<?xml version="1.0" encoding="UTF-8"?>
<urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9">
  <url>
    <loc>https://aaia.baremetalcyber.com/</loc>
    <lastmod>2026-03-17T20:32:41Z</lastmod>
    <priority>1.0</priority>
  </url>
  <url>
    <loc>https://aaia.baremetalcyber.com/episodes</loc>
    <lastmod>2026-03-17T20:32:41Z</lastmod>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://aaia.baremetalcyber.com/all-in-one-course-hub</loc>
    <lastmod>2026-03-17T20:32:41Z</lastmod>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://aaia.baremetalcyber.com/flash-cards</loc>
    <lastmod>2026-03-17T20:32:41Z</lastmod>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://aaia.baremetalcyber.com/study-guide</loc>
    <lastmod>2026-03-17T20:32:41Z</lastmod>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://aaia.baremetalcyber.com/recommended</loc>
    <lastmod>2026-03-17T20:32:41Z</lastmod>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://aaia.baremetalcyber.com/contact-us</loc>
    <lastmod>2026-03-17T20:32:41Z</lastmod>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://aaia.baremetalcyber.com/subscribe</loc>
    <lastmod>2026-03-17T20:32:41Z</lastmod>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://aaia.baremetalcyber.com/episodes/episode-1-exam-orientation-and-a-spoken-30-day-plan-to-pass-aaism-tasks-1-22</loc>
    <lastmod>2026-02-15T03:38:57Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://aaia.baremetalcyber.com/episodes/episode-2-understand-how-aaism-questions-map-to-real-ai-security-work-tasks-1-22</loc>
    <lastmod>2026-02-15T03:39:21Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://aaia.baremetalcyber.com/episodes/episode-3-walk-through-an-ai-system-life-cycle-in-clear-simple-language-task-22</loc>
    <lastmod>2026-02-15T03:39:37Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://aaia.baremetalcyber.com/episodes/episode-4-exam-acronyms-high-yield-audio-reference-for-aaism-daily-practice-tasks-1-22</loc>
    <lastmod>2026-02-15T03:39:54Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://aaia.baremetalcyber.com/episodes/episode-5-domain-1-overview-lead-ai-governance-and-program-management-confidently-task-1</loc>
    <lastmod>2026-02-15T03:40:14Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://aaia.baremetalcyber.com/episodes/episode-6-build-an-ai-governance-charter-that-aligns-to-business-objectives-task-1</loc>
    <lastmod>2026-02-15T03:40:31Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://aaia.baremetalcyber.com/episodes/episode-7-define-ai-roles-and-responsibilities-so-decisions-are-owned-and-clear-task-1</loc>
    <lastmod>2026-02-15T03:40:58Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://aaia.baremetalcyber.com/episodes/episode-8-set-governance-routines-that-keep-ai-security-decisions-consistent-task-1</loc>
    <lastmod>2026-02-15T03:41:16Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://aaia.baremetalcyber.com/episodes/episode-9-use-industry-frameworks-to-organize-ai-governance-and-security-work-task-3</loc>
    <lastmod>2026-02-15T03:41:36Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://aaia.baremetalcyber.com/episodes/episode-10-apply-ethical-principles-when-ai-outcomes-create-real-business-risk-task-3</loc>
    <lastmod>2026-02-15T03:41:58Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://aaia.baremetalcyber.com/episodes/episode-11-translate-ai-regulations-into-practical-testable-security-requirements-task-3</loc>
    <lastmod>2026-02-15T03:42:17Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://aaia.baremetalcyber.com/episodes/episode-12-plan-ai-impact-assessments-early-so-compliance-is-not-an-afterthought-task-8</loc>
    <lastmod>2026-02-15T03:42:41Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://aaia.baremetalcyber.com/episodes/episode-13-perform-ai-impact-assessments-with-scope-evidence-and-actionable-results-task-8</loc>
    <lastmod>2026-02-15T03:43:00Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://aaia.baremetalcyber.com/episodes/episode-14-prove-conformity-by-building-defensible-evidence-for-regulators-and-contracts-task-8</loc>
