<?xml version="1.0" encoding="UTF-8"?>
<urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9" xmlns:xhtml="http://www.w3.org/1999/xhtml">
    <url>
        <loc>https://www.cloudsecuritypodcast.tv</loc>
    </url>
    <url>
        <loc>https://www.cloudsecuritypodcast.tv/videos</loc>
    </url>
    <url>
        <loc>https://www.cloudsecuritypodcast.tv/search</loc>
    </url>
    <url>
        <loc>https://www.cloudsecuritypodcast.tv/about</loc>
    </url>
    <url>
        <loc>https://www.cloudsecuritypodcast.tv/newsletter</loc>
    </url>
    <url>
        <loc>https://www.cloudsecuritypodcast.tv/partner-with-us</loc>
    </url>
    <url>
        <loc>https://www.cloudsecuritypodcast.tv/videos/2023-what-kubernetes-security-looks-like-today-series-devsecops</loc>
    </url>
    <url>
        <loc>https://www.cloudsecuritypodcast.tv/videos/21-yrs-in-cybersecurity-challenges-then-now</loc>
    </url>
    <url>
        <loc>https://www.cloudsecuritypodcast.tv/videos/3-reasons-cybersecurity-drives-innovation</loc>
    </url>
    <url>
        <loc>https://www.cloudsecuritypodcast.tv/videos/3-reasons-how-cybersecurity-drives-transformation</loc>
    </url>
    <url>
        <loc>https://www.cloudsecuritypodcast.tv/videos/3-things-that-broke-the-digital-supply-chain</loc>
    </url>
    <url>
        <loc>https://www.cloudsecuritypodcast.tv/videos/5-major-trends-from-rsa-conference-2024-in-5-mins</loc>
    </url>
    <url>
        <loc>https://www.cloudsecuritypodcast.tv/videos/5-skills-to-level-up-your-cloud-hacking</loc>
    </url>
    <url>
        <loc>https://www.cloudsecuritypodcast.tv/videos/a-dev-friendly-cloud-native-security-pipeline</loc>
    </url>
    <url>
        <loc>https://www.cloudsecuritypodcast.tv/videos/adapting-to-new-threats-copilot-risks-the-future-of-data</loc>
    </url>
    <url>
        <loc>https://www.cloudsecuritypodcast.tv/videos/ai-agents-for-soc-hype-curve-vs-measurable-roi</loc>
    </url>
    <url>
        <loc>https://www.cloudsecuritypodcast.tv/videos/ai-for-soc-automation-a-blueprint-for-the-new-world-of-incident-response</loc>
    </url>
    <url>
        <loc>https://www.cloudsecuritypodcast.tv/videos/ai-is-already-breaking-the-silos-between-appsec-cloudsec</loc>
    </url>
    <url>
        <loc>https://www.cloudsecuritypodcast.tv/videos/ais-impact-on-real-world-problems</loc>
    </url>
    <url>
        <loc>https://www.cloudsecuritypodcast.tv/videos/ais-role-in-security-efficiency---kubernetes-edition</loc>
    </url>
    <url>
        <loc>https://www.cloudsecuritypodcast.tv/videos/an-aws-centric-view-of-google-cloud-identity</loc>
    </url>
    <url>
        <loc>https://www.cloudsecuritypodcast.tv/videos/api-security-best-practice-2022</loc>
    </url>
    <url>
        <loc>https://www.cloudsecuritypodcast.tv/videos/application-security-appsec-101</loc>
    </url>
    <url>
        <loc>https://www.cloudsecuritypodcast.tv/videos/application-security-engineer-skills</loc>
    </url>
    <url>
        <loc>https://www.cloudsecuritypodcast.tv/videos/attack-path-analysis-for-better-kubernetes-security</loc>
    </url>
    <url>
        <loc>https://www.cloudsecuritypodcast.tv/videos/attacking-and-defending-managed-kubernetes-clusters</loc>
    </url>
    <url>
        <loc>https://www.cloudsecuritypodcast.tv/videos/authorization-control-for-enterprise-in-cloud</loc>
    </url>
    <url>
        <loc>https://www.cloudsecuritypodcast.tv/videos/aws-cloud-penetration-testing-explained-with-example</loc>
    </url>
    <url>
        <loc>https://www.cloudsecuritypodcast.tv/videos/aws-cloud-security-strategies-for-2024</loc>
    </url>
    <url>
        <loc>https://www.cloudsecuritypodcast.tv/videos/aws-eks-explained</loc>
    </url>
    <url>
        <loc>https://www.cloudsecuritypodcast.tv/videos/aws-goat-cloud-penetration-testing</loc>
    </url>
    <url>
        <loc>https://www.cloudsecuritypodcast.tv/videos/aws-iam-access-analyzer-explained</loc>
    </url>
    <url>
        <loc>https://www.cloudsecuritypodcast.tv/videos/aws-iam-getting-started</loc>
    </url>
    <url>
        <loc>https://www.cloudsecuritypodcast.tv/videos/aws-multi-account-security-what-netflix-learned</loc>
    </url>
    <url>
        <loc>https://www.cloudsecuritypodcast.tv/videos/aws-re-invent-2019-security-announcements-the-devsecops-in-aws-edition</loc>
    </url>
    <url>
        <loc>https://www.cloudsecuritypodcast.tv/videos/aws-reinforce-2023-recap-highlights</loc>
    </url>
    <url>
        <loc>https://www.cloudsecuritypodcast.tv/videos/aws-reinvent-2022-recap-for-cloud-security-professionals</loc>
    </url>
    <url>
        <loc>https://www.cloudsecuritypodcast.tv/videos/aws-reinvent-2023-all-security-highlights-announcements</loc>
    </url>
    <url>
        <loc>https://www.cloudsecuritypodcast.tv/videos/aws-security-for-large-regulated-enterprise</loc>
    </url>
    <url>
        <loc>https://www.cloudsecuritypodcast.tv/videos/aws-security-using-open-source</loc>
    </url>
    <url>
        <loc>https://www.cloudsecuritypodcast.tv/videos/aws-threat-detection-for-not-so-common-aws-services-explained</loc>
    </url>
    <url>
        <loc>https://www.cloudsecuritypodcast.tv/videos/azure-cloud-security-architecture</loc>
    </url>
    <url>
        <loc>https://www.cloudsecuritypodcast.tv/videos/azure-cloud-security-pentesting-skills</loc>
    </url>
    <url>
        <loc>https://www.cloudsecuritypodcast.tv/videos/azure-kubernetes-service-aks-security-explained</loc>
    </url>
    <url>
        <loc>https://www.cloudsecuritypodcast.tv/videos/azure-security-best-practices-for-cloud-architects</loc>
    </url>
    <url>
        <loc>https://www.cloudsecuritypodcast.tv/videos/azure-security-fundamentals-level-1</loc>
    </url>
    <url>
        <loc>https://www.cloudsecuritypodcast.tv/videos/azure-security-fundamentals-level-200</loc>
    </url>
    <url>
        <loc>https://www.cloudsecuritypodcast.tv/videos/azure-security-fundamentals-zero-trust-with-azure-ad</loc>
