-03-29T16:11:15Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://issmp.baremetalcyber.com/episodes/episode-33-use-metrics-to-drive-security-program-and-operations-improvements-that-last</loc>
    <lastmod>2026-03-29T16:11:31Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://issmp.baremetalcyber.com/episodes/episode-34-prepare-and-secure-the-annual-security-budget-under-competing-priorities</loc>
    <lastmod>2026-03-29T16:11:45Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://issmp.baremetalcyber.com/episodes/episode-35-adjust-budget-requests-as-risks-and-threats-shift-mid-year</loc>
    <lastmod>2026-03-29T16:11:59Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://issmp.baremetalcyber.com/episodes/episode-36-manage-and-report-financial-responsibilities-with-credibility-and-clarity</loc>
    <lastmod>2026-03-29T16:12:14Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://issmp.baremetalcyber.com/episodes/episode-37-define-security-roles-and-responsibilities-across-teams-and-third-parties</loc>
    <lastmod>2026-03-29T16:12:30Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://issmp.baremetalcyber.com/episodes/episode-38-create-team-accountability-that-works-in-real-organizational-friction</loc>
    <lastmod>2026-03-29T16:12:45Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://issmp.baremetalcyber.com/episodes/episode-39-build-cross-functional-relationships-that-keep-security-embedded-and-trusted</loc>
    <lastmod>2026-03-29T16:13:00Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://issmp.baremetalcyber.com/episodes/episode-40-resolve-conflicts-between-security-and-stakeholders-without-losing-ground</loc>
    <lastmod>2026-03-29T16:13:39Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://issmp.baremetalcyber.com/episodes/episode-41-identify-communication-bottlenecks-and-remove-barriers-to-security-execution</loc>
    <lastmod>2026-03-29T16:13:53Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://issmp.baremetalcyber.com/episodes/episode-42-integrate-security-controls-into-business-processes-with-minimal-disruption</loc>
    <lastmod>2026-03-29T16:14:06Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://issmp.baremetalcyber.com/episodes/episode-43-incorporate-security-throughout-the-product-lifecycle-from-concept-to-retirement</loc>
    <lastmod>2026-03-29T16:14:20Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://issmp.baremetalcyber.com/episodes/episode-44-choose-and-apply-agile-waterfall-lean-and-hybrid-methods-with-security-fit</loc>
    <lastmod>2026-03-29T16:14:35Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://issmp.baremetalcyber.com/episodes/episode-45-analyze-project-scope-timelines-quality-and-budget-through-a-security-lens</loc>
    <lastmod>2026-03-29T16:14:48Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://issmp.baremetalcyber.com/episodes/episode-46-integrate-security-decision-points-and-requirements-across-the-system-lifecycle</loc>
    <lastmod>2026-03-29T16:15:02Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://issmp.baremetalcyber.com/episodes/episode-47-implement-security-controls-throughout-the-system-lifecycle-with-traceability</loc>
    <lastmod>2026-03-29T16:15:16Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://issmp.baremetalcyber.com/episodes/episode-48-oversee-security-configuration-management-processes-that-prevent-drift</loc>
    <lastmod>2026-03-29T16:15:29Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://issmp.baremetalcyber.com/episodes/episode-49-implement-core-security-principles-across-initiatives-and-emerging-technology</loc>
    <lastmod>2026-03-29T16:15:44Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://issmp.baremetalcyber.com/episodes/episode-50-address-how-organizational-initiatives-shift-security-posture-and-risk</loc>
    <lastmod>2026-03-29T16:15:57Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://issmp.baremetalcyber.com/episodes/episode-51-build-vulnerability-programs-asset-criticality-classification-and-prioritization</loc>
    <lastmod>2026-03-29T16:16:12Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://issmp.baremetalcyber.com/episodes/episode-52-prioritize-threats-and-vulnerabilities-based-on-risk-impact-and-likelihood</loc>
    <lastmod>2026-03-29T16:16:28Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://issmp.baremetalcyber.com/episodes/episode-53-manage-security-testing-across-scanning-pen-testing-and-threat-analysis</loc>
    <lastmod>2026-03-29T16:16:43Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://issmp.baremetalcyber.com/episodes/episode-54-drive-mitigation-and-remediation-to-closure-without-endless-re-openings</loc>
