<?xml version="1.0" encoding="UTF-8"?>
<urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9">
  <url>
    <loc>https://framework.transistor.fm/</loc>
    <lastmod>2026-03-30T14:40:02Z</lastmod>
    <priority>1.0</priority>
  </url>
  <url>
    <loc>https://framework.transistor.fm/episodes</loc>
    <lastmod>2026-03-30T14:40:02Z</lastmod>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://framework.transistor.fm/baremetalcyber</loc>
    <lastmod>2026-03-30T14:40:02Z</lastmod>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://framework.transistor.fm/recommended</loc>
    <lastmod>2026-03-30T14:40:02Z</lastmod>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://framework.transistor.fm/contact-us</loc>
    <lastmod>2026-03-30T14:40:02Z</lastmod>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://framework.transistor.fm/nist-csf-book</loc>
    <lastmod>2026-03-30T14:40:02Z</lastmod>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://framework.transistor.fm/subscribe</loc>
    <lastmod>2026-03-30T14:40:02Z</lastmod>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://framework.baremetalcyber.com/episodes/introduction-to-the-nist-csf</loc>
    <lastmod>2025-03-13T16:53:56Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://framework.baremetalcyber.com/episodes/introduction-to-gap-assessments</loc>
    <lastmod>2025-03-13T16:56:05Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://framework.baremetalcyber.com/episodes/the-fundamentals-of-cybersecurity-controls</loc>
    <lastmod>2025-03-13T16:56:11Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://framework.baremetalcyber.com/episodes/cybersecurity-maturity</loc>
    <lastmod>2025-03-13T16:56:07Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://framework.baremetalcyber.com/episodes/cybersecurity-risk-management</loc>
    <lastmod>2025-03-13T16:56:18Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://framework.baremetalcyber.com/episodes/introduction-to-nist-800-53</loc>
    <lastmod>2025-03-13T18:31:15Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://framework.baremetalcyber.com/episodes/introduction-to-nist-csf-profiles</loc>
    <lastmod>2025-03-13T16:56:54Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://framework.baremetalcyber.com/episodes/gv-oc-01-aligning-cybersecurity-with-organizational-mission</loc>
    <lastmod>2025-05-13T02:52:09Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://framework.baremetalcyber.com/episodes/gv-oc-02-understanding-stakeholder-needs-in-cybersecurity</loc>
    <lastmod>2025-05-13T02:52:25Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://framework.baremetalcyber.com/episodes/gv-oc-03-navigating-legal-and-regulatory-cybersecurity-requirements</loc>
    <lastmod>2025-05-13T02:52:38Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://framework.baremetalcyber.com/episodes/gv-oc-04-prioritizing-critical-objectives-and-services</loc>
    <lastmod>2025-05-13T02:52:55Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://framework.baremetalcyber.com/episodes/gv-oc-05-mapping-organizational-dependencies</loc>
    <lastmod>2025-05-13T02:53:11Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://framework.baremetalcyber.com/episodes/gv-rm-01-setting-cybersecurity-risk-management-goals</loc>
    <lastmod>2025-05-13T02:53:48Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://framework.baremetalcyber.com/episodes/gv-rm-02-defining-risk-appetite-and-tolerance</loc>
    <lastmod>2025-05-13T02:54:03Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://framework.baremetalcyber.com/episodes/gv-rm-03-integrating-cybersecurity-into-enterprise-risk-management</loc>
    <lastmod>2025-05-13T02:54:18Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://framework.baremetalcyber.com/episodes/gv-rm-04-crafting-strategic-risk-response-options</loc>
    <lastmod>2025-05-13T02:54:33Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://framework.baremetalcyber.com/episodes/gv-rm-05-building-communication-channels-for-cybersecurity-risks</loc>
    <lastmod>2025-05-13T02:54:47Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://framework.baremetalcyber.com/episodes/gv-rm-06-standardizing-cybersecurity-risk-assessment</loc>
