<?xml version="1.0" encoding="UTF-8"?>
<urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9">
  <url>
    <loc>https://hitrust.baremetalcyber.com/</loc>
    <lastmod>2026-03-30T14:46:02Z</lastmod>
    <priority>1.0</priority>
  </url>
  <url>
    <loc>https://hitrust.baremetalcyber.com/episodes</loc>
    <lastmod>2026-03-30T14:46:02Z</lastmod>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://hitrust.baremetalcyber.com/recommended</loc>
    <lastmod>2026-03-30T14:46:02Z</lastmod>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://hitrust.baremetalcyber.com/contact-us</loc>
    <lastmod>2026-03-30T14:46:02Z</lastmod>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://hitrust.baremetalcyber.com/baremetalcyber</loc>
    <lastmod>2026-03-30T14:46:02Z</lastmod>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://hitrust.baremetalcyber.com/controls-book</loc>
    <lastmod>2026-03-30T14:46:02Z</lastmod>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://hitrust.baremetalcyber.com/subscribe</loc>
    <lastmod>2026-03-30T14:46:02Z</lastmod>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://hitrust.baremetalcyber.com/episodes/episode-1-why-hitrust-exists-assurance-vs-frameworks</loc>
    <lastmod>2025-10-17T21:19:32Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://hitrust.baremetalcyber.com/episodes/episode-2-hipaa-and-phi-in-plain-english</loc>
    <lastmod>2025-10-17T21:20:01Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://hitrust.baremetalcyber.com/episodes/episode-3-terminology-and-mental-models</loc>
    <lastmod>2025-10-17T21:20:31Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://hitrust.baremetalcyber.com/episodes/episode-4-positioning-hitrust-vs-nist-csf-iso-27001-and-cis-18</loc>
    <lastmod>2025-10-17T21:34:36Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://hitrust.baremetalcyber.com/episodes/episode-5-assurance-programs-overview-e1-i1-r2</loc>
    <lastmod>2025-10-17T21:35:03Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://hitrust.baremetalcyber.com/episodes/episode-6-prisma-scoring-basics</loc>
    <lastmod>2025-10-17T21:35:28Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://hitrust.baremetalcyber.com/episodes/episode-7-evidence-that-passes-qa-policy-procedure-and-proof</loc>
    <lastmod>2025-10-17T21:35:58Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://hitrust.baremetalcyber.com/episodes/episode-8-mycsf-overview-and-workflow</loc>
    <lastmod>2025-10-17T21:36:23Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://hitrust.baremetalcyber.com/episodes/episode-9-readiness-assessment-vs-validated-assessment</loc>
    <lastmod>2025-10-17T21:36:49Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://hitrust.baremetalcyber.com/episodes/episode-10-sampling-basics-and-populations</loc>
    <lastmod>2025-10-17T21:37:14Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://hitrust.baremetalcyber.com/episodes/episode-11-shared-responsibility-and-inheritance</loc>
    <lastmod>2025-10-17T21:37:40Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://hitrust.baremetalcyber.com/episodes/episode-12-budgeting-and-timelines</loc>
    <lastmod>2025-10-17T21:38:03Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://hitrust.baremetalcyber.com/episodes/episode-13-roles-raci-and-governance-cadence</loc>
    <lastmod>2025-10-17T21:38:28Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://hitrust.baremetalcyber.com/episodes/episode-14-kickoff-checklist-and-first-30-days</loc>
    <lastmod>2025-10-17T21:38:57Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://hitrust.baremetalcyber.com/episodes/episode-15-foundations-recap-quick-reference</loc>
    <lastmod>2025-10-17T21:39:21Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://hitrust.baremetalcyber.com/episodes/episode-16-who-e1-is-for-and-who-it-isn-t</loc>
    <lastmod>2025-10-17T21:39:49Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://hitrust.baremetalcyber.com/episodes/episode-17-e1-scope-what-s-in-what-s-out</loc>
    <lastmod>2025-10-17T21:40:13Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://hitrust.baremetalcyber.com/episodes/episode-18-access-control-essentials-for-e1</loc>
    <lastmod>2025-10-17T21:40:36Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://hitrust.baremetalcyber.com/episodes/episode-19-endpoint-security-essentials-for-e1</loc>
    <lastmod>2025-10-17T21:41:01Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://hitrust.baremetalcyber.com/episodes/episode-20-patch-and-vulnerability-essentials-for-e1</loc>
    <lastmod>2025-10-17T21:41:24Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://hitrust.baremetalcyber.com/episodes/episode-21-backup-and-recovery-essentials-for-e1</loc>
