<?xml version="1.0" encoding="UTF-8"?>
  <urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9">
 
  <url>
    <loc>https://www.sans.org/podcasts/wait-just-an-infosec/weird-security-voyeurs-unite</loc>
    <lastmod>2026-04-09T18:08:14Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/podcasts/wait-just-an-infosec/inside-sans-holiday-hack-challenge-2023</loc>
    <lastmod>2026-04-09T18:08:14Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/podcasts/wait-just-an-infosec/the-dark-knight-of-osint-matt-edmondson</loc>
    <lastmod>2026-04-09T18:08:14Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/podcasts/wait-just-an-infosec/protecting-the-cloud-from-ransomware</loc>
    <lastmod>2026-04-09T18:08:14Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/podcasts/wait-just-an-infosec/detection-engineering-the-blue-team-cheat-code</loc>
    <lastmod>2026-04-09T18:08:14Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/podcasts/wait-just-an-infosec/in-hot-pursuit-tracking-ransomware-actors</loc>
    <lastmod>2026-04-09T18:08:14Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/podcasts/wait-just-an-infosec/empowering-tomorrow-s-security-leaders-with-the-sans-transformational-triad</loc>
    <lastmod>2026-04-09T18:08:14Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/podcasts/wait-just-an-infosec/2024-cyber-defense-trends-and-predictions</loc>
    <lastmod>2026-04-09T18:08:14Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/skill-vs-background-the-great-cyber-hiring-debate</loc>
    <lastmod>2026-04-09T18:08:14Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/should-countries-ban-ransomware-payments-</loc>
    <lastmod>2026-04-09T18:08:14Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/your-cloud-security-journey-key-trends-capabilities-skills</loc>
    <lastmod>2026-04-09T18:08:14Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/podcasts/wait-just-an-infosec/ed-skoudis-what-the-heck-is-going-on-with-cybersecurity-higher-ed</loc>
    <lastmod>2026-04-09T18:08:14Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/podcasts/wait-just-an-infosec/unleashing-ai-on-red-team-tactics-and-malware-development</loc>
    <lastmod>2026-04-09T18:08:14Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/podcasts/wait-just-an-infosec/top-5-most-common-security-culture-myths-lance-spitzner-dr-jessica-barker</loc>
    <lastmod>2026-04-09T18:08:14Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/podcasts/wait-just-an-infosec/strategies-of-a-world-class-soc</loc>
    <lastmod>2026-04-09T18:08:14Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/podcasts/wait-just-an-infosec/the-five-critical-controls-for-ics</loc>
    <lastmod>2026-04-09T18:08:14Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/podcasts/wait-just-an-infosec/building-the-security-culture-dream-team</loc>
    <lastmod>2026-04-09T18:08:14Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/podcasts/wait-just-an-infosec/lets-settle-this-in-the-cyber-range</loc>
    <lastmod>2026-04-09T18:08:14Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/podcasts/wait-just-an-infosec/applying-the-science-of-human-behavior-to-cybersecurity</loc>
    <lastmod>2026-04-09T18:08:14Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/podcasts/wait-just-an-infosec/thinking-outside-the-firewall-unconventional-cybersecurity-journeys</loc>
    <lastmod>2026-04-09T18:08:14Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/podcasts/wait-just-an-infosec/cyber-warfare-frontlines-unveiling-the-digital-battlefield-with-rob-lee-and-jake-williams</loc>
    <lastmod>2026-04-09T18:08:14Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/podcasts/ouch/defending-against-malware-invisible-enemy-3</loc>
    <lastmod>2026-04-09T18:08:14Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/podcasts/blueprint/introducing-blueprint</loc>
    <lastmod>2026-04-09T18:08:14Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/podcasts/blueprint/blueprint-live-at-the-sans-blue-team-summit-2023-46</loc>
    <lastmod>2026-04-09T18:08:14Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/podcasts/blueprint/blue-teamers-blueprint-for-malware-triage-with-ryan-chapman</loc>
    <lastmod>2026-04-09T18:08:14Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/podcasts/blueprint/mailbag-episode-with-john-hubbard</loc>
    <lastmod>2026-04-09T18:08:14Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/podcasts/blueprint/key-lessons-and-takeaways-from-blueprint-season-2-with-john-hubbard</loc>
    <lastmod>2026-04-09T18:08:14Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/podcasts/blueprint/adversary-emulation-with-jamie-williams</loc>
    <lastmod>2026-04-09T18:08:14Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/podcasts/blueprint/passwordless-can-it-be-done-with-mark-morowczynski-libby-brown</loc>
    <lastmod>2026-04-09T18:08:14Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/podcasts/blueprint/blueprint-dean-parsons-cyber-security-for-ot-and-ics</loc>