    <lastmod>2026-02-15T03:43:22Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://aaia.baremetalcyber.com/episodes/episode-15-write-ai-security-policies-people-can-follow-without-guessing-task-2</loc>
    <lastmod>2026-02-15T03:43:37Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://aaia.baremetalcyber.com/episodes/episode-16-turn-policies-into-standards-guidelines-and-step-by-step-procedures-task-2</loc>
    <lastmod>2026-02-15T03:44:00Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://aaia.baremetalcyber.com/episodes/episode-17-keep-ai-security-policies-current-using-ownership-and-change-control-task-2</loc>
    <lastmod>2026-02-15T03:44:14Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://aaia.baremetalcyber.com/episodes/episode-18-essential-terms-plain-language-glossary-for-fast-accurate-recall-tasks-1-22</loc>
    <lastmod>2026-02-15T03:44:34Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://aaia.baremetalcyber.com/episodes/episode-19-create-acceptable-use-guidelines-that-reduce-risky-ai-behavior-task-21</loc>
    <lastmod>2026-02-15T03:44:52Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://aaia.baremetalcyber.com/episodes/episode-20-build-ai-security-awareness-training-that-sticks-in-daily-work-task-21</loc>
    <lastmod>2026-02-15T03:45:12Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://aaia.baremetalcyber.com/episodes/episode-21-refresh-training-when-threats-tools-and-regulations-change-task-21</loc>
    <lastmod>2026-02-15T03:45:29Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://aaia.baremetalcyber.com/episodes/episode-22-inventory-ai-assets-models-prompts-data-and-key-dependencies-task-13</loc>
    <lastmod>2026-02-15T03:46:30Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://aaia.baremetalcyber.com/episodes/episode-23-classify-ai-assets-by-sensitivity-criticality-and-compliance-scope-task-13</loc>
    <lastmod>2026-02-15T03:46:44Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://aaia.baremetalcyber.com/episodes/episode-24-keep-the-ai-inventory-accurate-with-routine-governance-checks-task-13</loc>
    <lastmod>2026-02-15T03:47:00Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://aaia.baremetalcyber.com/episodes/episode-25-identify-data-risks-across-the-ai-life-cycle-leaks-and-tampering-task-14</loc>
    <lastmod>2026-02-15T03:47:16Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://aaia.baremetalcyber.com/episodes/episode-26-protect-training-and-test-data-with-access-control-and-secure-storage-task-14</loc>
    <lastmod>2026-02-15T03:47:38Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://aaia.baremetalcyber.com/episodes/episode-27-preserve-data-integrity-so-models-stay-reliable-and-trustworthy-task-14</loc>
    <lastmod>2026-02-15T03:47:53Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://aaia.baremetalcyber.com/episodes/episode-28-manage-retention-and-deletion-to-reduce-long-term-ai-data-exposure-task-14</loc>
    <lastmod>2026-02-15T03:48:18Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://aaia.baremetalcyber.com/episodes/episode-29-build-an-ai-security-program-that-fits-the-enterprise-security-program-task-19</loc>
    <lastmod>2026-02-15T03:48:32Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://aaia.baremetalcyber.com/episodes/episode-30-define-ai-security-metrics-leaders-can-understand-and-act-on-task-18</loc>
    <lastmod>2026-02-15T03:49:18Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://aaia.baremetalcyber.com/episodes/episode-31-monitor-ai-metrics-to-spot-misuse-drift-and-early-incident-signals-task-18</loc>
    <lastmod>2026-02-15T03:49:37Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://aaia.baremetalcyber.com/episodes/episode-32-use-metrics-to-prioritize-work-and-prove-security-program-value-task-18</loc>
    <lastmod>2026-02-15T03:49:53Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://aaia.baremetalcyber.com/episodes/episode-33-review-ai-security-tools-by-coverage-gaps-and-operational-fit-task-19</loc>
    <lastmod>2026-02-15T03:50:06Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://aaia.baremetalcyber.com/episodes/episode-34-implement-ai-security-tools-into-monitoring-alerting-and-response-workflows-task-19</loc>
