<?xml version="1.0" encoding="UTF-8"?>
<urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9">
  <url>
    <loc>https://aaism.baremetalcyber.com/</loc>
    <lastmod>2026-04-02T03:29:41Z</lastmod>
    <priority>1.0</priority>
  </url>
  <url>
    <loc>https://aaism.baremetalcyber.com/episodes</loc>
    <lastmod>2026-04-02T03:29:41Z</lastmod>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://aaism.baremetalcyber.com/recommended</loc>
    <lastmod>2026-04-02T03:29:41Z</lastmod>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://aaism.baremetalcyber.com/all-in-one-course-hub</loc>
    <lastmod>2026-04-02T03:29:41Z</lastmod>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://aaism.baremetalcyber.com/contact-us</loc>
    <lastmod>2026-04-02T03:29:41Z</lastmod>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://aaism.baremetalcyber.com/study-guide</loc>
    <lastmod>2026-04-02T03:29:41Z</lastmod>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://aaism.baremetalcyber.com/flash-cards</loc>
    <lastmod>2026-04-02T03:29:41Z</lastmod>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://aaism.baremetalcyber.com/subscribe</loc>
    <lastmod>2026-04-02T03:29:41Z</lastmod>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://aaism.baremetalcyber.com/episodes/episode-1-exam-orientation-and-a-spoken-30-day-plan-to-pass-aaism-tasks-1-22</loc>
    <lastmod>2026-02-15T16:35:27Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://aaism.baremetalcyber.com/episodes/episode-2-understand-how-aaism-questions-map-to-real-ai-security-work-tasks-1-22</loc>
    <lastmod>2026-02-15T16:35:39Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://aaism.baremetalcyber.com/episodes/episode-3-walk-through-an-ai-system-life-cycle-in-clear-simple-language-task-22</loc>
    <lastmod>2026-02-15T16:35:45Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://aaism.baremetalcyber.com/episodes/episode-4-exam-acronyms-high-yield-audio-reference-for-aaism-daily-practice-tasks-1-22</loc>
    <lastmod>2026-02-15T16:35:52Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://aaism.baremetalcyber.com/episodes/episode-5-domain-1-overview-lead-ai-governance-and-program-management-confidently-task-1</loc>
    <lastmod>2026-02-15T16:36:00Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://aaism.baremetalcyber.com/episodes/episode-6-build-an-ai-governance-charter-that-aligns-to-business-objectives-task-1</loc>
    <lastmod>2026-02-15T16:36:11Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://aaism.baremetalcyber.com/episodes/episode-7-define-ai-roles-and-responsibilities-so-decisions-are-owned-and-clear-task-1</loc>
    <lastmod>2026-02-15T16:36:24Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://aaism.baremetalcyber.com/episodes/episode-8-set-governance-routines-that-keep-ai-security-decisions-consistent-task-1</loc>
    <lastmod>2026-02-15T16:36:32Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://aaism.baremetalcyber.com/episodes/episode-9-use-industry-frameworks-to-organize-ai-governance-and-security-work-task-3</loc>
    <lastmod>2026-02-15T16:36:55Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://aaism.baremetalcyber.com/episodes/episode-10-apply-ethical-principles-when-ai-outcomes-create-real-business-risk-task-3</loc>
    <lastmod>2026-02-15T16:37:04Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://aaism.baremetalcyber.com/episodes/episode-11-translate-ai-regulations-into-practical-testable-security-requirements-task-3</loc>
    <lastmod>2026-02-15T16:37:10Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://aaism.baremetalcyber.com/episodes/episode-12-plan-ai-impact-assessments-early-so-compliance-is-not-an-afterthought-task-8</loc>
    <lastmod>2026-02-15T16:37:17Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://aaism.baremetalcyber.com/episodes/episode-13-perform-ai-impact-assessments-with-scope-evidence-and-actionable-results-task-8</loc>
    <lastmod>2026-02-15T16:37:23Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://aaism.baremetalcyber.com/episodes/episode-14-prove-conformity-by-building-defensible-evidence-for-regulators-and-contracts-task-8</loc>