    </url>
    <url>
        <loc>https://www.cloudsecuritypodcast.tv/videos/azure-vs-aws-from-a-cybersecurity-lens</loc>
    </url>
    <url>
        <loc>https://www.cloudsecuritypodcast.tv/videos/balancing-efficiency-security-ais-transformation-of-legal-data-analysis-2</loc>
    </url>
    <url>
        <loc>https://www.cloudsecuritypodcast.tv/videos/become-a-cloud-native-ciso-in-2023</loc>
    </url>
    <url>
        <loc>https://www.cloudsecuritypodcast.tv/videos/become-a-cloud-security-architect-in-2023</loc>
    </url>
    <url>
        <loc>https://www.cloudsecuritypodcast.tv/videos/blackhat-usa-2024-highlights-and-recap</loc>
    </url>
    <url>
        <loc>https://www.cloudsecuritypodcast.tv/videos/breaking-and-building-serverless-application-security</loc>
    </url>
    <url>
        <loc>https://www.cloudsecuritypodcast.tv/videos/bridging-cloud-edge-security-multi-cloud-context-remediation</loc>
    </url>
    <url>
        <loc>https://www.cloudsecuritypodcast.tv/videos/build-an-effective-aws-cloud-security-program-in-2024</loc>
    </url>
    <url>
        <loc>https://www.cloudsecuritypodcast.tv/videos/building-a-resilient-cloud-security-program-after-merger-and-acquisition</loc>
    </url>
    <url>
        <loc>https://www.cloudsecuritypodcast.tv/videos/building-a-resilient-security-architecture-for-the-ai-era</loc>
    </url>
    <url>
        <loc>https://www.cloudsecuritypodcast.tv/videos/building-a-soc-team-in-2024---automation-ai</loc>
    </url>
    <url>
        <loc>https://www.cloudsecuritypodcast.tv/videos/building-ai-powered-legal-tools-with-sagemaker-bedrock</loc>
    </url>
    <url>
        <loc>https://www.cloudsecuritypodcast.tv/videos/building-an-engineering-security-culture</loc>
    </url>
    <url>
        <loc>https://www.cloudsecuritypodcast.tv/videos/building-an-incident-response-team-for-high-growth-companies</loc>
    </url>
    <url>
        <loc>https://www.cloudsecuritypodcast.tv/videos/building-applications-with-zero-trust-principles</loc>
    </url>
    <url>
        <loc>https://www.cloudsecuritypodcast.tv/videos/building-blocks-of-cloud-security-program</loc>
    </url>
    <url>
        <loc>https://www.cloudsecuritypodcast.tv/videos/building-data-perimeter-in-cloud-in-2024</loc>
    </url>
    <url>
        <loc>https://www.cloudsecuritypodcast.tv/videos/building-google-cloud-security-products</loc>
    </url>
    <url>
        <loc>https://www.cloudsecuritypodcast.tv/videos/building-modern-identity-iam-roadmap-for-cloud</loc>
    </url>
    <url>
        <loc>https://www.cloudsecuritypodcast.tv/videos/building-observability-platform-for-scale</loc>
    </url>
    <url>
        <loc>https://www.cloudsecuritypodcast.tv/videos/building-platforms-in-highly-regulated-industries-explained</loc>
    </url>
    <url>
        <loc>https://www.cloudsecuritypodcast.tv/videos/building-platforms-in-regulated-industries</loc>
    </url>
    <url>
        <loc>https://www.cloudsecuritypodcast.tv/videos/building-scalable-authorization-in-cloud-native-apps</loc>
    </url>
    <url>
        <loc>https://www.cloudsecuritypodcast.tv/videos/building-scaling-aws-security-guardrails</loc>
    </url>
    <url>
        <loc>https://www.cloudsecuritypodcast.tv/videos/building-smarter-ai-infrastructure-private-ai-shadow-risks-gym-grade-innovation</loc>
    </url>
    <url>
        <loc>https://www.cloudsecuritypodcast.tv/videos/building-threat-detection-for-your-cloud-environment</loc>
    </url>
    <url>
        <loc>https://www.cloudsecuritypodcast.tv/videos/can-you-build-an-ai-soc-with-claude-code-the-reality-vs-hype</loc>
    </url>
    <url>
        <loc>https://www.cloudsecuritypodcast.tv/videos/centralised-credential-management-in-the-cloud</loc>
    </url>
    <url>
        <loc>https://www.cloudsecuritypodcast.tv/videos/centralized-vpc-endpoints---why-it-works-for-aws-networking</loc>
    </url>
    <url>
        <loc>https://www.cloudsecuritypodcast.tv/videos/challenges-with-building-serverless-applications-at-scale</loc>
    </url>
    <url>
        <loc>https://www.cloudsecuritypodcast.tv/videos/ciso-challenges-in-2021</loc>
    </url>
    <url>
        <loc>https://www.cloudsecuritypodcast.tv/videos/ciso-challenges-in-cloud-security</loc>
    </url>
    <url>
        <loc>https://www.cloudsecuritypodcast.tv/videos/ciso-in-a-cloud-world-in-2022</loc>
    </url>
    <url>
        <loc>https://www.cloudsecuritypodcast.tv/videos/ciso-perspective-josh-lemos-ciso-of-gitlab</loc>
    </url>
    <url>
        <loc>https://www.cloudsecuritypodcast.tv/videos/ciso-perspective-sean-catlett-slack-ciso</loc>
    </url>
    <url>
        <loc>https://www.cloudsecuritypodcast.tv/videos/ciso-perspective-series-linkedin-ciso</loc>
    </url>
    <url>
        <loc>https://www.cloudsecuritypodcast.tv/videos/cisos-guide-to-embracing-risk-in-business</loc>
    </url>
    <url>
        <loc>https://www.cloudsecuritypodcast.tv/videos/cloud-governance-using-infrastructure-as-code</loc>
    </url>
    <url>
        <loc>https://www.cloudsecuritypodcast.tv/videos/cloud-hacking-esports-ultimate-hacking-championship</loc>
    </url>
    <url>
        <loc>https://www.cloudsecuritypodcast.tv/videos/cloud-identity-lifecycle-management-explained</loc>
    </url>
    <url>
        <loc>https://www.cloudsecuritypodcast.tv/videos/cloud-incident-response-in-microsoft-azure</loc>
    </url>
    <url>
        <loc>https://www.cloudsecuritypodcast.tv/videos/cloud-infrastructure-security-at-scale</loc>
    </url>
    <url>
        <loc>https://www.cloudsecuritypodcast.tv/videos/cloud-native-security</loc>
    </url>
    <url>
        <loc>https://www.cloudsecuritypodcast.tv/videos/cloud-native-security-opentelemetry-tracing-explained</loc>
    </url>
    <url>
        <loc>https://www.cloudsecuritypodcast.tv/videos/cloud-native-security-strategies-for-2024</loc>
    </url>
    <url>
        <loc>https://www.cloudsecuritypodcast.tv/videos/cloud-native-strategies-from-a-fintech-ciso</loc>
    </url>
    <url>
