<?xml version='1.0' encoding='UTF-8'?><urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9" xmlns:video="http://www.google.com/schemas/sitemap-video/1.1" xmlns:image="http://www.google.com/schemas/sitemap-image/1.1"><url><loc>https://hackervalley.com/e/confidence-coaching-and-the-s-word-with-mel-reyes</loc><lastmod>2025-07-10</lastmod></url><url><loc>https://hackervalley.com/e/we-are-here-part-1-patrice-washington</loc><lastmod>2024-04-06</lastmod></url><url><loc>https://hackervalley.com/e/hacker-valley-blue-s2-episode-2-marcus-carey</loc><lastmod>2024-04-06</lastmod></url><url><loc>https://hackervalley.com/e/cultivating-client-trust-at-cybercon-with-ntts-dirk-hodgson-adam-green</loc><lastmod>2024-04-06</lastmod></url><url><loc>https://hackervalley.com/e/episode-75-losing-graciously-with-graham-cluley</loc><lastmod>2024-04-06</lastmod></url><url><loc>https://hackervalley.com/e/balancing-work-parenting-in-cybersecurity</loc><lastmod>2024-04-06</lastmod></url><url><loc>https://hackervalley.com/e/people-focused-leadership-in-cybersecurity-with-cody-wass</loc><lastmod>2024-04-06</lastmod></url><url><loc>https://hackervalley.com/e/hacker-valley-blue-season-2-finale</loc><lastmod>2024-04-06</lastmod></url><url><loc>https://hackervalley.com/e/hackers-have-hr-now-featuring-christopher-budd</loc><lastmod>2025-03-27</lastmod></url><url><loc>https://hackervalley.com/e/what-most-cybersecurity-advice-misses-and-how-to-fix-it-with-robert-hansen</loc><lastmod>2025-04-03</lastmod></url><url><loc>https://hackervalley.com/e/i-built-an-ai-version-of-myself-heres-why-with-marcus-j-carey</loc><lastmod>2025-03-15</lastmod></url><url><loc>https://hackervalley.com/e/episode-200</loc><lastmod>2024-04-06</lastmod></url><url><loc>https://hackervalley.com/e/reconnecting-to-childhood-creativity-with-mari-reisberg</loc><lastmod>2024-04-06</lastmod></url><url><loc>https://hackervalley.com/e/black-hat-2024-conference-pre-game</loc><lastmod>2024-08-09</lastmod></url><url><loc>https://hackervalley.com/e/ai-and-the-future-of-cyber-defense-with-john-hubbard</loc><lastmod>2024-10-08</lastmod></url><url><loc>https://hackervalley.com/e/episode-154-equity-in-technology-with-olivia-herriford</loc><lastmod>2024-04-06</lastmod></url><url><loc>https://hackervalley.com/e/episode-14-quality-time-with-itsp-a-podcaster-s-podcast</loc><lastmod>2024-04-06</lastmod></url><url><loc>https://hackervalley.com/e/standing-out-on-linkedin-as-a-cybersecurity-professional-with-chris-hughes</loc><lastmod>2024-04-06</lastmod></url><url><loc>https://hackervalley.com/e/underrepresented-episode-2</loc><lastmod>2024-04-06</lastmod></url><url><loc>https://hackervalley.com/e/episode-61-conferences-and-careers-post-covid-with-kathleen-smith</loc><lastmod>2024-04-06</lastmod></url><url><loc>https://hackervalley.com/e/episode-43-a-dark-episode-with-jack-rhysider</loc><lastmod>2024-04-06</lastmod></url><url><loc>https://hackervalley.com/e/episode-147-learning-cybersecurity-until-you-get-it-right-with-john-strand</loc><lastmod>2024-04-06</lastmod></url><url><loc>https://hackervalley.com/e/episode-109-honest-security-with-jason-meller</loc><lastmod>2024-04-06</lastmod></url><url><loc>https://hackervalley.com/e/learning-how-to-learn-mastering-the-cyber-fundamentals-with-rich-greene</loc><lastmod>2025-10-16</lastmod></url><url><loc>https://hackervalley.com/e/rise-of-the-machines-why-your-attack-surface-has-more-holes-than-you-think-ft-pandian-gnanaprakasam</loc><lastmod>2025-01-28</lastmod></url><url><loc>https://hackervalley.com/e/prioritizing-proactive-cybersecurity-with-richard-rushing</loc><lastmod>2024-04-06</lastmod></url><url><loc>https://hackervalley.com/e/episode-74-origins-of-deception-technology-with-haroon-meer</loc><lastmod>2024-04-06</lastmod></url><url><loc>https://hackervalley.com/e/episode-35-not-a-moment-but-a-movement-with-makinde-adeagbo</loc><lastmod>2024-04-06</lastmod></url><url><loc>https://hackervalley.com/e/episode-56-digging-into-deepfakes-with-alyssa-miller</loc><lastmod>2024-04-06</lastmod></url><url><loc>https://hackervalley.com