<?xml version="1.0" encoding="UTF-8"?>
<urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9">
  <url>
    <loc>https://secv8.baremetalcyber.com/</loc>
    <lastmod>2026-04-27T01:40:12Z</lastmod>
    <priority>1.0</priority>
  </url>
  <url>
    <loc>https://secv8.baremetalcyber.com/episodes</loc>
    <lastmod>2026-04-27T01:40:12Z</lastmod>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://secv8.baremetalcyber.com/recommended</loc>
    <lastmod>2026-04-27T01:40:12Z</lastmod>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://secv8.baremetalcyber.com/subscribe</loc>
    <lastmod>2026-04-27T01:40:12Z</lastmod>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://secv8.baremetalcyber.com/episodes/episode-1-sy0-801-at-a-glance-what-changed-from-security-701</loc>
    <lastmod>2026-04-26T23:41:49Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://secv8.baremetalcyber.com/episodes/episode-2-how-to-study-with-an-audio-first-security-plan</loc>
    <lastmod>2026-04-26T23:43:53Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://secv8.baremetalcyber.com/episodes/episode-3-defense-in-depth-layering-controls-so-one-failure-doesn-t-sink-you-1-1</loc>
    <lastmod>2026-04-26T23:44:20Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://secv8.baremetalcyber.com/episodes/episode-4-cia-and-aaa-the-core-security-models-1-1</loc>
    <lastmod>2026-04-26T23:44:46Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://secv8.baremetalcyber.com/episodes/episode-5-non-repudiation-least-privilege-and-trust-decisions-1-1</loc>
    <lastmod>2026-04-26T23:45:29Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://secv8.baremetalcyber.com/episodes/episode-6-zero-trust-principles-never-trust-always-verify-1-1</loc>
    <lastmod>2026-04-26T23:46:04Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://secv8.baremetalcyber.com/episodes/episode-7-control-categories-and-control-types-1-1</loc>
    <lastmod>2026-04-26T23:46:50Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://secv8.baremetalcyber.com/episodes/episode-8-change-management-why-security-breaks-during-normal-updates-1-2</loc>
    <lastmod>2026-04-26T23:47:17Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://secv8.baremetalcyber.com/episodes/episode-9-cabs-approvals-ownership-and-stakeholders-1-2</loc>
    <lastmod>2026-04-26T23:47:38Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://secv8.baremetalcyber.com/episodes/episode-10-impact-analysis-test-results-and-maintenance-windows-1-2</loc>
    <lastmod>2026-04-26T23:48:19Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://secv8.baremetalcyber.com/episodes/episode-11-backout-plans-vs-fail-forward-recovering-from-bad-changes-1-2</loc>
    <lastmod>2026-04-26T23:49:06Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://secv8.baremetalcyber.com/episodes/episode-12-technical-and-documentation-impacts-of-change-1-2</loc>
    <lastmod>2026-04-26T23:50:00Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://secv8.baremetalcyber.com/episodes/episode-13-pki-foundations-public-keys-private-keys-and-trust-1-3</loc>
    <lastmod>2026-04-26T23:50:31Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://secv8.baremetalcyber.com/episodes/episode-14-certificates-and-certificate-authorities-1-3</loc>
    <lastmod>2026-04-26T23:51:04Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://secv8.baremetalcyber.com/episodes/episode-15-revocation-and-validation-crls-ocsp-and-trust-problems-1-3</loc>
    <lastmod>2026-04-26T23:51:43Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://secv8.baremetalcyber.com/episodes/episode-16-csrs-wildcards-root-of-trust-and-key-escrow-1-3</loc>
    <lastmod>2026-04-26T23:52:04Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://secv8.baremetalcyber.com/episodes/episode-17-symmetric-vs-asymmetric-encryption-1-3</loc>
    <lastmod>2026-04-26T23:52:28Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://secv8.baremetalcyber.com/episodes/episode-18-encryption-levels-disk-file-volume-database-and-record-1-3</loc>
    <lastmod>2026-04-26T23:53:05Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://secv8.baremetalcyber.com/episodes/episode-19-key-exchange-algorithms-key-length-and-protocol-selection-1-3</loc>
    <lastmod>2026-04-26T23:54:00Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://secv8.baremetalcyber.com/episodes/episode-20-hashing-salting-digital-signatures-obfuscation-and-crypto-tools-1-3</loc>
