<?xml version="1.0" encoding="UTF-8"?>
<urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9">
  <url>
    <loc>https://cipt.baremetalcyber.com/</loc>
    <lastmod>2026-04-22T02:48:53Z</lastmod>
    <priority>1.0</priority>
  </url>
  <url>
    <loc>https://cipt.baremetalcyber.com/episodes</loc>
    <lastmod>2026-04-22T02:48:53Z</lastmod>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://cipt.baremetalcyber.com/recommended</loc>
    <lastmod>2026-04-22T02:48:53Z</lastmod>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://cipt.baremetalcyber.com/contact-us</loc>
    <lastmod>2026-04-22T02:48:53Z</lastmod>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://cipt.baremetalcyber.com/all-in-one-course-hub</loc>
    <lastmod>2026-04-22T02:48:53Z</lastmod>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://cipt.baremetalcyber.com/flash-cards</loc>
    <lastmod>2026-04-22T02:48:53Z</lastmod>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://cipt.baremetalcyber.com/study-guide</loc>
    <lastmod>2026-04-22T02:48:53Z</lastmod>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://cipt.baremetalcyber.com/subscribe</loc>
    <lastmod>2026-04-22T02:48:53Z</lastmod>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://cipt.baremetalcyber.com/episodes/episode-1-crack-the-cipt-blueprint-and-what-truly-matters</loc>
    <lastmod>2026-03-28T21:48:30Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cipt.baremetalcyber.com/episodes/episode-2-map-a-high-yield-audio-only-cipt-study-plan</loc>
    <lastmod>2026-03-28T21:48:43Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cipt.baremetalcyber.com/episodes/episode-3-master-scoring-rules-candidate-policies-and-pitfalls</loc>
    <lastmod>2026-03-28T21:48:57Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cipt.baremetalcyber.com/episodes/episode-4-own-the-privacy-roles-landscape-with-raci-mapping</loc>
    <lastmod>2026-03-28T21:49:25Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cipt.baremetalcyber.com/episodes/episode-5-translate-regulatory-requirements-into-practical-engineering-moves</loc>
    <lastmod>2026-03-28T21:49:40Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cipt.baremetalcyber.com/episodes/episode-6-deploy-notices-policies-and-procedures-users-trust</loc>
    <lastmod>2026-03-28T21:49:54Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cipt.baremetalcyber.com/episodes/episode-7-command-day-to-day-privacy-operations-with-confidence</loc>
    <lastmod>2026-03-28T21:50:07Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cipt.baremetalcyber.com/episodes/episode-8-audit-third-party-privacy-risk-without-blind-spots</loc>
    <lastmod>2026-03-28T21:50:21Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cipt.baremetalcyber.com/episodes/episode-9-respond-to-privacy-incidents-fast-and-effectively</loc>
    <lastmod>2026-03-28T21:50:40Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cipt.baremetalcyber.com/episodes/episode-10-spot-threats-vulnerabilities-and-real-world-exploits-early</loc>
    <lastmod>2026-03-28T21:50:55Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cipt.baremetalcyber.com/episodes/episode-11-apply-contextual-integrity-to-real-processing-scenarios</loc>
    <lastmod>2026-03-28T21:51:10Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cipt.baremetalcyber.com/episodes/episode-12-use-fair-to-quantify-and-prioritize-privacy-risk</loc>
    <lastmod>2026-03-28T21:51:26Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cipt.baremetalcyber.com/episodes/episode-13-align-programs-to-nist-and-nice-frameworks-smartly</loc>
    <lastmod>2026-03-28T21:51:44Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cipt.baremetalcyber.com/episodes/episode-14-model-privacy-threats-the-right-way-with-linddun</loc>
    <lastmod>2026-03-28T21:52:03Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cipt.baremetalcyber.com/episodes/episode-15-leverage-mitre-panoptic-modeling-for-data-protection</loc>
    <lastmod>2026-03-28T21:52:18Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cipt.baremetalcyber.com/episodes/episode-16-separate-legal-duties-from-ethical-design-decisions</loc>
    <lastmod>2026-03-28T21:52:37Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cipt.baremetalcyber.com/episodes/episode-17-advise-ethical-technology-design-that-scales-sustainably</loc>