    <lastmod>2025-10-17T21:41:49Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://hitrust.baremetalcyber.com/episodes/episode-22-network-and-boundary-essentials-for-e1</loc>
    <lastmod>2025-10-17T21:42:20Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://hitrust.baremetalcyber.com/episodes/episode-23-logging-and-monitoring-essentials-for-e1</loc>
    <lastmod>2025-10-17T21:42:45Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://hitrust.baremetalcyber.com/episodes/episode-24-secure-development-essentials-for-e1</loc>
    <lastmod>2025-10-17T21:43:09Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://hitrust.baremetalcyber.com/episodes/episode-25-vendor-oversight-essentials-for-e1</loc>
    <lastmod>2025-10-17T21:43:34Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://hitrust.baremetalcyber.com/episodes/episode-26-incident-response-essentials-for-e1</loc>
    <lastmod>2025-10-17T21:44:01Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://hitrust.baremetalcyber.com/episodes/episode-27-awareness-and-training-essentials-for-e1</loc>
    <lastmod>2025-10-17T21:44:33Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://hitrust.baremetalcyber.com/episodes/episode-28-building-the-e1-policy-pack</loc>
    <lastmod>2025-10-17T21:44:57Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://hitrust.baremetalcyber.com/episodes/episode-29-evidence-assembly-sequencing-for-e1</loc>
    <lastmod>2025-10-17T21:45:24Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://hitrust.baremetalcyber.com/episodes/episode-30-e1-recap-quick-reference</loc>
    <lastmod>2025-10-17T21:45:49Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://hitrust.baremetalcyber.com/episodes/episode-31-i1-intent-and-when-to-choose-it</loc>
    <lastmod>2025-10-17T21:46:41Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://hitrust.baremetalcyber.com/episodes/episode-32-what-implemented-means-in-practice</loc>
    <lastmod>2025-10-17T21:48:03Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://hitrust.baremetalcyber.com/episodes/episode-33-access-control-for-i1</loc>
    <lastmod>2025-10-17T21:48:28Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://hitrust.baremetalcyber.com/episodes/episode-34-authentication-and-mfa-for-i1</loc>
    <lastmod>2025-10-17T21:48:54Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://hitrust.baremetalcyber.com/episodes/episode-35-device-security-and-baselines-for-i1</loc>
    <lastmod>2025-10-17T21:49:20Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://hitrust.baremetalcyber.com/episodes/episode-36-secure-configuration-management-for-i1</loc>
    <lastmod>2025-10-17T21:49:45Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://hitrust.baremetalcyber.com/episodes/episode-37-patch-and-vulnerability-management-for-i1</loc>
    <lastmod>2025-10-17T21:50:09Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://hitrust.baremetalcyber.com/episodes/episode-38-change-and-release-management-for-i1</loc>
    <lastmod>2025-10-17T21:50:35Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://hitrust.baremetalcyber.com/episodes/episode-39-privacy-by-design-fundamentals</loc>
    <lastmod>2025-10-17T21:51:02Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://hitrust.baremetalcyber.com/episodes/episode-40-data-classification-and-handling-for-phi</loc>
    <lastmod>2025-10-17T21:51:30Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://hitrust.baremetalcyber.com/episodes/episode-41-cryptography-requirements-for-i1</loc>
    <lastmod>2025-10-17T21:51:55Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://hitrust.baremetalcyber.com/episodes/episode-42-logging-strategy-for-i1</loc>
    <lastmod>2025-10-17T21:52:21Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://hitrust.baremetalcyber.com/episodes/episode-43-monitoring-and-alerting-for-i1</loc>
    <lastmod>2025-10-17T21:52:47Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://hitrust.baremetalcyber.com/episodes/episode-44-incident-response-expectations-for-i1</loc>
    <lastmod>2025-10-17T21:53:08Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://hitrust.baremetalcyber.com/episodes/episode-45-business-continuity-and-disaster-recovery-proofs-for-i1</loc>
    <lastmod>2025-10-17T21:53:34Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://hitrust.baremetalcyber.com/episodes/episode-46-secure-sdlc-controls-for-i1</loc>
    <lastmod>2025-10-17T21:53:58Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://hitrust.baremetalcyber.com/episodes/episode-47-third-party-risk-management-for-i1</loc>
    <lastmod>2025-10-17T21:54:23Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://hitrust.baremetalcyber.com/episodes/episode-48-workforce-security-and-training-for-i1</loc>