        <loc>https://www.cloudsecuritypodcast.tv/videos/cloud-security-and-infosec-girls</loc>
    </url>
    <url>
        <loc>https://www.cloudsecuritypodcast.tv/videos/cloud-security-baseline-for-scale</loc>
    </url>
    <url>
        <loc>https://www.cloudsecuritypodcast.tv/videos/cloud-security-detection-response-strategies-that-actually-work</loc>
    </url>
    <url>
        <loc>https://www.cloudsecuritypodcast.tv/videos/cloud-security-evolved-from-cnapp-to-ai-threats-ft-elad-koren-palo-alto-networks</loc>
    </url>
    <url>
        <loc>https://www.cloudsecuritypodcast.tv/videos/cloud-security-in-25-billion-dollar-company</loc>
    </url>
    <url>
        <loc>https://www.cloudsecuritypodcast.tv/videos/cloud-security-in-a-operational-technology-vs-information-technology</loc>
    </url>
    <url>
        <loc>https://www.cloudsecuritypodcast.tv/videos/cloud-security-in-a-world-of-multi-public-cloud</loc>
    </url>
    <url>
        <loc>https://www.cloudsecuritypodcast.tv/videos/cloud-security-in-japan-2020</loc>
    </url>
    <url>
        <loc>https://www.cloudsecuritypodcast.tv/videos/cloud-security-in-the-boardroom-ciso-perspective-with-phil-venables</loc>
    </url>
    <url>
        <loc>https://www.cloudsecuritypodcast.tv/videos/cloud-security-journey-of-dow-jones-post-the-aws-cloud-breach</loc>
    </url>
    <url>
        <loc>https://www.cloudsecuritypodcast.tv/videos/cloud-security-monitoring-in-modern-security-security-stack</loc>
    </url>
    <url>
        <loc>https://www.cloudsecuritypodcast.tv/videos/cloud-security-operations-for-modern-threats</loc>
    </url>
    <url>
        <loc>https://www.cloudsecuritypodcast.tv/videos/cloud-security-programs-with-aws-security-services</loc>
    </url>
    <url>
        <loc>https://www.cloudsecuritypodcast.tv/videos/cloud-security-roadmap</loc>
    </url>
    <url>
        <loc>https://www.cloudsecuritypodcast.tv/videos/cloud-security-testing-in-aws</loc>
    </url>
    <url>
        <loc>https://www.cloudsecuritypodcast.tv/videos/cloudformation-vs-terraform-an-engineers-experience-migrating-aws-iac</loc>
    </url>
    <url>
        <loc>https://www.cloudsecuritypodcast.tv/videos/cnapps-cspms-dont-tell-the-full-cloud-security-story</loc>
    </url>
    <url>
        <loc>https://www.cloudsecuritypodcast.tv/videos/comparing-cloud-security-tools-cwpp-vs-cspm-vs-casb</loc>
    </url>
    <url>
        <loc>https://www.cloudsecuritypodcast.tv/videos/compliance-as-code-in-kubernetes</loc>
    </url>
    <url>
        <loc>https://www.cloudsecuritypodcast.tv/videos/confidential-computing-in-azure-explained</loc>
    </url>
    <url>
        <loc>https://www.cloudsecuritypodcast.tv/videos/container-security-101-in-aws</loc>
    </url>
    <url>
        <loc>https://www.cloudsecuritypodcast.tv/videos/container-security-for-aws</loc>
    </url>
    <url>
        <loc>https://www.cloudsecuritypodcast.tv/videos/continuous-kubernetes-security-in-2023</loc>
    </url>
    <url>
        <loc>https://www.cloudsecuritypodcast.tv/videos/continuous-monitoring-for-controls-vulnerabilities</loc>
    </url>
    <url>
        <loc>https://www.cloudsecuritypodcast.tv/videos/coronavirus-cybersecurity-isolation-life-ashish-rajan</loc>
    </url>
    <url>
        <loc>https://www.cloudsecuritypodcast.tv/videos/creating-effective-sigma-rules-with-ai</loc>
    </url>
    <url>
        <loc>https://www.cloudsecuritypodcast.tv/videos/cybersecurity-asset-management-for-the-modern-security-stack</loc>
    </url>
    <url>
        <loc>https://www.cloudsecuritypodcast.tv/videos/cybersecurity-best-practices-and-password-security-in-cloud-and-ai</loc>
    </url>
    <url>
        <loc>https://www.cloudsecuritypodcast.tv/videos/cybersecurity-for-ai-the-new-threat-landscape-how-do-we-secure-it</loc>
    </url>
    <url>
        <loc>https://www.cloudsecuritypodcast.tv/videos/cybersecurity-isnt-crowded-security-engineering-and-the-5-000-vendor-problem</loc>
    </url>
    <url>
        <loc>https://www.cloudsecuritypodcast.tv/videos/data-governance-best-practices</loc>
    </url>
    <url>
        <loc>https://www.cloudsecuritypodcast.tv/videos/data-resiliency-why-your-backups-arent-enough</loc>
    </url>
    <url>
        <loc>https://www.cloudsecuritypodcast.tv/videos/data-security-and-its-challenges-in-cloud</loc>
    </url>
    <url>
        <loc>https://www.cloudsecuritypodcast.tv/videos/data-security-roadmap-in-2023</loc>
    </url>
    <url>
        <loc>https://www.cloudsecuritypodcast.tv/videos/detection-engineering-with-google-cloud</loc>
    </url>
    <url>
        <loc>https://www.cloudsecuritypodcast.tv/videos/digital-transformation-are-we-there-yet</loc>
    </url>
    <url>
        <loc>https://www.cloudsecuritypodcast.tv/videos/do-you-need-a-cloud-security-posture-management-cspm</loc>
    </url>
    <url>
        <loc>https://www.cloudsecuritypodcast.tv/videos/doing-google-cloud-security-right</loc>
    </url>
    <url>
        <loc>https://www.cloudsecuritypodcast.tv/videos/dynamic-permission-boundaries-a-new-approach-to-cloud-security</loc>
    </url>
    <url>
        <loc>https://www.cloudsecuritypodcast.tv/videos/ebpf-kubernetes-network-security-without-the-blind-sides</loc>
    </url>
    <url>
        <loc>https://www.cloudsecuritypodcast.tv/videos/edge-security-is-the-key-to-cloud-protection</loc>
    </url>
    <url>
        <loc>https://www.cloudsecuritypodcast.tv/videos/escape-proof-cloud-how-block-built-an-automated-approach-to-egress-control</loc>
    </url>
    <url>
        <loc>https://www.cloudsecuritypodcast.tv/videos/essential-strategies-to-master-incident-response-in-cloud</loc>
    </url>
    <url>
        <loc>https://www.cloudsecuritypodcast.tv/videos/evolution-of-kubernetes-security-kubecon-eu-2023</loc>
    </url>
    <url>
        <loc>https://www.cloudsecuritypodcast.tv/videos/finding-and-fixing-security-bugs-in-google-cloud</loc>
    </url>
    <url>
        <loc>https://www.cloudsecuritypodcast.tv/videos/finding-bugs-in-google-cloud</loc>