    <lastmod>2026-02-15T16:37:33Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://aaism.baremetalcyber.com/episodes/episode-15-write-ai-security-policies-people-can-follow-without-guessing-task-2</loc>
    <lastmod>2026-02-15T16:37:40Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://aaism.baremetalcyber.com/episodes/episode-16-turn-policies-into-standards-guidelines-and-step-by-step-procedures-task-2</loc>
    <lastmod>2026-02-15T16:37:46Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://aaism.baremetalcyber.com/episodes/episode-17-keep-ai-security-policies-current-using-ownership-and-change-control-task-2</loc>
    <lastmod>2026-02-15T16:37:52Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://aaism.baremetalcyber.com/episodes/episode-18-essential-terms-plain-language-glossary-for-fast-accurate-recall-tasks-1-22</loc>
    <lastmod>2026-02-15T16:37:58Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://aaism.baremetalcyber.com/episodes/episode-19-create-acceptable-use-guidelines-that-reduce-risky-ai-behavior-task-21</loc>
    <lastmod>2026-02-15T16:38:34Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://aaism.baremetalcyber.com/episodes/episode-20-build-ai-security-awareness-training-that-sticks-in-daily-work-task-21</loc>
    <lastmod>2026-02-15T16:38:46Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://aaism.baremetalcyber.com/episodes/episode-21-refresh-training-when-threats-tools-and-regulations-change-task-21</loc>
    <lastmod>2026-02-15T16:38:53Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://aaism.baremetalcyber.com/episodes/episode-22-inventory-ai-assets-models-prompts-data-and-key-dependencies-task-13</loc>
    <lastmod>2026-02-15T16:39:11Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://aaism.baremetalcyber.com/episodes/episode-23-classify-ai-assets-by-sensitivity-criticality-and-compliance-scope-task-13</loc>
    <lastmod>2026-02-15T16:39:25Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://aaism.baremetalcyber.com/episodes/episode-24-keep-the-ai-inventory-accurate-with-routine-governance-checks-task-13</loc>
    <lastmod>2026-02-15T16:39:31Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://aaism.baremetalcyber.com/episodes/episode-25-identify-data-risks-across-the-ai-life-cycle-leaks-and-tampering-task-14</loc>
    <lastmod>2026-02-15T16:39:38Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://aaism.baremetalcyber.com/episodes/episode-26-protect-training-and-test-data-with-access-control-and-secure-storage-task-14</loc>
    <lastmod>2026-02-15T16:39:44Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://aaism.baremetalcyber.com/episodes/episode-27-preserve-data-integrity-so-models-stay-reliable-and-trustworthy-task-14</loc>
    <lastmod>2026-02-15T16:39:50Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://aaism.baremetalcyber.com/episodes/episode-28-manage-retention-and-deletion-to-reduce-long-term-ai-data-exposure-task-14</loc>
    <lastmod>2026-02-15T16:40:04Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://aaism.baremetalcyber.com/episodes/episode-29-build-an-ai-security-program-that-fits-the-enterprise-security-program-task-19</loc>
    <lastmod>2026-02-15T16:40:10Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://aaism.baremetalcyber.com/episodes/episode-30-define-ai-security-metrics-leaders-can-understand-and-act-on-task-18</loc>
    <lastmod>2026-02-15T16:40:16Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://aaism.baremetalcyber.com/episodes/episode-31-monitor-ai-metrics-to-spot-misuse-drift-and-early-incident-signals-task-18</loc>
    <lastmod>2026-02-15T16:41:12Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://aaism.baremetalcyber.com/episodes/episode-32-use-metrics-to-prioritize-work-and-prove-security-program-value-task-18</loc>
    <lastmod>2026-02-15T16:41:18Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://aaism.baremetalcyber.com/episodes/episode-33-review-ai-security-tools-by-coverage-gaps-and-operational-fit-task-19</loc>
