<?xml version="1.0" encoding="UTF-8"?>
<urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9">
  <url>
    <loc>https://crisc.baremetalcyber.com/</loc>
    <lastmod>2026-04-02T18:46:10Z</lastmod>
    <priority>1.0</priority>
  </url>
  <url>
    <loc>https://crisc.baremetalcyber.com/episodes</loc>
    <lastmod>2026-04-02T18:46:10Z</lastmod>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://crisc.baremetalcyber.com/flash-cards</loc>
    <lastmod>2026-04-02T18:46:10Z</lastmod>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://crisc.baremetalcyber.com/study-guide</loc>
    <lastmod>2026-04-02T18:46:10Z</lastmod>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://crisc.baremetalcyber.com/all-in-one-course-hub</loc>
    <lastmod>2026-04-02T18:46:10Z</lastmod>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://crisc.baremetalcyber.com/recommended</loc>
    <lastmod>2026-04-02T18:46:10Z</lastmod>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://crisc.baremetalcyber.com/contact-us</loc>
    <lastmod>2026-04-02T18:46:10Z</lastmod>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://crisc.baremetalcyber.com/subscribe</loc>
    <lastmod>2026-04-02T18:46:10Z</lastmod>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://crisc.baremetalcyber.com/episodes/welcome-to-the-crisc-certification-exam-overview-benefits-and-career-opportunities</loc>
    <lastmod>2026-04-02T18:33:42Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://crisc.baremetalcyber.com/episodes/understanding-isaca-and-key-resources-for-crisc-exam-preparation</loc>
    <lastmod>2026-04-02T18:33:39Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://crisc.baremetalcyber.com/episodes/proven-strategies-for-passing-the-crisc-exam-on-your-first-attempt</loc>
    <lastmod>2026-04-02T18:33:35Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://crisc.baremetalcyber.com/episodes/critical-exam-tips-test-taking-strategies-and-common-pitfalls</loc>
    <lastmod>2026-04-02T18:33:32Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://crisc.baremetalcyber.com/episodes/final-review-summary-of-key-concepts-across-all-crisc-domains</loc>
    <lastmod>2026-04-02T18:33:29Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://crisc.baremetalcyber.com/episodes/exam-day-preparation-what-to-expect-and-how-to-prepare-mentally</loc>
    <lastmod>2026-04-02T18:33:26Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://crisc.baremetalcyber.com/episodes/final-crisc-comprehensive-review-domains-1-2</loc>
    <lastmod>2026-04-02T18:33:23Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://crisc.baremetalcyber.com/episodes/final-crisc-comprehensive-review-domains-3-4</loc>
    <lastmod>2026-04-02T18:33:20Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://crisc.baremetalcyber.com/episodes/final-crisc-exam-readiness-and-last-minute-preparation-tips</loc>
    <lastmod>2026-04-02T18:33:17Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://crisc.baremetalcyber.com/episodes/crisc-domain-1-overview-governance-fundamentals-and-framework</loc>
    <lastmod>2026-04-02T18:33:15Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://crisc.baremetalcyber.com/episodes/organizational-strategy-goals-and-objectives</loc>
    <lastmod>2026-04-02T18:33:11Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://crisc.baremetalcyber.com/episodes/organizational-structure-roles-and-responsibilities</loc>
    <lastmod>2026-04-02T18:33:10Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://crisc.baremetalcyber.com/episodes/organizational-culture</loc>
    <lastmod>2026-04-02T18:33:04Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://crisc.baremetalcyber.com/episodes/policies-and-standards</loc>
    <lastmod>2026-04-02T18:33:03Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://crisc.baremetalcyber.com/episodes/business-processes</loc>
    <lastmod>2026-04-02T18:35:54Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://crisc.baremetalcyber.com/episodes/organizational-assets</loc>
    <lastmod>2026-04-02T18:35:57Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://crisc.baremetalcyber.com/episodes/enterprise-risk-management-and-risk-management-framework</loc>
    <lastmod>2026-04-02T18:35:59Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://crisc.baremetalcyber.com/episodes/three-lines-of-defense-model</loc>
    <lastmod>2026-04-02T18:36:01Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://crisc.baremetalcyber.com/episodes/risk-profile-development-and-maintenance</loc>
