<?xml version="1.0" encoding="UTF-8"?>
<urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9">
  <url>
    <loc>https://cism.baremetalcyber.com/</loc>
    <lastmod>2026-05-20T17:56:14Z</lastmod>
    <priority>1.0</priority>
  </url>
  <url>
    <loc>https://cism.baremetalcyber.com/episodes</loc>
    <lastmod>2026-05-20T17:56:14Z</lastmod>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://cism.baremetalcyber.com/study-guide</loc>
    <lastmod>2026-05-20T17:56:14Z</lastmod>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://cism.baremetalcyber.com/flash-cards</loc>
    <lastmod>2026-05-20T17:56:14Z</lastmod>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://cism.baremetalcyber.com/all-in-one-course-hub</loc>
    <lastmod>2026-05-20T17:56:14Z</lastmod>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://cism.baremetalcyber.com/recommended</loc>
    <lastmod>2026-05-20T17:56:14Z</lastmod>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://cism.baremetalcyber.com/contact-us</loc>
    <lastmod>2026-05-20T17:56:14Z</lastmod>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://cism.baremetalcyber.com/subscribe</loc>
    <lastmod>2026-05-20T17:56:14Z</lastmod>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://cism.baremetalcyber.com/episodes/welcome-to-the-cism-certification-overview-and-benefits</loc>
    <lastmod>2026-05-17T06:15:09Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cism.baremetalcyber.com/episodes/understanding-the-exam-domains-structure-and-study-strategies</loc>
    <lastmod>2026-05-17T06:15:08Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cism.baremetalcyber.com/episodes/cism-vs-cissp-vs-crisc-choosing-your-certification-path</loc>
    <lastmod>2026-05-17T06:15:07Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cism.baremetalcyber.com/episodes/essential-skills-and-experience-for-cism-candidates</loc>
    <lastmod>2026-05-17T06:15:07Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cism.baremetalcyber.com/episodes/building-a-personalized-cism-study-plan</loc>
    <lastmod>2026-05-17T06:15:04Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cism.baremetalcyber.com/episodes/test-taking-strategies-and-exam-day-tips-for-success</loc>
    <lastmod>2026-05-17T06:15:04Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cism.baremetalcyber.com/episodes/organizational-culture-and-its-impact-on-security</loc>
    <lastmod>2026-05-17T06:15:06Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cism.baremetalcyber.com/episodes/legal-and-regulatory-compliance-essentials</loc>
    <lastmod>2026-05-17T06:15:05Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cism.baremetalcyber.com/episodes/contractual-requirements-and-security-agreements</loc>
    <lastmod>2026-05-17T06:15:05Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cism.baremetalcyber.com/episodes/organizational-structures-roles-and-responsibilities-in-security-governance</loc>
    <lastmod>2026-05-17T06:15:05Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cism.baremetalcyber.com/episodes/developing-an-effective-information-security-strategy</loc>
    <lastmod>2026-05-17T06:15:03Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cism.baremetalcyber.com/episodes/overview-of-major-governance-frameworks-cobit-iso-nist</loc>
    <lastmod>2026-05-17T06:15:03Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cism.baremetalcyber.com/episodes/deep-dive-into-cobit-framework</loc>
    <lastmod>2026-05-17T06:15:11Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cism.baremetalcyber.com/episodes/deep-dive-into-iso-27001-and-iso-27002</loc>
    <lastmod>2026-05-17T06:15:03Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cism.baremetalcyber.com/episodes/deep-dive-into-nist-cybersecurity-framework-csf</loc>
    <lastmod>2026-05-17T06:15:02Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cism.baremetalcyber.com/episodes/strategic-planning-essentials-budgets-resources-and-the-business-case</loc>
    <lastmod>2026-05-17T06:15:05Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cism.baremetalcyber.com/episodes/current-cyber-threat-landscape</loc>
    <lastmod>2026-05-17T06:15:02Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cism.baremetalcyber.com/episodes/identifying-and-managing-emerging-risks-ai-quantum-iot</loc>
    <lastmod>2026-05-17T06:15:02Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cism.baremetalcyber.com/episodes/conducting-vulnerability-and-control-deficiency-analysis</loc>
    <lastmod>2026-05-17T06:15:00Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cism.baremetalcyber.com/episodes/quantitative-vs-qualitative-risk-assessment</loc>