    <lastmod>2026-04-26T23:54:39Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://secv8.baremetalcyber.com/episodes/episode-21-threats-vs-vulnerabilities-likelihood-impact-and-life-cycle-2-1</loc>
    <lastmod>2026-04-26T23:55:03Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://secv8.baremetalcyber.com/episodes/episode-22-threat-feeds-and-intelligence-sources-2-1</loc>
    <lastmod>2026-04-26T23:55:49Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://secv8.baremetalcyber.com/episodes/episode-23-vulnerability-scoring-cvss-cves-and-prioritization-2-1</loc>
    <lastmod>2026-04-26T23:56:31Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://secv8.baremetalcyber.com/episodes/episode-24-vulnerability-types-and-risk-based-decisions-2-1</loc>
    <lastmod>2026-04-26T23:56:56Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://secv8.baremetalcyber.com/episodes/episode-25-threat-actors-organized-crime-terrorists-hacktivists-and-insiders-2-2</loc>
    <lastmod>2026-04-26T23:57:37Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://secv8.baremetalcyber.com/episodes/episode-26-state-sponsored-competitors-accidental-and-unskilled-attackers-2-2</loc>
    <lastmod>2026-04-26T23:58:00Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://secv8.baremetalcyber.com/episodes/episode-27-motivations-and-capabilities-money-espionage-ideology-and-extortion-2-2</loc>
    <lastmod>2026-04-26T23:58:51Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://secv8.baremetalcyber.com/episodes/episode-28-apts-and-the-modern-threat-vector-map-2-3</loc>
    <lastmod>2026-04-26T23:59:17Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://secv8.baremetalcyber.com/episodes/episode-29-message-based-attacks-email-sms-rcs-im-and-collaboration-tools-2-3</loc>
    <lastmod>2026-04-26T23:59:46Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://secv8.baremetalcyber.com/episodes/episode-30-image-and-attachment-attacks-qr-codes-captcha-abuse-macros-pdfs-and-rtf-2-3</loc>
    <lastmod>2026-04-27T00:00:29Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://secv8.baremetalcyber.com/episodes/episode-31-browser-based-attacks-extensions-javascript-cookies-password-managers-and-session-tokens-2-3</loc>
    <lastmod>2026-04-27T00:01:11Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://secv8.baremetalcyber.com/episodes/episode-32-network-remote-access-and-endpoint-threat-sources-2-3</loc>
    <lastmod>2026-04-27T00:01:40Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://secv8.baremetalcyber.com/episodes/episode-33-supply-chain-saas-usb-human-iot-ot-physical-bluetooth-rf-and-nfc-threats-2-3</loc>
    <lastmod>2026-04-27T00:02:10Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://secv8.baremetalcyber.com/episodes/episode-34-unsupported-unpatched-obsolete-and-unmanaged-systems-2-4</loc>
    <lastmod>2026-04-27T00:02:34Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://secv8.baremetalcyber.com/episodes/episode-35-ports-services-applications-race-conditions-and-malicious-updates-2-4</loc>
    <lastmod>2026-04-27T00:03:10Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://secv8.baremetalcyber.com/episodes/episode-36-code-weaknesses-hardcoded-secrets-and-unsafe-exception-handling-2-4</loc>
    <lastmod>2026-04-27T00:03:41Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://secv8.baremetalcyber.com/episodes/episode-37-stale-credentials-rogue-devices-shadow-it-wireless-mobile-and-identity-provider-risks-2-4</loc>
    <lastmod>2026-04-27T00:11:16Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://secv8.baremetalcyber.com/episodes/episode-38-llms-misconfigurations-public-repositories-and-public-object-storage-2-4</loc>
    <lastmod>2026-04-27T00:12:02Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://secv8.baremetalcyber.com/episodes/episode-39-malware-indicators-ransomware-trojans-worms-spyware-and-fileless-malware-2-5</loc>
    <lastmod>2026-04-27T00:12:27Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://secv8.baremetalcyber.com/episodes/episode-40-physical-and-network-attack-indicators-2-5</loc>
    <lastmod>2026-04-27T00:12:53Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://secv8.baremetalcyber.com/episodes/episode-41-social-engineering-indicators-smishing-vishing-whaling-quishing-and-deepfakes</loc>