    <lastmod>2026-04-02T18:36:05Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://crisc.baremetalcyber.com/episodes/risk-appetite-and-risk-tolerance-definitions-and-applications</loc>
    <lastmod>2026-04-02T18:36:09Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://crisc.baremetalcyber.com/episodes/legal-regulatory-and-contractual-requirements</loc>
    <lastmod>2026-04-02T18:36:12Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://crisc.baremetalcyber.com/episodes/professional-ethics-of-risk-management</loc>
    <lastmod>2026-04-02T18:36:16Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://crisc.baremetalcyber.com/episodes/domain-1-review-key-takeaways-and-exam-tips</loc>
    <lastmod>2026-04-02T18:36:21Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://crisc.baremetalcyber.com/episodes/crisc-domain-2-overview-understanding-it-risk-assessment</loc>
    <lastmod>2026-04-02T18:36:25Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://crisc.baremetalcyber.com/episodes/risk-events-identification-and-contributing-conditions</loc>
    <lastmod>2026-04-02T18:36:27Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://crisc.baremetalcyber.com/episodes/analyzing-loss-results-and-business-impacts-of-risk-events</loc>
    <lastmod>2026-04-02T18:36:29Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://crisc.baremetalcyber.com/episodes/threat-modelling-and-the-threat-landscape</loc>
    <lastmod>2026-04-02T18:36:32Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://crisc.baremetalcyber.com/episodes/vulnerability-and-control-deficiency-analysis-root-cause-analysis</loc>
    <lastmod>2026-04-02T18:36:36Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://crisc.baremetalcyber.com/episodes/risk-scenario-development</loc>
    <lastmod>2026-04-02T18:36:37Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://crisc.baremetalcyber.com/episodes/risk-assessment-concepts-standards-and-frameworks</loc>
    <lastmod>2026-04-02T18:36:41Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://crisc.baremetalcyber.com/episodes/the-it-risk-register-creation-and-management</loc>
    <lastmod>2026-04-02T18:36:45Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://crisc.baremetalcyber.com/episodes/risk-analysis-methodologies-and-tools</loc>
    <lastmod>2026-04-02T18:36:49Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://crisc.baremetalcyber.com/episodes/conducting-business-impact-analysis-bia</loc>
    <lastmod>2026-04-02T18:36:52Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://crisc.baremetalcyber.com/episodes/inherent-risk-vs-residual-risk</loc>
    <lastmod>2026-04-02T18:36:54Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://crisc.baremetalcyber.com/episodes/domain-2-review-key-takeaways-and-exam-tips</loc>
    <lastmod>2026-04-02T18:38:53Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://crisc.baremetalcyber.com/episodes/crisc-domain-3-overview-risk-response-and-reporting-essentials</loc>
    <lastmod>2026-04-02T18:38:56Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://crisc.baremetalcyber.com/episodes/understanding-risk-treatment-options-accept-mitigate-transfer-avoid</loc>
    <lastmod>2026-04-02T18:39:00Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://crisc.baremetalcyber.com/episodes/implementing-and-documenting-risk-response-decisions</loc>
    <lastmod>2026-04-02T18:39:03Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://crisc.baremetalcyber.com/episodes/assigning-risk-and-control-ownership</loc>
    <lastmod>2026-04-02T18:39:06Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://crisc.baremetalcyber.com/episodes/third-party-risk-identification-and-evaluation</loc>
    <lastmod>2026-04-02T18:39:09Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://crisc.baremetalcyber.com/episodes/managing-and-monitoring-third-party-risks</loc>
    <lastmod>2026-04-02T18:39:14Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://crisc.baremetalcyber.com/episodes/issue-finding-and-exception-management</loc>
    <lastmod>2026-04-02T18:39:16Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://crisc.baremetalcyber.com/episodes/managing-emerging-risks</loc>
    <lastmod>2026-04-02T18:39:20Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://crisc.baremetalcyber.com/episodes/control-types-standards-and-frameworks</loc>
    <lastmod>2026-04-02T18:39:23Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://crisc.baremetalcyber.com/episodes/control-design-selection-and-analysis</loc>
