<?xml version="1.0" encoding="utf-8" standalone="yes"?><urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9" xmlns:xhtml="http://www.w3.org/1999/xhtml"><url><loc>https://securitycocktailhour.com/tags/apt/</loc><lastmod>2026-03-23T00:00:00-04:00</lastmod></url><url><loc>https://securitycocktailhour.com/tags/apt42/</loc><lastmod>2026-03-23T00:00:00-04:00</lastmod></url><url><loc>https://securitycocktailhour.com/tags/charming-kitten/</loc><lastmod>2026-03-23T00:00:00-04:00</lastmod></url><url><loc>https://securitycocktailhour.com/tags/cyber-espionage/</loc><lastmod>2026-03-23T00:00:00-04:00</lastmod></url><url><loc>https://securitycocktailhour.com/</loc><lastmod>2026-03-23T00:00:00-04:00</lastmod></url><url><loc>https://securitycocktailhour.com/episodes/</loc><lastmod>2026-03-23T00:00:00-04:00</lastmod></url><url><loc>https://securitycocktailhour.com/tags/iran/</loc><lastmod>2026-03-23T00:00:00-04:00</lastmod></url><url><loc>https://securitycocktailhour.com/tags/nation-state/</loc><lastmod>2026-03-23T00:00:00-04:00</lastmod></url><url><loc>https://securitycocktailhour.com/tags/personal-security/</loc><lastmod>2026-03-23T00:00:00-04:00</lastmod></url><url><loc>https://securitycocktailhour.com/tags/</loc><lastmod>2026-03-23T00:00:00-04:00</lastmod></url><url><loc>https://securitycocktailhour.com/tags/targeted-attack/</loc><lastmod>2026-03-23T00:00:00-04:00</lastmod></url><url><loc>https://securitycocktailhour.com/episodes/episode-73-what-happens-when-an-iranian-apt-targets-you-personally/</loc><lastmod>2026-03-23T00:00:00-04:00</lastmod></url><url><loc>https://securitycocktailhour.com/blog/</loc><lastmod>2026-03-23T00:00:00+00:00</lastmod></url><url><loc>https://securitycocktailhour.com/blog/targeted-by-irans-charming-kitten-apt/</loc><lastmod>2026-03-23T00:00:00+00:00</lastmod></url><url><loc>https://securitycocktailhour.com/tags/cartel-drones/</loc><lastmod>2026-03-10T00:00:00-05:00</lastmod></url><url><loc>https://securitycocktailhour.com/tags/cybersecurity-threats/</loc><lastmod>2026-03-10T00:00:00-05:00</lastmod></url><url><loc>https://securitycocktailhour.com/tags/drone-security/</loc><lastmod>2026-03-10T00:00:00-05:00</lastmod></url><url><loc>https://securitycocktailhour.com/episodes/episode-72-drones-are-the-next-cyber-weapon/</loc><lastmod>2026-03-10T00:00:00-05:00</lastmod></url><url><loc>https://securitycocktailhour.com/tags/faa-regulations/</loc><lastmod>2026-03-10T00:00:00-05:00</lastmod></url><url><loc>https://securitycocktailhour.com/tags/fpv-drones/</loc><lastmod>2026-03-10T00:00:00-05:00</lastmod></url><url><loc>https://securitycocktailhour.com/tags/hardware-security/</loc><lastmod>2026-03-10T00:00:00-05:00</lastmod></url><url><loc>https://securitycocktailhour.com/tags/war-flying/</loc><lastmod>2026-03-10T00:00:00-05:00</lastmod></url><url><loc>https://securitycocktailhour.com/tags/dji/</loc><lastmod>2026-03-10T00:00:00+00:00</lastmod></url><url><loc>https://securitycocktailhour.com/blog/drones-already-being-used-cyberweapons-security-teams/</loc><lastmod>2026-03-10T00:00:00+00:00</lastmod></url><url><loc>https://securitycocktailhour.com/tags/physical-security/</loc><lastmod>2026-03-10T00:00:00+00:00</lastmod></url><url><loc>https://securitycocktailhour.com/tags/uas/</loc><lastmod>2026-03-10T00:00:00+00:00</lastmod></url><url><loc>https://securitycocktailhour.com/tags/wireless-security/</loc><lastmod>2026-03-10T00:00:00+00:00</lastmod></url><url><loc>https://securitycocktailhour.com/tags/agentic-ai/</loc><lastmod>2026-02-23T00:00:00-05:00</lastmod></url><url><loc>https://securitycocktailhour.com/tags/asset-context/</loc><lastmod>2026-02-23T00:00:00-05:00</lastmod></url><url><loc>https://securitycocktailhour.com/episodes/episode-71-breaking-vulnerability-managements-30-year-logjam/</loc><lastmod>2026-02-23T00:00:00-05:00</lastmod></url><url><loc>https://securitycocktailhour.com/tags/incident-response/</loc><lastmod>2026-02-23T00:00:00-05:00</lastmod></url><url><loc>https://securitycocktailhour.com/tags/offensive-security/</loc><lastmod>2026-02-23T00:00:00-05:00</lastmod></url><url><loc>https://securitycocktailhour.com/tags/security-operations/</loc><lastmod>2026-02-23T00:00:00-05:00</lastmod></url><url><loc>https://securitycocktailhour.com/tags/tonic-security/</loc><lastmod>2026-02-23T00:00:00-05:00</lastmod></url><url><loc>https://securitycocktailhour.com/tags/vulnerability-management/</loc><lastmod>2026-02-23T00:00:00-05:00</lastmod></url><url><loc>https://securitycocktailhour.com/tags/ai-competition/</loc><lastmod>2026-02-22T00:00:00+00:00</lastmod></url><url><loc>https://securitycocktailhour.com/tags/claude-code/</loc><lastmod>2026-02-22T00:00:00+00:00</lastmod></url><url><loc>https://securitycocktailhour.com/tags/openai/</loc><lastmod>2026-02-22T00:00:00+00:00</lastmod></url><url><loc>https://securitycocktailhour.com/tags/openclaw/</loc><lastmod>2026-02-22T00:00:00+00:00</lastmod></url><url><loc>https://securitycocktailhour.com/blog/openclaw-openai-acquisition-ai-security-good-news/</loc><lastmod>2026-02-22T00:00:00+00:00</lastmod></url><url><loc>https://securitycocktailhour.com/tags/prompt-injection/</loc><lastmod>2026-02-22T00:00:00+00:00</lastmod></url><url><loc>https://securitycocktailhour.com/tags/security-market/</loc><lastmod>2026-02-22T00:00:00+00:00</lastmod></url><url><loc>https://securitycocktailhour.com/tags/ai-agents/</loc><lastmod>2026-02-05T00:00:00+00:00</lastmod></url><url><loc>https://securitycocktailhour.com/tags/ai-security/</loc><lastmod>2026-02-05T00:00:00+00:00</lastmod></url><url><loc>https://securitycocktailhour.com/tags/credential-security/</loc><lastmod>2026-02-05T00:00:00+00:00</lastmod></url><url><loc>https://securitycocktailhour.com/tags/open-source-security/</loc><lastmod>2026-02-05T00:00:00+00:00</lastmod></url><url><loc>https://securitycocktailhour.com/blog/openclaws-security-reputation-well-deserved-how-to-use-it/</loc><lastmod>2026-02-05T00:00:00+00:00</lastmod></url><url><loc>https://securitycocktailhour.com/tags/aerospace-security/</loc><lastmod>2026-02-02T00:00:00-05:00</lastmod></url><url><loc>https://securitycocktailhour.com/tags/critical-infrastructure/</loc><lastmod>2026-02-02T00:00:00-05:00</lastmod></url><url><loc>https://securitycocktailhour.com/tags/cybersecurity/</loc><lastmod>2026-02-02T00:00:00-05:00</lastmod></url><url><loc>https://securitycocktailhour.com/tags/government-security/</loc><lastmod>2026-02-02T00:00:00-05:00</lastmod></url><url><loc>https://securitycocktailhour.com/tags/nasa/</loc><lastmod>2026-02