<?xml version="1.0" encoding="UTF-8"?>
<urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9">
  <url>
    <loc>https://cism.baremetalcyber.com/</loc>
    <lastmod>2026-04-02T18:24:09Z</lastmod>
    <priority>1.0</priority>
  </url>
  <url>
    <loc>https://cism.baremetalcyber.com/episodes</loc>
    <lastmod>2026-04-02T18:24:09Z</lastmod>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://cism.baremetalcyber.com/study-guide</loc>
    <lastmod>2026-04-02T18:24:09Z</lastmod>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://cism.baremetalcyber.com/flash-cards</loc>
    <lastmod>2026-04-02T18:24:09Z</lastmod>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://cism.baremetalcyber.com/all-in-one-course-hub</loc>
    <lastmod>2026-04-02T18:24:09Z</lastmod>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://cism.baremetalcyber.com/recommended</loc>
    <lastmod>2026-04-02T18:24:09Z</lastmod>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://cism.baremetalcyber.com/contact-us</loc>
    <lastmod>2026-04-02T18:24:09Z</lastmod>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://cism.baremetalcyber.com/subscribe</loc>
    <lastmod>2026-04-02T18:24:09Z</lastmod>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://cism.baremetalcyber.com/episodes/welcome-to-the-cism-certification-overview-and-benefits</loc>
    <lastmod>2026-04-02T18:04:22Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cism.baremetalcyber.com/episodes/understanding-the-exam-domains-structure-and-study-strategies</loc>
    <lastmod>2026-04-02T18:04:31Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cism.baremetalcyber.com/episodes/cism-vs-cissp-vs-crisc-choosing-your-certification-path</loc>
    <lastmod>2026-04-02T18:04:41Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cism.baremetalcyber.com/episodes/essential-skills-and-experience-for-cism-candidates</loc>
    <lastmod>2026-04-02T18:04:50Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cism.baremetalcyber.com/episodes/building-a-personalized-cism-study-plan</loc>
    <lastmod>2026-04-02T18:05:01Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cism.baremetalcyber.com/episodes/test-taking-strategies-and-exam-day-tips-for-success</loc>
    <lastmod>2026-04-02T18:05:34Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cism.baremetalcyber.com/episodes/organizational-culture-and-its-impact-on-security</loc>
    <lastmod>2026-04-02T18:06:22Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cism.baremetalcyber.com/episodes/legal-and-regulatory-compliance-essentials</loc>
    <lastmod>2026-04-02T18:06:31Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cism.baremetalcyber.com/episodes/contractual-requirements-and-security-agreements</loc>
    <lastmod>2026-04-02T18:06:44Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cism.baremetalcyber.com/episodes/organizational-structures-roles-and-responsibilities-in-security-governance</loc>
    <lastmod>2026-04-02T18:06:55Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cism.baremetalcyber.com/episodes/developing-an-effective-information-security-strategy</loc>
    <lastmod>2026-04-02T18:07:08Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cism.baremetalcyber.com/episodes/overview-of-major-governance-frameworks-cobit-iso-nist</loc>
    <lastmod>2026-04-02T18:07:20Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cism.baremetalcyber.com/episodes/deep-dive-into-cobit-framework</loc>
    <lastmod>2026-04-02T18:08:11Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cism.baremetalcyber.com/episodes/deep-dive-into-iso-27001-and-iso-27002</loc>
    <lastmod>2026-04-02T18:08:18Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cism.baremetalcyber.com/episodes/deep-dive-into-nist-cybersecurity-framework-csf</loc>
    <lastmod>2026-04-02T18:08:26Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cism.baremetalcyber.com/episodes/strategic-planning-essentials-budgets-resources-and-the-business-case</loc>
    <lastmod>2026-04-02T18:08:52Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cism.baremetalcyber.com/episodes/current-cyber-threat-landscape</loc>
    <lastmod>2026-04-02T18:09:07Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cism.baremetalcyber.com/episodes/identifying-and-managing-emerging-risks-ai-quantum-iot</loc>
    <lastmod>2026-04-02T18:09:17Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cism.baremetalcyber.com/episodes/conducting-vulnerability-and-control-deficiency-analysis</loc>
    <lastmod>2026-04-02T18:24:09Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cism.baremetalcyber.com/episodes/quantitative-vs-qualitative-risk-assessment</loc>