    <lastmod>2026-03-28T21:52:51Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cipt.baremetalcyber.com/episodes/episode-18-mitigate-bias-in-automated-decisions-and-analytics</loc>
    <lastmod>2026-03-28T21:53:07Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cipt.baremetalcyber.com/episodes/episode-19-design-consent-journeys-users-understand-and-choose</loc>
    <lastmod>2026-03-28T21:53:26Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cipt.baremetalcyber.com/episodes/episode-20-craft-clear-honest-and-actionable-privacy-notices</loc>
    <lastmod>2026-03-28T21:53:49Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cipt.baremetalcyber.com/episodes/episode-21-manage-automatic-data-collection-without-overreach</loc>
    <lastmod>2026-03-28T21:53:56Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cipt.baremetalcyber.com/episodes/episode-22-extract-public-data-responsibly-and-defensibly</loc>
    <lastmod>2026-03-28T21:54:09Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cipt.baremetalcyber.com/episodes/episode-23-plan-data-retention-and-destruction-that-works</loc>
    <lastmod>2026-03-28T21:54:23Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cipt.baremetalcyber.com/episodes/episode-24-practice-ruthless-data-minimization-across-the-lifecycle</loc>
    <lastmod>2026-03-28T21:54:38Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cipt.baremetalcyber.com/episodes/episode-25-segregate-processing-workloads-to-contain-privacy-blast-radius</loc>
    <lastmod>2026-03-28T21:56:17Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cipt.baremetalcyber.com/episodes/episode-26-reduce-aggregation-risks-in-data-lakes-and-warehouses</loc>
    <lastmod>2026-03-28T21:56:53Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cipt.baremetalcyber.com/episodes/episode-27-apply-anonymization-techniques-that-stand-up-to-scrutiny</loc>
    <lastmod>2026-03-28T21:57:11Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cipt.baremetalcyber.com/episodes/episode-28-implement-pseudonymization-controls-that-actually-protect</loc>
    <lastmod>2026-03-28T21:57:28Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cipt.baremetalcyber.com/episodes/episode-29-use-differential-privacy-wisely-in-analytics-pipelines</loc>
    <lastmod>2026-03-28T21:57:42Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cipt.baremetalcyber.com/episodes/episode-30-limit-secondary-uses-targeting-and-profiling-responsibly</loc>
    <lastmod>2026-03-28T21:57:57Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cipt.baremetalcyber.com/episodes/episode-31-control-disclosure-and-access-with-robust-guardrails</loc>
    <lastmod>2026-03-28T21:58:14Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cipt.baremetalcyber.com/episodes/episode-32-prevent-distortion-exposure-and-confidentiality-breaks</loc>
    <lastmod>2026-03-28T21:58:30Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cipt.baremetalcyber.com/episodes/episode-33-counter-blackmail-appropriation-and-identity-misuse</loc>
    <lastmod>2026-03-28T21:58:44Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cipt.baremetalcyber.com/episodes/episode-34-harden-iam-and-authentication-for-privacy-outcomes</loc>
    <lastmod>2026-03-28T21:58:59Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cipt.baremetalcyber.com/episodes/episode-35-tame-advertising-ecosystems-and-cross-site-profiling-risk</loc>
    <lastmod>2026-03-28T21:59:13Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cipt.baremetalcyber.com/episodes/episode-36-defend-human-factors-social-engineering-and-deception</loc>
    <lastmod>2026-03-28T21:59:30Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cipt.baremetalcyber.com/episodes/episode-37-eliminate-manipulative-dark-patterns-by-design</loc>
    <lastmod>2026-03-28T21:59:45Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cipt.baremetalcyber.com/episodes/episode-38-choose-proven-pro-privacy-design-patterns-for-ux</loc>
    <lastmod>2026-03-28T21:59:57Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cipt.baremetalcyber.com/episodes/episode-39-find-and-fix-privacy-bugs-before-release</loc>
    <lastmod>2026-03-28T22:00:11Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cipt.baremetalcyber.com/episodes/episode-40-deploy-intrusion-detection-that-respects-privacy-signals</loc>
    <lastmod>2026-03-28T22:00:26Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cipt.baremetalcyber.com/episodes/episode-41-control-change-management-risks-in-data-processing</loc>