    <lastmod>2026-02-15T16:41:24Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://aaism.baremetalcyber.com/episodes/episode-34-implement-ai-security-tools-into-monitoring-alerting-and-response-workflows-task-19</loc>
    <lastmod>2026-02-15T16:41:30Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://aaism.baremetalcyber.com/episodes/episode-35-operationalize-tools-with-tuning-ownership-and-measurable-outcomes-task-19</loc>
    <lastmod>2026-02-15T16:41:36Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://aaism.baremetalcyber.com/episodes/episode-36-domain-1-quick-review-governance-policies-assets-metrics-and-training-tasks-1-3</loc>
    <lastmod>2026-02-15T16:41:49Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://aaism.baremetalcyber.com/episodes/episode-37-investigate-ai-security-incidents-by-collecting-the-right-evidence-fast-task-15</loc>
    <lastmod>2026-02-15T16:41:55Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://aaism.baremetalcyber.com/episodes/episode-38-document-ai-incidents-clearly-for-regulators-contracts-and-executive-updates-task-15</loc>
    <lastmod>2026-02-15T16:42:02Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://aaism.baremetalcyber.com/episodes/episode-39-report-ai-security-incidents-on-time-without-losing-accuracy-task-15</loc>
    <lastmod>2026-02-15T16:42:08Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://aaism.baremetalcyber.com/episodes/episode-40-contain-ai-incidents-quickly-by-limiting-access-and-stopping-risky-flows-task-16</loc>
    <lastmod>2026-02-15T16:42:15Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://aaism.baremetalcyber.com/episodes/episode-41-notify-and-escalate-during-ai-incidents-with-the-right-triggers-task-16</loc>
    <lastmod>2026-02-15T16:42:24Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://aaism.baremetalcyber.com/episodes/episode-42-eradicate-root-causes-and-recover-safely-after-ai-security-incidents-task-16</loc>
    <lastmod>2026-02-15T16:42:32Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://aaism.baremetalcyber.com/episodes/episode-43-add-ai-systems-to-business-continuity-plans-without-hidden-weak-points-task-17</loc>
    <lastmod>2026-02-15T16:42:38Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://aaism.baremetalcyber.com/episodes/episode-44-set-recovery-goals-for-ai-services-data-pipelines-and-vendors-task-17</loc>
    <lastmod>2026-02-15T16:42:43Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://aaism.baremetalcyber.com/episodes/episode-45-plan-for-vendor-outages-and-safe-degraded-modes-in-ai-systems-task-17</loc>
    <lastmod>2026-02-15T16:42:50Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://aaism.baremetalcyber.com/episodes/episode-46-domain-1-recap-drill-pick-the-right-task-under-pressure-tasks-1-21</loc>
    <lastmod>2026-02-15T16:43:01Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://aaism.baremetalcyber.com/episodes/episode-47-domain-2-overview-manage-ai-risk-while-enabling-business-opportunity-task-4</loc>
    <lastmod>2026-02-15T16:43:07Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://aaism.baremetalcyber.com/episodes/episode-48-run-the-ai-risk-management-life-cycle-from-intake-to-monitoring-task-4</loc>
    <lastmod>2026-02-15T16:43:15Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://aaism.baremetalcyber.com/episodes/episode-49-connect-ai-risks-to-enterprise-risk-reporting-and-decision-making-task-4</loc>
    <lastmod>2026-02-15T16:43:20Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://aaism.baremetalcyber.com/episodes/episode-50-assign-ai-risk-owners-and-approvals-so-accountability-is-never-unclear-task-4</loc>
    <lastmod>2026-02-15T16:43:26Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://aaism.baremetalcyber.com/episodes/episode-51-identify-the-ai-threat-landscape-using-realistic-abuse-cases-task-5</loc>
    <lastmod>2026-02-15T16:44:12Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://aaism.baremetalcyber.com/episodes/episode-52-assess-ai-threats-by-likelihood-and-impact-not-hype-and-fear-task-5</loc>
    <lastmod>2026-02-15T16:44:25Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://aaism.baremetalcyber.com/episodes/episode-53-keep-threat-understanding-current-as-attackers-and-tools-evolve-task-5</loc>