    </url>
    <url>
        <loc>https://www.cloudsecuritypodcast.tv/videos/finding-security-holes-in-azure-services</loc>
    </url>
    <url>
        <loc>https://www.cloudsecuritypodcast.tv/videos/fixing-cloud-security-with-aws-lambda</loc>
    </url>
    <url>
        <loc>https://www.cloudsecuritypodcast.tv/videos/fixing-that-broken-digital-supply-chain</loc>
    </url>
    <url>
        <loc>https://www.cloudsecuritypodcast.tv/videos/fixing-version-matching-with-a-risk-based-approach-to-sca-in-the-ai-era</loc>
    </url>
    <url>
        <loc>https://www.cloudsecuritypodcast.tv/videos/from-code-suggestions-to-security</loc>
    </url>
    <url>
        <loc>https://www.cloudsecuritypodcast.tv/videos/from-executive-assistant-to-head-of-security</loc>
    </url>
    <url>
        <loc>https://www.cloudsecuritypodcast.tv/videos/from-university-to-a-security-engineer-at-atlassian</loc>
    </url>
    <url>
        <loc>https://www.cloudsecuritypodcast.tv/videos/from-zero-to-hero-in-devops</loc>
    </url>
    <url>
        <loc>https://www.cloudsecuritypodcast.tv/videos/fundamentals-of-aws-cloud-security-assessment</loc>
    </url>
    <url>
        <loc>https://www.cloudsecuritypodcast.tv/videos/gb-skip-navigation-search-create-avatar-image-mindset-modern-soc-strategies-for-cloud-kubernetes-ft-sergej-epp-ex-deutsche-bank</loc>
    </url>
    <url>
        <loc>https://www.cloudsecuritypodcast.tv/videos/getting-an-entry-level-grc-role</loc>
    </url>
    <url>
        <loc>https://www.cloudsecuritypodcast.tv/videos/getting-infrastructure-as-code-iac-security-culture-right</loc>
    </url>
    <url>
        <loc>https://www.cloudsecuritypodcast.tv/videos/getting-started-with-chaos-engineering</loc>
    </url>
    <url>
        <loc>https://www.cloudsecuritypodcast.tv/videos/getting-started-with-hacking-aws-cloud</loc>
    </url>
    <url>
        <loc>https://www.cloudsecuritypodcast.tv/videos/getting-started-with-hacking-aws-ecs</loc>
    </url>
    <url>
        <loc>https://www.cloudsecuritypodcast.tv/videos/google-cloud-hacking-red-team-perspective</loc>
    </url>
    <url>
        <loc>https://www.cloudsecuritypodcast.tv/videos/google-cloud-iap-a-pentester-viewpoint</loc>
    </url>
    <url>
        <loc>https://www.cloudsecuritypodcast.tv/videos/google-cloud-security-fundamentals</loc>
    </url>
    <url>
        <loc>https://www.cloudsecuritypodcast.tv/videos/google-cloud-security-fundamentals-level-2</loc>
    </url>
    <url>
        <loc>https://www.cloudsecuritypodcast.tv/videos/google-cloud-security-how-does-google-cloud-work</loc>
    </url>
    <url>
        <loc>https://www.cloudsecuritypodcast.tv/videos/google-cloud-security-pentesting-methodology</loc>
    </url>
    <url>
        <loc>https://www.cloudsecuritypodcast.tv/videos/guide-to-hybrid-cloud-bare-metal-secret-management</loc>
    </url>
    <url>
        <loc>https://www.cloudsecuritypodcast.tv/videos/hacker-stories-from-the-internet</loc>
    </url>
    <url>
        <loc>https://www.cloudsecuritypodcast.tv/videos/hacker-summer-camp-2022-the-cloud-security-edition</loc>
    </url>
    <url>
        <loc>https://www.cloudsecuritypodcast.tv/videos/have-i-lost-my-secrets</loc>
    </url>
    <url>
        <loc>https://www.cloudsecuritypodcast.tv/videos/high-performance-computing-in-aws-explained</loc>
    </url>
    <url>
        <loc>https://www.cloudsecuritypodcast.tv/videos/hot-takes-with-cisos---dan-maslin</loc>
    </url>
    <url>
        <loc>https://www.cloudsecuritypodcast.tv/videos/hot-takes-with-cisos-cybersecurity-leaders-caleb-sima</loc>
    </url>
    <url>
        <loc>https://www.cloudsecuritypodcast.tv/videos/hot-takes-with-cisos-cybersecurity-leaders-helen-mclaughlin</loc>
    </url>
    <url>
        <loc>https://www.cloudsecuritypodcast.tv/videos/hot-takes-with-cisos-cybersecurity-leaders-merlin-namuth</loc>
    </url>
    <url>
        <loc>https://www.cloudsecuritypodcast.tv/videos/hot-takes-with-cisos-cybersecurity-leaders-sandor-incze</loc>
    </url>
    <url>
        <loc>https://www.cloudsecuritypodcast.tv/videos/hot-takes-with-cisos-cybersecurity-leaders-srinath-kuruvadi</loc>
    </url>
    <url>
        <loc>https://www.cloudsecuritypodcast.tv/videos/how-agents-exfiltrate-data-how-to-defend-them</loc>
    </url>
    <url>
        <loc>https://www.cloudsecuritypodcast.tv/videos/how-atlassian-manages-risk-and-compliance</loc>
    </url>
    <url>
        <loc>https://www.cloudsecuritypodcast.tv/videos/how-attackers-stay-hidden-inside-your-azure-cloud</loc>
    </url>
    <url>
        <loc>https://www.cloudsecuritypodcast.tv/videos/how-bt-tackled-180-years-of-legacy-to-build-a-passwordless-future</loc>
    </url>
    <url>
        <loc>https://www.cloudsecuritypodcast.tv/videos/how-can-ai-improve-security-operations-and-cloud-security-in-2024</loc>
    </url>
    <url>
        <loc>https://www.cloudsecuritypodcast.tv/videos/how-can-we-improve-developer-security-with-ai-in-2024</loc>
    </url>
    <url>
        <loc>https://www.cloudsecuritypodcast.tv/videos/how-confluent-migrated-kubernetes-networking-across-aws-azure-gcp</loc>
    </url>
    <url>
        <loc>https://www.cloudsecuritypodcast.tv/videos/how-is-kubernetes-network-security-evolving</loc>
    </url>
    <url>
        <loc>https://www.cloudsecuritypodcast.tv/videos/how-mdr-and-ai-are-shaping-cybersecurity-in-2024</loc>
    </url>
    <url>
        <loc>https://www.cloudsecuritypodcast.tv/videos/how-to-accelerate-your-aws-security-maturity-in-2023</loc>
    </url>
    <url>
        <loc>https://www.cloudsecuritypodcast.tv/videos/how-to-attract-and-retain-more-women-engineers</loc>
    </url>
    <url>
        <loc>https://www.cloudsecuritypodcast.tv/videos/how-to-automate-security-in-google-cloud</loc>
    </url>
    <url>
        <loc>https://www.cloudsecuritypodcast.tv/videos/how-to-become-a-cloud-native-security-architect</loc>
    </url>
    <url>
        <loc>https://www.cloudsecuritypodcast.tv/videos/how-to-become-a-cloud-native-security-engineer</loc>
