<?xml version="1.0" encoding="UTF-8"?>
<urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9">
  <url>
    <loc>https://gsom.baremetalcyber.com/</loc>
    <lastmod>2026-03-16T23:55:16Z</lastmod>
    <priority>1.0</priority>
  </url>
  <url>
    <loc>https://gsom.baremetalcyber.com/episodes</loc>
    <lastmod>2026-03-16T23:55:16Z</lastmod>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://gsom.baremetalcyber.com/baremetalcyber</loc>
    <lastmod>2026-03-16T23:55:16Z</lastmod>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://gsom.baremetalcyber.com/recommended</loc>
    <lastmod>2026-03-16T23:55:16Z</lastmod>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://gsom.baremetalcyber.com/contact-us</loc>
    <lastmod>2026-03-16T23:55:16Z</lastmod>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://gsom.baremetalcyber.com/subscribe</loc>
    <lastmod>2026-03-16T23:55:16Z</lastmod>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://gsom.baremetalcyber.com/episodes/episode-1-decode-the-gsom-exam-structure-scoring-and-what-success-looks-like</loc>
    <lastmod>2026-02-15T02:29:32Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://gsom.baremetalcyber.com/episodes/episode-2-navigate-giac-proctoring-rules-and-policies-without-test-day-surprises</loc>
    <lastmod>2026-02-15T02:30:36Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://gsom.baremetalcyber.com/episodes/episode-3-build-an-audio-first-study-plan-mapped-to-official-gsom-objectives</loc>
    <lastmod>2026-02-15T02:31:20Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://gsom.baremetalcyber.com/episodes/episode-4-cyber-defense-theory-threat-intel-and-defensible-architecture-in-plain-english</loc>
    <lastmod>2026-02-15T02:32:46Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://gsom.baremetalcyber.com/episodes/episode-5-apply-fundamental-cyber-defense-theory-to-anticipate-attacker-moves-early</loc>
    <lastmod>2026-02-15T02:33:03Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://gsom.baremetalcyber.com/episodes/episode-6-translate-cyber-threat-intelligence-into-prioritized-detections-and-response-decisions</loc>
    <lastmod>2026-02-15T02:33:26Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://gsom.baremetalcyber.com/episodes/episode-7-judge-threat-intel-quality-source-reliability-confidence-and-operational-fit</loc>
    <lastmod>2026-02-15T02:33:43Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://gsom.baremetalcyber.com/episodes/episode-8-design-defensible-security-architecture-by-mapping-threats-to-layered-controls</loc>
    <lastmod>2026-02-15T02:33:58Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://gsom.baremetalcyber.com/episodes/episode-9-spaced-review-recall-cyber-defense-theory-threat-intel-defensible-architecture-quickly</loc>
    <lastmod>2026-02-15T02:34:12Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://gsom.baremetalcyber.com/episodes/episode-10-soc-design-and-planning-assess-business-goals-and-security-requirements</loc>
    <lastmod>2026-02-15T02:34:33Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://gsom.baremetalcyber.com/episodes/episode-11-turn-operational-requirements-into-soc-services-coverage-models-and-staffing</loc>
    <lastmod>2026-02-15T02:34:48Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://gsom.baremetalcyber.com/episodes/episode-12-identify-relevant-threats-and-potential-attack-paths-unique-to-your-environment</loc>
    <lastmod>2026-02-15T02:35:01Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://gsom.baremetalcyber.com/episodes/episode-13-build-an-organizational-risk-profile-that-drives-soc-priorities-and-escalation</loc>
    <lastmod>2026-02-15T02:35:19Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://gsom.baremetalcyber.com/episodes/episode-14-design-and-staff-an-effective-soc-program-that-actually-runs-well</loc>
    <lastmod>2026-02-15T02:35:32Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://gsom.baremetalcyber.com/episodes/episode-15-spaced-review-replay-business-context-attack-paths-risk-and-planning-decisions</loc>
    <lastmod>2026-02-15T02:35:49Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://gsom.baremetalcyber.com/episodes/episode-16-exam-acronyms-high-yield-audio-reference-for-the-giac-gsom</loc>
    <lastmod>2026-02-15T02:36:05Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://gsom.baremetalcyber.com/episodes/episode-17-soc-tools-and-technology-know-what-common-platforms-do-and-why</loc>
    <lastmod>2026-02-15T02:36:21Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://gsom.baremetalcyber.com/episodes/episode-18-choose-siem-edr-soar-and-case-tooling-that-supports-operations</loc>
    <lastmod>2026-02-15T02:36:41Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://gsom.baremetalcyber.com/episodes/episode-19-integrate-soc-tools-safely-so-data-flows-without-breaking-trust</loc>
    <lastmod>2026-02-15T02:37:00Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://gsom.baremetalcyber.com/episodes/episode-20-secure-soc-technology-with-least-privilege-hardening-monitoring-and-logging</loc>