    <lastmod>2026-02-15T03:50:30Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://aaia.baremetalcyber.com/episodes/episode-35-operationalize-tools-with-tuning-ownership-and-measurable-outcomes-task-19</loc>
    <lastmod>2026-02-15T03:50:46Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://aaia.baremetalcyber.com/episodes/episode-36-domain-1-quick-review-governance-policies-assets-metrics-and-training-tasks-1-3</loc>
    <lastmod>2026-02-15T03:51:01Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://aaia.baremetalcyber.com/episodes/episode-37-investigate-ai-security-incidents-by-collecting-the-right-evidence-fast-task-15</loc>
    <lastmod>2026-02-15T03:51:21Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://aaia.baremetalcyber.com/episodes/episode-38-document-ai-incidents-clearly-for-regulators-contracts-and-executive-updates-task-15</loc>
    <lastmod>2026-02-15T03:51:41Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://aaia.baremetalcyber.com/episodes/episode-39-report-ai-security-incidents-on-time-without-losing-accuracy-task-15</loc>
    <lastmod>2026-02-15T03:51:59Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://aaia.baremetalcyber.com/episodes/episode-40-contain-ai-incidents-quickly-by-limiting-access-and-stopping-risky-flows-task-16</loc>
    <lastmod>2026-02-15T03:52:20Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://aaia.baremetalcyber.com/episodes/episode-41-notify-and-escalate-during-ai-incidents-with-the-right-triggers-task-16</loc>
    <lastmod>2026-02-15T03:52:34Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://aaia.baremetalcyber.com/episodes/episode-42-eradicate-root-causes-and-recover-safely-after-ai-security-incidents-task-16</loc>
    <lastmod>2026-02-15T03:53:37Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://aaia.baremetalcyber.com/episodes/episode-43-add-ai-systems-to-business-continuity-plans-without-hidden-weak-points-task-17</loc>
    <lastmod>2026-02-15T03:53:53Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://aaia.baremetalcyber.com/episodes/episode-44-set-recovery-goals-for-ai-services-data-pipelines-and-vendors-task-17</loc>
    <lastmod>2026-02-15T03:54:10Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://aaia.baremetalcyber.com/episodes/episode-45-plan-for-vendor-outages-and-safe-degraded-modes-in-ai-systems-task-17</loc>
    <lastmod>2026-02-15T03:54:24Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://aaia.baremetalcyber.com/episodes/episode-46-domain-1-recap-drill-pick-the-right-task-under-pressure-tasks-1-21</loc>
    <lastmod>2026-02-15T03:54:42Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://aaia.baremetalcyber.com/episodes/episode-47-domain-2-overview-manage-ai-risk-while-enabling-business-opportunity-task-4</loc>
    <lastmod>2026-02-15T03:54:59Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://aaia.baremetalcyber.com/episodes/episode-48-run-the-ai-risk-management-life-cycle-from-intake-to-monitoring-task-4</loc>
    <lastmod>2026-02-15T03:55:14Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://aaia.baremetalcyber.com/episodes/episode-49-connect-ai-risks-to-enterprise-risk-reporting-and-decision-making-task-4</loc>
    <lastmod>2026-02-15T03:55:28Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://aaia.baremetalcyber.com/episodes/episode-50-assign-ai-risk-owners-and-approvals-so-accountability-is-never-unclear-task-4</loc>
    <lastmod>2026-02-15T03:55:42Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://aaia.baremetalcyber.com/episodes/episode-51-identify-the-ai-threat-landscape-using-realistic-abuse-cases-task-5</loc>
    <lastmod>2026-02-15T03:59:23Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://aaia.baremetalcyber.com/episodes/episode-52-assess-ai-threats-by-likelihood-and-impact-not-hype-and-fear-task-5</loc>
    <lastmod>2026-02-15T03:59:52Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://aaia.baremetalcyber.com/episodes/episode-53-keep-threat-understanding-current-as-attackers-and-tools-evolve-task-5</loc>
    <lastmod>2026-02-15T04:00:10Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://aaia.baremetalcyber.com/episodes/episode-54-monitor-internal-changes-that-require-ai-risk-reassessment-task-6</loc>