    </url>
    <url>
        <loc>https://www.cloudsecuritypodcast.tv/videos/how-to-become-a-cloud-security-architect-in-2021</loc>
    </url>
    <url>
        <loc>https://www.cloudsecuritypodcast.tv/videos/how-to-become-a-cloud-security-engineer</loc>
    </url>
    <url>
        <loc>https://www.cloudsecuritypodcast.tv/videos/how-to-become-a-cloud-security-engineer-in-2020</loc>
    </url>
    <url>
        <loc>https://www.cloudsecuritypodcast.tv/videos/how-to-become-a-senior-cloud-security-engineer</loc>
    </url>
    <url>
        <loc>https://www.cloudsecuritypodcast.tv/videos/how-to-become-a-successful-ciso-in-2020</loc>
    </url>
    <url>
        <loc>https://www.cloudsecuritypodcast.tv/videos/how-to-build-a-cloud-security-program-media-industry</loc>
    </url>
    <url>
        <loc>https://www.cloudsecuritypodcast.tv/videos/how-to-build-a-cloud-security-program-with-containers</loc>
    </url>
    <url>
        <loc>https://www.cloudsecuritypodcast.tv/videos/how-to-build-a-modern-cyber-security-program-in-2023</loc>
    </url>
    <url>
        <loc>https://www.cloudsecuritypodcast.tv/videos/how-to-build-aws-multi-account-infrastructure-with-security-and-speed</loc>
    </url>
    <url>
        <loc>https://www.cloudsecuritypodcast.tv/videos/how-to-build-cybersecurity-training-program</loc>
    </url>
    <url>
        <loc>https://www.cloudsecuritypodcast.tv/videos/how-to-build-secure-environments-in-google-cloud</loc>
    </url>
    <url>
        <loc>https://www.cloudsecuritypodcast.tv/videos/how-to-build-secure-environments-in-microsoft-azure</loc>
    </url>
    <url>
        <loc>https://www.cloudsecuritypodcast.tv/videos/how-to-build-trust-in-an-ai-soc-for-regulated-environments</loc>
    </url>
    <url>
        <loc>https://www.cloudsecuritypodcast.tv/videos/how-to-create-an-effective-cyber-security-team</loc>
    </url>
    <url>
        <loc>https://www.cloudsecuritypodcast.tv/videos/how-to-detect-software-supply-chain-attacks-with-honeytokens</loc>
    </url>
    <url>
        <loc>https://www.cloudsecuritypodcast.tv/videos/how-to-do-google-cloud-security-the-2020-edition</loc>
    </url>
    <url>
        <loc>https://www.cloudsecuritypodcast.tv/videos/how-to-escape-clusters-in-a-managed-kubernetes-cluster</loc>
    </url>
    <url>
        <loc>https://www.cloudsecuritypodcast.tv/videos/how-to-get-fedramp-certified-in-aws</loc>
    </url>
    <url>
        <loc>https://www.cloudsecuritypodcast.tv/videos/how-to-prepare-for-gdpr-in-azure-cloud-environment</loc>
    </url>
    <url>
        <loc>https://www.cloudsecuritypodcast.tv/videos/how-to-secure-and-improve-your-cloud-environment</loc>
    </url>
    <url>
        <loc>https://www.cloudsecuritypodcast.tv/videos/how-to-secure-aws-cloud-environment-for-healthcare</loc>
    </url>
    <url>
        <loc>https://www.cloudsecuritypodcast.tv/videos/how-to-secure-cloud-managed-kubernetes</loc>
    </url>
    <url>
        <loc>https://www.cloudsecuritypodcast.tv/videos/how-to-secure-container-environment-for-financial-services</loc>
    </url>
    <url>
        <loc>https://www.cloudsecuritypodcast.tv/videos/how-to-start-in-bug-bounty-in-2020</loc>
    </url>
    <url>
        <loc>https://www.cloudsecuritypodcast.tv/videos/how-to-threat-model-the-digital-supply-chain-in-cloud</loc>
    </url>
    <url>
        <loc>https://www.cloudsecuritypodcast.tv/videos/identity-cross-account-access-management-in-aws-cloud</loc>
    </url>
    <url>
        <loc>https://www.cloudsecuritypodcast.tv/videos/implementing-cloud-security-tools-the-right-way</loc>
    </url>
    <url>
        <loc>https://www.cloudsecuritypodcast.tv/videos/incident-response-in-aws-cloud</loc>
    </url>
    <url>
        <loc>https://www.cloudsecuritypodcast.tv/videos/incident-response-of-kubernetes-and-how-to-automate-containment</loc>
    </url>
    <url>
        <loc>https://www.cloudsecuritypodcast.tv/videos/infrastructure-as-code-security</loc>
    </url>
    <url>
        <loc>https://www.cloudsecuritypodcast.tv/videos/is-public-cloud-secure</loc>
    </url>
    <url>
        <loc>https://www.cloudsecuritypodcast.tv/videos/is-there-devsecops-in-cloud</loc>
    </url>
    <url>
        <loc>https://www.cloudsecuritypodcast.tv/videos/is-your-ci-cd-pipeline-your-biggest-security-risk</loc>
    </url>
    <url>
        <loc>https://www.cloudsecuritypodcast.tv/videos/kubernetes-best-practices-2022</loc>
    </url>
    <url>
        <loc>https://www.cloudsecuritypodcast.tv/videos/kubernetes-cluster-security-audit-explained</loc>
    </url>
    <url>
        <loc>https://www.cloudsecuritypodcast.tv/videos/kubernetes-goat-vulnerable-by-design</loc>
    </url>
    <url>
        <loc>https://www.cloudsecuritypodcast.tv/videos/kubernetes-network-security-for-multi-tenancy</loc>
    </url>
    <url>
        <loc>https://www.cloudsecuritypodcast.tv/videos/kubernetes-runtime-threat-detection-and-response-falco-sysdig</loc>
    </url>
    <url>
        <loc>https://www.cloudsecuritypodcast.tv/videos/kubernetes-security-at-scale-in-a-ci-cd-pipeline</loc>
    </url>
    <url>
        <loc>https://www.cloudsecuritypodcast.tv/videos/kubernetes-security-best-practices-in-2022</loc>
    </url>
    <url>
        <loc>https://www.cloudsecuritypodcast.tv/videos/kubernetes-security-explained-for-those-starting-today</loc>
    </url>
    <url>
        <loc>https://www.cloudsecuritypodcast.tv/videos/kubernetes-security-trends-2024-software-supply-chain-security-zero-trust-and-ai</loc>
    </url>
    <url>
        <loc>https://www.cloudsecuritypodcast.tv/videos/learning-terraform-as-a-cloud-software-engineer</loc>
    </url>
    <url>
        <loc>https://www.cloudsecuritypodcast.tv/videos/manage-privileged-access-for-kubernetes-cloud</loc>
    </url>
    <url>
        <loc>https://www.cloudsecuritypodcast.tv/videos/managing-threats-in-aws-using-aws-tools</loc>
    </url>
    <url>
        <loc>https://www.cloudsecuritypodcast.tv/videos/microsoft-ignite-2020-sydney-security-releases</loc>