    <lastmod>2026-02-15T16:44:40Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://aaism.baremetalcyber.com/episodes/episode-54-monitor-internal-changes-that-require-ai-risk-reassessment-task-6</loc>
    <lastmod>2026-02-15T16:45:00Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://aaism.baremetalcyber.com/episodes/episode-55-monitor-external-changes-like-laws-vendors-and-new-ai-capabilities-task-6</loc>
    <lastmod>2026-02-15T16:45:16Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://aaism.baremetalcyber.com/episodes/episode-56-build-a-reassessment-cadence-that-prevents-stale-ai-risk-decisions-task-6</loc>
    <lastmod>2026-02-15T16:45:58Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://aaism.baremetalcyber.com/episodes/episode-57-design-ai-security-testing-that-matches-your-model-data-and-use-case-task-7</loc>
    <lastmod>2026-02-15T16:46:36Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://aaism.baremetalcyber.com/episodes/episode-58-build-ai-vulnerability-management-from-discovery-to-remediation-task-7</loc>
    <lastmod>2026-02-15T16:46:51Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://aaism.baremetalcyber.com/episodes/episode-59-retest-and-document-fixes-so-ai-vulnerabilities-stay-closed-task-7</loc>
    <lastmod>2026-02-15T16:47:06Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://aaism.baremetalcyber.com/episodes/episode-60-embed-vendor-ai-security-requirements-before-procurement-begins-task-9</loc>
    <lastmod>2026-02-15T16:47:27Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://aaism.baremetalcyber.com/episodes/episode-61-monitor-vendor-controls-using-evidence-updates-and-incident-notifications-task-9</loc>
    <lastmod>2026-02-15T16:47:42Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://aaism.baremetalcyber.com/episodes/episode-62-verify-vendor-ai-security-through-audits-tests-and-contract-enforcement-task-9</loc>
    <lastmod>2026-02-15T16:48:04Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://aaism.baremetalcyber.com/episodes/episode-63-domain-2-quick-review-risk-lifecycle-threats-testing-and-vendors-tasks-4-9</loc>
    <lastmod>2026-02-15T16:48:18Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://aaism.baremetalcyber.com/episodes/episode-64-domain-3-overview-secure-ai-technologies-using-architecture-and-controls-task-10</loc>
    <lastmod>2026-02-15T16:48:40Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://aaism.baremetalcyber.com/episodes/episode-65-design-ai-security-architecture-with-clear-trust-boundaries-and-data-flows-task-10</loc>
    <lastmod>2026-02-15T16:48:57Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://aaism.baremetalcyber.com/episodes/episode-66-reduce-ai-attack-surface-through-smart-deployment-and-integration-choices-task-10</loc>
    <lastmod>2026-02-15T16:49:19Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://aaism.baremetalcyber.com/episodes/episode-67-implement-ai-architecture-protections-for-identity-secrets-and-isolation-task-10</loc>
    <lastmod>2026-02-15T16:49:34Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://aaism.baremetalcyber.com/episodes/episode-68-integrate-ai-architecture-into-enterprise-architecture-without-shadow-systems-task-11</loc>
    <lastmod>2026-02-15T16:49:58Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://aaism.baremetalcyber.com/episodes/episode-69-align-ai-architecture-with-enterprise-identity-network-and-data-standards-task-11</loc>
    <lastmod>2026-02-15T16:50:12Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://aaism.baremetalcyber.com/episodes/episode-70-document-architecture-decisions-so-governance-and-audit-stay-aligned-task-11</loc>
    <lastmod>2026-02-15T16:50:34Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://aaism.baremetalcyber.com/episodes/episode-71-understand-the-ai-development-life-cycle-from-idea-to-retirement-task-22</loc>
    <lastmod>2026-02-15T16:51:34Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://aaism.baremetalcyber.com/episodes/episode-72-secure-build-train-and-deploy-pipelines-for-repeatable-safe-releases-task-22</loc>