-02T00:00:00-05:00</lastmod></url><url><loc>https://securitycocktailhour.com/tags/renee-wynn/</loc><lastmod>2026-02-02T00:00:00-05:00</lastmod></url><url><loc>https://securitycocktailhour.com/episodes/episode-70-securing-mars-rovers-and-space-stations-with-nasas-former-cio-renee-wynn/</loc><lastmod>2026-02-02T00:00:00-05:00</lastmod></url><url><loc>https://securitycocktailhour.com/tags/space-security/</loc><lastmod>2026-02-02T00:00:00-05:00</lastmod></url><url><loc>https://securitycocktailhour.com/tags/business-continuity/</loc><lastmod>2026-01-22T00:00:00+00:00</lastmod></url><url><loc>https://securitycocktailhour.com/tags/disaster-recovery/</loc><lastmod>2026-01-22T00:00:00+00:00</lastmod></url><url><loc>https://securitycocktailhour.com/tags/risk-management/</loc><lastmod>2026-01-22T00:00:00+00:00</lastmod></url><url><loc>https://securitycocktailhour.com/tags/sla/</loc><lastmod>2026-01-22T00:00:00+00:00</lastmod></url><url><loc>https://securitycocktailhour.com/blog/sla-wake-up-call-pennies-on-dollar/</loc><lastmod>2026-01-22T00:00:00+00:00</lastmod></url><url><loc>https://securitycocktailhour.com/tags/vendor-management/</loc><lastmod>2026-01-22T00:00:00+00:00</lastmod></url><url><loc>https://securitycocktailhour.com/tags/black-hills-information-security/</loc><lastmod>2026-01-19T00:00:00-05:00</lastmod></url><url><loc>https://securitycocktailhour.com/tags/cybersecurity-industry/</loc><lastmod>2026-01-19T00:00:00-05:00</lastmod></url><url><loc>https://securitycocktailhour.com/tags/disruption/</loc><lastmod>2026-01-19T00:00:00-05:00</lastmod></url><url><loc>https://securitycocktailhour.com/tags/industry-trends/</loc><lastmod>2026-01-19T00:00:00-05:00</lastmod></url><url><loc>https://securitycocktailhour.com/tags/john-strand/</loc><lastmod>2026-01-19T00:00:00-05:00</lastmod></url><url><loc>https://securitycocktailhour.com/tags/security-innovation/</loc><lastmod>2026-01-19T00:00:00-05:00</lastmod></url><url><loc>https://securitycocktailhour.com/tags/venture-capital/</loc><lastmod>2026-01-19T00:00:00-05:00</lastmod></url><url><loc>https://securitycocktailhour.com/episodes/episode-69-why-cybersecurity-is-ripe-for-disruption-john-strand-part-2/</loc><lastmod>2026-01-19T00:00:00-05:00</lastmod></url><url><loc>https://securitycocktailhour.com/tags/ai-hiring/</loc><lastmod>2026-01-12T10:11:10-05:00</lastmod></url><url><loc>https://securitycocktailhour.com/tags/black-hills-infosec/</loc><lastmod>2026-01-12T10:11:10-05:00</lastmod></url><url><loc>https://securitycocktailhour.com/tags/career-changers/</loc><lastmod>2026-01-12T10:11:10-05:00</lastmod></url><url><loc>https://securitycocktailhour.com/tags/career-development/</loc><lastmod>2026-01-12T10:11:10-05:00</lastmod></url><url><loc>https://securitycocktailhour.com/tags/cybersecurity-training/</loc><lastmod>2026-01-12T10:11:10-05:00</lastmod></url><url><loc>https://securitycocktailhour.com/episodes/episode-68-disruption-through-kindness-john-strands-revolution-in-security-education-part-1/</loc><lastmod>2026-01-12T10:11:10-05:00</lastmod></url><url><loc>https://securitycocktailhour.com/tags/scholarships/</loc><lastmod>2026-01-12T10:11:10-05:00</lastmod></url><url><loc>https://securitycocktailhour.com/tags/security-education/</loc><lastmod>2026-01-12T