    <lastmod>2026-04-27T00:13:40Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://secv8.baremetalcyber.com/episodes/episode-42-indicators-of-compromise-hashes-domains-timestamps-log-manipulation-and-impossible-travel</loc>
    <lastmod>2026-04-27T00:14:03Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://secv8.baremetalcyber.com/episodes/episode-43-application-attacks-injection-buffer-overflow-replay-privilege-escalation-forgery-and-traversal</loc>
    <lastmod>2026-04-27T00:18:58Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://secv8.baremetalcyber.com/episodes/episode-44-credential-attacks-password-spraying-brute-force-user-enumeration-and-mfa-bypass</loc>
    <lastmod>2026-04-27T00:19:25Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://secv8.baremetalcyber.com/episodes/episode-45-ai-threats-model-manipulation-poisoning-and-prompt-injection</loc>
    <lastmod>2026-04-27T00:19:48Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://secv8.baremetalcyber.com/episodes/episode-46-ai-failure-risks-data-loss-bias-explainability-hallucinations-and-ethics</loc>
    <lastmod>2026-04-27T00:20:25Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://secv8.baremetalcyber.com/episodes/episode-47-ai-abuse-jailbreaking-evasion-privacy-session-hijacking-and-code-execution</loc>
    <lastmod>2026-04-27T00:20:58Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://secv8.baremetalcyber.com/episodes/episode-48-architecture-models-cloud-on-premises-hybrid-private-public-and-community-cloud</loc>
    <lastmod>2026-04-27T00:21:24Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://secv8.baremetalcyber.com/episodes/episode-49-serverless-multicloud-and-infrastructure-as-code</loc>
    <lastmod>2026-04-27T00:23:06Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://secv8.baremetalcyber.com/episodes/episode-50-ot-air-gapped-networks-microservices-and-segmentation</loc>
    <lastmod>2026-04-27T00:23:28Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://secv8.baremetalcyber.com/episodes/episode-51-technical-architecture-tradeoffs-availability-resilience-open-source-and-usability-3-1</loc>
    <lastmod>2026-04-27T00:23:51Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://secv8.baremetalcyber.com/episodes/episode-52-business-architecture-tradeoffs-data-sovereignty-classification-cost-and-ownership-3-1</loc>
    <lastmod>2026-04-27T00:24:29Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://secv8.baremetalcyber.com/episodes/episode-53-scalability-environmental-requirements-risk-and-recovery-decisions-3-1</loc>
    <lastmod>2026-04-27T00:24:50Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://secv8.baremetalcyber.com/episodes/episode-54-infrastructure-protection-device-placement-security-zones-attack-surface-and-diversity-3-2</loc>
    <lastmod>2026-04-27T00:25:13Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://secv8.baremetalcyber.com/episodes/episode-55-zero-trust-architecture-user-device-and-application-decisions-3-2</loc>
    <lastmod>2026-04-27T00:25:56Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://secv8.baremetalcyber.com/episodes/episode-56-secure-access-vpns-remote-access-tunneling-and-encrypted-messaging-3-2</loc>
    <lastmod>2026-04-27T00:26:21Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://secv8.baremetalcyber.com/episodes/episode-57-out-of-band-management-file-transfer-and-security-service-edge-3-2</loc>
    <lastmod>2026-04-27T00:27:18Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://secv8.baremetalcyber.com/episodes/episode-58-identity-architecture-gmsas-least-privilege-accounts-privilege-creep-and-failure-modes-3-2</loc>
    <lastmod>2026-04-27T00:27:41Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://secv8.baremetalcyber.com/episodes/episode-59-data-types-and-states-structured-unstructured-at-rest-in-use-and-in-transit-3-3</loc>
    <lastmod>2026-04-27T00:28:09Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://secv8.baremetalcyber.com/episodes/episode-60-data-classification-public-to-top-secret-sensitive-to-restricted-3-3</loc>
    <lastmod>2026-04-27T00:29:11Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://secv8.baremetalcyber.com/episodes/episode-61-securing-data-masking-hashing-filtering-tokenization-encryption-and-obfuscation-3-3</loc>