    <lastmod>2025-05-13T02:55:03Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://framework.baremetalcyber.com/episodes/gv-rm-07-embracing-strategic-opportunities-in-risk-management</loc>
    <lastmod>2025-05-13T02:55:18Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://framework.baremetalcyber.com/episodes/gv-rr-01-leadership-s-role-in-cybersecurity-accountability</loc>
    <lastmod>2025-05-13T02:55:46Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://framework.baremetalcyber.com/episodes/gv-rr-02-clarifying-cybersecurity-roles-and-responsibilities</loc>
    <lastmod>2025-05-13T02:56:01Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://framework.baremetalcyber.com/episodes/gv-rr-03-allocating-resources-for-cybersecurity-success</loc>
    <lastmod>2025-05-13T02:56:20Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://framework.baremetalcyber.com/episodes/gv-rr-04-embedding-cybersecurity-in-hr-practices</loc>
    <lastmod>2025-05-13T02:56:34Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://framework.baremetalcyber.com/episodes/gv-po-01-establishing-a-cybersecurity-risk-management-policy</loc>
    <lastmod>2025-05-13T02:56:55Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://framework.baremetalcyber.com/episodes/gv-po-02-keeping-cybersecurity-policies-current</loc>
    <lastmod>2025-05-13T02:57:13Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://framework.baremetalcyber.com/episodes/gv-ov-01-reviewing-cybersecurity-strategy-outcomes</loc>
    <lastmod>2025-05-13T02:57:53Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://framework.baremetalcyber.com/episodes/gv-ov-02-adjusting-strategies-for-comprehensive-risk-coverage</loc>
    <lastmod>2025-05-13T02:58:05Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://framework.baremetalcyber.com/episodes/gv-ov-03-evaluating-cybersecurity-performance</loc>
    <lastmod>2025-05-13T02:58:17Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://framework.baremetalcyber.com/episodes/gv-sc-01-building-a-supply-chain-risk-management-program</loc>
    <lastmod>2025-05-13T02:58:30Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://framework.baremetalcyber.com/episodes/gv-sc-02-defining-cybersecurity-roles-in-the-supply-chain</loc>
    <lastmod>2025-05-13T02:58:45Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://framework.baremetalcyber.com/episodes/gv-sc-03-integrating-supply-chain-risks-into-broader-frameworks</loc>
    <lastmod>2025-05-13T02:58:58Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://framework.baremetalcyber.com/episodes/gv-sc-04-prioritizing-suppliers-by-criticality</loc>
    <lastmod>2025-05-13T02:59:22Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://framework.baremetalcyber.com/episodes/gv-sc-05-setting-cybersecurity-requirements-for-suppliers</loc>
    <lastmod>2025-05-13T02:59:35Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://framework.baremetalcyber.com/episodes/gv-sc-06-conducting-due-diligence-before-supplier-partnerships</loc>
    <lastmod>2025-05-13T02:59:50Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://framework.baremetalcyber.com/episodes/gv-sc-07-managing-supplier-risks-throughout-relationships</loc>
    <lastmod>2025-05-13T03:00:03Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://framework.baremetalcyber.com/episodes/gv-sc-08-including-suppliers-in-incident-response-planning</loc>
    <lastmod>2025-05-13T03:00:17Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://framework.baremetalcyber.com/episodes/gv-sc-09-monitoring-supply-chain-security-practices</loc>
    <lastmod>2025-05-13T03:00:32Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://framework.baremetalcyber.com/episodes/gv-sc-10-planning-for-post-partnership-security</loc>
    <lastmod>2025-05-13T03:00:49Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://framework.baremetalcyber.com/episodes/id-am-01-tracking-organizational-hardware-assets</loc>
    <lastmod>2025-05-13T03:01:33Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://framework.baremetalcyber.com/episodes/id-am-02-managing-software-and-service-inventories</loc>
    <lastmod>2025-05-13T03:01:46Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://framework.baremetalcyber.com/episodes/id-am-03-mapping-network-communication-flows</loc>
    <lastmod>2025-03-13T20:31:44Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://framework.baremetalcyber.com/episodes/id-am-04-cataloging-supplier-provided-services</loc>