    <lastmod>2026-04-09T18:08:14Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/podcasts/blueprint/understanding-and-applying-threat-intelligence-with-katie-nickels</loc>
    <lastmod>2026-04-09T18:08:14Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/podcasts/blueprint/jaron-bradley-securing-enterprise-macos-34</loc>
    <lastmod>2026-04-09T18:08:14Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/podcasts/blueprint/training-yourself-in-a-quarantined-world-with-dave-herrald-ryan-kovar</loc>
    <lastmod>2026-04-09T18:08:14Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/podcasts/blueprint/cat-self-macos-and-linux-security-32</loc>
    <lastmod>2026-04-09T18:08:14Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/podcasts/blueprint/blueprint-david-hoelzer-threat-detection-with-machine-learning-and-ai-27</loc>
    <lastmod>2026-04-09T18:08:14Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/podcasts/blueprint/appsec-devops-and-devsecops-with-tanya-janca</loc>
    <lastmod>2026-04-09T18:08:14Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/podcasts/blueprint/playbook-for-security-onion-with-josh-brower</loc>
    <lastmod>2026-04-09T18:08:14Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/podcasts/blueprint/powershell-for-the-blue-team-with-josh-johnson</loc>
    <lastmod>2026-04-09T18:08:14Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/podcasts/blueprint/empowering-security-researchers-around-the-world-with-roberto-rodriguez</loc>
    <lastmod>2026-04-09T18:08:14Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/podcasts/blueprint/locking-down-and-monitoring-cloud-infrastructure-with-kyle-dickinson</loc>
    <lastmod>2026-04-09T18:08:14Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/podcasts/blueprint/machine-learning-primer-for-the-blue-team-with-austin-taylor</loc>
    <lastmod>2026-04-09T18:08:14Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/podcasts/blueprint/mark-orlando-building-a-stronger-blue-team-29</loc>
    <lastmod>2026-04-09T18:08:14Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/podcasts/blueprint/strategy-10-measure-performance-to-improve-performance-49</loc>
    <lastmod>2026-04-09T18:08:14Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/podcasts/blueprint/strategy-4-hire-and-grow-quality-staff-42</loc>
    <lastmod>2026-04-09T18:08:14Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/podcasts/blueprint/alexia-crumpton-mitre-att-ck-for-defenders-33</loc>
    <lastmod>2026-04-09T18:08:14Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/podcasts/blueprint/creativity-and-choices-talking-about-thinking-with-chris-sanders-stef-rand</loc>
    <lastmod>2026-04-09T18:08:14Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/podcasts/blueprint/tony-turner-securing-the-cyber-supply-chain-30</loc>
    <lastmod>2026-04-09T18:08:14Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/podcasts/blueprint/strategy-7-select-and-collect-the-right-data-45</loc>
    <lastmod>2026-04-09T18:08:14Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/podcasts/blueprint/cloud-compliance-and-automating-security-with-aj-yawn</loc>
    <lastmod>2026-04-09T18:08:14Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/podcasts/blueprint/rob-lee-training-and-reskilling-in-cyber-security-35</loc>
    <lastmod>2026-04-09T18:08:14Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/podcasts/blueprint/get-a-handle-on-your-vulnerabilities-with-chris-baker</loc>
    <lastmod>2026-04-09T18:08:14Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/podcasts/blueprint/strategy-6-illuminate-adversaries-cyber-threat-intelligence-44</loc>
    <lastmod>2026-04-09T18:08:14Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/podcasts/blueprint/shock-to-the-system-reevaluating-your-security-operations-with-mark-orlando</loc>
    <lastmod>2026-04-09T18:08:14Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/podcasts/blueprint/joe-lykowski-building-a-transparent-data-driven-soc-36</loc>
    <lastmod>2026-04-09T18:08:14Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/podcasts/blueprint/strategy-8-leverage-tools-and-support-analyst-workflow-47</loc>
    <lastmod>2026-04-09T18:08:14Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/podcasts/blueprint/privacy-laws-the-future-driver-of-cyber-security-with-mary-chaney</loc>
    <lastmod>2026-04-09T18:08:14Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/podcasts/blueprint/bonus-episode-what-does-it-take-to-author-a-cybersecurity-book-</loc>
    <lastmod>2026-04-09T18:08:14Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/podcasts/blueprint/maturing-your-cyber-defense-with-rob-van-os</loc>
    <lastmod>2026-04-09T18:08:14Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/podcasts/blueprint/soc-metrics-measuring-success-and-preventing-burnout-with-jon-hencinski</loc>