    </url>
    <url>
        <loc>https://www.cloudsecuritypodcast.tv/videos/migrating-from-monolith-to-cloud-native</loc>
    </url>
    <url>
        <loc>https://www.cloudsecuritypodcast.tv/videos/migrating-from-tick-box-compliance-to-automating-grc-in-a-multi-cloud-world</loc>
    </url>
    <url>
        <loc>https://www.cloudsecuritypodcast.tv/videos/more-fake-code-than-real-ai-supply-chain-security-explained</loc>
    </url>
    <url>
        <loc>https://www.cloudsecuritypodcast.tv/videos/multi-cloud-strategy</loc>
    </url>
    <url>
        <loc>https://www.cloudsecuritypodcast.tv/videos/multicloud-strategy-for-aws-and-gcp</loc>
    </url>
    <url>
        <loc>https://www.cloudsecuritypodcast.tv/videos/navigating-nist-csf-2-0-guide-to-frameworks-and-governance</loc>
    </url>
    <url>
        <loc>https://www.cloudsecuritypodcast.tv/videos/network-pentest-2-0-the-cloud-pentest-revolution</loc>
    </url>
    <url>
        <loc>https://www.cloudsecuritypodcast.tv/videos/network-security-for-kubernetes</loc>
    </url>
    <url>
        <loc>https://www.cloudsecuritypodcast.tv/videos/network-security-in-cloud-native-world</loc>
    </url>
    <url>
        <loc>https://www.cloudsecuritypodcast.tv/videos/new-identity-blueprint-for-a-future-with-cloud-ai</loc>
    </url>
    <url>
        <loc>https://www.cloudsecuritypodcast.tv/videos/nist-cybersecurity-metrics-for-the-board</loc>
    </url>
    <url>
        <loc>https://www.cloudsecuritypodcast.tv/videos/offensive-cloud-security-program-for-2024</loc>
    </url>
    <url>
        <loc>https://www.cloudsecuritypodcast.tv/videos/payment-security-with-cryptography-aws-nitro-and-lambda</loc>
    </url>
    <url>
        <loc>https://www.cloudsecuritypodcast.tv/videos/phishing-scores-will-be-gone-in-18-months-the-future-of-social-engineering</loc>
    </url>
    <url>
        <loc>https://www.cloudsecuritypodcast.tv/videos/podcast-collaboration-hacker-valley-studio</loc>
    </url>
    <url>
        <loc>https://www.cloudsecuritypodcast.tv/videos/preventative-cloud-security-explained</loc>
    </url>
    <url>
        <loc>https://www.cloudsecuritypodcast.tv/videos/prioritizing-cloud-security-how-to-decide-what-to-protect-first</loc>
    </url>
    <url>
        <loc>https://www.cloudsecuritypodcast.tv/videos/privileged-access-management-in-large-cloud-environments</loc>
    </url>
    <url>
        <loc>https://www.cloudsecuritypodcast.tv/videos/proactive-security-strategies-for-ai-integration</loc>
    </url>
    <url>
        <loc>https://www.cloudsecuritypodcast.tv/videos/proactive-vs-reactive-security-in-microsoft-azure</loc>
    </url>
    <url>
        <loc>https://www.cloudsecuritypodcast.tv/videos/ransomware-ai-minutes-to-meltdown-a-new-strategy-for-resiliency</loc>
    </url>
    <url>
        <loc>https://www.cloudsecuritypodcast.tv/videos/ransomware-supply-chain-attacks-in-aws</loc>
    </url>
    <url>
        <loc>https://www.cloudsecuritypodcast.tv/videos/real-world-cloud-security-challenges-and-solutions-explained-for-2024</loc>
    </url>
    <url>
        <loc>https://www.cloudsecuritypodcast.tv/videos/real-world-cloud-threats-and-multi-cloud-defense-in-2024</loc>
    </url>
    <url>
        <loc>https://www.cloudsecuritypodcast.tv/videos/realities-of-cloud-networking-in-aws</loc>
    </url>
    <url>
        <loc>https://www.cloudsecuritypodcast.tv/videos/red-team-in-cloud</loc>
    </url>
    <url>
        <loc>https://www.cloudsecuritypodcast.tv/videos/red-team-in-google-cloud</loc>
    </url>
    <url>
        <loc>https://www.cloudsecuritypodcast.tv/videos/risk-analysis-of-kubernetes-security</loc>
    </url>
    <url>
        <loc>https://www.cloudsecuritypodcast.tv/videos/risk-management-in-cloud-security</loc>
    </url>
    <url>
        <loc>https://www.cloudsecuritypodcast.tv/videos/rsa-conference-2023-recap-in-5-minutes</loc>
    </url>
    <url>
        <loc>https://www.cloudsecuritypodcast.tv/videos/scaling-a-practical-aws-asset-management-program</loc>
    </url>
    <url>
        <loc>https://www.cloudsecuritypodcast.tv/videos/scaling-container-security-without-slowing-developers-ft-cailyn-edwards-sig-security</loc>
    </url>
    <url>
        <loc>https://www.cloudsecuritypodcast.tv/videos/scaling-devsecops-for-cloud-in-2024</loc>
    </url>
    <url>
        <loc>https://www.cloudsecuritypodcast.tv/videos/secret-management-for-modern-apps-explained</loc>
    </url>
    <url>
        <loc>https://www.cloudsecuritypodcast.tv/videos/secure-your-saas-applications-like-this</loc>
    </url>
    <url>
        <loc>https://www.cloudsecuritypodcast.tv/videos/securing-ai-applications-in-the-cloud</loc>
    </url>
    <url>
        <loc>https://www.cloudsecuritypodcast.tv/videos/securing-ai-threat-modeling-detection-live-panel-with-anthropic-canva-bsidessf</loc>
    </url>
    <url>
        <loc>https://www.cloudsecuritypodcast.tv/videos/securitng-the-kubernetes-supply-chain</loc>
    </url>
    <url>
        <loc>https://www.cloudsecuritypodcast.tv/videos/security-and-compliance-in-aws-cloud</loc>
    </url>
    <url>
        <loc>https://www.cloudsecuritypodcast.tv/videos/security-chaos-engineering-experiments-for-beginners</loc>
    </url>
    <url>
        <loc>https://www.cloudsecuritypodcast.tv/videos/security-for-ai-ml-models-in-aws</loc>
    </url>
    <url>
        <loc>https://www.cloudsecuritypodcast.tv/videos/security-governance-and-compliance-in-serverless-applications</loc>
    </url>
    <url>
        <loc>https://www.cloudsecuritypodcast.tv/videos/serverless-security-best-practices</loc>
    </url>
    <url>
        <loc>https://www.cloudsecuritypodcast.tv/videos/service-mesh-security-explained</loc>
    </url>
    <url>
        <loc>https://www.cloudsecuritypodcast.tv/videos/sidecar-container-vulnerability-in-kubernetes-explained</loc>
    </url>
    <url>
        <loc>https://www.cloudsecuritypodcast.tv/videos/skills-needed-for-an-associate-cloud-security-engineer</loc>
    </url>
    <url>
