<?xml version="1.0" encoding="UTF-8"?>
<urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9">
  <url>
    <loc>https://cis18.baremetalcyber.com/</loc>
    <lastmod>2026-03-30T14:42:57Z</lastmod>
    <priority>1.0</priority>
  </url>
  <url>
    <loc>https://cis18.baremetalcyber.com/episodes</loc>
    <lastmod>2026-03-30T14:42:57Z</lastmod>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://cis18.baremetalcyber.com/recommended</loc>
    <lastmod>2026-03-30T14:42:57Z</lastmod>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://cis18.baremetalcyber.com/baremetalcyber</loc>
    <lastmod>2026-03-30T14:42:57Z</lastmod>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://cis18.baremetalcyber.com/contact-us</loc>
    <lastmod>2026-03-30T14:42:57Z</lastmod>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://cis18.baremetalcyber.com/cis-18-book</loc>
    <lastmod>2026-03-30T14:42:57Z</lastmod>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://cis18.baremetalcyber.com/subscribe</loc>
    <lastmod>2026-03-30T14:42:57Z</lastmod>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://cis18.baremetalcyber.com/episodes/episode-1-what-are-the-cis-critical-security-controls</loc>
    <lastmod>2025-10-18T13:46:46Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cis18.baremetalcyber.com/episodes/episode-2-how-to-use-cis-18-in-your-organization</loc>
    <lastmod>2025-10-18T14:57:15Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cis18.baremetalcyber.com/episodes/episode-3-what-is-a-control-and-what-is-a-safeguard</loc>
    <lastmod>2025-10-18T14:57:50Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cis18.baremetalcyber.com/episodes/episode-4-glossary-of-common-cybersecurity-terms</loc>
    <lastmod>2025-10-18T15:00:32Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cis18.baremetalcyber.com/episodes/episode-5-glossary-of-common-cybersecurity-terms</loc>
    <lastmod>2025-10-18T15:01:07Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cis18.baremetalcyber.com/episodes/episode-6-overview-why-asset-management-is-foundational</loc>
    <lastmod>2025-10-18T15:01:43Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cis18.baremetalcyber.com/episodes/episode-7-safeguard-1-1-inventory-of-assets</loc>
    <lastmod>2025-10-18T15:02:28Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cis18.baremetalcyber.com/episodes/episode-8-safeguard-1-2-address-unauthorized-assets</loc>
    <lastmod>2025-10-18T15:02:59Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cis18.baremetalcyber.com/episodes/episode-9-remaining-safeguards-summary-control-1</loc>
    <lastmod>2025-10-18T15:03:33Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cis18.baremetalcyber.com/episodes/episode-10-overview-managing-the-software-landscape</loc>
    <lastmod>2025-10-18T15:04:06Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cis18.baremetalcyber.com/episodes/episode-11-safeguard-2-1-maintain-a-software-inventory</loc>
    <lastmod>2025-10-18T15:04:41Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cis18.baremetalcyber.com/episodes/episode-12-safeguard-2-2-only-allow-authorized-software</loc>
    <lastmod>2025-10-18T15:05:17Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cis18.baremetalcyber.com/episodes/episode-13-remaining-safeguards-summary-control-2</loc>
    <lastmod>2025-10-18T15:05:51Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cis18.baremetalcyber.com/episodes/episode-14-overview-protecting-sensitive-data</loc>
    <lastmod>2025-10-18T15:06:18Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cis18.baremetalcyber.com/episodes/episode-15-safeguard-3-1-data-classification-and-inventory</loc>
    <lastmod>2025-10-18T15:06:46Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cis18.baremetalcyber.com/episodes/episode-16-safeguard-3-2-data-retention-and-disposal</loc>
    <lastmod>2025-10-18T15:07:13Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cis18.baremetalcyber.com/episodes/episode-17-safeguard-3-3-data-encryption-at-rest-and-in-transit</loc>
    <lastmod>2025-10-18T15:07:39Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cis18.baremetalcyber.com/episodes/episode-18-remaining-safeguards-summary-control-3</loc>
    <lastmod>2025-10-18T15:08:08Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cis18.baremetalcyber.com/episodes/episode-19-overview-why-secure-configs-matter</loc>
    <lastmod>2025-10-18T15:08:32Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cis18.baremetalcyber.com/episodes/episode-20-safeguard-4-1-establish-secure-configuration-baselines</loc>
    <lastmod>2025-10-18T15:08:57Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cis18.baremetalcyber.com/episodes/episode-21-safeguard-4-2-automated-configuration-management</loc>
    <lastmod>2025-10-18T15:09:34Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cis18.baremetalcyber.com/episodes/episode-22-remaining-safeguards-summary-control-4</loc>
    <lastmod>2025-10-18T15:20:37Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cis18.baremetalcyber.com/episodes/episode-23-overview-managing-identity-and-accounts</loc>
    <lastmod>2025-10-18T15:21:21Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cis18.baremetalcyber.com/episodes/episode-24-safeguard-5-1-inventory-of-accounts</loc>