    <lastmod>2026-03-28T22:00:40Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cipt.baremetalcyber.com/episodes/episode-42-vet-service-provider-privacy-with-measurable-controls</loc>
    <lastmod>2026-03-28T22:00:56Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cipt.baremetalcyber.com/episodes/episode-43-assess-e-commerce-checkout-and-loyalty-privacy-risks</loc>
    <lastmod>2026-03-28T22:01:10Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cipt.baremetalcyber.com/episodes/episode-44-evaluate-surveillance-and-iot-sensors-without-overcollection</loc>
    <lastmod>2026-03-28T22:01:25Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cipt.baremetalcyber.com/episodes/episode-45-navigate-biometrics-safely-capture-storage-and-use</loc>
    <lastmod>2026-03-28T22:01:42Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cipt.baremetalcyber.com/episodes/episode-46-manage-location-tracking-risks-across-devices-and-apps</loc>
    <lastmod>2026-03-28T22:01:57Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cipt.baremetalcyber.com/episodes/episode-47-monitor-web-and-in-app-tracking-transparently</loc>
    <lastmod>2026-03-28T22:02:13Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cipt.baremetalcyber.com/episodes/episode-48-evaluate-ai-and-machine-learning-privacy-trade-offs</loc>
    <lastmod>2026-03-28T22:02:28Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cipt.baremetalcyber.com/episodes/episode-49-secure-communications-and-mobile-messaging-end-to-end</loc>
    <lastmod>2026-03-28T22:02:44Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cipt.baremetalcyber.com/episodes/episode-50-guide-safer-social-media-and-online-gaming-practices</loc>
    <lastmod>2026-03-28T22:03:00Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cipt.baremetalcyber.com/episodes/episode-51-run-privacy-audits-that-drive-real-remediation</loc>
    <lastmod>2026-03-28T22:03:15Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cipt.baremetalcyber.com/episodes/episode-52-define-and-monitor-kris-and-kpis-that-matter</loc>
    <lastmod>2026-03-28T22:03:31Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cipt.baremetalcyber.com/episodes/episode-53-complete-dpias-with-sharp-decision-ready-analysis</loc>
    <lastmod>2026-03-28T22:03:46Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cipt.baremetalcyber.com/episodes/episode-54-implement-privacy-by-design-across-product-roadmaps</loc>
    <lastmod>2026-03-28T22:04:10Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cipt.baremetalcyber.com/episodes/episode-55-set-measurable-goals-and-align-system-specifications</loc>
    <lastmod>2026-03-28T22:04:24Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cipt.baremetalcyber.com/episodes/episode-56-analyze-ux-privacy-impacts-without-visual-aids</loc>
    <lastmod>2026-03-28T22:04:47Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cipt.baremetalcyber.com/episodes/episode-57-test-privacy-usability-thoroughly-with-audio-first-methods</loc>
    <lastmod>2026-03-28T22:05:02Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cipt.baremetalcyber.com/episodes/episode-58-adopt-value-sensitive-design-for-trustworthy-products</loc>
    <lastmod>2026-03-28T22:05:17Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cipt.baremetalcyber.com/episodes/episode-59-apply-nist-privacy-objectives-to-daily-operations</loc>
    <lastmod>2026-03-28T22:05:52Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cipt.baremetalcyber.com/episodes/episode-60-model-data-flows-accurately-from-source-to-sink</loc>
    <lastmod>2026-03-28T22:06:09Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cipt.baremetalcyber.com/episodes/episode-61-manage-sdlc-privacy-risks-from-idea-to-sunset</loc>
    <lastmod>2026-03-28T22:06:24Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cipt.baremetalcyber.com/episodes/episode-62-build-data-inventories-and-ropa-that-stay-current</loc>
    <lastmod>2026-03-28T22:06:39Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cipt.baremetalcyber.com/episodes/episode-63-review-code-and-monitor-runtime-for-privacy-regressions</loc>
    <lastmod>2026-03-28T22:06:53Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cipt.baremetalcyber.com/episodes/welcome-to-certified-the-iapp-cipt-audio-course</loc>
    <lastmod>2026-03-28T21:40:03Z</lastmod>
    <priority>0.9</priority>
  </url>
</urlset>