        <loc>https://www.cloudsecuritypodcast.tv/videos/so-you-want-to-do-google-cloud-threat-detection-start-here</loc>
    </url>
    <url>
        <loc>https://www.cloudsecuritypodcast.tv/videos/software-signing-for-kubernetes-supply-chain-everybody-else</loc>
    </url>
    <url>
        <loc>https://www.cloudsecuritypodcast.tv/videos/software-supply-chain-controls-for-terraform</loc>
    </url>
    <url>
        <loc>https://www.cloudsecuritypodcast.tv/videos/start-here-for-kubernetes-security</loc>
    </url>
    <url>
        <loc>https://www.cloudsecuritypodcast.tv/videos/state-of-cloud-security---practitioner-edition</loc>
    </url>
    <url>
        <loc>https://www.cloudsecuritypodcast.tv/videos/state-of-cloud-security-2024---leadership-edition</loc>
    </url>
    <url>
        <loc>https://www.cloudsecuritypodcast.tv/videos/streamlining-aws-cloud-access-controls-for-human-and-non-human-identities---aws-iam-access-analyzer</loc>
    </url>
    <url>
        <loc>https://www.cloudsecuritypodcast.tv/videos/talking-cloud-security-with-hacker-valley-studio</loc>
    </url>
    <url>
        <loc>https://www.cloudsecuritypodcast.tv/videos/the-cloud-to-code-dilemma-lets-talk</loc>
    </url>
    <url>
        <loc>https://www.cloudsecuritypodcast.tv/videos/the-economics-of-cybersecurity-and-trends</loc>
    </url>
    <url>
        <loc>https://www.cloudsecuritypodcast.tv/videos/the-evolution-of-email-security-from-pre-breach-to-post-breach-protection</loc>
    </url>
    <url>
        <loc>https://www.cloudsecuritypodcast.tv/videos/the-evolution-of-infrastructure-as-code-so-far---2024-edition</loc>
    </url>
    <url>
        <loc>https://www.cloudsecuritypodcast.tv/videos/the-future-of-software-development-with-ai</loc>
    </url>
    <url>
        <loc>https://www.cloudsecuritypodcast.tv/videos/the-new-future-of-cloud-security</loc>
    </url>
    <url>
        <loc>https://www.cloudsecuritypodcast.tv/videos/the-role-of-application-security-in-2024</loc>
    </url>
    <url>
        <loc>https://www.cloudsecuritypodcast.tv/videos/the-role-of-cloud-security-research-in-2024</loc>
    </url>
    <url>
        <loc>https://www.cloudsecuritypodcast.tv/videos/the-role-of-platform-engineers-in-scaling-enterprise-security</loc>
    </url>
    <url>
        <loc>https://www.cloudsecuritypodcast.tv/videos/the-role-of-real-time-defense-in-cloud-security</loc>
    </url>
    <url>
        <loc>https://www.cloudsecuritypodcast.tv/videos/the-security-gaps-in-aws-bedrock-azure-ai-you-need-to-know</loc>
    </url>
    <url>
        <loc>https://www.cloudsecuritypodcast.tv/videos/the-terraform-lift-shift-playbook-migrating-200-apps-to-multi-cloud-with-terraform</loc>
    </url>
    <url>
        <loc>https://www.cloudsecuritypodcast.tv/videos/the-truth-about-agentic-ai-in-the-soc-reality-vs-hype</loc>
    </url>
    <url>
        <loc>https://www.cloudsecuritypodcast.tv/videos/the-truth-about-ai-in-the-soc-from-alert-fatigue-to-detection-engineering</loc>
    </url>
    <url>
        <loc>https://www.cloudsecuritypodcast.tv/videos/the-truth-about-cnapp-and-kubernetes-security</loc>
    </url>
    <url>
        <loc>https://www.cloudsecuritypodcast.tv/videos/they-scanned-entire-github-for-secrets-and-found-this</loc>
    </url>
    <url>
        <loc>https://www.cloudsecuritypodcast.tv/videos/threat-analyst-skills</loc>
    </url>
    <url>
        <loc>https://www.cloudsecuritypodcast.tv/videos/threat-detection-and-incident-response-in-cloud</loc>
    </url>
    <url>
        <loc>https://www.cloudsecuritypodcast.tv/videos/threat-detection-for-not-so-common-cloud-services</loc>
    </url>
    <url>
        <loc>https://www.cloudsecuritypodcast.tv/videos/threat-hunting-in-aws</loc>
    </url>
    <url>
        <loc>https://www.cloudsecuritypodcast.tv/videos/threat-intelligence-in-azure</loc>
    </url>
    <url>
        <loc>https://www.cloudsecuritypodcast.tv/videos/threat-modeling-the-ai-agent-architecture-threats-monitoring</loc>
    </url>
    <url>
        <loc>https://www.cloudsecuritypodcast.tv/videos/top-3-cloud-security-predictions-for-2025-from-cloud-security-expert</loc>
    </url>
    <url>
        <loc>https://www.cloudsecuritypodcast.tv/videos/traditional-pam-vs-cloud-cpam-for-a-cloud-first-world</loc>
    </url>
    <url>
        <loc>https://www.cloudsecuritypodcast.tv/videos/understand-your-cloud-security-landscape-to-cut-through-the-noise</loc>
    </url>
    <url>
        <loc>https://www.cloudsecuritypodcast.tv/videos/understanding-a-10b-fraud-vector-in-cloud-native-workflows</loc>
    </url>
    <url>
        <loc>https://www.cloudsecuritypodcast.tv/videos/understanding-google-cloud-security-fundamentals</loc>
    </url>
    <url>
        <loc>https://www.cloudsecuritypodcast.tv/videos/understanding-threat-modeling-in-cloud</loc>
    </url>
    <url>
        <loc>https://www.cloudsecuritypodcast.tv/videos/using-ai-agents-to-solve-cloud-vulnerability-overload</loc>
    </url>
    <url>
        <loc>https://www.cloudsecuritypodcast.tv/videos/using-ai-to-fix-your-cloud-security-backlog-beyond-visibility</loc>
    </url>
    <url>
        <loc>https://www.cloudsecuritypodcast.tv/videos/using-data-perimeters-in-aws-to-scale-guardrails</loc>
    </url>
    <url>
        <loc>https://www.cloudsecuritypodcast.tv/videos/what-is-a-connected-car-how-to-secure-its-api</loc>
    </url>
    <url>
        <loc>https://www.cloudsecuritypodcast.tv/videos/what-is-a-security-data-lake</loc>
    </url>
    <url>
        <loc>https://www.cloudsecuritypodcast.tv/videos/what-is-ai-spm</loc>
    </url>
    <url>
        <loc>https://www.cloudsecuritypodcast.tv/videos/what-is-azure-identity-management</loc>
    </url>
    <url>
        <loc>https://www.cloudsecuritypodcast.tv/videos/what-is-cadr</loc>
    </url>
    <url>
        <loc>https://www.cloudsecuritypodcast.tv/videos/what-is-cloud-native-application-protection-cnapp</loc>
    </url>
    <url>
        <loc>https://www.cloudsecuritypodcast.tv/videos/what-is-confidential-computing-explained-for-2024</loc>