    <lastmod>2025-05-13T03:03:29Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://framework.baremetalcyber.com/episodes/id-am-05-prioritizing-assets-by-importance</loc>
    <lastmod>2025-05-13T03:03:42Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://framework.baremetalcyber.com/episodes/id-am-07-inventorying-sensitive-data-and-metadata</loc>
    <lastmod>2025-05-13T03:04:19Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://framework.baremetalcyber.com/episodes/id-am-08-managing-assets-across-their-lifecycle</loc>
    <lastmod>2025-05-13T03:04:33Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://framework.baremetalcyber.com/episodes/id-ra-01-identifying-and-recording-asset-vulnerabilities</loc>
    <lastmod>2025-05-13T03:04:58Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://framework.baremetalcyber.com/episodes/id-ra-02-leveraging-cyber-threat-intelligence</loc>
    <lastmod>2025-05-13T03:05:11Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://framework.baremetalcyber.com/episodes/id-ra-03-recognizing-internal-and-external-threats</loc>
    <lastmod>2025-05-13T03:05:24Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://framework.baremetalcyber.com/episodes/id-ra-04-assessing-threat-impact-and-likelihood</loc>
    <lastmod>2025-05-13T03:05:36Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://framework.baremetalcyber.com/episodes/id-ra-05-understanding-inherent-cybersecurity-risks</loc>
    <lastmod>2025-05-13T03:05:59Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://framework.baremetalcyber.com/episodes/id-ra-06-prioritizing-risk-response-strategies</loc>
    <lastmod>2025-05-13T03:06:11Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://framework.baremetalcyber.com/episodes/id-ra-07-managing-changes-and-exceptions-in-risk</loc>
    <lastmod>2025-05-13T03:06:24Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://framework.baremetalcyber.com/episodes/id-ra-08-handling-vulnerability-disclosures</loc>
    <lastmod>2025-05-13T03:06:38Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://framework.baremetalcyber.com/episodes/id-ra-09-verifying-hardware-and-software-integrity</loc>
    <lastmod>2025-05-13T03:07:08Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://framework.baremetalcyber.com/episodes/id-ra-10-assessing-critical-suppliers-before-acquisition</loc>
    <lastmod>2025-05-13T03:07:20Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://framework.baremetalcyber.com/episodes/id-im-01-learning-from-cybersecurity-evaluations</loc>
    <lastmod>2025-05-13T03:07:36Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://framework.baremetalcyber.com/episodes/id-im-02-improving-through-security-tests-and-exercises</loc>
    <lastmod>2025-05-13T03:07:50Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://framework.baremetalcyber.com/episodes/id-im-03-enhancing-processes-from-operational-insights</loc>
    <lastmod>2025-05-13T03:08:06Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://framework.baremetalcyber.com/episodes/id-im-04-strengthening-incident-response-plans</loc>
    <lastmod>2025-05-13T03:08:21Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://framework.baremetalcyber.com/episodes/pr-aa-01-managing-identities-and-credentials</loc>
    <lastmod>2025-05-13T03:50:04Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://framework.baremetalcyber.com/episodes/pr-aa-02-verifying-identities-for-credential-issuance</loc>
    <lastmod>2025-05-13T03:50:18Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://framework.baremetalcyber.com/episodes/pr-aa-03-authenticating-users-and-devices</loc>
    <lastmod>2025-05-13T03:50:30Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://framework.baremetalcyber.com/episodes/pr-aa-04-securing-identity-assertions</loc>
    <lastmod>2025-05-13T03:50:45Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://framework.baremetalcyber.com/episodes/pr-aa-05-enforcing-access-control-policies</loc>
    <lastmod>2025-05-13T03:51:00Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://framework.baremetalcyber.com/episodes/pr-aa-06-controlling-physical-access-to-assets</loc>
    <lastmod>2025-05-13T03:51:17Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://framework.baremetalcyber.com/episodes/pr-at-01-training-personnel-on-cybersecurity-basics</loc>
