<?xml version="1.0" encoding="UTF-8"?>
<urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9">
  <url>
    <loc>https://cdpse.baremetalcyber.com/</loc>
    <lastmod>2026-03-17T20:16:13Z</lastmod>
    <priority>1.0</priority>
  </url>
  <url>
    <loc>https://cdpse.baremetalcyber.com/episodes</loc>
    <lastmod>2026-03-17T20:16:13Z</lastmod>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://cdpse.baremetalcyber.com/recommended</loc>
    <lastmod>2026-03-17T20:16:13Z</lastmod>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://cdpse.baremetalcyber.com/contact-us</loc>
    <lastmod>2026-03-17T20:16:13Z</lastmod>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://cdpse.baremetalcyber.com/all-in-one-course-hub</loc>
    <lastmod>2026-03-17T20:16:13Z</lastmod>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://cdpse.baremetalcyber.com/study-guide</loc>
    <lastmod>2026-03-17T20:16:13Z</lastmod>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://cdpse.baremetalcyber.com/flash-cards</loc>
    <lastmod>2026-03-17T20:16:13Z</lastmod>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://cdpse.baremetalcyber.com/subscribe</loc>
    <lastmod>2026-03-17T20:16:13Z</lastmod>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://cdpse.baremetalcyber.com/episodes/episode-1-decode-what-the-cdpse-exam-actually-tests-across-real-privacy-engineering-work</loc>
    <lastmod>2026-02-15T18:11:29Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cdpse.baremetalcyber.com/episodes/episode-2-build-a-spoken-30-day-cdpse-study-plan-that-tracks-every-tested-objective</loc>
    <lastmod>2026-02-15T18:11:44Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cdpse.baremetalcyber.com/episodes/episode-3-exam-acronyms-high-yield-audio-reference-for-fast-cdpse-recall</loc>
    <lastmod>2026-02-15T18:11:59Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cdpse.baremetalcyber.com/episodes/episode-4-recognize-personal-information-precisely-across-systems-contexts-and-data-types</loc>
    <lastmod>2026-02-15T18:12:15Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cdpse.baremetalcyber.com/episodes/episode-5-apply-privacy-principles-like-privacy-by-design-consent-and-transparency-end-to-end-domain-1a-2-privacy-principles</loc>
    <lastmod>2026-02-15T18:12:31Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cdpse.baremetalcyber.com/episodes/episode-6-interpret-privacy-laws-and-regulations-as-concrete-testable-engineering-requirements-domain-1a-3-privacy-laws-and-regulations</loc>
    <lastmod>2026-02-15T18:12:44Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cdpse.baremetalcyber.com/episodes/episode-7-handle-cross-border-and-sector-rules-without-losing-control-of-privacy-obligations-domain-1a-3-privacy-laws-and-regulations</loc>
    <lastmod>2026-02-15T18:18:43Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cdpse.baremetalcyber.com/episodes/episode-8-build-privacy-documentation-that-survives-audits-incidents-and-organizational-change-domain-1a-4-privacy-documentation</loc>
    <lastmod>2026-02-15T18:19:03Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cdpse.baremetalcyber.com/episodes/episode-9-define-privacy-roles-culture-and-responsibilities-so-accountability-is-real-domain-1b-1-organizational-culture-structure-and-responsibilities</loc>
    <lastmod>2026-02-15T18:19:23Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cdpse.baremetalcyber.com/episodes/episode-10-engineer-vendor-and-supply-chain-privacy-controls-that-hold-up-under-pressure-domain-1b-2-vendor-and-supply-chain-management</loc>
    <lastmod>2026-02-15T18:19:49Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cdpse.baremetalcyber.com/episodes/episode-11-run-privacy-incident-management-with-clear-triggers-evidence-and-remediation-flow-domain-1b-3-incident-management</loc>
    <lastmod>2026-02-15T18:20:05Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cdpse.baremetalcyber.com/episodes/episode-12-deliver-data-subject-rights-requests-and-notification-with-speed-and-correctness-domain-1b-4-data-subject-rights-requests-and-notification</loc>
    <lastmod>2026-02-15T18:20:24Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cdpse.baremetalcyber.com/episodes/episode-13-spaced-retrieval-review-rapid-recall-for-domain-1-governance-and-operations-essentials-domain-1a-1-to-1b-4</loc>
    <lastmod>2026-02-15T18:20:41Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cdpse.baremetalcyber.com/episodes/episode-14-build-a-privacy-risk-management-process-that-stays-consistent-and-repeatable-domain-2a-1-risk-management-process-and-policies</loc>