    <lastmod>2026-03-29T16:16:58Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://issmp.baremetalcyber.com/episodes/episode-55-monitor-and-report-vulnerabilities-with-actionable-executive-ready-signal</loc>
    <lastmod>2026-03-29T16:17:14Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://issmp.baremetalcyber.com/episodes/episode-56-integrate-security-requirements-into-change-control-without-slowing-delivery</loc>
    <lastmod>2026-03-29T16:17:28Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://issmp.baremetalcyber.com/episodes/episode-57-conduct-security-impact-analysis-that-prevents-change-driven-incidents</loc>
    <lastmod>2026-03-29T16:17:42Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://issmp.baremetalcyber.com/episodes/episode-58-coordinate-stakeholders-and-manage-change-documentation-and-tracking-cleanly</loc>
    <lastmod>2026-03-29T16:17:57Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://issmp.baremetalcyber.com/episodes/episode-59-ensure-ongoing-policy-compliance-through-continuous-monitoring-practices</loc>
    <lastmod>2026-03-29T16:18:12Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://issmp.baremetalcyber.com/episodes/episode-60-define-risk-program-objectives-with-owners-stakeholders-and-clear-scope</loc>
    <lastmod>2026-03-29T16:19:01Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://issmp.baremetalcyber.com/episodes/episode-61-identify-risk-tolerance-and-appetite-and-translate-it-into-real-decisions</loc>
    <lastmod>2026-03-29T16:19:16Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://issmp.baremetalcyber.com/episodes/episode-62-build-and-verify-asset-inventory-inputs-that-make-risk-analysis-reliable</loc>
    <lastmod>2026-03-29T16:19:33Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://issmp.baremetalcyber.com/episodes/episode-63-analyze-organizational-risks-and-select-countermeasures-and-compensating-controls</loc>
    <lastmod>2026-03-29T16:19:47Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://issmp.baremetalcyber.com/episodes/episode-64-choose-risk-treatment-options-and-perform-cost-benefit-analysis-that-persuades</loc>
    <lastmod>2026-03-29T16:20:02Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://issmp.baremetalcyber.com/episodes/episode-65-document-and-manage-agreed-risks-issues-treatments-and-accountability</loc>
    <lastmod>2026-03-29T16:20:17Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://issmp.baremetalcyber.com/episodes/episode-66-test-monitor-and-report-risks-and-issues-with-operational-follow-through</loc>
    <lastmod>2026-03-29T16:20:33Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://issmp.baremetalcyber.com/episodes/episode-67-manage-supply-chain-risk-objectives-across-vendors-suppliers-and-partners</loc>
    <lastmod>2026-03-29T16:20:48Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://issmp.baremetalcyber.com/episodes/episode-68-integrate-third-party-risks-into-enterprise-risk-management-end-to-end</loc>
    <lastmod>2026-03-29T16:21:04Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://issmp.baremetalcyber.com/episodes/episode-69-verify-and-validate-supply-chain-controls-and-confirm-they-actually-work</loc>
    <lastmod>2026-03-29T16:21:20Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://issmp.baremetalcyber.com/episodes/episode-70-monitor-and-review-supply-chain-risks-as-dependencies-and-threats-change</loc>
    <lastmod>2026-03-29T16:21:36Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://issmp.baremetalcyber.com/episodes/episode-71-identify-risk-factors-and-pick-the-right-risk-assessment-approach</loc>
    <lastmod>2026-03-29T16:21:50Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://issmp.baremetalcyber.com/episodes/episode-72-perform-risk-analysis-with-repeatable-methods-and-defensible-results</loc>
    <lastmod>2026-03-29T16:22:05Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://issmp.baremetalcyber.com/episodes/episode-73-identify-risk-controls-and-determine-control-effectiveness-with-evidence</loc>
    <lastmod>2026-03-29T16:22:20Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://issmp.baremetalcyber.com/episodes/episode-74-evaluate-control-coverage-gaps-and-overlap-across-the-control-portfolio</loc>
    <lastmod>2026-03-29T16:22:36Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://issmp.baremetalcyber.com/episodes/episode-75-monitor-and-report-control-effectiveness-and-coverage-for-decision-makers</loc>
    <lastmod>2026-03-29T16:22:51Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://issmp.baremetalcyber.com/episodes/episode-76-establish-and-maintain-a-security-operations-center-with-essential-documentation</loc>