    <lastmod>2025-05-13T03:51:40Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://framework.baremetalcyber.com/episodes/pr-at-02-preparing-specialists-for-cybersecurity-roles</loc>
    <lastmod>2025-05-13T03:51:54Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://framework.baremetalcyber.com/episodes/pr-ds-01-protecting-data-at-rest</loc>
    <lastmod>2025-05-13T03:45:21Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://framework.baremetalcyber.com/episodes/pr-ds-02-securing-data-in-transit</loc>
    <lastmod>2025-05-13T03:45:37Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://framework.baremetalcyber.com/episodes/pr-ds-10-safeguarding-data-in-use</loc>
    <lastmod>2025-05-13T03:45:52Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://framework.baremetalcyber.com/episodes/pr-ds-11-ensuring-reliable-data-backups</loc>
    <lastmod>2025-05-13T03:46:08Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://framework.baremetalcyber.com/episodes/pr-ps-01-implementing-configuration-management</loc>
    <lastmod>2025-05-13T03:48:01Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://framework.baremetalcyber.com/episodes/pr-ps-02-maintaining-software-security</loc>
    <lastmod>2025-05-13T03:48:14Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://framework.baremetalcyber.com/episodes/pr-ps-03-managing-hardware-lifecycles</loc>
    <lastmod>2025-05-13T03:48:30Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://framework.baremetalcyber.com/episodes/pr-ps-04-enabling-continuous-monitoring-with-logs</loc>
    <lastmod>2025-05-13T03:49:04Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://framework.baremetalcyber.com/episodes/pr-ps-05-preventing-unauthorized-software-use</loc>
    <lastmod>2025-05-13T03:49:18Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://framework.baremetalcyber.com/episodes/pr-ps-06-securing-the-software-development-process</loc>
    <lastmod>2025-05-13T03:49:30Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://framework.baremetalcyber.com/episodes/pr-ir-01-protecting-against-unauthorized-network-access</loc>
    <lastmod>2025-05-13T03:46:41Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://framework.baremetalcyber.com/episodes/pr-ir-02-shielding-assets-from-environmental-threats</loc>
    <lastmod>2025-05-13T03:46:55Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://framework.baremetalcyber.com/episodes/pr-ir-03-building-resilient-technology-systems</loc>
    <lastmod>2025-05-13T03:47:09Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://framework.baremetalcyber.com/episodes/pr-ir-04-maintaining-resource-capacity-for-availability</loc>
    <lastmod>2025-05-13T03:47:23Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://framework.baremetalcyber.com/episodes/de-cm-01-monitoring-networks-for-adverse-events</loc>
    <lastmod>2025-05-13T03:53:35Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://framework.baremetalcyber.com/episodes/de-cm-02-watching-the-physical-environment-for-threats</loc>
    <lastmod>2025-05-13T03:53:45Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://framework.baremetalcyber.com/episodes/de-cm-03-tracking-personnel-and-technology-usage</loc>
    <lastmod>2025-05-13T03:53:56Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://framework.baremetalcyber.com/episodes/de-cm-06-monitoring-external-service-providers</loc>
    <lastmod>2025-05-13T03:54:11Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://framework.baremetalcyber.com/episodes/de-cm-09-detecting-threats-across-technology-stacks</loc>
    <lastmod>2025-05-13T03:54:25Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://framework.baremetalcyber.com/episodes/de-ae-02-analyzing-adverse-events-for-insights</loc>
    <lastmod>2025-05-13T03:54:49Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://framework.baremetalcyber.com/episodes/de-ae-03-correlating-data-from-multiple-sources</loc>
    <lastmod>2025-05-13T03:55:01Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://framework.baremetalcyber.com/episodes/de-ae-04-estimating-the-impact-of-adverse-events</loc>
    <lastmod>2025-05-13T03:55:14Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://framework.baremetalcyber.com/episodes/de-ae-06-sharing-adverse-event-information</loc>