    <lastmod>2026-02-15T18:21:01Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cdpse.baremetalcyber.com/episodes/episode-15-perform-privacy-focused-assessments-like-pias-with-practical-scope-and-outputs-domain-2a-2-privacy-focused-assessment</loc>
    <lastmod>2026-02-15T18:21:15Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cdpse.baremetalcyber.com/episodes/episode-16-make-privacy-training-and-awareness-stick-in-real-teams-and-workflows-domain-2a-3-privacy-training-and-awareness</loc>
    <lastmod>2026-02-15T18:21:36Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cdpse.baremetalcyber.com/episodes/episode-17-identify-privacy-threats-and-vulnerabilities-before-they-become-operational-failures-domain-2a-4-threats-and-vulnerabilities</loc>
    <lastmod>2026-02-15T18:21:52Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cdpse.baremetalcyber.com/episodes/episode-18-choose-risk-responses-that-balance-privacy-delivery-and-business-reality-domain-2a-5-risk-response</loc>
    <lastmod>2026-02-15T18:22:11Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cdpse.baremetalcyber.com/episodes/episode-19-use-privacy-frameworks-to-structure-controls-evidence-and-governance-decisions-domain-2b-1-privacy-frameworks</loc>
    <lastmod>2026-02-15T18:22:27Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cdpse.baremetalcyber.com/episodes/episode-20-produce-evidence-and-artifacts-that-prove-privacy-controls-actually-work-domain-2b-2-evidence-and-artifacts</loc>
    <lastmod>2026-02-15T18:22:49Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cdpse.baremetalcyber.com/episodes/episode-21-build-a-data-inventory-you-can-trust-and-keep-it-current-domain-2c-1-data-inventory</loc>
    <lastmod>2026-02-15T18:23:05Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cdpse.baremetalcyber.com/episodes/episode-22-map-data-flows-end-to-end-so-privacy-risk-is-visible-not-guessed-domain-2c-2-data-flow</loc>
    <lastmod>2026-02-15T18:23:23Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cdpse.baremetalcyber.com/episodes/episode-23-classify-data-properly-to-drive-the-right-privacy-safeguards-domain-2c-3-data-classification</loc>
    <lastmod>2026-02-15T18:23:39Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cdpse.baremetalcyber.com/episodes/episode-24-use-data-minimization-to-reduce-exposure-without-breaking-the-business-domain-2c-4-data-minimization</loc>
    <lastmod>2026-02-15T18:24:23Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cdpse.baremetalcyber.com/episodes/episode-25-define-retention-and-disposal-that-is-enforceable-across-systems-and-vendors-domain-2c-5-retention-and-disposal</loc>
    <lastmod>2026-02-15T18:24:43Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cdpse.baremetalcyber.com/episodes/episode-26-build-consent-management-that-is-measurable-reversible-and-reliable-domain-2c-6-consent-management</loc>
    <lastmod>2026-02-15T18:25:03Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cdpse.baremetalcyber.com/episodes/episode-27-apply-purpose-limitation-so-data-use-stays-aligned-with-promises-and-approvals-domain-2c-7-purpose-limitation</loc>
    <lastmod>2026-02-15T18:25:17Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cdpse.baremetalcyber.com/episodes/episode-28-manage-privacy-in-third-party-data-sharing-with-clear-boundaries-and-controls-domain-2c-8-data-sharing-and-third-parties</loc>
    <lastmod>2026-02-15T18:25:39Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cdpse.baremetalcyber.com/episodes/episode-29-protect-privacy-in-monitoring-logging-and-observability-without-losing-visibility-domain-2c-9-monitoring-and-logging</loc>
    <lastmod>2026-02-15T18:25:58Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cdpse.baremetalcyber.com/episodes/episode-30-spaced-retrieval-review-data-inventory-flows-classification-minimization-and-retention-domain-2c-1-to-2c-9</loc>
    <lastmod>2026-02-15T18:26:13Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cdpse.baremetalcyber.com/episodes/episode-31-spaced-retrieval-review-data-life-cycle-management-from-collection-to-destruction-domain-3a-1-to-3b-4</loc>
    <lastmod>2026-02-15T18:26:36Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cdpse.baremetalcyber.com/episodes/episode-32-choose-infrastructure-and-platform-approaches-for-privacy-across-legacy-and-cloud-domain-4a-1-infrastructure-and-platform-technology</loc>
    <lastmod>2026-02-15T18:31:15Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cdpse.baremetalcyber.com/episodes/episode-33-secure-devices-and-endpoints-so-personal-information-exposure-stays-contained-domain-4a-2-devices-and-endpoints</loc>