    <lastmod>2026-05-17T06:15:03Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cism.baremetalcyber.com/episodes/conducting-effective-risk-analysis-workshops</loc>
    <lastmod>2026-05-17T06:14:59Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cism.baremetalcyber.com/episodes/risk-mitigation-and-acceptance-strategies</loc>
    <lastmod>2026-05-17T06:14:59Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cism.baremetalcyber.com/episodes/risk-transfer-and-avoidance-strategies</loc>
    <lastmod>2026-05-17T06:14:56Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cism.baremetalcyber.com/episodes/establishing-risk-and-control-ownership</loc>
    <lastmod>2026-05-17T06:14:56Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cism.baremetalcyber.com/episodes/best-practices-in-risk-monitoring-and-reporting</loc>
    <lastmod>2026-05-17T06:14:56Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cism.baremetalcyber.com/episodes/staffing-and-managing-security-teams</loc>
    <lastmod>2026-05-17T06:14:57Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cism.baremetalcyber.com/episodes/selecting-and-implementing-security-tools-and-technologies</loc>
    <lastmod>2026-05-17T06:14:57Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cism.baremetalcyber.com/episodes/information-asset-identification-and-classification-fundamentals</loc>
    <lastmod>2026-05-17T06:14:57Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cism.baremetalcyber.com/episodes/applying-industry-standards-and-frameworks-to-your-security-program</loc>
    <lastmod>2026-05-17T06:14:55Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cism.baremetalcyber.com/episodes/developing-effective-security-policies</loc>
    <lastmod>2026-05-17T06:14:57Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cism.baremetalcyber.com/episodes/writing-actionable-procedures-and-guidelines</loc>
    <lastmod>2026-05-17T06:14:56Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cism.baremetalcyber.com/episodes/developing-and-using-information-security-program-metrics</loc>
    <lastmod>2026-05-17T06:14:56Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cism.baremetalcyber.com/episodes/designing-and-selecting-effective-information-security-controls</loc>
    <lastmod>2026-05-17T06:14:52Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cism.baremetalcyber.com/episodes/implementing-and-integrating-information-security-controls</loc>
    <lastmod>2026-05-17T06:14:53Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cism.baremetalcyber.com/episodes/techniques-for-information-security-control-testing-and-evaluation</loc>
    <lastmod>2026-05-17T06:14:53Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cism.baremetalcyber.com/episodes/developing-engaging-information-security-awareness-and-training-programs</loc>
    <lastmod>2026-05-17T06:14:53Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cism.baremetalcyber.com/episodes/vendor-risk-assessment-and-selection</loc>
    <lastmod>2026-05-17T06:14:53Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cism.baremetalcyber.com/episodes/contractual-security-requirements-and-ongoing-vendor-monitoring</loc>
    <lastmod>2026-05-17T06:14:50Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cism.baremetalcyber.com/episodes/communications-and-reporting-for-the-information-security-program</loc>
    <lastmod>2026-05-17T06:14:50Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cism.baremetalcyber.com/episodes/designing-and-documenting-the-incident-response-plan</loc>
    <lastmod>2026-05-17T06:14:50Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cism.baremetalcyber.com/episodes/maintaining-and-updating-your-incident-response-plan</loc>
    <lastmod>2026-05-17T06:14:59Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cism.baremetalcyber.com/episodes/conducting-business-impact-analysis-bia</loc>
    <lastmod>2026-05-17T06:14:49Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cism.baremetalcyber.com/episodes/building-your-business-continuity-plan-bcp</loc>
    <lastmod>2026-05-17T06:14:50Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cism.baremetalcyber.com/episodes/designing-your-disaster-recovery-plan-drp</loc>
    <lastmod>2026-05-17T06:14:49Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cism.baremetalcyber.com/episodes/testing-maintenance-and-improvement-of-your-drp</loc>
    <lastmod>2026-05-17T06:14:50Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cism.baremetalcyber.com/episodes/incident-classification-and-categorization-methods</loc>