    <lastmod>2026-02-15T02:37:20Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://gsom.baremetalcyber.com/episodes/episode-21-spaced-review-cement-soc-tooling-choices-integrations-and-secure-implementation-habits</loc>
    <lastmod>2026-02-15T02:38:33Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://gsom.baremetalcyber.com/episodes/episode-22-data-source-assessment-and-collection-decide-what-to-collect-and-prioritize</loc>
    <lastmod>2026-02-15T02:39:04Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://gsom.baremetalcyber.com/episodes/episode-23-use-business-operations-knowledge-to-select-telemetry-that-matters-most</loc>
    <lastmod>2026-02-15T02:39:38Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://gsom.baremetalcyber.com/episodes/episode-24-turn-organizational-use-cases-into-specific-data-source-requirements-fast</loc>
    <lastmod>2026-02-15T02:39:55Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://gsom.baremetalcyber.com/episodes/episode-25-leverage-industry-frameworks-to-prioritize-collection-enrichment-and-coverage-gaps</loc>
    <lastmod>2026-02-15T02:40:09Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://gsom.baremetalcyber.com/episodes/episode-26-orchestrate-secure-and-efficient-data-collection-pipelines-across-diverse-systems</loc>
    <lastmod>2026-02-15T02:40:23Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://gsom.baremetalcyber.com/episodes/episode-27-enrich-collected-data-with-context-so-monitoring-becomes-decisively-faster</loc>
    <lastmod>2026-02-15T02:40:36Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://gsom.baremetalcyber.com/episodes/episode-28-spaced-review-prioritize-collect-and-enrich-data-sources-without-blind-spots</loc>
    <lastmod>2026-02-15T02:40:54Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://gsom.baremetalcyber.com/episodes/episode-29-managing-alert-creation-and-processing-build-alerts-people-can-act-on</loc>
    <lastmod>2026-02-15T02:41:08Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://gsom.baremetalcyber.com/episodes/episode-30-create-actionable-alerts-from-use-cases-and-observable-attacker-behaviors</loc>
    <lastmod>2026-02-15T02:41:29Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://gsom.baremetalcyber.com/episodes/episode-31-prioritize-alerts-using-severity-confidence-and-business-impact-tradeoffs</loc>
    <lastmod>2026-02-15T02:41:45Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://gsom.baremetalcyber.com/episodes/episode-32-classify-alerts-consistently-to-speed-triage-routing-and-investigation-handoffs</loc>
    <lastmod>2026-02-15T02:41:59Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://gsom.baremetalcyber.com/episodes/episode-33-implement-best-practices-for-timely-manageable-and-sustainable-alert-response</loc>
    <lastmod>2026-02-15T02:42:15Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://gsom.baremetalcyber.com/episodes/episode-34-tune-noisy-detections-using-feedback-loops-that-shrink-backlogs-over-time</loc>
    <lastmod>2026-02-15T02:42:30Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://gsom.baremetalcyber.com/episodes/episode-35-spaced-review-build-prioritize-classify-respond-and-tune-alerts-confidently</loc>
    <lastmod>2026-02-15T02:42:43Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://gsom.baremetalcyber.com/episodes/episode-36-preparing-for-incident-response-readiness-steps-that-prevent-chaos-later</loc>
    <lastmod>2026-02-15T02:42:57Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://gsom.baremetalcyber.com/episodes/episode-37-master-the-incident-response-cycle-and-where-soc-operations-plug-in</loc>
    <lastmod>2026-02-15T02:43:11Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://gsom.baremetalcyber.com/episodes/episode-38-prepare-investigation-foundations-evidence-handling-tooling-access-and-documentation</loc>
    <lastmod>2026-02-15T02:43:27Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://gsom.baremetalcyber.com/episodes/episode-39-build-communication-paths-and-decision-points-before-the-first-incident-hits</loc>
    <lastmod>2026-02-15T02:43:41Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://gsom.baremetalcyber.com/episodes/episode-40-spaced-review-remember-ir-preparation-phases-and-soc-coordination-essentials</loc>
    <lastmod>2026-02-15T02:46:38Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://gsom.baremetalcyber.com/episodes/episode-41-managing-incident-response-execution-investigation-techniques-that-reach-the-truth</loc>
    <lastmod>2026-02-15T02:48:43Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://gsom.baremetalcyber.com/episodes/episode-42-scope-incidents-rapidly-using-hypotheses-timelines-and-high-value-evidence</loc>
    <lastmod>2026-02-15T02:48:57Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://gsom.baremetalcyber.com/episodes/episode-43-execute-containment-choices-that-reduce-risk-without-crippling-the-business</loc>