    <lastmod>2026-04-09T18:08:14Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/podcasts/blueprint/current-state-and-future-of-security-operations-with-anton-chuvakin</loc>
    <lastmod>2026-04-09T18:08:14Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/podcasts/blueprint/strategy-9-communicate-clearly-collaborate-often-share-generously-48</loc>
    <lastmod>2026-04-09T18:08:14Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/podcasts/blueprint/blueprint-live-at-sansfire-2022-a-panel-with-heather-mahalik-katie-nickels-and-jeff-mcjunkin-28</loc>
    <lastmod>2026-04-09T18:08:14Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/podcasts/blueprint/strategy-1-know-what-you-are-protecting-and-why-39</loc>
    <lastmod>2026-04-09T18:08:14Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/podcasts/blueprint/strategy-2-give-the-soc-the-authority-to-do-its-job-40</loc>
    <lastmod>2026-04-09T18:08:14Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/podcasts/blueprint/microsoft-incident-response-playbooks-with-mark-morowczynski-thomas-detzner</loc>
    <lastmod>2026-04-09T18:08:14Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/podcasts/blueprint/11-strategies-of-a-world-class-security-operations-center-fundamentals-38</loc>
    <lastmod>2026-04-09T18:08:14Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/podcasts/blueprint/how-genai-is-changing-your-soc-for-the-better-with-seth-misenar-54</loc>
    <lastmod>2026-04-09T18:08:14Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/podcasts/blueprint/strategy-3-build-a-soc-structure-to-match-your-organizational-needs-41</loc>
    <lastmod>2026-04-09T18:08:14Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/podcasts/blueprint/corissa-koopmans-mark-morowczynski-azure-ad-threat-detection-and-logging-31</loc>
    <lastmod>2026-04-09T18:08:14Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/podcasts/blueprint/how-phishing-resistant-credentials-work-with-mark-morowczynski-and-tarek-dawoud-55</loc>
    <lastmod>2026-04-09T18:08:14Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/podcasts/blueprint/simplifying-your-logging-strategy-what2log-project-with-mick-douglas-flynn-weeks</loc>
    <lastmod>2026-04-09T18:08:14Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/podcasts/blueprint/from-clues-to-containment-unraveling-a-gift-card-fraud-scheme-with-mark-jeanmougin-53</loc>
    <lastmod>2026-04-09T18:08:14Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/podcasts/blueprint/strategy-11-turn-up-volume-expanding-soc-functionality-50</loc>
    <lastmod>2026-04-09T18:08:14Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/podcasts/wait-just-an-infosec/2024-trends-predictions-series-ransomware</loc>
    <lastmod>2026-04-09T18:08:14Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/podcasts/wait-just-an-infosec/defending-your-business-against-ransomware-cyber-extortion</loc>
    <lastmod>2026-04-09T18:08:14Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/podcasts/blueprint/strategy-5-prioritize-incident-response-43</loc>
    <lastmod>2026-04-09T18:08:14Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/podcasts/wait-just-an-infosec/to-click-or-not-to-click</loc>
    <lastmod>2026-04-09T18:08:14Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/podcasts/ouch/protecting-seniors-scams-4</loc>
    <lastmod>2026-04-09T18:08:14Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/podcasts/ouch/how-cybercriminals-exploit-your-emotions-2</loc>
    <lastmod>2026-04-09T18:08:14Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/podcasts/ouch/account-takeovers-emotional-predators-1</loc>
    <lastmod>2026-04-09T18:08:14Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/podcasts/ouch/spotting-online-job-scams-5</loc>
    <lastmod>2026-04-09T18:08:14Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/podcasts/cyber-leaders/the-booming-business-of-cybercrime-with-geoff-white-6</loc>
    <lastmod>2026-04-09T18:08:14Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/podcasts/blueprint/series-one-roundup-8</loc>
    <lastmod>2026-04-09T18:08:14Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/podcasts/cyber-leaders/securing-the-supply-chain-christine-gadsby-12</loc>
    <lastmod>2026-04-09T18:08:14Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/podcasts/cyber-leaders/inside-pacific-rim-ross-mckerchar-11</loc>
    <lastmod>2026-04-09T18:08:14Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/podcasts/cyber-leaders/bridging-the-gap-with-frank-kim-4</loc>
    <lastmod>2026-04-09T18:08:14Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/podcasts/cyber-leaders/life-limb-and-infrastructure-tim-conway-17</loc>
    <lastmod>2026-04-09T18:08:14Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/podcasts/cyber-leaders/countering-ransomware-with-jen-ellis-3</loc>
    <lastmod>2026-04-09T18:08:14Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/podcasts/cyber-leaders/breaking-barriers-with-helen-rabe-5</loc>