    <lastmod>2026-02-15T04:00:32Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://aaia.baremetalcyber.com/episodes/episode-55-monitor-external-changes-like-laws-vendors-and-new-ai-capabilities-task-6</loc>
    <lastmod>2026-02-15T04:00:53Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://aaia.baremetalcyber.com/episodes/episode-56-build-a-reassessment-cadence-that-prevents-stale-ai-risk-decisions-task-6</loc>
    <lastmod>2026-02-15T04:01:09Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://aaia.baremetalcyber.com/episodes/episode-57-design-ai-security-testing-that-matches-your-model-data-and-use-case-task-7</loc>
    <lastmod>2026-02-15T04:01:30Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://aaia.baremetalcyber.com/episodes/episode-58-build-ai-vulnerability-management-from-discovery-to-remediation-task-7</loc>
    <lastmod>2026-02-15T04:01:44Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://aaia.baremetalcyber.com/episodes/episode-59-retest-and-document-fixes-so-ai-vulnerabilities-stay-closed-task-7</loc>
    <lastmod>2026-02-15T04:02:19Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://aaia.baremetalcyber.com/episodes/episode-60-embed-vendor-ai-security-requirements-before-procurement-begins-task-9</loc>
    <lastmod>2026-02-15T04:02:36Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://aaia.baremetalcyber.com/episodes/episode-61-audit-ai-deployment-controls-approvals-gates-and-rollback-readiness-task-8</loc>
    <lastmod>2026-02-15T04:03:00Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://aaia.baremetalcyber.com/episodes/episode-62-audit-ai-monitoring-controls-drift-performance-and-incident-triggers-task-8</loc>
    <lastmod>2026-02-15T04:03:49Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://aaia.baremetalcyber.com/episodes/episode-63-audit-ai-decommissioning-retirement-criteria-and-data-cleanup-duties-task-8</loc>
    <lastmod>2026-02-15T04:04:20Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://aaia.baremetalcyber.com/episodes/episode-64-evaluate-algorithms-and-models-for-alignment-to-business-objectives-task-9</loc>
    <lastmod>2026-02-15T04:04:45Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://aaia.baremetalcyber.com/episodes/episode-65-test-model-alignment-to-policy-what-it-should-do-versus-what-it-does-task-9</loc>
    <lastmod>2026-02-15T04:05:12Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://aaia.baremetalcyber.com/episodes/episode-66-evaluate-model-explainability-expectations-without-overpromising-certainty-task-9</loc>
    <lastmod>2026-02-15T04:05:45Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://aaia.baremetalcyber.com/episodes/episode-67-evaluate-model-performance-claims-using-audit-grade-skepticism-task-9</loc>
    <lastmod>2026-02-15T04:06:16Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://aaia.baremetalcyber.com/episodes/episode-68-evaluate-change-management-for-ai-where-updates-can-change-outcomes-task-13</loc>
    <lastmod>2026-02-15T04:06:35Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://aaia.baremetalcyber.com/episodes/episode-69-audit-model-update-approvals-testing-evidence-and-release-readiness-task-13</loc>
    <lastmod>2026-02-15T04:07:03Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://aaia.baremetalcyber.com/episodes/episode-70-audit-emergency-changes-for-ai-when-risk-forces-fast-decisions-task-13</loc>
    <lastmod>2026-02-15T04:07:26Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://aaia.baremetalcyber.com/episodes/episode-71-evaluate-configuration-management-for-ai-across-code-data-and-models-task-14</loc>
    <lastmod>2026-02-15T04:08:09Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://aaia.baremetalcyber.com/episodes/episode-72-prove-reproducibility-model-versions-parameters-and-training-snapshots-task-14</loc>
    <lastmod>2026-02-15T04:08:36Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://aaia.baremetalcyber.com/episodes/episode-73-audit-access-to-model-artifacts-pipelines-and-configuration-repositories-task-14</loc>
    <lastmod>2026-02-15T04:09:10Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://aaia.baremetalcyber.com/episodes/episode-74-supervise-ai-outputs-detect-harmful-decisions-before-customers-do-domain-2d</loc>