    <lastmod>2026-04-27T00:30:04Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://secv8.baremetalcyber.com/episodes/episode-62-data-protection-roles-owner-custodian-steward-operator-controller-and-subprocessor-3-3</loc>
    <lastmod>2026-04-27T00:30:52Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://secv8.baremetalcyber.com/episodes/episode-63-data-handling-geofencing-lifecycle-retention-disposal-and-compliance-3-3</loc>
    <lastmod>2026-04-27T00:31:27Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://secv8.baremetalcyber.com/episodes/episode-64-resilience-sites-hot-warm-cold-and-environmental-planning-3-4</loc>
    <lastmod>2026-04-27T00:32:01Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://secv8.baremetalcyber.com/episodes/episode-65-platform-diversity-load-balancing-clustering-autoscaling-and-high-availability-3-4</loc>
    <lastmod>2026-04-27T00:32:44Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://secv8.baremetalcyber.com/episodes/episode-66-power-storage-backups-immutability-and-restoration-testing-3-4</loc>
    <lastmod>2026-04-27T00:33:13Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://secv8.baremetalcyber.com/episodes/episode-67-disaster-recovery-and-business-continuity-failover-simulation-parallel-processing-and-capacity-planning-3-4</loc>
    <lastmod>2026-04-27T00:33:43Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://secv8.baremetalcyber.com/episodes/episode-68-recovery-metrics-rto-rpo-mttr-and-mtbf-3-4</loc>
    <lastmod>2026-04-27T00:34:18Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://secv8.baremetalcyber.com/episodes/episode-69-mitigating-controls-overview-segmentation-access-control-hardening-and-sandboxing-4-1</loc>
    <lastmod>2026-04-27T00:34:41Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://secv8.baremetalcyber.com/episodes/episode-70-deception-and-disruption-honeypots-honeynets-honeyfiles-honeytokens-and-canary-accounts-4-1</loc>
    <lastmod>2026-04-27T00:35:26Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://secv8.baremetalcyber.com/episodes/episode-71-monitoring-mdm-allow-lists-block-lists-ids-ips-and-wips-4-1</loc>
    <lastmod>2026-04-27T00:35:53Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://secv8.baremetalcyber.com/episodes/episode-72-firewalls-and-filtering-waf-utm-layer-4-layer-7-rate-limiting-and-dlp-4-1</loc>
    <lastmod>2026-04-27T00:36:27Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://secv8.baremetalcyber.com/episodes/episode-73-endpoint-and-network-access-control-edr-xdr-antivirus-captive-portals-802-1x-and-posture-4-1</loc>
    <lastmod>2026-04-27T00:36:51Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://secv8.baremetalcyber.com/episodes/episode-74-repository-application-and-code-security-secrets-scanning-input-validation-secure-cookies-static-analysis-and-code-signing-4-1</loc>
    <lastmod>2026-04-27T00:37:21Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://secv8.baremetalcyber.com/episodes/episode-75-email-and-os-security-dmarc-spf-dkim-bimi-group-policy-and-selinux-4-1</loc>
    <lastmod>2026-04-27T00:37:54Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://secv8.baremetalcyber.com/episodes/episode-76-asset-management-hardware-software-and-data-life-cycle-4-2</loc>
    <lastmod>2026-04-27T00:38:14Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://secv8.baremetalcyber.com/episodes/episode-77-planning-procurement-assignment-tracking-disposal-and-decommissioning-4-2</loc>
    <lastmod>2026-04-27T00:38:36Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://secv8.baremetalcyber.com/episodes/episode-78-vulnerability-management-overview-scanning-ipam-cspm-and-source-code-review-4-3</loc>
    <lastmod>2026-04-27T00:39:12Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://secv8.baremetalcyber.com/episodes/episode-79-prioritization-severity-business-impact-and-pen-test-report-review-4-3</loc>
    <lastmod>2026-04-27T00:39:35Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://secv8.baremetalcyber.com/episodes/episode-80-remediation-verification-and-internal-reporting-4-3</loc>
    <lastmod>2026-04-27T00:39:57Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://secv8.baremetalcyber.com/episodes/episode-81-external-reporting-bug-bounties-and-responsible-disclosure-4-3</loc>