    <lastmod>2026-04-09T18:08:14Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/podcasts/cyber-leaders/human-edge-of-ai-rob-lee-19</loc>
    <lastmod>2026-04-09T18:08:14Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/podcasts/cyber-leaders/understanding-the-geopolitical-landscape-of-cyber-security-with-shashank-johsi-1</loc>
    <lastmod>2026-04-09T18:08:14Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/podcasts/cyber-leaders/fifth-domain-natos-cyber-frontline-manfred-boudreaux-dehmer-9</loc>
    <lastmod>2026-04-09T18:08:14Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/podcasts/cyber-leaders/translating-cyber-risk-for-a-chaotic-world-tarah-wheeler-14</loc>
    <lastmod>2026-04-09T18:08:14Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/podcasts/cyber-leaders/fud-special-7</loc>
    <lastmod>2026-04-09T18:08:14Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/podcasts/cyber-leaders/introduction</loc>
    <lastmod>2026-04-09T18:08:14Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/podcasts/cyber-leaders/cyber-warfare-disinformation-geopolitical-risks-bilyana-lily-16</loc>
    <lastmod>2026-04-09T18:08:14Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/podcasts/cyber-leaders/season-2-trailer</loc>
    <lastmod>2026-04-09T18:08:14Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/podcasts/cyber-leaders/cyber-battlefield-max-smeets-13</loc>
    <lastmod>2026-04-09T18:08:14Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/podcasts/cyber-leaders/series-2-round-up-18</loc>
    <lastmod>2026-04-09T18:08:14Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/podcasts/cyber-leaders/fighting-back-john-hubbard-15</loc>
    <lastmod>2026-04-09T18:08:14Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/podcasts/cyber-leaders/insider-threat-lisa-forte-10</loc>
    <lastmod>2026-04-09T18:08:14Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/podcasts/cyber-leaders/leading-global-cybersecurity-with-christine-bejerasco-2</loc>
    <lastmod>2026-04-09T18:08:14Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/podcasts/ouch/passkeys-simpler-safer-way-sign-in-6</loc>
    <lastmod>2026-04-09T18:08:14Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/podcasts/blueprint/james-rowley-creating-running-insider-threat-program-26</loc>
    <lastmod>2026-04-09T18:08:14Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/podcasts/blueprint/brandon-evans-cloud-security-threats-and-opportunities-37</loc>
    <lastmod>2026-04-09T18:08:14Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/podcasts/blueprint/leading-by-example-confidence-responsibility-cybersecurity-zak-stufflebeam-61</loc>
    <lastmod>2026-04-09T18:08:14Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/podcasts/blueprint/redefining-security-operations-lessons-ai-integration-james-spiteri-60</loc>
    <lastmod>2026-04-09T18:08:14Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/podcasts/blueprint/special-forces-cybersecurity-rich-greene-59</loc>
    <lastmod>2026-04-09T18:08:14Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/podcasts/blueprint/soc-dashboards-done-right-ryan-thompson-58</loc>
    <lastmod>2026-04-09T18:08:14Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/podcasts/blueprint/success-simplified-3-step-process-hitting-your-career-goals-john-hubbard-57</loc>
    <lastmod>2026-04-09T18:08:14Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/podcasts/cyber-leaders/how-modern-threats-are-redefining-the-rules-of-defense-paul-chichester-20</loc>
    <lastmod>2026-04-09T18:08:14Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/podcasts/ouch/hidden-dangers-forgotten-accounts-why-it-pays-clean-house</loc>
    <lastmod>2026-04-09T18:08:14Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/podcasts/cyber-leaders/quantums-leap-how-cyber-leaders-are-preparing-for-the-post-encryption-era-applied-quantum-21</loc>
    <lastmod>2026-04-09T18:08:14Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/podcasts/cyber-leaders/inside-digital-forensics-hunting-for-truth-in-the-dark-heather-barnhart-22</loc>
    <lastmod>2026-04-09T18:08:14Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/podcasts/cyber-leaders/the-hidden-conflicts-inside-every-cyber-team-nikki-robinson-23</loc>
    <lastmod>2026-04-09T18:08:14Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/podcasts/cyber-leaders/how-we-really-build-a-safer-digital-curtis-dukes-24</loc>
    <lastmod>2026-04-09T18:08:14Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/podcasts/cyber-leaders/who-really-controls-the-internet-and-why-it-matters-roxana-radu-emily-taylor-25</loc>
    <lastmod>2026-04-09T18:08:14Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/podcasts/cyber-leaders/securing-the-connected-world-thomas-harvey-26</loc>
    <lastmod>2026-04-09T18:08:14Z</lastmod>
  </url>

  <url>
    <loc>https://www.sans.org/podcasts/cyber-leaders/how-secure-by-design-and-public-private-partnerships-drive-deterrence</loc>
    <lastmod>2026-04-09T18:08:14Z</lastmod>
  </url>

  </urlset>