    <lastmod>2026-02-15T18:31:37Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cdpse.baremetalcyber.com/episodes/episode-34-design-connectivity-choices-that-reduce-privacy-risk-across-networks-and-services-domain-4a-3-connectivity</loc>
    <lastmod>2026-02-15T18:32:01Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cdpse.baremetalcyber.com/episodes/episode-35-embed-privacy-into-the-secure-development-life-cycle-without-slowing-delivery-domain-4a-4-secure-development-life-cycle</loc>
    <lastmod>2026-02-15T18:32:24Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cdpse.baremetalcyber.com/episodes/episode-36-engineer-apis-and-cloud-native-services-to-prevent-silent-privacy-failure-modes-domain-4a-5-apis-and-cloud-native-services</loc>
    <lastmod>2026-02-15T18:32:48Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cdpse.baremetalcyber.com/episodes/episode-37-operationalize-asset-management-so-data-assets-and-owners-are-never-ambiguous-domain-4b-1-asset-management</loc>
    <lastmod>2026-02-15T18:33:04Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cdpse.baremetalcyber.com/episodes/episode-38-implement-identity-and-access-management-that-enforces-least-privilege-for-privacy-domain-4b-2-identity-and-access-management</loc>
    <lastmod>2026-02-15T18:33:31Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cdpse.baremetalcyber.com/episodes/episode-39-maintain-patching-and-hardening-discipline-that-protects-privacy-at-scale-domain-4b-3-patch-management-and-hardening</loc>
    <lastmod>2026-02-15T18:33:56Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cdpse.baremetalcyber.com/episodes/episode-40-select-transport-protocols-that-protect-privacy-across-modern-and-legacy-paths-domain-4b-4-communication-and-transport-protocols</loc>
    <lastmod>2026-02-15T18:34:11Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cdpse.baremetalcyber.com/episodes/episode-41-use-encryption-and-hashing-correctly-so-privacy-goals-match-cryptographic-reality-domain-4b-5-encryption-and-hashing</loc>
    <lastmod>2026-02-15T18:34:31Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cdpse.baremetalcyber.com/episodes/episode-42-build-monitoring-and-logging-that-supports-privacy-without-creating-new-exposure-domain-4b-6-monitoring-and-logging</loc>
    <lastmod>2026-02-15T18:34:44Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cdpse.baremetalcyber.com/episodes/episode-43-implement-consent-tagging-that-travels-with-data-and-survives-system-boundaries-domain-4c-1-consent-tagging</loc>
    <lastmod>2026-02-15T18:35:03Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cdpse.baremetalcyber.com/episodes/episode-44-govern-tracking-technologies-and-cookie-management-with-clear-enforceable-rules-domain-4c-2-tracking-technologies</loc>
    <lastmod>2026-02-15T18:35:16Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cdpse.baremetalcyber.com/episodes/episode-45-apply-anonymization-and-pseudonymization-with-honest-limits-and-verification-domain-4c-3-anonymization-and-pseudonymization</loc>
    <lastmod>2026-02-15T18:35:35Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cdpse.baremetalcyber.com/episodes/episode-46-choose-privacy-enhancing-technologies-that-match-threats-data-and-architecture-domain-4c-4-privacy-enhancing-technologies</loc>
    <lastmod>2026-02-15T18:35:48Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cdpse.baremetalcyber.com/episodes/episode-47-address-ai-and-ml-privacy-considerations-before-models-ship-to-production-domain-4c-5-ai-machine-learning-ml-considerations</loc>
    <lastmod>2026-02-15T18:36:09Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cdpse.baremetalcyber.com/episodes/episode-48-detect-ai-and-ml-privacy-pitfalls-like-inference-drift-and-overcollection-risks-domain-4c-5-ai-machine-learning-ml-considerations</loc>
    <lastmod>2026-02-15T18:36:24Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cdpse.baremetalcyber.com/episodes/episode-49-spaced-retrieval-review-privacy-engineering-decisions-across-stacks-controls-and-data-domain-4a-1-to-4c-5</loc>
    <lastmod>2026-02-15T18:36:44Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cdpse.baremetalcyber.com/episodes/episode-50-identify-internal-and-external-requirements-that-shape-every-privacy-program-decision-task-1</loc>
    <lastmod>2026-02-15T18:36:58Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cdpse.baremetalcyber.com/episodes/episode-51-review-programs-for-legal-alignment-best-practices-and-data-subject-expectations-task-2</loc>