    <lastmod>2025-10-17T21:54:53Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://hitrust.baremetalcyber.com/episodes/episode-49-physical-and-environmental-controls-for-i1</loc>
    <lastmod>2025-10-17T21:55:19Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://hitrust.baremetalcyber.com/episodes/episode-50-metrics-kris-and-prisma-tie-in-for-i1</loc>
    <lastmod>2025-10-17T21:56:16Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://hitrust.baremetalcyber.com/episodes/episode-51-internal-reviews-and-readiness-checks-for-i1</loc>
    <lastmod>2025-10-17T21:56:48Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://hitrust.baremetalcyber.com/episodes/episode-52-writing-narratives-and-cross-references-for-i1</loc>
    <lastmod>2025-10-17T21:57:14Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://hitrust.baremetalcyber.com/episodes/episode-53-packaging-and-submitting-an-i1-assessment</loc>
    <lastmod>2025-10-17T21:57:38Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://hitrust.baremetalcyber.com/episodes/episode-54-caps-and-maintaining-momentum-for-i1</loc>
    <lastmod>2025-10-17T21:58:05Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://hitrust.baremetalcyber.com/episodes/episode-55-i1-recap-quick-reference</loc>
    <lastmod>2025-10-17T21:58:32Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://hitrust.baremetalcyber.com/episodes/episode-56-why-r2-and-what-it-requires</loc>
    <lastmod>2025-10-17T21:58:57Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://hitrust.baremetalcyber.com/episodes/episode-57-hitrust-qa-expectations-and-rework-loops</loc>
    <lastmod>2025-10-17T21:59:26Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://hitrust.baremetalcyber.com/episodes/episode-58-tailoring-and-scoping-for-r2</loc>
    <lastmod>2025-10-17T22:00:10Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://hitrust.baremetalcyber.com/episodes/episode-59-organizational-and-system-factors</loc>
    <lastmod>2025-10-17T22:00:35Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://hitrust.baremetalcyber.com/episodes/episode-60-control-selection-logic-at-r2</loc>
    <lastmod>2025-10-17T22:01:10Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://hitrust.baremetalcyber.com/episodes/episode-61-prisma-scoring-strategy-at-r2</loc>
    <lastmod>2025-10-17T22:01:36Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://hitrust.baremetalcyber.com/episodes/episode-62-inheritance-and-shared-responsibility-at-r2</loc>
    <lastmod>2025-10-17T22:02:05Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://hitrust.baremetalcyber.com/episodes/episode-63-sampling-design-for-r2</loc>
    <lastmod>2025-10-17T22:02:31Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://hitrust.baremetalcyber.com/episodes/episode-64-evidence-sufficiency-by-control-type</loc>
    <lastmod>2025-10-17T22:03:02Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://hitrust.baremetalcyber.com/episodes/episode-65-vulnerability-management-at-r2</loc>
    <lastmod>2025-10-17T22:03:51Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://hitrust.baremetalcyber.com/episodes/episode-66-configuration-management-at-r2</loc>
    <lastmod>2025-10-17T22:04:16Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://hitrust.baremetalcyber.com/episodes/episode-67-vendor-risk-management-at-r2</loc>
    <lastmod>2025-10-17T22:04:47Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://hitrust.baremetalcyber.com/episodes/episode-68-cryptography-program-governance-at-r2</loc>
    <lastmod>2025-10-17T22:05:13Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://hitrust.baremetalcyber.com/episodes/episode-69-data-lifecycle-with-phi-at-r2</loc>
    <lastmod>2025-10-17T22:05:38Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://hitrust.baremetalcyber.com/episodes/episode-70-logging-and-siem-architecture-that-passes</loc>
    <lastmod>2025-10-17T22:06:02Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://hitrust.baremetalcyber.com/episodes/episode-71-threat-modeling-and-secure-design-concepts</loc>
    <lastmod>2025-10-17T22:06:25Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://hitrust.baremetalcyber.com/episodes/episode-72-devsecops-pipelines-as-evidence-at-r2</loc>
    <lastmod>2025-10-17T22:06:56Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://hitrust.baremetalcyber.com/episodes/episode-73-network-segmentation-and-zero-trust-patterns</loc>
    <lastmod>2025-10-17T22:07:31Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://hitrust.baremetalcyber.com/episodes/episode-74-business-continuity-and-disaster-recovery-at-r2</loc>
    <lastmod>2025-10-17T22:07:57Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://hitrust.baremetalcyber.com/episodes/episode-75-incident-management-metrics-and-root-cause-analysis</loc>