    <lastmod>2026-02-15T16:52:12Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://aaism.baremetalcyber.com/episodes/episode-73-validate-models-for-safety-accuracy-and-security-failure-modes-task-22</loc>
    <lastmod>2026-02-15T16:52:30Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://aaism.baremetalcyber.com/episodes/episode-74-apply-security-controls-across-the-ai-life-cycle-to-treat-risk-task-12</loc>
    <lastmod>2026-02-15T16:53:03Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://aaism.baremetalcyber.com/episodes/episode-75-assign-control-owners-and-evidence-so-controls-survive-real-operations-task-12</loc>
    <lastmod>2026-02-15T16:53:03Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://aaism.baremetalcyber.com/episodes/episode-76-review-and-tune-ai-security-controls-as-models-data-and-threats-change-task-12</loc>
    <lastmod>2026-02-15T16:53:25Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://aaism.baremetalcyber.com/episodes/episode-77-control-data-pipelines-with-lineage-access-control-and-secure-storage-task-14</loc>
    <lastmod>2026-02-15T16:53:45Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://aaism.baremetalcyber.com/episodes/episode-78-protect-embeddings-prompts-and-inference-logs-as-sensitive-ai-assets-task-14</loc>
    <lastmod>2026-02-15T16:54:03Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://aaism.baremetalcyber.com/episodes/episode-79-manage-privacy-requirements-across-ai-inputs-outputs-and-user-access-task-3</loc>
    <lastmod>2026-02-15T16:54:22Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://aaism.baremetalcyber.com/episodes/episode-80-build-ethical-guardrails-that-reduce-harm-while-meeting-business-goals-task-3</loc>
    <lastmod>2026-02-15T16:54:35Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://aaism.baremetalcyber.com/episodes/episode-81-design-risk-based-human-oversight-so-ai-stays-safe-and-useful-task-20</loc>
    <lastmod>2026-02-15T16:54:55Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://aaism.baremetalcyber.com/episodes/episode-82-review-ai-outputs-for-trust-and-safety-without-slowing-the-business-task-20</loc>
    <lastmod>2026-02-15T16:55:19Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://aaism.baremetalcyber.com/episodes/episode-83-improve-explainability-so-decisions-are-defensible-to-leaders-and-auditors-task-20</loc>
    <lastmod>2026-02-15T16:55:32Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://aaism.baremetalcyber.com/episodes/episode-84-test-robustness-and-respond-when-models-behave-unpredictably-task-20</loc>
    <lastmod>2026-02-15T16:55:45Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://aaism.baremetalcyber.com/episodes/episode-85-build-continuous-monitoring-for-ai-systems-controls-and-security-signals-task-12</loc>
    <lastmod>2026-02-15T16:56:03Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://aaism.baremetalcyber.com/episodes/episode-86-connect-monitoring-to-incident-response-so-alerts-lead-to-action-task-16</loc>
    <lastmod>2026-02-15T16:56:16Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://aaism.baremetalcyber.com/episodes/episode-87-cross-domain-practice-choose-the-right-task-in-realistic-scenarios-tasks-1-22</loc>
    <lastmod>2026-02-15T16:56:30Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://aaism.baremetalcyber.com/episodes/episode-88-final-rapid-recap-remember-the-three-domains-and-all-22-tasks-tasks-1-22</loc>
    <lastmod>2026-02-15T16:56:52Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://aaism.baremetalcyber.com/episodes/episode-89-exam-day-tactics-calm-pacing-best-answer-logic-and-time-discipline-tasks-1-22</loc>
    <lastmod>2026-02-15T16:57:06Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://aaism.baremetalcyber.com/episodes/episode-90-finish-strong-lock-in-governance-risk-and-controls-for-aaism-tasks-1-22</loc>
    <lastmod>2026-02-15T16:57:25Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://aaism.baremetalcyber.com/episodes/welcome-to-the-isaca-aaism-audio-course</loc>
    <lastmod>2026-02-15T17:02:08Z</lastmod>
    <priority>0.9</priority>
  </url>
</urlset>