    <lastmod>2026-02-15T02:49:11Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://gsom.baremetalcyber.com/episodes/episode-44-drive-eradication-and-recovery-with-verification-and-controlled-reentry-steps</loc>
    <lastmod>2026-02-15T02:59:40Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://gsom.baremetalcyber.com/episodes/episode-45-close-the-loop-with-lessons-learned-that-strengthen-every-ir-phase</loc>
    <lastmod>2026-02-15T03:01:01Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://gsom.baremetalcyber.com/episodes/episode-46-spaced-review-investigate-contain-eradicate-recover-and-learn-without-guesswork</loc>
    <lastmod>2026-02-15T03:01:10Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://gsom.baremetalcyber.com/episodes/episode-47-proactive-detection-and-analysis-threat-hunting-and-active-defense-fundamentals</loc>
    <lastmod>2026-02-15T03:01:20Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://gsom.baremetalcyber.com/episodes/episode-48-run-the-threat-hunting-process-from-hypothesis-to-defensible-conclusions</loc>
    <lastmod>2026-02-15T03:01:35Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://gsom.baremetalcyber.com/episodes/episode-49-apply-active-defense-techniques-that-increase-visibility-and-adversary-friction</loc>
    <lastmod>2026-02-15T03:01:42Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://gsom.baremetalcyber.com/episodes/episode-50-use-community-sourced-resources-to-supplement-gaps-in-detection-capabilities</loc>
    <lastmod>2026-02-15T03:01:53Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://gsom.baremetalcyber.com/episodes/episode-51-convert-hunt-results-into-improved-detections-playbooks-and-data-needs</loc>
    <lastmod>2026-02-15T03:02:06Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://gsom.baremetalcyber.com/episodes/episode-52-spaced-review-reinforce-threat-hunting-active-defense-and-community-resource-leverage</loc>
    <lastmod>2026-02-15T03:02:15Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://gsom.baremetalcyber.com/episodes/episode-53-soc-analytics-and-metrics-choose-measures-that-reflect-progress-and-effectiveness</loc>
    <lastmod>2026-02-15T03:02:26Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://gsom.baremetalcyber.com/episodes/episode-54-set-soc-goals-and-analytics-that-guide-continuous-maturity-planning</loc>
    <lastmod>2026-02-15T03:02:35Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://gsom.baremetalcyber.com/episodes/episode-55-analyze-soc-operations-to-find-bottlenecks-gaps-and-high-impact-improvements</loc>
    <lastmod>2026-02-15T03:02:44Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://gsom.baremetalcyber.com/episodes/episode-56-build-a-strategic-plan-that-turns-metrics-into-sustained-operational-change</loc>
    <lastmod>2026-02-15T03:03:00Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://gsom.baremetalcyber.com/episodes/episode-57-communicate-soc-performance-with-metrics-leaders-trust-and-teams-respect</loc>
    <lastmod>2026-02-15T03:03:10Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://gsom.baremetalcyber.com/episodes/episode-58-spaced-review-make-metrics-analytics-and-planning-feel-automatic-under-pressure</loc>
    <lastmod>2026-02-15T03:03:21Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://gsom.baremetalcyber.com/episodes/episode-59-continuous-improvement-use-post-incident-data-to-fuel-future-growth</loc>
    <lastmod>2026-02-15T03:03:30Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://gsom.baremetalcyber.com/episodes/episode-60-automate-repetitive-soc-tasks-to-boost-consistency-and-reduce-burnout</loc>
    <lastmod>2026-02-15T02:47:45Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://gsom.baremetalcyber.com/episodes/episode-61-validate-detections-with-analytic-testing-before-attackers-exploit-your-gaps</loc>
    <lastmod>2026-02-15T03:03:47Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://gsom.baremetalcyber.com/episodes/episode-62-apply-adversarial-emulation-to-stress-test-soc-people-process-and-tools</loc>
    <lastmod>2026-02-15T03:03:54Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://gsom.baremetalcyber.com/episodes/episode-63-essential-terms-plain-language-glossary-for-fast-recall</loc>
    <lastmod>2026-02-15T03:04:40Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://gsom.baremetalcyber.com/episodes/episode-64-final-review-weave-every-gsom-objective-into-one-coherent-soc-operating-model</loc>
    <lastmod>2026-02-15T03:04:48Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://gsom.baremetalcyber.com/episodes/episode-65-exam-day-tactics-mental-models-for-triage-and-confident-gsom-answers</loc>
    <lastmod>2026-02-15T03:05:01Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://gsom.baremetalcyber.com/episodes/welcome-to-the-giac-gsom-audio-course</loc>
    <lastmod>2026-02-15T03:00:35Z</lastmod>
    <priority>0.9</priority>
  </url>
</urlset>