    <lastmod>2025-10-18T15:21:49Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cis18.baremetalcyber.com/episodes/episode-25-safeguard-5-2-centralized-account-management</loc>
    <lastmod>2025-10-18T15:22:15Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cis18.baremetalcyber.com/episodes/episode-26-safeguard-5-3-disable-dormant-accounts</loc>
    <lastmod>2025-10-18T15:22:42Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cis18.baremetalcyber.com/episodes/episode-27-remaining-safeguards-summary-control-5</loc>
    <lastmod>2025-10-18T15:23:06Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cis18.baremetalcyber.com/episodes/episode-28-overview-principles-of-least-privilege</loc>
    <lastmod>2025-10-18T15:23:29Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cis18.baremetalcyber.com/episodes/episode-29-safeguard-6-1-access-authorization-processes</loc>
    <lastmod>2025-10-18T15:24:02Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cis18.baremetalcyber.com/episodes/episode-30-safeguard-6-2-role-based-access-control-rbac</loc>
    <lastmod>2025-10-18T15:24:53Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cis18.baremetalcyber.com/episodes/episode-31-remaining-safeguards-summary-control-6</loc>
    <lastmod>2025-10-18T15:26:08Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cis18.baremetalcyber.com/episodes/episode-32-overview-why-vulnerability-management-is-continuous</loc>
    <lastmod>2025-10-18T15:26:49Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cis18.baremetalcyber.com/episodes/episode-33-safeguard-7-1-vulnerability-scanning-tools</loc>
    <lastmod>2025-10-18T15:27:15Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cis18.baremetalcyber.com/episodes/episode-34-safeguard-7-2-remediation-timelines-and-slas</loc>
    <lastmod>2025-10-18T15:27:43Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cis18.baremetalcyber.com/episodes/episode-35-safeguard-7-3-integration-with-patch-management</loc>
    <lastmod>2025-10-18T15:28:10Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cis18.baremetalcyber.com/episodes/episode-36-remaining-safeguards-summary-control-7</loc>
    <lastmod>2025-10-18T15:28:52Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cis18.baremetalcyber.com/episodes/episode-37-overview-logs-as-the-backbone-of-detection</loc>
    <lastmod>2025-10-18T15:29:25Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cis18.baremetalcyber.com/episodes/episode-38-safeguard-8-1-enable-audit-logging</loc>
    <lastmod>2025-10-18T15:29:56Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cis18.baremetalcyber.com/episodes/episode-39-safeguard-8-2-centralized-log-collection-and-siem</loc>
    <lastmod>2025-10-18T15:30:28Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cis18.baremetalcyber.com/episodes/episode-40-remaining-safeguards-summary-control-8</loc>
    <lastmod>2025-10-18T15:30:52Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cis18.baremetalcyber.com/episodes/episode-41-overview-email-and-browser-as-attack-vectors</loc>
    <lastmod>2025-10-18T15:31:16Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cis18.baremetalcyber.com/episodes/episode-42-safeguard-9-1-spam-and-phishing-defenses</loc>
    <lastmod>2025-10-18T15:31:39Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cis18.baremetalcyber.com/episodes/episode-43-safeguard-9-2-browser-configuration-and-isolation</loc>
    <lastmod>2025-10-18T15:32:03Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cis18.baremetalcyber.com/episodes/episode-44-remaining-safeguards-summary-control-9</loc>
    <lastmod>2025-10-18T15:32:33Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cis18.baremetalcyber.com/episodes/episode-45-overview-malware-threats-and-defenses</loc>
    <lastmod>2025-10-18T15:33:01Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cis18.baremetalcyber.com/episodes/episode-46-safeguard-10-1-anti-malware-solutions</loc>
    <lastmod>2025-10-18T15:33:26Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cis18.baremetalcyber.com/episodes/episode-47-safeguard-10-2-endpoint-detection-and-response-edr</loc>
    <lastmod>2025-10-18T15:33:50Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cis18.baremetalcyber.com/episodes/episode-48-remaining-safeguards-summary-control-10</loc>
    <lastmod>2025-10-18T15:34:22Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cis18.baremetalcyber.com/episodes/episode-49-overview-planning-for-inevitable-failures</loc>
    <lastmod>2025-10-18T15:34:45Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cis18.baremetalcyber.com/episodes/episode-50-safeguard-11-1-backup-process-design</loc>
    <lastmod>2025-10-18T15:35:15Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cis18.baremetalcyber.com/episodes/episode-51-safeguard-11-2-testing-data-recovery</loc>
    <lastmod>2025-10-18T15:35:41Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cis18.baremetalcyber.com/episodes/episode-52-remaining-safeguards-summary-control-11</loc>
    <lastmod>2025-10-18T15:36:08Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cis18.baremetalcyber.com/episodes/episode-53-overview-network-devices-and-hygiene</loc>
    <lastmod>2025-10-18T15:36:37Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cis18.baremetalcyber.com/episodes/episode-54-safeguard-12-1-maintain-network-diagrams</loc>