10:11:10-05:00</lastmod></url><url><loc>https://securitycocktailhour.com/tags/cyber-kinetic-warfare/</loc><lastmod>2026-01-09T00:00:00+00:00</lastmod></url><url><loc>https://securitycocktailhour.com/tags/cyber-operations/</loc><lastmod>2026-01-09T00:00:00+00:00</lastmod></url><url><loc>https://securitycocktailhour.com/tags/national-security/</loc><lastmod>2026-01-09T00:00:00+00:00</lastmod></url><url><loc>https://securitycocktailhour.com/tags/power-grid-security/</loc><lastmod>2026-01-09T00:00:00+00:00</lastmod></url><url><loc>https://securitycocktailhour.com/tags/threat-modeling/</loc><lastmod>2026-01-09T00:00:00+00:00</lastmod></url><url><loc>https://securitycocktailhour.com/blog/cyber-meets-kinetic-venezuela-new-reality-defenders/</loc><lastmod>2026-01-09T00:00:00+00:00</lastmod></url><url><loc>https://securitycocktailhour.com/tags/device-maintenance/</loc><lastmod>2025-12-22T00:00:00+00:00</lastmod></url><url><loc>https://securitycocktailhour.com/tags/firmware-update/</loc><lastmod>2025-12-22T00:00:00+00:00</lastmod></url><url><loc>https://securitycocktailhour.com/episodes/episode-67-flipper-zero-firmware-update-if-at-first-you-dont-succeed/</loc><lastmod>2025-12-22T00:00:00+00:00</lastmod></url><url><loc>https://securitycocktailhour.com/tags/flipper-zero/</loc><lastmod>2025-12-22T00:00:00+00:00</lastmod></url><url><loc>https://securitycocktailhour.com/tags/pentesting/</loc><lastmod>2025-12-22T00:00:00+00:00</lastmod></url><url><loc>https://securitycocktailhour.com/tags/security-tools/</loc><lastmod>2025-12-22T00:00:00+00:00</lastmod></url><url><loc>https://securitycocktailhour.com/tags/troubleshooting/</loc><lastmod>2025-12-22T00:00:00+00:00</lastmod></url><url><loc>https://securitycocktailhour.com/tags/hacking-tools/</loc><lastmod>2025-12-15T00:00:00+00:00</lastmod></url><url><loc>https://securitycocktailhour.com/tags/hardware/</loc><lastmod>2025-12-15T00:00:00+00:00</lastmod></url><url><loc>https://securitycocktailhour.com/episodes/episode-66-unboxing-device-every-hacker-wants/</loc><lastmod>2025-12-15T00:00:00+00:00</lastmod></url><url><loc>https://securitycocktailhour.com/blog/dangerous-job-scams-2025-complete-guide/</loc><lastmod>2025-12-10T00:00:00+00:00</lastmod></url><url><loc>https://securitycocktailhour.com/tags/ai-deepfakes/</loc><lastmod>2025-12-10T00:00:00+00:00</lastmod></url><url><loc>https://securitycocktailhour.com/tags/career-safety/</loc><lastmod>2025-12-10T00:00:00+00:00</lastmod></url><url><loc>https://securitycocktailhour.com/tags/cryptocurrency-scams/</loc><lastmod>2025-12-10T00:00:00+00:00</lastmod></url><url><loc>https://securitycocktailhour.com/tags/cybersecurity-awareness/</loc><lastmod>2025-12-10T00:00:00+00:00</lastmod></url><url><loc>https://securitycocktailhour.com/tags/employment-fraud/</loc><lastmod>2025-12-10T00:00:00+00:00</lastmod></url><url><loc>https://securitycocktailhour.com/tags/interview-fraud/</loc><lastmod>2025-12-10T00:00:00+00:00</lastmod></url><url><loc>https://securitycocktailhour.com/tags/job-scams/</loc><lastmod>2025-12-10T00:00:00+00:00</lastmod></url><url><loc>https://securitycocktailhour.com/tags/malware/</loc><lastmod>2025-12-10T00:00:00+00:00</lastmod></url><url><loc>https://securitycocktailhour.com/tags/mystery-shopper-scams/</loc><