    <lastmod>2026-04-02T18:10:50Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cism.baremetalcyber.com/episodes/conducting-effective-risk-analysis-workshops</loc>
    <lastmod>2026-04-02T18:11:00Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cism.baremetalcyber.com/episodes/risk-mitigation-and-acceptance-strategies</loc>
    <lastmod>2026-04-02T18:13:22Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cism.baremetalcyber.com/episodes/risk-transfer-and-avoidance-strategies</loc>
    <lastmod>2026-04-02T18:13:51Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cism.baremetalcyber.com/episodes/establishing-risk-and-control-ownership</loc>
    <lastmod>2026-04-02T18:13:54Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cism.baremetalcyber.com/episodes/best-practices-in-risk-monitoring-and-reporting</loc>
    <lastmod>2026-04-02T18:14:07Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cism.baremetalcyber.com/episodes/staffing-and-managing-security-teams</loc>
    <lastmod>2026-04-02T18:14:33Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cism.baremetalcyber.com/episodes/selecting-and-implementing-security-tools-and-technologies</loc>
    <lastmod>2026-04-02T18:15:03Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cism.baremetalcyber.com/episodes/information-asset-identification-and-classification-fundamentals</loc>
    <lastmod>2026-04-02T18:15:08Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cism.baremetalcyber.com/episodes/applying-industry-standards-and-frameworks-to-your-security-program</loc>
    <lastmod>2026-04-02T18:15:09Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cism.baremetalcyber.com/episodes/developing-effective-security-policies</loc>
    <lastmod>2026-04-02T18:15:12Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cism.baremetalcyber.com/episodes/writing-actionable-procedures-and-guidelines</loc>
    <lastmod>2026-04-02T18:16:14Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cism.baremetalcyber.com/episodes/developing-and-using-information-security-program-metrics</loc>
    <lastmod>2026-04-02T18:16:18Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cism.baremetalcyber.com/episodes/designing-and-selecting-effective-information-security-controls</loc>
    <lastmod>2026-04-02T18:16:21Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cism.baremetalcyber.com/episodes/implementing-and-integrating-information-security-controls</loc>
    <lastmod>2026-04-02T18:16:24Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cism.baremetalcyber.com/episodes/techniques-for-information-security-control-testing-and-evaluation</loc>
    <lastmod>2026-04-02T18:16:27Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cism.baremetalcyber.com/episodes/developing-engaging-information-security-awareness-and-training-programs</loc>
    <lastmod>2026-04-02T18:16:31Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cism.baremetalcyber.com/episodes/vendor-risk-assessment-and-selection</loc>
    <lastmod>2026-04-02T18:16:33Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cism.baremetalcyber.com/episodes/contractual-security-requirements-and-ongoing-vendor-monitoring</loc>
    <lastmod>2026-04-02T18:16:38Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cism.baremetalcyber.com/episodes/communications-and-reporting-for-the-information-security-program</loc>
    <lastmod>2026-04-02T18:16:39Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cism.baremetalcyber.com/episodes/designing-and-documenting-the-incident-response-plan</loc>
    <lastmod>2026-04-02T18:16:45Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cism.baremetalcyber.com/episodes/maintaining-and-updating-your-incident-response-plan</loc>
    <lastmod>2026-04-02T18:17:49Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cism.baremetalcyber.com/episodes/conducting-business-impact-analysis-bia</loc>
    <lastmod>2026-04-02T18:17:56Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cism.baremetalcyber.com/episodes/building-your-business-continuity-plan-bcp</loc>
    <lastmod>2026-04-02T18:17:56Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cism.baremetalcyber.com/episodes/designing-your-disaster-recovery-plan-drp</loc>
    <lastmod>2026-04-02T18:18:00Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cism.baremetalcyber.com/episodes/testing-maintenance-and-improvement-of-your-drp</loc>
    <lastmod>2026-04-02T18:18:05Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cism.baremetalcyber.com/episodes/incident-classification-and-categorization-methods</loc>