    </url>
    <url>
        <loc>https://www.cloudsecuritypodcast.tv/videos/what-is-ctem</loc>
    </url>
    <url>
        <loc>https://www.cloudsecuritypodcast.tv/videos/what-is-cyber-resilience-in-cloud</loc>
    </url>
    <url>
        <loc>https://www.cloudsecuritypodcast.tv/videos/what-is-devsecops-devsecops-with-cloud-ai-explained-for-2023</loc>
    </url>
    <url>
        <loc>https://www.cloudsecuritypodcast.tv/videos/what-is-digital-risk-protection-why-is-it-important</loc>
    </url>
    <url>
        <loc>https://www.cloudsecuritypodcast.tv/videos/what-is-good-company-culture</loc>
    </url>
    <url>
        <loc>https://www.cloudsecuritypodcast.tv/videos/what-is-infrastructure-as-code-security</loc>
    </url>
    <url>
        <loc>https://www.cloudsecuritypodcast.tv/videos/what-is-saas-security-posture-management-sspm</loc>
    </url>
    <url>
        <loc>https://www.cloudsecuritypodcast.tv/videos/what-is-sbom-ibom</loc>
    </url>
    <url>
        <loc>https://www.cloudsecuritypodcast.tv/videos/what-is-security-chaos-engineering</loc>
    </url>
    <url>
        <loc>https://www.cloudsecuritypodcast.tv/videos/what-is-sre-when-do-you-need-it</loc>
    </url>
    <url>
        <loc>https://www.cloudsecuritypodcast.tv/videos/what-is-the-future-of-security-operations-with-ai-in-2024</loc>
    </url>
    <url>
        <loc>https://www.cloudsecuritypodcast.tv/videos/what-is-the-role-of-application-security-posture-management-in-cybersecurity</loc>
    </url>
    <url>
        <loc>https://www.cloudsecuritypodcast.tv/videos/what-the-heck-is-ci-cd</loc>
    </url>
    <url>
        <loc>https://www.cloudsecuritypodcast.tv/videos/why-email-breaches-still-happen</loc>
    </url>
    <url>
        <loc>https://www.cloudsecuritypodcast.tv/videos/why-engineers-ignore-security-building-processes-that-actually-work</loc>
    </url>
    <url>
        <loc>https://www.cloudsecuritypodcast.tv/videos/why-identity-and-edge-security-matters-for-cloud-security</loc>
    </url>
    <url>
        <loc>https://www.cloudsecuritypodcast.tv/videos/why-least-privilege-matters-in-cloud-security</loc>
    </url>
    <url>
        <loc>https://www.cloudsecuritypodcast.tv/videos/why-security-can-be-stricter-a-zero-trust-approach-to-appsec-with-ai</loc>
    </url>
    <url>
        <loc>https://www.cloudsecuritypodcast.tv/videos/why-siloed-security-fails-in-the-cloud-a-new-horizontal-approach</loc>
    </url>
    <url>
        <loc>https://www.cloudsecuritypodcast.tv/videos/why-solving-the-data-problem-is-key-to-cloud-security</loc>
    </url>
    <url>
        <loc>https://www.cloudsecuritypodcast.tv/videos/will-application-security-eat-cloud-security-for-lunch</loc>
    </url>
    <url>
        <loc>https://www.cloudsecuritypodcast.tv/videos/women-in-cybersecurity</loc>
    </url>
    <url>
        <loc>https://www.cloudsecuritypodcast.tv/videos/your-secops-team-cant-save-your-cloud-a-new-blueprint-for-security</loc>
    </url>
    <url>
        <loc>https://www.cloudsecuritypodcast.tv/videos/zero-trust-the-triple-paradox</loc>
    </url>
    <url>
        <loc>https://www.cloudsecuritypodcast.tv/channel/ai-in-cloud-security</loc>
    </url>
    <url>
        <loc>https://www.cloudsecuritypodcast.tv/channel/aws-security</loc>
    </url>
    <url>
        <loc>https://www.cloudsecuritypodcast.tv/channel/azure-security</loc>
    </url>
    <url>
        <loc>https://www.cloudsecuritypodcast.tv/channel/ciso-cso-interviews</loc>
    </url>
    <url>
        <loc>https://www.cloudsecuritypodcast.tv/channel/cloud-native-security-series</loc>
    </url>
    <url>
        <loc>https://www.cloudsecuritypodcast.tv/channel/cloud-security-careers</loc>
    </url>
    <url>
        <loc>https://www.cloudsecuritypodcast.tv/channel/cloud-security-engineering-series</loc>
    </url>
    <url>
        <loc>https://www.cloudsecuritypodcast.tv/channel/cloud-security-series</loc>
    </url>
    <url>
        <loc>https://www.cloudsecuritypodcast.tv/channel/container-security-series</loc>
    </url>
    <url>
        <loc>https://www.cloudsecuritypodcast.tv/channel/data-security</loc>
    </url>
    <url>
        <loc>https://www.cloudsecuritypodcast.tv/channel/devsecops-appsec-episode</loc>
    </url>
    <url>
        <loc>https://www.cloudsecuritypodcast.tv/channel/google-cloud-security</loc>
    </url>
    <url>
        <loc>https://www.cloudsecuritypodcast.tv/channel/hot-takes</loc>
    </url>
    <url>
        <loc>https://www.cloudsecuritypodcast.tv/channel/identify-and-access-management-iam</loc>
    </url>
    <url>
        <loc>https://www.cloudsecuritypodcast.tv/channel/kubernetes-security</loc>
    </url>
    <url>
        <loc>https://www.cloudsecuritypodcast.tv/channel/offensive-security-cloud</loc>
    </url>
    <url>
        <loc>https://www.cloudsecuritypodcast.tv/channel/red-team-in-cloud-series</loc>
    </url>
    <url>
        <loc>https://www.cloudsecuritypodcast.tv/channel/serverless-series</loc>
    </url>
    <url>
        <loc>https://www.cloudsecuritypodcast.tv/season/originals</loc>
    </url>
    <url>
        <loc>https://www.cloudsecuritypodcast.tv/season/season-five</loc>
    </url>
    <url>
        <loc>https://www.cloudsecuritypodcast.tv/season/season-four</loc>
    </url>
    <url>
        <loc>https://www.cloudsecuritypodcast.tv/season/season-one</loc>
    </url>
    <url>
        <loc>https://www.cloudsecuritypodcast.tv/season/season-six</loc>
    </url>
    <url>
        <loc>https://www.cloudsecuritypodcast.tv/season/season-three</loc>
    </url>
    <url>
        <loc>https://www.cloudsecuritypodcast.tv/season/season-two</loc>
    </url>
    <url>
        <loc>https://www.cloudsecuritypodcast.tv/blog/top-10-cloud-security-podcasts-to-follow-in-2025</loc>
    </url>
    <url>
        <loc>https://www.cloudsecuritypodcast.tv/policy/privacy-policy</loc>
    </url>
    <url>
        <loc>https://www.cloudsecuritypodcast.tv/policy/terms-of-service</loc>
    </url>
</urlset>