lastmod>2025-12-10T00:00:00+00:00</lastmod></url><url><loc>https://securitycocktailhour.com/tags/reshipping-scams/</loc><lastmod>2025-12-10T00:00:00+00:00</lastmod></url><url><loc>https://securitycocktailhour.com/episodes/episode-65-job-scams-are-getting-worse-four-of-the-most-dangerous/</loc><lastmod>2025-12-08T00:00:00+00:00</lastmod></url><url><loc>https://securitycocktailhour.com/episodes/episode-64-bonus-holiday-scams-unwrapped-tips-to-stay-safe-this-season/</loc><lastmod>2025-12-02T00:00:00+00:00</lastmod></url><url><loc>https://securitycocktailhour.com/tags/artificial-intelligence/</loc><lastmod>2025-11-26T00:00:00+00:00</lastmod></url><url><loc>https://securitycocktailhour.com/tags/communication/</loc><lastmod>2025-11-26T00:00:00+00:00</lastmod></url><url><loc>https://securitycocktailhour.com/tags/compliance/</loc><lastmod>2025-11-26T00:00:00+00:00</lastmod></url><url><loc>https://securitycocktailhour.com/tags/data-protection/</loc><lastmod>2025-11-26T00:00:00+00:00</lastmod></url><url><loc>https://securitycocktailhour.com/tags/governance/</loc><lastmod>2025-11-26T00:00:00+00:00</lastmod></url><url><loc>https://securitycocktailhour.com/tags/high-frequency-trading/</loc><lastmod>2025-11-26T00:00:00+00:00</lastmod></url><url><loc>https://securitycocktailhour.com/tags/leadership/</loc><lastmod>2025-11-26T00:00:00+00:00</lastmod></url><url><loc>https://securitycocktailhour.com/tags/network-security/</loc><lastmod>2025-11-26T00:00:00+00:00</lastmod></url><url><loc>https://securitycocktailhour.com/tags/performance/</loc><lastmod>2025-11-26T00:00:00+00:00</lastmod></url><url><loc>https://securitycocktailhour.com/blog/ai-innovation-outpaces-security-governance/</loc><lastmod>2025-11-26T00:00:00+00:00</lastmod></url><url><loc>https://securitycocktailhour.com/tags/shadow-it/</loc><lastmod>2025-11-26T00:00:00+00:00</lastmod></url><url><loc>https://securitycocktailhour.com/blog/when-nanoseconds-matter/</loc><lastmod>2025-11-26T00:00:00+00:00</lastmod></url><url><loc>https://securitycocktailhour.com/blog/why-security-always-gets-blamed/</loc><lastmod>2025-11-26T00:00:00+00:00</lastmod></url><url><loc>https://securitycocktailhour.com/episodes/episode-63-cybersecurity-at-nanosecond-speed-securing-high-frequency-trading/</loc><lastmod>2025-11-17T00:00:00+00:00</lastmod></url><url><loc>https://securitycocktailhour.com/episodes/episode-62-ai-in-cybersecurity-how-cisos-are-actually-using-llms/</loc><lastmod>2025-11-03T00:00:00+00:00</lastmod></url><url><loc>https://securitycocktailhour.com/privacy/</loc><lastmod>2025-10-14T00:00:00+00:00</lastmod></url><url><loc>https://securitycocktailhour.com/terms/</loc><lastmod>2025-10-14T00:00:00+00:00</lastmod></url><url><loc>https://securitycocktailhour.com/episodes/episode-61-ai-attacks-need-ai-defense-ransomwares-new-danger-and-how-a-top-cyber-expert-is-/</loc><lastmod>2025-09-23T00:00:00+00:00</lastmod></url><url><loc>https://securitycocktailhour.com/episodes/episode-60-crypto-kidnappings-lost-keys-and-million-dollar-bug-bounties/</loc><lastmod>2025-09-09T00:00:00+00:00</lastmod></url><url><loc>https://securitycocktailhour.com/episodes/episode-59-wifi-pineapple-unboxing-the-hacker-device-from-tv-shows/</loc><lastmod>2025-08-18T00:00:00+00:00</lastmod></url><url