    <lastmod>2026-02-15T18:37:20Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cdpse.baremetalcyber.com/episodes/episode-52-advise-on-data-life-cycle-policies-so-data-governance-reflects-privacy-reality-task-3</loc>
    <lastmod>2026-02-15T18:38:08Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cdpse.baremetalcyber.com/episodes/episode-53-design-and-evaluate-technical-and-operational-controls-for-classification-and-life-cycle-task-4</loc>
    <lastmod>2026-02-15T18:38:28Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cdpse.baremetalcyber.com/episodes/episode-54-perform-pias-and-privacy-focused-assessments-without-missing-real-world-impacts-task-5</loc>
    <lastmod>2026-02-15T18:38:49Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cdpse.baremetalcyber.com/episodes/episode-55-integrate-privacy-principles-into-procedures-and-operational-manuals-people-follow-task-6</loc>
    <lastmod>2026-02-15T18:39:05Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cdpse.baremetalcyber.com/episodes/episode-56-collaborate-to-ensure-privacy-by-design-is-applied-through-build-and-rollout-task-7</loc>
    <lastmod>2026-02-15T18:39:27Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cdpse.baremetalcyber.com/episodes/episode-57-identify-and-assess-privacy-threats-and-vulnerabilities-with-repeatable-rigor-task-8</loc>
    <lastmod>2026-02-15T18:39:41Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cdpse.baremetalcyber.com/episodes/episode-58-evaluate-vendor-contracts-slas-and-practices-then-monitor-for-compliance-evidence-task-9</loc>
    <lastmod>2026-02-15T18:39:59Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cdpse.baremetalcyber.com/episodes/episode-59-participate-in-incident-management-to-address-privacy-impacts-and-drive-remediation-task-10</loc>
    <lastmod>2026-02-15T18:40:14Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cdpse.baremetalcyber.com/episodes/episode-60-collaborate-with-stakeholders-to-resolve-privacy-compliance-gaps-and-risk-responses-task-11</loc>
    <lastmod>2026-02-15T18:40:31Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cdpse.baremetalcyber.com/episodes/episode-61-evaluate-information-architecture-choices-that-enable-privacy-by-design-outcomes-task-12</loc>
    <lastmod>2026-02-15T18:40:49Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cdpse.baremetalcyber.com/episodes/episode-62-track-regulatory-change-emerging-threats-and-pets-so-the-program-stays-current-task-13</loc>
    <lastmod>2026-02-15T18:41:11Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cdpse.baremetalcyber.com/episodes/episode-63-keep-personal-information-inventory-and-dataflows-current-with-durable-processes-task-14</loc>
    <lastmod>2026-02-15T18:41:45Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cdpse.baremetalcyber.com/episodes/episode-64-advise-on-personal-information-classification-so-risk-and-controls-stay-consistent-task-15</loc>
    <lastmod>2026-02-15T18:42:00Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cdpse.baremetalcyber.com/episodes/episode-65-build-metrics-that-report-privacy-program-performance-in-language-leaders-trust-task-16</loc>
    <lastmod>2026-02-15T18:42:22Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cdpse.baremetalcyber.com/episodes/episode-66-advocate-for-privacy-maturity-improvements-aligned-to-organizational-objectives-task-17</loc>
    <lastmod>2026-02-15T18:42:35Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cdpse.baremetalcyber.com/episodes/episode-67-create-educational-content-and-training-that-builds-a-privacy-aware-culture-task-18</loc>
    <lastmod>2026-02-15T18:42:59Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cdpse.baremetalcyber.com/episodes/episode-68-promote-accountability-fairness-and-transparency-across-the-full-data-life-cycle-task-19</loc>
    <lastmod>2026-02-15T18:43:15Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cdpse.baremetalcyber.com/episodes/episode-69-exam-day-tactics-a-calm-mental-model-for-triage-time-and-confidence-domains-1-4</loc>
    <lastmod>2026-02-15T18:43:42Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cdpse.baremetalcyber.com/episodes/episode-70-essential-terms-plain-language-glossary-for-fast-cdpse-recall-domains-1-4</loc>
    <lastmod>2026-02-15T18:44:18Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cdpse.baremetalcyber.com/episodes/welcome-to-the-isaca-cdpse-audio-course</loc>
    <lastmod>2026-02-15T18:44:41Z</lastmod>
    <priority>0.9</priority>
  </url>
</urlset>