    <lastmod>2026-04-02T18:39:27Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://crisc.baremetalcyber.com/episodes/control-implementation-best-practices</loc>
    <lastmod>2026-04-02T18:39:28Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://crisc.baremetalcyber.com/episodes/control-testing-and-effectiveness-evaluation</loc>
    <lastmod>2026-04-02T18:39:31Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://crisc.baremetalcyber.com/episodes/developing-and-executing-risk-treatment-plans</loc>
    <lastmod>2026-04-02T18:39:33Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://crisc.baremetalcyber.com/episodes/data-collection-aggregation-analysis-and-validation</loc>
    <lastmod>2026-04-02T18:39:38Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://crisc.baremetalcyber.com/episodes/techniques-for-risk-monitoring-and-validation</loc>
    <lastmod>2026-04-02T18:39:41Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://crisc.baremetalcyber.com/episodes/techniques-for-control-monitoring-and-continuous-improvement</loc>
    <lastmod>2026-04-02T18:39:43Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://crisc.baremetalcyber.com/episodes/risk-and-control-reporting-techniques-heatmaps-scorecards-and-dashboards</loc>
    <lastmod>2026-04-02T18:39:46Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://crisc.baremetalcyber.com/episodes/understanding-key-performance-indicators-kpis</loc>
    <lastmod>2026-04-02T18:39:50Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://crisc.baremetalcyber.com/episodes/defining-and-utilizing-key-risk-indicators-kris-and-key-control-indicators-kcis</loc>
    <lastmod>2026-04-02T18:39:53Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://crisc.baremetalcyber.com/episodes/domain-3-review-key-takeaways-and-exam-tips</loc>
    <lastmod>2026-04-02T18:41:54Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://crisc.baremetalcyber.com/episodes/crisc-domain-4-overview-information-technology-and-security-alignment</loc>
    <lastmod>2026-04-02T18:41:56Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://crisc.baremetalcyber.com/episodes/enterprise-architecture-principles</loc>
    <lastmod>2026-04-02T18:42:02Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://crisc.baremetalcyber.com/episodes/it-operations-change-and-asset-management</loc>
    <lastmod>2026-04-02T18:42:05Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://crisc.baremetalcyber.com/episodes/it-operations-problem-and-incident-management</loc>
    <lastmod>2026-04-02T18:42:08Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://crisc.baremetalcyber.com/episodes/project-management-in-the-it-environment</loc>
    <lastmod>2026-04-02T18:42:11Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://crisc.baremetalcyber.com/episodes/disaster-recovery-management-drm</loc>
    <lastmod>2026-04-02T18:42:12Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://crisc.baremetalcyber.com/episodes/data-lifecycle-management-principles</loc>
    <lastmod>2026-04-02T18:42:15Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://crisc.baremetalcyber.com/episodes/system-development-life-cycle-sdlc-essentials</loc>
    <lastmod>2026-04-02T18:42:18Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://crisc.baremetalcyber.com/episodes/emerging-technologies-and-associated-risks</loc>
    <lastmod>2026-04-02T18:42:24Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://crisc.baremetalcyber.com/episodes/information-security-concepts-frameworks-and-standards</loc>
    <lastmod>2026-04-02T18:42:25Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://crisc.baremetalcyber.com/episodes/information-security-awareness-training</loc>
    <lastmod>2026-04-02T18:42:27Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://crisc.baremetalcyber.com/episodes/business-continuity-management-concepts-and-practices</loc>
    <lastmod>2026-04-02T18:42:32Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://crisc.baremetalcyber.com/episodes/data-privacy-and-protection-principles</loc>
    <lastmod>2026-04-02T18:42:35Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://crisc.baremetalcyber.com/episodes/domain-4-review-key-takeaways-and-exam-tips</loc>
    <lastmod>2026-04-02T18:42:38Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://crisc.baremetalcyber.com/episodes/collecting-and-reviewing-organization-s-business-and-it-information</loc>