    <lastmod>2025-10-17T22:08:29Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://hitrust.baremetalcyber.com/episodes/episode-76-privacy-controls-interplay-at-r2</loc>
    <lastmod>2025-10-17T22:09:01Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://hitrust.baremetalcyber.com/episodes/episode-77-workforce-management-at-r2</loc>
    <lastmod>2025-10-17T22:09:44Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://hitrust.baremetalcyber.com/episodes/episode-78-physical-controls-at-multi-site-scale</loc>
    <lastmod>2025-10-17T22:10:35Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://hitrust.baremetalcyber.com/episodes/episode-79-multi-entity-and-multi-system-scoping</loc>
    <lastmod>2025-10-17T22:11:03Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://hitrust.baremetalcyber.com/episodes/episode-80-narratives-and-cross-mapping-tables-for-r2</loc>
    <lastmod>2025-10-17T22:11:51Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://hitrust.baremetalcyber.com/episodes/episode-81-internal-qa-before-assessor-arrival</loc>
    <lastmod>2025-10-17T22:12:23Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://hitrust.baremetalcyber.com/episodes/episode-82-assessor-engagement-and-q-a-cadence</loc>
    <lastmod>2025-10-17T22:12:50Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://hitrust.baremetalcyber.com/episodes/episode-83-caps-that-actually-close-at-r2</loc>
    <lastmod>2025-10-17T22:13:15Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://hitrust.baremetalcyber.com/episodes/episode-84-finalization-certification-letter-and-rds-xchange</loc>
    <lastmod>2025-10-17T22:13:41Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://hitrust.baremetalcyber.com/episodes/episode-85-r2-recap-quick-reference</loc>
    <lastmod>2025-10-17T22:14:09Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://hitrust.baremetalcyber.com/episodes/episode-86-hospitals-and-provider-organizations</loc>
    <lastmod>2025-10-17T22:14:51Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://hitrust.baremetalcyber.com/episodes/episode-87-payers-and-third-party-administrators</loc>
    <lastmod>2025-10-17T22:15:29Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://hitrust.baremetalcyber.com/episodes/episode-88-health-tech-and-saas-providers</loc>
    <lastmod>2025-10-17T22:16:02Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://hitrust.baremetalcyber.com/episodes/episode-89-cloud-inheritance-patterns-aws-azure-gcp-side-by-side</loc>
    <lastmod>2025-10-17T22:16:26Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://hitrust.baremetalcyber.com/episodes/episode-90-cloud-security-gotchas-by-example</loc>
    <lastmod>2025-10-17T22:16:55Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://hitrust.baremetalcyber.com/episodes/episode-91-fhir-and-api-security-primer</loc>
    <lastmod>2025-10-17T22:17:24Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://hitrust.baremetalcyber.com/episodes/episode-92-apis-and-fhir-requirements-impact</loc>
    <lastmod>2025-10-17T22:17:48Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://hitrust.baremetalcyber.com/episodes/episode-93-phi-in-analytics-and-ai-pipelines</loc>
    <lastmod>2025-10-17T22:18:12Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://hitrust.baremetalcyber.com/episodes/episode-94-mapping-hitrust-results-to-nist-csf</loc>
    <lastmod>2025-10-17T22:18:56Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://hitrust.baremetalcyber.com/episodes/episode-95-soc-2-and-hitrust-when-and-how-to-integrate</loc>
    <lastmod>2025-10-17T22:19:19Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://hitrust.baremetalcyber.com/episodes/episode-96-pathways-from-e1-to-i1-to-r2</loc>
    <lastmod>2025-10-17T22:19:44Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://hitrust.baremetalcyber.com/episodes/episode-97-budget-and-staffing-models-that-work</loc>
    <lastmod>2025-10-17T22:20:07Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://hitrust.baremetalcyber.com/episodes/episode-98-executive-storytelling-with-hitrust-results</loc>
    <lastmod>2025-10-17T22:20:31Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://hitrust.baremetalcyber.com/episodes/episode-99-managing-auditors-regulators-and-customers</loc>
    <lastmod>2025-10-17T22:20:59Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://hitrust.baremetalcyber.com/episodes/episode-100-the-always-ready-program-annual-rhythm-and-90-day-renewal</loc>
    <lastmod>2025-10-17T22:21:36Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://hitrust.baremetalcyber.com/episodes/hitrust-trailer</loc>
    <lastmod>2025-10-27T01:27:37Z</lastmod>
    <priority>0.9</priority>
  </url>
</urlset>