><loc>https://securitycocktailhour.com/episodes/episode-58-travel-router-unboxing-dont-get-hacked-on-vacation/</loc><lastmod>2025-08-04T00:00:00+00:00</lastmod></url><url><loc>https://securitycocktailhour.com/episodes/episode-57-dr-nikki-robinson-why-security-teams-fail-at-human-factors/</loc><lastmod>2025-07-03T00:00:00+00:00</lastmod></url><url><loc>https://securitycocktailhour.com/episodes/episode-56-from-zero-day-hunter-to-cyber-defender-cody-pierces-journey/</loc><lastmod>2025-06-20T00:00:00+00:00</lastmod></url><url><loc>https://securitycocktailhour.com/episodes/episode-55-firmware-fire-and-the-future-of-cybersecurity-smoked-manhattans-with-paul-asadoo/</loc><lastmod>2025-05-27T00:00:00+00:00</lastmod></url><url><loc>https://securitycocktailhour.com/episodes/episode-31-the-future-of-security-leadership-with-sivan-tehila/</loc><lastmod>2025-05-20T00:00:00+00:00</lastmod></url><url><loc>https://securitycocktailhour.com/episodes/episode-54-dont-get-hacked-on-vacation-travel-cybersecurity-tips/</loc><lastmod>2025-05-12T00:00:00+00:00</lastmod></url><url><loc>https://securitycocktailhour.com/episodes/episode-53-the-new-rules-of-cyber-incident-response-new-attacks-new-response/</loc><lastmod>2025-04-11T00:00:00+00:00</lastmod></url><url><loc>https://securitycocktailhour.com/episodes/episode-52-how-do-you-sell-really-expensive-security-software/</loc><lastmod>2025-03-23T00:00:00+00:00</lastmod></url><url><loc>https://securitycocktailhour.com/episodes/episode-50-from-the-battlefield-to-the-boardroom-high-stakes-cyber-security/</loc><lastmod>2025-02-28T00:00:00+00:00</lastmod></url><url><loc>https://securitycocktailhour.com/episodes/episode-51-agentic-ai-security-full-speed-into-the-unknown/</loc><lastmod>2025-02-18T00:00:00+00:00</lastmod></url><url><loc>https://securitycocktailhour.com/episodes/episode-49-metawar-winn-schwartau-on-how-to-win-the-fight-for-our-minds/</loc><lastmod>2025-02-14T00:00:00+00:00</lastmod></url><url><loc>https://securitycocktailhour.com/episodes/episode-48-ransomware-and-hawaiian-shirts-another-friday-in-cyber-security/</loc><lastmod>2025-02-06T00:00:00+00:00</lastmod></url><url><loc>https://securitycocktailhour.com/episodes/episode-47-landing-your-first-cyber-security-job-the-experience-dilemma/</loc><lastmod>2025-01-13T00:00:00+00:00</lastmod></url><url><loc>https://securitycocktailhour.com/episodes/episode-46-securing-ai-misbehavior-even-the-experts-couldnt-predict/</loc><lastmod>2024-12-17T00:00:00+00:00</lastmod></url><url><loc>https://securitycocktailhour.com/episodes/episode-45-holiday-scams-unwrapped-tips-to-stay-safe-this-season/</loc><lastmod>2024-12-03T00:00:00+00:00</lastmod></url><url><loc>https://securitycocktailhour.com/episodes/episode-44-breaking-in-and-locking-down-from-hacker-to-cyber-defender/</loc><lastmod>2024-11-22T00:00:00+00:00</lastmod></url><url><loc>https://securitycocktailhour.com/episodes/episode-43-cybersecurity-for-emts-and-first-responders-protecting-patients-and-professional/</loc><lastmod>2024-11-07T00:00:00+00:00</lastmod></url><url><loc>https://securitycocktailhour.com/episodes/episode-42-retail-crime-prevention-using-ai-to-respond-to-a-growing-threat/</loc><lastmod>2024-10-29T00:00:00+00:00</lastmod></url><url><loc>https://securitycocktailhour.com/episodes/episode-41-everybody-makes-mistakes-including-cybersecurity-pros/</loc><lastmod>2024-10-15T00:00:00+00:00</lastmod></url><url><loc>https://securitycocktailhour.com/episodes/episode-40-fighting-cybersecurity-threats-together-how-government-private-industry-collabor/</loc><lastmod>2024-10-08T00:00:00+00:00</lastmod></url><url><loc>https://securitycocktailhour.com/episodes/episode-39-building-a-successful-cybersecurity-career-seizing-opportunities-and-always-lear/</loc><lastmod>2024-10-01T00:00:00+00:00</lastmod></url><url><loc>https://securitycocktailhour.com/episodes/episode-38-why-data-breaches-keep-getting-worse/</loc><lastmod>2024-09-17T00:00:00+00:00</lastmod></url><url><loc>https://securitycocktailhour.com/episodes/episode-37-cybersecurity-and-ai-what-the-experts-are-worried-about-and-what-theyre-doing/</loc><lastmod>2024-09-03T00:00:00+00:00</lastmod></url><url><loc>https://securitycocktailhour.com/episodes/episode-36-infosec-job-market-living-in-the-chaotic-age/</loc><lastmod>2024-08-08T00:00:00+00:00</lastmod></url><url><loc>https://securitycocktailhour.com/episodes/episode-35-hacking-your-way-into-a-security-career-with-nathali-cano/</loc><lastmod>2024-07-23T00:00:00+00:00</lastmod></url><url><loc>https://securitycocktailhour.com/episodes/episode-34-security-perception-is-everything-with-douglas-marzano/</loc><lastmod>2024-07-09T00:00:00+00:00</lastmod></url><url><loc>https://securitycocktailhour.com/episodes/episode-33-surviving-an-identity-crisis-with-venkat-raghavan/</loc><lastmod>2024-06-26T00:00:00+00:00</lastmod></url><url><loc>https://securitycocktailhour.com/episodes/episode-32-going-into-ot-operational-technology-with-robert-lee/</loc><lastmod>2024-06-11T00:00:00+00:00</lastmod></url><url><loc>https://securitycocktailhour.com/episodes/episode-30-the-security-career-reality-check-with-may-brooks-kempler/</loc><lastmod>2024-05-07T00:00:00+00:00</lastmod></url><url><loc>https://securitycocktailhour.com/episodes/episode-29-mad-ais-and-poisoned-llms-fighting-digital-insanity-with-michael-silva/</loc><lastmod>2024-04-16T00:00:00+00:00</lastmod></url><url><loc>https://securitycocktailhour.com/episodes/episode-28-threat-intelligence-with-ryan-westman/</loc><lastmod>2024-03-20T00:00:00+00:00</lastmod></url><url><loc>https://securitycocktailhour.com/episodes/episode-27-purple-teaming-with-reut-weitzman/</loc><lastmod>2024-03-08T00:00:00+00:00</lastmod></url><url><loc>https://securitycocktailhour.com/episodes/episode-26-ai-and-the-future-of-security-with-john-dwyer/</loc><lastmod>2024-02-02T00:00:00+00:00</lastmod></url><url><loc>https://securitycocktailhour.com/episodes/episode-25-seven-trillion-reasons-to-drink-from-eric-oneill/</loc><lastmod>2024-01-18T00:00:00+00:00</lastmod></url><url><loc>https://securitycocktailhour.com/episodes/episode-24-what-keeps-monte-fabiani-up-at-night/</loc><lastmod>2024-01-02T00:00:00+00:00</lastmod></url><url><loc>https://securitycocktailhour.com/episodes/episode-23-holiday-security-tips-and-negronis-with-reut-weitzman/</loc><lastmod>2023-12-08T00:00:00+00:00</lastmod></url><url><loc>https://securitycocktailhour.com/episodes/episode-22-zero-trust-and-80-proof-bourbon-with-adam-kohler/</loc><lastmod>2023-11-20T00:00:00+00:00</