    <lastmod>2026-03-29T16:23:07Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://issmp.baremetalcyber.com/episodes/episode-77-aggregate-threat-intelligence-from-multiple-sources-into-usable-context</loc>
    <lastmod>2026-03-29T16:23:22Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://issmp.baremetalcyber.com/episodes/episode-78-baseline-network-data-and-user-behavior-to-make-detection-credible</loc>
    <lastmod>2026-03-29T16:23:32Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://issmp.baremetalcyber.com/episodes/episode-79-detect-and-analyze-anomalous-behavior-patterns-for-actionable-security-triage</loc>
    <lastmod>2026-03-29T16:23:45Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://issmp.baremetalcyber.com/episodes/episode-80-conduct-threat-modeling-to-anticipate-attacks-and-strengthen-defenses</loc>
    <lastmod>2026-03-29T16:25:11Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://issmp.baremetalcyber.com/episodes/episode-81-identify-and-categorize-attacks-to-improve-response-speed-and-accuracy</loc>
    <lastmod>2026-03-29T16:25:26Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://issmp.baremetalcyber.com/episodes/episode-82-correlate-security-events-and-threat-data-into-coherent-prioritized-cases</loc>
    <lastmod>2026-03-29T16:25:45Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://issmp.baremetalcyber.com/episodes/episode-83-define-actionable-alerts-that-reduce-noise-and-increase-analyst-confidence</loc>
    <lastmod>2026-03-29T16:26:01Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://issmp.baremetalcyber.com/episodes/episode-84-establish-incident-program-documentation-that-drives-consistent-response</loc>
    <lastmod>2026-03-29T16:26:17Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://issmp.baremetalcyber.com/episodes/episode-85-build-incident-case-management-processes-that-preserve-evidence-and-momentum</loc>
    <lastmod>2026-03-29T16:26:32Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://issmp.baremetalcyber.com/episodes/episode-86-establish-an-incident-response-team-with-roles-authority-and-coverage</loc>
    <lastmod>2026-03-29T16:26:47Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://issmp.baremetalcyber.com/episodes/episode-87-apply-incident-management-methodologies-that-scale-under-pressure</loc>
    <lastmod>2026-03-29T16:27:02Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://issmp.baremetalcyber.com/episodes/episode-88-build-incident-handling-processes-from-intake-through-containment-and-recovery</loc>
    <lastmod>2026-03-29T16:27:20Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://issmp.baremetalcyber.com/episodes/episode-89-establish-investigation-processes-that-support-root-cause-and-legal-needs</loc>
    <lastmod>2026-03-29T16:27:35Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://issmp.baremetalcyber.com/episodes/episode-90-quantify-and-report-incident-impact-to-stakeholders-without-speculation</loc>
    <lastmod>2026-03-29T16:27:53Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://issmp.baremetalcyber.com/episodes/episode-91-conduct-root-cause-analysis-that-drives-control-improvements-and-prevention</loc>
    <lastmod>2026-03-29T16:28:12Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://issmp.baremetalcyber.com/episodes/episode-92-facilitate-resiliency-planning-inputs-coop-external-factors-laws-and-bia</loc>
    <lastmod>2026-03-29T16:28:27Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://issmp.baremetalcyber.com/episodes/episode-93-facilitate-bcp-development-with-time-resource-verification-and-bia-constraints</loc>
    <lastmod>2026-03-29T16:28:42Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://issmp.baremetalcyber.com/episodes/episode-94-facilitate-drp-development-with-time-resource-and-verification-requirements</loc>
    <lastmod>2026-03-29T16:28:56Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://issmp.baremetalcyber.com/episodes/episode-95-identify-recovery-alternatives-and-coordinate-practical-recovery-strategies</loc>
    <lastmod>2026-03-29T16:29:14Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://issmp.baremetalcyber.com/episodes/episode-96-assign-recovery-roles-and-responsibilities-that-work-during-real-disasters</loc>
    <lastmod>2026-03-29T16:29:32Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://issmp.baremetalcyber.com/episodes/episode-97-plan-testing-evaluation-and-modification-of-coop-bcp-and-drp</loc>
    <lastmod>2026-03-29T16:29:46Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://issmp.baremetalcyber.com/episodes/episode-98-determine-survivability-and-resiliency-capabilities-without-false-confidence</loc>
