<?xml version="1.0" encoding="UTF-8"?>
<urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9">
  <url>
    <loc>https://cybersmokehouse.com/</loc>
    <lastmod>2026-04-09T17:34:26Z</lastmod>
    <priority>1.0</priority>
  </url>
  <url>
    <loc>https://cybersmokehouse.com/episodes</loc>
    <lastmod>2026-04-09T17:34:26Z</lastmod>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://cybersmokehouse.com/recommended</loc>
    <lastmod>2026-04-09T17:34:26Z</lastmod>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://cybersmokehouse.com/subscribe</loc>
    <lastmod>2026-04-09T17:34:26Z</lastmod>
    <priority>0.8</priority>
  </url>
  <url>
    <loc>https://cybersmokehouse.com/episodes/securing-what-you-can-t-see-clete-taylor-cyber-smokehouse-episode-10</loc>
    <lastmod>2026-04-07T12:00:09Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cybersmokehouse.com/episodes/securing-identity-in-a-cloud-first-world-joe-mendygral-cyber-smokehouse-episode-9</loc>
    <lastmod>2026-03-31T12:00:15Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cybersmokehouse.com/episodes/ai-identity-and-the-future-of-security-steve-bay-cyber-smokehouse-episode-008</loc>
    <lastmod>2026-03-24T12:00:13Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cybersmokehouse.com/episodes/translating-cyber-risk-for-business-leaders-jimmy-lummis-cyber-smokehouse-episode-007</loc>
    <lastmod>2026-03-17T12:00:05Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cybersmokehouse.com/episodes/security-strategy-beyond-traditional-perimeters-david-nolan-cyber-smokehouse-episode-6</loc>
    <lastmod>2026-03-10T12:00:19Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cybersmokehouse.com/episodes/resilient-healthcare-in-a-cyber-age-hugo-lai-cyber-smokehouse-episode-005</loc>
    <lastmod>2026-03-03T13:00:13Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cybersmokehouse.com/episodes/leading-through-cyber-complexity-wade-myers-cyber-smokehouse-episode-004</loc>
    <lastmod>2026-02-24T13:00:19Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cybersmokehouse.com/episodes/cyber-resilience-in-the-real-world-damian-apone-cyber-smokehouse-episode-003</loc>
    <lastmod>2026-02-17T13:00:08Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cybersmokehouse.com/episodes/preparing-for-the-quantum-cyber-shift-gregg-barrow-cyber-smokehouse-episode-002</loc>
    <lastmod>2026-02-10T13:00:19Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cybersmokehouse.com/episodes/data-driven-cybersecurity-decisions-erik-hart-cyber-smokehouse-episode-001</loc>
    <lastmod>2026-02-05T20:43:19Z</lastmod>
    <priority>0.9</priority>
  </url>
  <url>
    <loc>https://cybersmokehouse.com/episodes/cyber-smokehouse-trailer</loc>
    <lastmod>2026-01-27T16:32:26Z</lastmod>
    <priority>0.9</priority>
  </url>
</urlset>