    <lastmod>2026-04-27T00:40:43Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://secv8.baremetalcyber.com/episodes/episode-82-monitoring-resources-systems-applications-infrastructure-and-log-aggregation-4-4</loc>
    <lastmod>2026-04-27T00:41:05Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://secv8.baremetalcyber.com/episodes/episode-83-alerting-operations-scanning-archiving-reporting-and-alert-tuning-4-4</loc>
    <lastmod>2026-04-27T00:41:37Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://secv8.baremetalcyber.com/episodes/episode-84-monitoring-tools-siem-dlp-vulnerability-scanners-orchestration-and-packet-analyzers-4-4</loc>
    <lastmod>2026-04-27T00:41:59Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://secv8.baremetalcyber.com/episodes/episode-85-monitoring-protocols-and-data-flow-netflow-snmp-syslog-scap-port-mirroring-and-dashboards-4-4</loc>
    <lastmod>2026-04-27T00:42:29Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://secv8.baremetalcyber.com/episodes/episode-86-iam-lifecycle-provisioning-deprovisioning-permissions-and-identity-proofing-4-5</loc>
    <lastmod>2026-04-27T00:42:51Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://secv8.baremetalcyber.com/episodes/episode-87-federation-and-sso-saml-ldap-and-oauth-4-5</loc>
    <lastmod>2026-04-27T00:44:07Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://secv8.baremetalcyber.com/episodes/episode-88-account-types-and-privilege-models-user-privileged-service-third-party-and-emergency-access-4-5</loc>
    <lastmod>2026-04-27T00:44:26Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://secv8.baremetalcyber.com/episodes/episode-89-mfa-tokens-biometrics-otps-backup-codes-and-bypass-risks-4-5</loc>
    <lastmod>2026-04-27T00:45:06Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://secv8.baremetalcyber.com/episodes/episode-90-access-models-and-modern-authentication-jit-access-passkeys-passwordless-and-credential-monitoring-4-5</loc>
    <lastmod>2026-04-27T00:47:39Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://secv8.baremetalcyber.com/episodes/episode-91-automation-use-cases-provisioning-desired-state-anomaly-detection-and-ticketing-4-6</loc>
    <lastmod>2026-04-27T00:48:02Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://secv8.baremetalcyber.com/episodes/episode-92-automation-risks-and-guardrails-logic-complexity-financial-risk-and-process-risk-4-6</loc>
    <lastmod>2026-04-27T00:48:54Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://secv8.baremetalcyber.com/episodes/episode-93-ai-in-secops-agentic-ai-chatbots-predictive-analysis-ai-augmented-baselines-and-ci-cd-4-6</loc>
    <lastmod>2026-04-27T00:49:20Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://secv8.baremetalcyber.com/episodes/episode-94-incident-response-preparation-training-tabletop-exercises-playbooks-simulations-and-roles-4-7</loc>
    <lastmod>2026-04-27T00:49:44Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://secv8.baremetalcyber.com/episodes/episode-95-identification-and-investigation-detection-advisories-threat-hunting-forensics-and-chain-of-custody-4-7</loc>
    <lastmod>2026-04-27T00:50:07Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://secv8.baremetalcyber.com/episodes/episode-96-containment-through-post-incident-isolation-negotiation-recovery-reporting-lessons-learned-and-rca-4-7</loc>
    <lastmod>2026-04-27T00:50:44Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://secv8.baremetalcyber.com/episodes/episode-97-investigation-data-types-access-device-server-application-authentication-communication-and-audit-logs-4-8</loc>
    <lastmod>2026-04-27T00:51:07Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://secv8.baremetalcyber.com/episodes/episode-98-investigation-sources-vulnerability-scans-automated-reports-netflow-ipfix-surveillance-and-packet-captures-4-8</loc>
    <lastmod>2026-04-27T00:51:32Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://secv8.baremetalcyber.com/episodes/episode-99-evidence-and-stakeholders-file-integrity-memory-dumps-bit-copies-snapshots-hr-legal-and-log-parsing-4-8</loc>
    <lastmod>2026-04-27T00:52:09Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://secv8.baremetalcyber.com/episodes/episode-100-grc-artifacts-guidelines-benchmarks-advisories-implementation-guides-and-reference-architectures-5-1</loc>