    <lastmod>2026-02-15T04:09:30Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://aaia.baremetalcyber.com/episodes/episode-75-build-human-oversight-triggers-for-ai-decisions-that-need-escalation-domain-2d</loc>
    <lastmod>2026-02-15T04:10:27Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://aaia.baremetalcyber.com/episodes/episode-76-validate-supervision-of-ai-impacts-on-fairness-safety-and-quality-domain-2d</loc>
    <lastmod>2026-02-15T04:11:04Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://aaia.baremetalcyber.com/episodes/episode-77-test-ai-solutions-for-accuracy-robustness-bias-and-safety-domain-2e</loc>
    <lastmod>2026-02-15T04:11:33Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://aaia.baremetalcyber.com/episodes/episode-78-choose-ai-testing-methods-that-match-the-risk-of-the-use-case-domain-2e</loc>
    <lastmod>2026-02-15T04:11:51Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://aaia.baremetalcyber.com/episodes/episode-79-evaluate-the-design-and-effectiveness-of-ai-specific-controls-task-12</loc>
    <lastmod>2026-02-15T04:12:26Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://aaia.baremetalcyber.com/episodes/episode-80-prove-ai-controls-work-over-time-not-only-on-launch-day-task-12</loc>
    <lastmod>2026-02-15T04:12:56Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://aaia.baremetalcyber.com/episodes/episode-81-evaluate-ai-threats-and-vulnerabilities-that-do-not-exist-in-normal-it-domain-2f</loc>
    <lastmod>2026-02-15T04:13:19Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://aaia.baremetalcyber.com/episodes/episode-82-understand-data-poisoning-evasion-and-model-theft-in-plain-language-domain-2f</loc>
    <lastmod>2026-02-15T04:13:51Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://aaia.baremetalcyber.com/episodes/episode-83-evaluate-ai-threat-and-vulnerability-management-programs-for-real-coverage-task-19</loc>
    <lastmod>2026-02-15T04:14:22Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://aaia.baremetalcyber.com/episodes/episode-84-build-threat-monitoring-that-catches-abuse-of-models-and-prompts-early-task-19</loc>
    <lastmod>2026-02-15T04:14:52Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://aaia.baremetalcyber.com/episodes/episode-85-evaluate-identity-and-access-management-for-ai-models-data-and-keys-task-16</loc>
    <lastmod>2026-02-15T04:15:26Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://aaia.baremetalcyber.com/episodes/episode-86-audit-least-privilege-for-pipelines-service-accounts-and-model-endpoints-task-16</loc>
    <lastmod>2026-02-15T04:16:02Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://aaia.baremetalcyber.com/episodes/episode-87-evaluate-ai-vendors-and-supply-chain-controls-where-your-visibility-ends-task-10</loc>
    <lastmod>2026-02-15T04:16:35Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://aaia.baremetalcyber.com/episodes/episode-88-audit-ai-vendor-claims-contracts-and-control-evidence-without-getting-sold-task-10</loc>
    <lastmod>2026-02-15T04:17:32Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://aaia.baremetalcyber.com/episodes/episode-89-evaluate-ai-problem-and-incident-management-programs-for-fast-containment-task-20</loc>
    <lastmod>2026-02-15T04:18:13Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://aaia.baremetalcyber.com/episodes/episode-90-run-ai-incident-response-detect-triage-contain-recover-and-learn-domain-2g</loc>
    <lastmod>2026-02-15T04:18:47Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://aaia.baremetalcyber.com/episodes/episode-91-spaced-retrieval-review-domain-2-operations-and-controls-simplified-review-domain-2</loc>
    <lastmod>2026-02-15T04:19:15Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://aaia.baremetalcyber.com/episodes/episode-92-plan-an-ai-audit-scope-criteria-stakeholders-and-timing-choices-domain-3a</loc>
    <lastmod>2026-02-15T04:19:56Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://aaia.baremetalcyber.com/episodes/episode-93-build-ai-audit-objectives-that-connect-directly-to-business-risk-domain-3a</loc>
    <lastmod>2026-02-15T04:20:24Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://aaia.baremetalcyber.com/episodes/episode-94-choose-audit-criteria-for-ai-using-policy-risk-and-outcomes-domain-3a</loc>