    <lastmod>2025-05-13T03:55:28Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://framework.baremetalcyber.com/episodes/de-ae-07-enhancing-analysis-with-threat-intelligence</loc>
    <lastmod>2025-05-13T03:55:41Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://framework.baremetalcyber.com/episodes/de-ae-08-declaring-incidents-based-on-criteria</loc>
    <lastmod>2025-05-13T03:55:59Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://framework.baremetalcyber.com/episodes/rs-ma-01-executing-the-incident-response-plan</loc>
    <lastmod>2025-03-14T00:12:21Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://framework.baremetalcyber.com/episodes/rs-ma-02-triaging-and-validating-incident-reports</loc>
    <lastmod>2025-03-14T00:11:49Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://framework.baremetalcyber.com/episodes/rs-ma-03-categorizing-and-prioritizing-incidents</loc>
    <lastmod>2025-03-13T22:45:29Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://framework.baremetalcyber.com/episodes/rs-ma-04-escalating-incidents-when-needed</loc>
    <lastmod>2025-03-14T00:11:20Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://framework.baremetalcyber.com/episodes/rs-ma-05-initiating-incident-recovery</loc>
    <lastmod>2025-03-14T00:11:00Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://framework.baremetalcyber.com/episodes/rs-an-03-investigating-incident-causes</loc>
    <lastmod>2025-03-14T00:10:33Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://framework.baremetalcyber.com/episodes/rs-an-06-recording-investigation-actions</loc>
    <lastmod>2025-03-14T00:10:14Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://framework.baremetalcyber.com/episodes/rs-an-07-preserving-incident-data-integrity</loc>
    <lastmod>2025-03-14T00:09:56Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://framework.baremetalcyber.com/episodes/rs-an-08-assessing-incident-magnitude</loc>
    <lastmod>2025-03-14T00:09:39Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://framework.baremetalcyber.com/episodes/rs-co-02-notifying-stakeholders-of-incidents</loc>
    <lastmod>2025-03-14T00:08:46Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://framework.baremetalcyber.com/episodes/rs-co-03-sharing-information-with-stakeholders</loc>
    <lastmod>2025-03-14T00:08:32Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://framework.baremetalcyber.com/episodes/rs-mi-01-containing-cybersecurity-incidents</loc>
    <lastmod>2025-03-14T00:08:09Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://framework.baremetalcyber.com/episodes/rs-mi-02-eradicating-incident-threats</loc>
    <lastmod>2025-03-14T00:07:52Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://framework.baremetalcyber.com/episodes/rc-rp-01-launching-incident-recovery-efforts</loc>
    <lastmod>2025-03-14T00:05:33Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://framework.baremetalcyber.com/episodes/rc-rp-02-prioritizing-recovery-actions</loc>
    <lastmod>2025-03-14T00:05:46Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://framework.baremetalcyber.com/episodes/rc-rp-03-verifying-backup-integrity</loc>
    <lastmod>2025-03-14T00:05:58Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://framework.baremetalcyber.com/episodes/rc-rp-04-restoring-critical-functions-post-incident</loc>
    <lastmod>2025-03-14T00:06:12Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://framework.baremetalcyber.com/episodes/rc-rp-05-confirming-system-restoration</loc>
    <lastmod>2025-03-14T00:06:27Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://framework.baremetalcyber.com/episodes/rc-rp-06-declaring-recovery-completion</loc>
    <lastmod>2025-03-14T00:06:40Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://framework.baremetalcyber.com/episodes/rc-co-03-communicating-recovery-progress</loc>
    <lastmod>2025-03-14T00:06:56Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://framework.baremetalcyber.com/episodes/rc-co-04-sharing-public-recovery-updates</loc>
    <lastmod>2025-03-14T00:07:11Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://framework.baremetalcyber.com/episodes/welcome-to-framework-the-nist-csf</loc>
    <lastmod>2025-10-20T21:32:02Z</lastmod>
    <priority>0.9</priority>
  </url>
</urlset>