    <lastmod>2025-10-18T15:37:04Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cis18.baremetalcyber.com/episodes/episode-55-safeguard-12-2-secure-and-configure-devices</loc>
    <lastmod>2025-10-18T15:37:27Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cis18.baremetalcyber.com/episodes/episode-56-safeguard-12-3-remove-legacy-and-unused-devices</loc>
    <lastmod>2025-10-18T15:37:52Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cis18.baremetalcyber.com/episodes/episode-57-remaining-safeguards-summary-control-12</loc>
    <lastmod>2025-10-18T15:59:59Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cis18.baremetalcyber.com/episodes/episode-58-overview-monitoring-as-the-nervous-system</loc>
    <lastmod>2025-10-18T16:00:32Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cis18.baremetalcyber.com/episodes/episode-59-safeguard-13-1-intrusion-detection-and-prevention</loc>
    <lastmod>2025-10-18T16:00:58Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cis18.baremetalcyber.com/episodes/episode-60-safeguard-13-2-segmentation-and-filtering</loc>
    <lastmod>2025-10-18T16:01:49Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cis18.baremetalcyber.com/episodes/episode-61-safeguard-13-3-anomaly-detection</loc>
    <lastmod>2025-10-18T16:02:15Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cis18.baremetalcyber.com/episodes/episode-62-remaining-safeguards-summary-control-13</loc>
    <lastmod>2025-10-18T16:02:38Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cis18.baremetalcyber.com/episodes/episode-63-overview-human-factor-in-cyber-defense</loc>
    <lastmod>2025-10-18T16:03:05Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cis18.baremetalcyber.com/episodes/episode-64-safeguard-14-1-security-awareness-program</loc>
    <lastmod>2025-10-18T16:03:31Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cis18.baremetalcyber.com/episodes/episode-65-safeguard-14-2-phishing-simulations</loc>
    <lastmod>2025-10-18T16:04:00Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cis18.baremetalcyber.com/episodes/episode-66-safeguard-14-3-role-based-training-for-admins-and-developers</loc>
    <lastmod>2025-10-18T16:04:27Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cis18.baremetalcyber.com/episodes/episode-67-remaining-safeguards-summary-control-14</loc>
    <lastmod>2025-10-18T16:04:50Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cis18.baremetalcyber.com/episodes/episode-68-overview-third-party-and-vendor-risks</loc>
    <lastmod>2025-10-18T16:06:05Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cis18.baremetalcyber.com/episodes/episode-69-safeguard-15-1-inventory-of-service-providers</loc>
    <lastmod>2025-10-18T16:06:28Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cis18.baremetalcyber.com/episodes/episode-70-safeguard-15-2-security-requirements-in-contracts</loc>
    <lastmod>2025-10-18T16:06:53Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cis18.baremetalcyber.com/episodes/episode-71-remaining-safeguards-summary-control-15</loc>
    <lastmod>2025-10-18T16:07:19Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cis18.baremetalcyber.com/episodes/episode-72-overview-secure-software-lifecycle</loc>
    <lastmod>2025-10-18T16:07:46Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cis18.baremetalcyber.com/episodes/episode-73-safeguard-16-1-secure-coding-practices</loc>
    <lastmod>2025-10-18T16:08:11Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cis18.baremetalcyber.com/episodes/episode-74-safeguard-16-2-static-and-dynamic-testing</loc>
    <lastmod>2025-10-18T16:08:41Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cis18.baremetalcyber.com/episodes/episode-75-remaining-safeguards-summary-control-16</loc>
    <lastmod>2025-10-18T16:09:05Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cis18.baremetalcyber.com/episodes/episode-76-overview-incident-response-principles</loc>
    <lastmod>2025-10-18T16:09:28Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cis18.baremetalcyber.com/episodes/episode-77-safeguard-17-1-ir-plan-and-playbooks</loc>
    <lastmod>2025-10-18T16:09:54Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cis18.baremetalcyber.com/episodes/episode-78-safeguard-17-2-tabletop-exercises</loc>
    <lastmod>2025-10-18T16:10:18Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cis18.baremetalcyber.com/episodes/episode-79-remaining-safeguards-summary-control-17</loc>
    <lastmod>2025-10-18T16:10:48Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cis18.baremetalcyber.com/episodes/episode-80-overview-why-penetration-testing-validates-defenses</loc>
    <lastmod>2025-10-18T16:11:14Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cis18.baremetalcyber.com/episodes/episode-81-safeguard-18-1-external-testing-programs</loc>
    <lastmod>2025-10-18T16:11:40Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cis18.baremetalcyber.com/episodes/episode-82-safeguard-18-2-internal-and-red-team-exercises</loc>
    <lastmod>2025-10-18T16:12:06Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cis18.baremetalcyber.com/episodes/trailer</loc>
    <lastmod>2025-10-27T01:12:59Z</lastmod>
    <priority>0.9</priority>
  </url>
</urlset>