    <lastmod>2026-05-17T06:14:48Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cism.baremetalcyber.com/episodes/training-testing-and-evaluating-your-incident-management-capabilities</loc>
    <lastmod>2026-05-17T06:14:47Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cism.baremetalcyber.com/episodes/incident-management-tools-and-techniques</loc>
    <lastmod>2026-05-17T06:14:45Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cism.baremetalcyber.com/episodes/incident-investigation-methodologies</loc>
    <lastmod>2026-05-17T06:14:48Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cism.baremetalcyber.com/episodes/digital-forensics-and-evidence-collection-basics</loc>
    <lastmod>2026-05-17T06:14:46Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cism.baremetalcyber.com/episodes/effective-incident-containment-methods</loc>
    <lastmod>2026-05-17T06:14:46Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cism.baremetalcyber.com/episodes/incident-response-communications-reporting-notification-and-escalation</loc>
    <lastmod>2026-05-17T06:14:44Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cism.baremetalcyber.com/episodes/techniques-for-incident-eradication</loc>
    <lastmod>2026-05-17T06:14:43Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cism.baremetalcyber.com/episodes/techniques-for-secure-recovery-and-restoration</loc>
    <lastmod>2026-05-17T06:14:43Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cism.baremetalcyber.com/episodes/conducting-meaningful-post-incident-reviews</loc>
    <lastmod>2026-05-17T06:14:43Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cism.baremetalcyber.com/episodes/identifying-internal-and-external-influences-on-security-strategy</loc>
    <lastmod>2026-05-17T06:14:43Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cism.baremetalcyber.com/episodes/establishing-information-security-strategy-aligned-with-organizational-goals</loc>
    <lastmod>2026-05-17T06:14:43Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cism.baremetalcyber.com/episodes/implementing-information-security-governance-frameworks</loc>
    <lastmod>2026-05-17T06:14:41Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cism.baremetalcyber.com/episodes/integrating-information-security-into-corporate-governance</loc>
    <lastmod>2026-05-17T06:14:42Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cism.baremetalcyber.com/episodes/building-effective-security-budgets-and-roi-analysis</loc>
    <lastmod>2026-05-17T06:14:41Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cism.baremetalcyber.com/episodes/communicating-the-business-case-and-gaining-stakeholder-buy-in</loc>
    <lastmod>2026-05-17T06:14:49Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cism.baremetalcyber.com/episodes/gaining-senior-leadership-commitment-and-stakeholder-support</loc>
    <lastmod>2026-05-17T06:14:41Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cism.baremetalcyber.com/episodes/defining-and-communicating-security-roles-and-responsibilities</loc>
    <lastmod>2026-05-17T06:14:42Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cism.baremetalcyber.com/episodes/compiling-and-presenting-effective-security-reports</loc>
    <lastmod>2026-05-17T06:14:38Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cism.baremetalcyber.com/episodes/evaluating-and-reporting-information-security-metrics</loc>
    <lastmod>2026-05-17T06:14:41Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cism.baremetalcyber.com/episodes/aligning-security-programs-with-operational-business-objectives</loc>
    <lastmod>2026-05-17T06:14:38Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cism.baremetalcyber.com/episodes/integrating-security-requirements-into-organizational-processes</loc>
    <lastmod>2026-05-17T06:14:37Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cism.baremetalcyber.com/episodes/managing-and-monitoring-security-compliance-with-external-parties</loc>
    <lastmod>2026-05-17T06:14:38Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cism.baremetalcyber.com/episodes/supervising-risk-identification-and-assessment</loc>
    <lastmod>2026-05-17T06:14:38Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cism.baremetalcyber.com/episodes/supervising-risk-treatment-and-continuous-monitoring</loc>
    <lastmod>2026-05-17T06:14:39Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cism.baremetalcyber.com/episodes/continuous-improvement-through-post-incident-reviews-and-risk-reassessment</loc>
    <lastmod>2026-05-17T06:14:39Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cism.baremetalcyber.com/episodes/trailer</loc>
    <lastmod>2025-10-26T21:29:51Z</lastmod>
    <priority>0.9</priority>
  </url>
</urlset>