    <lastmod>2026-04-02T18:18:03Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cism.baremetalcyber.com/episodes/training-testing-and-evaluating-your-incident-management-capabilities</loc>
    <lastmod>2026-04-02T18:18:08Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cism.baremetalcyber.com/episodes/incident-management-tools-and-techniques</loc>
    <lastmod>2026-04-02T18:18:11Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cism.baremetalcyber.com/episodes/incident-investigation-methodologies</loc>
    <lastmod>2026-04-02T18:18:14Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cism.baremetalcyber.com/episodes/digital-forensics-and-evidence-collection-basics</loc>
    <lastmod>2026-04-02T18:18:18Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cism.baremetalcyber.com/episodes/effective-incident-containment-methods</loc>
    <lastmod>2026-04-02T18:18:23Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cism.baremetalcyber.com/episodes/incident-response-communications-reporting-notification-and-escalation</loc>
    <lastmod>2026-04-02T18:18:27Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cism.baremetalcyber.com/episodes/techniques-for-incident-eradication</loc>
    <lastmod>2026-04-02T18:21:51Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cism.baremetalcyber.com/episodes/techniques-for-secure-recovery-and-restoration</loc>
    <lastmod>2026-04-02T18:21:56Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cism.baremetalcyber.com/episodes/conducting-meaningful-post-incident-reviews</loc>
    <lastmod>2026-04-02T18:21:57Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cism.baremetalcyber.com/episodes/identifying-internal-and-external-influences-on-security-strategy</loc>
    <lastmod>2026-04-02T18:22:02Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cism.baremetalcyber.com/episodes/establishing-information-security-strategy-aligned-with-organizational-goals</loc>
    <lastmod>2026-04-02T18:19:07Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cism.baremetalcyber.com/episodes/implementing-information-security-governance-frameworks</loc>
    <lastmod>2026-04-02T18:21:16Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cism.baremetalcyber.com/episodes/integrating-information-security-into-corporate-governance</loc>
    <lastmod>2026-04-02T18:22:38Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cism.baremetalcyber.com/episodes/building-effective-security-budgets-and-roi-analysis</loc>
    <lastmod>2026-04-02T18:21:20Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cism.baremetalcyber.com/episodes/communicating-the-business-case-and-gaining-stakeholder-buy-in</loc>
    <lastmod>2026-04-02T18:21:22Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cism.baremetalcyber.com/episodes/gaining-senior-leadership-commitment-and-stakeholder-support</loc>
    <lastmod>2026-04-02T18:21:25Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cism.baremetalcyber.com/episodes/defining-and-communicating-security-roles-and-responsibilities</loc>
    <lastmod>2026-04-02T18:21:29Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cism.baremetalcyber.com/episodes/compiling-and-presenting-effective-security-reports</loc>
    <lastmod>2026-04-02T18:21:29Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cism.baremetalcyber.com/episodes/evaluating-and-reporting-information-security-metrics</loc>
    <lastmod>2026-04-02T18:21:32Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cism.baremetalcyber.com/episodes/aligning-security-programs-with-operational-business-objectives</loc>
    <lastmod>2026-04-02T18:21:36Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cism.baremetalcyber.com/episodes/integrating-security-requirements-into-organizational-processes</loc>
    <lastmod>2026-04-02T18:21:43Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cism.baremetalcyber.com/episodes/managing-and-monitoring-security-compliance-with-external-parties</loc>
    <lastmod>2026-04-02T18:21:39Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cism.baremetalcyber.com/episodes/supervising-risk-identification-and-assessment</loc>
    <lastmod>2026-04-02T18:21:44Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cism.baremetalcyber.com/episodes/supervising-risk-treatment-and-continuous-monitoring</loc>
    <lastmod>2026-04-02T18:21:45Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cism.baremetalcyber.com/episodes/continuous-improvement-through-post-incident-reviews-and-risk-reassessment</loc>
    <lastmod>2026-04-02T18:21:49Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cism.baremetalcyber.com/episodes/trailer</loc>
    <lastmod>2025-10-26T21:29:51Z</lastmod>
    <priority>0.9</priority>
  </url>
</urlset>