    <lastmod>2026-04-27T00:52:30Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://secv8.baremetalcyber.com/episodes/episode-101-standards-and-procedures-baselines-passwords-physical-security-rfcs-encryption-sops-and-runbooks-5-1</loc>
    <lastmod>2026-04-27T00:52:52Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://secv8.baremetalcyber.com/episodes/episode-102-plans-and-policies-bcp-drp-byod-aup-clean-desk-incident-response-data-retention-access-control-and-privacy-5-1</loc>
    <lastmod>2026-04-27T00:53:30Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://secv8.baremetalcyber.com/episodes/episode-103-risk-identification-and-assessment-assets-stakeholders-scoring-and-categorization-5-2</loc>
    <lastmod>2026-04-27T00:53:53Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://secv8.baremetalcyber.com/episodes/episode-104-risk-analysis-and-registers-impact-likelihood-owners-current-mitigations-and-qualitative-vs-quantitative-risk-5-2</loc>
    <lastmod>2026-04-27T00:54:28Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://secv8.baremetalcyber.com/episodes/episode-105-risk-treatment-and-business-impact-transfer-accept-avoid-mitigate-bia-appetite-residual-risk-sle-ale-and-aro-5-2</loc>
    <lastmod>2026-04-27T00:54:50Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://secv8.baremetalcyber.com/episodes/episode-106-third-party-risk-vendor-selection-rfp-rfi-rfq-eoi-due-diligence-and-conflicts-5-3</loc>
    <lastmod>2026-04-27T00:55:23Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://secv8.baremetalcyber.com/episodes/episode-107-agreements-and-monitoring-sla-slo-mou-moa-nda-msa-sow-and-right-to-audit-5-3</loc>
    <lastmod>2026-04-27T00:55:46Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://secv8.baremetalcyber.com/episodes/episode-108-vendor-constraints-and-rules-of-engagement-jurisdiction-roi-lock-in-and-assurance-mechanisms-5-3</loc>
    <lastmod>2026-04-27T00:56:17Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://secv8.baremetalcyber.com/episodes/episode-109-compliance-training-and-monitoring-data-handling-aml-ctf-anti-bribery-and-attestations-5-4</loc>
    <lastmod>2026-04-27T00:56:39Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://secv8.baremetalcyber.com/episodes/episode-110-non-compliance-privacy-rights-legal-holds-legal-orders-and-retention-5-4</loc>
    <lastmod>2026-04-27T00:57:19Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://secv8.baremetalcyber.com/episodes/episode-111-audit-data-gathering-sampling-questionnaires-interviews-assertions-and-reference-sources-5-5</loc>
    <lastmod>2026-04-27T00:57:42Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://secv8.baremetalcyber.com/episodes/episode-112-audit-scope-and-engagements-charters-gap-analysis-internal-reviews-external-reviews-and-benchmarking-5-5</loc>
    <lastmod>2026-04-27T00:58:23Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://secv8.baremetalcyber.com/episodes/episode-113-penetration-testing-reconnaissance-frameworks-functional-testing-and-behavioral-testing-5-5</loc>
    <lastmod>2026-04-27T00:58:47Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://secv8.baremetalcyber.com/episodes/episode-114-security-awareness-training-onboarding-ongoing-targeted-and-corrective-training-5-6</loc>
    <lastmod>2026-04-27T00:59:17Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://secv8.baremetalcyber.com/episodes/episode-115-awareness-delivery-and-effectiveness-lms-self-service-metrics-behavior-risk-scoring-bec-byod-and-remote-work-5-6</loc>
    <lastmod>2026-04-27T00:59:58Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://secv8.baremetalcyber.com/episodes/episode-116-pbq-strategy-turning-objectives-into-scenario-decisions-review</loc>
    <lastmod>2026-04-27T01:00:22Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://secv8.baremetalcyber.com/episodes/episode-117-full-course-review-the-sy0-801-memory-map-review</loc>
    <lastmod>2026-04-27T01:00:46Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://secv8.baremetalcyber.com/episodes/episode-118-final-objectives-update-what-changed-when-comptia-finalized-sy0-801-update</loc>
    <lastmod>2026-04-27T01:01:07Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://secv8.baremetalcyber.com/episodes/welcome-to-the-comptia-security-audio-course</loc>
    <lastmod>2026-04-27T01:02:13Z</lastmod>
    <priority>0.9</priority>
  </url>
</urlset>