    <lastmod>2026-02-15T04:20:55Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://aaia.baremetalcyber.com/episodes/episode-95-use-audit-techniques-tailored-to-ai-systems-not-generic-checklists-domain-3b</loc>
    <lastmod>2026-02-15T04:21:22Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://aaia.baremetalcyber.com/episodes/episode-96-design-sampling-for-ai-decisions-that-reveals-bias-and-failure-modes-domain-3b</loc>
    <lastmod>2026-02-15T04:21:46Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://aaia.baremetalcyber.com/episodes/episode-97-test-ai-controls-with-evidence-not-opinions-or-vendor-demos-domain-3b</loc>
    <lastmod>2026-02-15T04:22:12Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://aaia.baremetalcyber.com/episodes/episode-98-collect-ai-audit-evidence-logs-lineage-artifacts-and-change-records-domain-3c</loc>
    <lastmod>2026-02-15T04:22:38Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://aaia.baremetalcyber.com/episodes/episode-99-validate-evidence-integrity-when-models-and-data-change-over-time-domain-3c</loc>
    <lastmod>2026-02-15T04:23:16Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://aaia.baremetalcyber.com/episodes/episode-100-audit-data-quality-before-trusting-any-ai-output-or-model-score-domain-3d</loc>
    <lastmod>2026-02-15T04:23:38Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://aaia.baremetalcyber.com/episodes/episode-101-use-analytics-to-detect-drift-anomalies-and-control-breakdown-trends-domain-3d</loc>
    <lastmod>2026-02-15T04:24:14Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://aaia.baremetalcyber.com/episodes/episode-102-deliver-ai-audit-reports-executives-understand-and-teams-can-act-on-domain-3e</loc>
    <lastmod>2026-02-15T04:24:57Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://aaia.baremetalcyber.com/episodes/episode-103-write-ai-findings-that-tie-cause-risk-evidence-and-remediation-together-domain-3e</loc>
    <lastmod>2026-02-15T04:25:26Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://aaia.baremetalcyber.com/episodes/episode-104-follow-up-ai-audits-so-fixes-stick-and-risk-stays-reduced-domain-3e</loc>
    <lastmod>2026-02-15T04:25:49Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://aaia.baremetalcyber.com/episodes/episode-105-evaluate-impacts-and-risk-when-integrating-ai-into-the-audit-process-task-22</loc>
    <lastmod>2026-02-15T04:26:24Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://aaia.baremetalcyber.com/episodes/episode-106-prevent-ai-in-audit-blind-spots-bias-leakage-and-overreliance-risks-task-22</loc>
    <lastmod>2026-02-15T04:26:44Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://aaia.baremetalcyber.com/episodes/episode-107-utilize-ai-to-enhance-audit-planning-without-outsourcing-judgment-task-23</loc>
    <lastmod>2026-02-15T04:27:09Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://aaia.baremetalcyber.com/episodes/episode-108-utilize-ai-to-enhance-audit-execution-while-preserving-evidence-quality-task-23</loc>
    <lastmod>2026-02-15T04:27:44Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://aaia.baremetalcyber.com/episodes/episode-109-utilize-ai-to-enhance-audit-reporting-without-hallucinated-conclusions-task-23</loc>
    <lastmod>2026-02-15T04:28:12Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://aaia.baremetalcyber.com/episodes/episode-110-spaced-retrieval-review-domain-3-audit-tools-and-techniques-simplified-review-domain-3</loc>
    <lastmod>2026-02-15T04:28:36Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://aaia.baremetalcyber.com/episodes/episode-111-spaced-retrieval-mega-review-all-23-tasks-in-one-connected-storyline-review-tasks-1-23</loc>
    <lastmod>2026-02-15T04:29:00Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://aaia.baremetalcyber.com/episodes/episode-112-exam-day-tactics-calm-fast-defensible-answers-for-aaia-scenarios-exam-day-tactics</loc>
    <lastmod>2026-02-15T04:29:21Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://aaia.baremetalcyber.com/episodes/welcome-to-the-isaca-aaia-audio-course</loc>
    <lastmod>2026-02-15T04:30:29Z</lastmod>
    <priority>0.9</priority>
  </url>
</urlset>