    <lastmod>2026-04-02T18:42:43Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://crisc.baremetalcyber.com/episodes/identifying-potential-or-realized-impacts-of-it-risk</loc>
    <lastmod>2026-04-02T18:42:47Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://crisc.baremetalcyber.com/episodes/identifying-threats-and-vulnerabilities-to-people-processes-and-technology</loc>
    <lastmod>2026-04-02T18:42:50Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://crisc.baremetalcyber.com/episodes/evaluating-threats-vulnerabilities-and-risks-to-develop-it-risk-scenarios</loc>
    <lastmod>2026-04-02T18:42:54Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://crisc.baremetalcyber.com/episodes/establishing-accountability-through-risk-and-control-ownership</loc>
    <lastmod>2026-04-02T18:42:57Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://crisc.baremetalcyber.com/episodes/establishing-and-maintaining-the-it-risk-register</loc>
    <lastmod>2026-04-02T18:45:16Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://crisc.baremetalcyber.com/episodes/facilitating-identification-of-risk-appetite-and-tolerance</loc>
    <lastmod>2026-04-02T18:45:17Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://crisc.baremetalcyber.com/episodes/promoting-a-risk-aware-culture-through-security-awareness-training</loc>
    <lastmod>2026-04-02T18:45:21Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://crisc.baremetalcyber.com/episodes/conducting-a-comprehensive-it-risk-assessment</loc>
    <lastmod>2026-04-02T18:45:23Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://crisc.baremetalcyber.com/episodes/identifying-and-evaluating-effectiveness-of-existing-controls</loc>
    <lastmod>2026-04-02T18:45:26Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://crisc.baremetalcyber.com/episodes/reviewing-risk-and-control-analysis-for-gaps-assessment</loc>
    <lastmod>2026-04-02T18:45:29Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://crisc.baremetalcyber.com/episodes/facilitating-stakeholder-selection-of-recommended-risk-responses</loc>
    <lastmod>2026-04-02T18:45:33Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://crisc.baremetalcyber.com/episodes/collaborating-with-risk-owners-developing-risk-treatment-plans</loc>
    <lastmod>2026-04-02T18:45:36Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://crisc.baremetalcyber.com/episodes/collaborating-with-control-owners-control-selection-and-design</loc>
    <lastmod>2026-04-02T18:45:39Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://crisc.baremetalcyber.com/episodes/collaborating-with-control-owners-control-implementation-and-maintenance</loc>
    <lastmod>2026-04-02T18:45:42Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://crisc.baremetalcyber.com/episodes/validating-execution-of-risk-responses-against-risk-treatment-plans</loc>
    <lastmod>2026-04-02T18:45:43Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://crisc.baremetalcyber.com/episodes/defining-and-establishing-key-risk-indicators-kris</loc>
    <lastmod>2026-04-02T18:45:48Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://crisc.baremetalcyber.com/episodes/monitoring-and-analyzing-key-risk-indicators-kris</loc>
    <lastmod>2026-04-02T18:45:49Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://crisc.baremetalcyber.com/episodes/collaborating-with-control-owners-on-kpis-and-kcis-identification</loc>
    <lastmod>2026-04-02T18:45:54Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://crisc.baremetalcyber.com/episodes/monitoring-and-analyzing-kpis-and-kcis</loc>
    <lastmod>2026-04-02T18:45:56Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://crisc.baremetalcyber.com/episodes/reviewing-control-assessments-for-effectiveness-and-maturity</loc>
    <lastmod>2026-04-02T18:46:02Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://crisc.baremetalcyber.com/episodes/reporting-risk-information-to-stakeholders</loc>
    <lastmod>2026-04-02T18:46:05Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://crisc.baremetalcyber.com/episodes/reporting-control-information-and-supporting-risk-based-decisions</loc>
    <lastmod>2026-04-02T18:46:08Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://crisc.baremetalcyber.com/episodes/evaluating-business-practices-alignment-with-risk-management-and-security-frameworks</loc>
    <lastmod>2026-04-02T18:46:10Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://crisc.baremetalcyber.com/episodes/trailer</loc>
    <lastmod>2025-10-26T23:00:02Z</lastmod>
    <priority>0.9</priority>
  </url>
</urlset>