    <lastmod>2026-03-29T16:30:01Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://issmp.baremetalcyber.com/episodes/episode-99-manage-the-plan-update-process-so-contingency-plans-stay-current</loc>
    <lastmod>2026-03-29T16:30:17Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://issmp.baremetalcyber.com/episodes/episode-100-declare-and-communicate-a-disaster-clearly-across-the-organization</loc>
    <lastmod>2026-03-29T16:42:05Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://issmp.baremetalcyber.com/episodes/episode-101-implement-the-plan-and-coordinate-response-without-operational-chaos</loc>
    <lastmod>2026-03-29T16:42:20Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://issmp.baremetalcyber.com/episodes/episode-102-restore-normal-operations-while-protecting-integrity-availability-and-trust</loc>
    <lastmod>2026-03-29T16:42:42Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://issmp.baremetalcyber.com/episodes/episode-103-capture-lessons-learned-and-turn-them-into-concrete-program-changes</loc>
    <lastmod>2026-03-29T16:42:56Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://issmp.baremetalcyber.com/episodes/episode-104-identify-legal-jurisdictions-and-trans-border-data-flow-obligations</loc>
    <lastmod>2026-03-29T16:43:18Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://issmp.baremetalcyber.com/episodes/episode-105-identify-applicable-security-and-privacy-laws-regulations-and-standards</loc>
    <lastmod>2026-03-29T16:43:54Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://issmp.baremetalcyber.com/episodes/episode-106-identify-intellectual-property-laws-and-translate-them-into-security-controls</loc>
    <lastmod>2026-03-29T16:44:19Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://issmp.baremetalcyber.com/episodes/episode-107-advise-on-risks-of-non-compliance-and-non-conformity-with-business-clarity</loc>
    <lastmod>2026-03-29T16:44:40Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://issmp.baremetalcyber.com/episodes/episode-108-promote-the-isc2-code-of-ethics-through-practical-leadership-decisions</loc>
    <lastmod>2026-03-29T16:44:54Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://issmp.baremetalcyber.com/episodes/episode-109-promote-organizational-ethics-and-resolve-security-dilemmas-without-hand-waving</loc>
    <lastmod>2026-03-29T16:45:16Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://issmp.baremetalcyber.com/episodes/episode-110-inform-and-advise-senior-management-on-compliance-strategy-and-tradeoffs</loc>
    <lastmod>2026-03-29T16:45:40Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://issmp.baremetalcyber.com/episodes/episode-111-evaluate-and-select-compliance-frameworks-that-fit-business-and-regulation</loc>
    <lastmod>2026-03-29T16:45:59Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://issmp.baremetalcyber.com/episodes/episode-112-implement-compliance-frameworks-into-operations-without-creating-paper-security</loc>
    <lastmod>2026-03-29T16:46:21Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://issmp.baremetalcyber.com/episodes/episode-113-define-and-monitor-compliance-metrics-that-survive-audit-scrutiny</loc>
    <lastmod>2026-03-29T16:47:03Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://issmp.baremetalcyber.com/episodes/episode-114-plan-and-schedule-internal-and-external-audit-activities-with-minimal-disruption</loc>
    <lastmod>2026-03-29T16:47:39Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://issmp.baremetalcyber.com/episodes/episode-115-coordinate-audit-activities-and-maintain-evidence-readiness-year-round</loc>
    <lastmod>2026-03-29T16:48:07Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://issmp.baremetalcyber.com/episodes/episode-116-evaluate-and-validate-findings-and-build-responses-that-address-root-causes</loc>
    <lastmod>2026-03-29T16:48:25Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://issmp.baremetalcyber.com/episodes/episode-117-monitor-and-validate-remediation-actions-until-risk-is-truly-reduced</loc>
    <lastmod>2026-03-29T16:48:42Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://issmp.baremetalcyber.com/episodes/episode-118-document-compliance-exceptions-with-controls-workarounds-and-risk-context</loc>
    <lastmod>2026-03-29T16:48:58Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://issmp.baremetalcyber.com/episodes/episode-119-obtain-authorized-risk-waivers-with-proper-approval-and-traceable-records</loc>
    <lastmod>2026-03-29T16:49:47Z</lastmod>
    <priority>0.9</priority>
  </url>
</urlset>