lastmod></url><url><loc>https://securitycocktailhour.com/episodes/episode-21-medical-devices-halloween-and-whiskey-with-gabrielle-hempel/</loc><lastmod>2023-10-27T00:00:00+00:00</lastmod></url><url><loc>https://securitycocktailhour.com/episodes/episode-20-mai-tais-with-tom-cross/</loc><lastmod>2023-10-12T00:00:00+00:00</lastmod></url><url><loc>https://securitycocktailhour.com/episodes/episode-19-tequila-with-rebecca-cahak/</loc><lastmod>2023-09-19T00:00:00+00:00</lastmod></url><url><loc>https://securitycocktailhour.com/episodes/episode-18-free-choice-with-jason-mar-tang/</loc><lastmod>2023-09-05T00:00:00+00:00</lastmod></url><url><loc>https://securitycocktailhour.com/episodes/episode-17-scotch-and-tea-with-chris-roberts/</loc><lastmod>2023-08-24T00:00:00+00:00</lastmod></url><url><loc>https://securitycocktailhour.com/episodes/episode-16-french-75-with-jennifer-granick/</loc><lastmod>2023-08-02T00:00:00+00:00</lastmod></url><url><loc>https://securitycocktailhour.com/episodes/episode-14-security-campfire-stories/</loc><lastmod>2023-06-22T00:00:00+00:00</lastmod></url><url><loc>https://securitycocktailhour.com/episodes/episode-15-cyber-warrior/</loc><lastmod>2023-06-17T00:00:00+00:00</lastmod></url><url><loc>https://securitycocktailhour.com/episodes/episode-13-so-you-want-to-be-a-security-entrepreneur/</loc><lastmod>2023-06-17T00:00:00+00:00</lastmod></url><url><loc>https://securitycocktailhour.com/episodes/episode-12-security-culture-club/</loc><lastmod>2023-06-08T00:00:00+00:00</lastmod></url><url><loc>https://securitycocktailhour.com/episodes/episode-11-how-to-hire-a-security-team/</loc><lastmod>2023-06-01T00:00:00+00:00</lastmod></url><url><loc>https://securitycocktailhour.com/episodes/episode-10/</loc><lastmod>2023-05-23T00:00:00+00:00</lastmod></url><url><loc>https://securitycocktailhour.com/episodes/episode-09/</loc><lastmod>2023-05-18T00:00:00+00:00</lastmod></url><url><loc>https://securitycocktailhour.com/episodes/episode-08/</loc><lastmod>2023-05-10T00:00:00+00:00</lastmod></url><url><loc>https://securitycocktailhour.com/episodes/episode-07/</loc><lastmod>2023-05-02T00:00:00+00:00</lastmod></url><url><loc>https://securitycocktailhour.com/episodes/episode-06/</loc><lastmod>2023-04-20T00:00:00+00:00</lastmod></url><url><loc>https://securitycocktailhour.com/episodes/episode-05/</loc><lastmod>2023-04-09T00:00:00+00:00</lastmod></url><url><loc>https://securitycocktailhour.com/episodes/episode-04/</loc><lastmod>2023-03-28T00:00:00+00:00</lastmod></url><url><loc>https://securitycocktailhour.com/episodes/episode-03/</loc><lastmod>2023-03-26T00:00:00+00:00</lastmod></url><url><loc>https://securitycocktailhour.com/episodes/episode-01/</loc><lastmod>2023-03-26T00:00:00+00:00</lastmod></url><url><loc>https://securitycocktailhour.com/episodes/episode-02/</loc><lastmod>2023-03-26T00:00:00+00:00</lastmod></url><url><loc>https://securitycocktailhour.com/about/</loc></url><url><loc>https://securitycocktailhour.com/categories/</loc></url><url><loc>https://securitycocktailhour.com/contact/</loc></url><url><loc>https://securitycocktailhour.com/newsletter/</loc></url><url><loc>https://securitycocktailhour.com/partnership/</loc></url><url><loc>https://securitycocktailhour.com/resources/</loc></url></urlset>