/e/improv-ing-your-way-to-better-vendor-meetings-with-brad-liggett</loc><lastmod>2024-04-06</lastmod></url><url><loc>https://hackervalley.com/e/episode-160-creating-valuable-tech-content-with-ken-underhill</loc><lastmod>2024-04-06</lastmod></url><url><loc>https://hackervalley.com/e/episode-164-demystifying-product-innovation-with-erik-goldman</loc><lastmod>2024-04-06</lastmod></url><url><loc>https://hackervalley.com/e/episode-116-start-up-secure-with-chris-castaldo</loc><lastmod>2024-04-06</lastmod></url><url><loc>https://hackervalley.com/e/building-tech-and-adding-value-in-the-era-of-ai-with-josh-danielson</loc><lastmod>2024-05-14</lastmod></url><url><loc>https://hackervalley.com/e/think-like-a-hacker-before-the-hack-happens-with-john-hammond</loc><lastmod>2026-01-01</lastmod></url><url><loc>https://hackervalley.com/e/networking-2-0-the-future-of-decentralized-networking-access-management</loc><lastmod>2024-07-22</lastmod></url><url><loc>https://hackervalley.com/e/episode-132-giving-back-through-technology-with-gabriela-ariza</loc><lastmod>2024-04-06</lastmod></url><url><loc>https://hackervalley.com/e/hacker-valley-red-episode-5-ted-harrington</loc><lastmod>2024-04-06</lastmod></url><url><loc>https://hackervalley.com/e/episode-50-50th-episode-and-beyond-with-ron-and-chris</loc><lastmod>2024-04-06</lastmod></url><url><loc>https://hackervalley.com/e/episode-36-life-and-purpose-mapping-hacks-with-craig-filek</loc><lastmod>2024-04-06</lastmod></url><url><loc>https://hackervalley.com/e/episode-127-finding-comfort-in-being-uncomfortable-with-paul-rivera</loc><lastmod>2024-04-06</lastmod></url><url><loc>https://hackervalley.com/e/episode-17-undercover-in-the-criminal-underground-with-charity-wright</loc><lastmod>2024-04-06</lastmod></url><url><loc>https://hackervalley.com/e/building-leadership-strategy-beyond-tech-with-brian-haugli</loc><lastmod>2024-04-06</lastmod></url><url><loc>https://hackervalley.com/e/episode-28-talking-tech-speaking-for-sans-with-jennifer-santiago</loc><lastmod>2024-04-06</lastmod></url><url><loc>https://hackervalley.com/e/episode-49-what-is-your-superpower-with-yael-nagler</loc><lastmod>2024-04-06</lastmod></url><url><loc>https://hackervalley.com/e/penetration-testing-public-speaking-and-content-creation-with-phillip-wylie</loc><lastmod>2024-04-06</lastmod></url><url><loc>https://hackervalley.com/e/episode-148-immersed-in-cybersecurity-with-james-hadley</loc><lastmod>2024-04-06</lastmod></url><url><loc>https://hackervalley.com/e/the-critical-role-of-empathy-in-cybersecurity-with-tracy-maleeff</loc><lastmod>2024-04-06</lastmod></url><url><loc>https://hackervalley.com/e/hacker-valley-red-episode-6-lisa-jiggetts</loc><lastmod>2024-04-06</lastmod></url><url><loc>https://hackervalley.com/e/episode-120-bishops-black-belts-and-business-with-jeff-cook</loc><lastmod>2024-04-06</lastmod></url><url><loc>https://hackervalley.com/e/episode-99-securityweek-s-2020-ciso-forum-hvs-style</loc><lastmod>2024-04-06</lastmod></url><url><loc>https://hackervalley.com/e/episode-152-cancelling-the-cold-call-with-nikki-ivey</loc><lastmod>2024-04-06</lastmod></url><url><loc>https://hackervalley.com/e/what-is-cyber-threat-intelligence-and-how-to-stand-out-as-threat-intelligence-analyst</loc><lastmod>2024-04-06</lastmod></url><url><loc>https://hackervalley.com/e/episode-151-health-is-wealth-with-alexis-robertson</loc><lastmod>2024-04-06</lastmod></url><url><loc>https://hackervalley.com/e/episode18-math-for-security-and-red-teaming-with-kmap</loc><lastmod>2024-04-06</lastmod></url><url><loc>https://hackervalley.com/e/think-like-a-hacker-solve-like-a-leader-featuring-ted-harrington</loc><lastmod>2024-12-17</lastmod></url><url><loc>https://hackervalley.com/e/episode-40-lessons-in-humility-with-daniel-meade</loc><lastmod>2024-04-06</lastmod></url><url><loc>https://hackervalley.com/e/what-we-all-should-be-talking-about-when-it-comes-to-ai-and-security</loc><lastmod>2024-07-22</lastmod></url><url><loc>https://hackervalley.com/e/episode-171-resilient-mindset-with-chris-hughes</loc><lastmod>2024-04-06</lastmod></url><url><loc>https://hackervalley.com/e/what-makes-a-great-ciso-a-playbook-from-gary-hayslip</loc><lastmod>2025-07-17</lastmod></url><url><loc>https://hackervalley.com/e/learning-from-cybersecurity-legends-with-davin-jackson</loc><lastmod>2024-04-06</lastmod></url><url><loc>https://hackervalley.com/e/episode-162-security-in-space-with-frank-pound</loc><lastmod>2024-04-06</lastmod></url><url><loc>https://hackervalley.com/e/episode-25-underrepresented</loc><lastmod>2024-04-06</lastmod></url><url><loc>https://hackervalley.com/e/episode-78-explaining-humans-with-dr-camilla-pang</loc><lastmod>2024-04-06</lastmod></url><url><loc>https://hackervalley.com/e/we-are-here-finale-rep-yvette-clarke</loc><lastmod>2024-04-06</lastmod></url><url><loc>https://hackervalley.com/e/episode-136-from-tragedy-to-triumph-with-chani-simms</loc><lastmod>2024-04-06</lastmod></url><url><loc>https://hackervalley.com/e/a-rebels-heart-a-leaders-mind-with-allison-minutillo</loc><lastmod>2024-04-06</lastmod></url><url><loc>https://hackervalley.com/e/quickq-what-is-social-networking-hacker-summer-camp-fomo</loc><lastmod>2024-04-06</lastmod></url><url><loc>https://hackervalley.com/e/episode-189-head-in-the-cloud-with-maurice-grose-jr</loc><lastmod>2024-04-06</lastmod></url><url><loc>https://hackervalley.com/e/your-two-year-edge-starts-now-with-marco-figueroa</loc><lastmod>2025-05-29</lastmod></url><url><loc>https://hackervalley.com/e/episode-59-dawn-of-the-intelligence-executive-with-mike-anderson</loc><lastmod>2024-04-06</lastmod></url><url><loc>https://hackervalley.com/e/hacker-valley-blue-s2-episode-1</loc><lastmod>2024-04-06</lastmod></url><url><loc>https://hackervalley.com/e/securing-feelings-of-worth-value-belonging-with-marrelle-bailey</loc><lastmod>2024-04-06</lastmod></url><url><loc>https://hackervalley.com/e/episode-197-leading-your-tribe-with-simone-knego</loc><lastmod>2024-04-06</lastmod></url><url><loc>https://hackervalley.com/e/recruiting-and-how-to-find-the-perfect-match-with-mimi-gross</loc><lastmod>2024-04-06</lastmod></url><url><loc>https://hackervalley.com/e/episode-4-layer-8-fitness-diet-focus</loc><lastmod>2024-04-06</lastmod></url><url><loc>https://hackervalley.com/e/from-landscaping-to-cyber-leadership-with-cole-lisko</loc><lastmod>2024-12-24</lastmod></url><url><loc>https://hackervalley.com/f1d38776-0870-4b83-b457-237bcd93fd81</loc><image:image><image:loc>https://44814285.fs1.hubspotusercontent-na1.net/hubfs/44814285/HVM%20H.png</image:loc><image:caption>HVMH</image:caption><image:title>HVMH</image:title></image:image><lastmod>2025-02-27</lastmod></url><url><loc>https://hackervalley.com/blog/how-to-sponsor-a-cybersecurity-podcast</loc><image:image><image:loc>https://44814285.fs1.hubspotusercontent-na1.net/hubfs/44814285/Body.png</image:loc><image:caption>Body</image:caption><image:title>Body</image:title></image:image><image:image><image:loc>https://44814285.fs1.hubspotusercontent-na1.net/hubfs/44814285/How%20to%20Sponsor%20Thumbnail.png</image:loc><image:caption>HowtoSponsorThumbnail</image:caption><image:title>HowtoSponsorThumbnail</image:title></image:image><image:image><image:loc>https://44814285.fs1.hubspotusercontent-na1.net/hubfs/44814285/image-png-Oct-29-2024-04-15-41-4569-PM.png</image:loc><image:caption>imagepngOct2920240415414569PM</image:caption><image:title>imagepngOct2920240415414569PM</image:title></image:image><image:image><image:loc>https://44814285.fs1.hubspotusercontent-na1.net/hubfs/44814285/action.gif</image:loc><image:caption>action</image:caption><image:title>action</image:title></image:image><lastmod>2025-05-07</lastmod></url><url><loc>https://hackervalley.com/e/where-automation-ends-cyber-ingenuity-begins-with-phillip-wylie</loc><lastmod>2025-09-18</lastmod></url><url><loc>https://hackervalley.com/e/episode-134-knowing-your-worth-in-technology-and-cybersecurity-with-jimmy-sanders</loc><lastmod>2024-04-06</lastmod></url><url><loc>https://hackervalley.com/e/episode-7-layer-8-vulnerability-and-diversity</loc><lastmod>2024-04-06</lastmod></url><url><loc>https://hackervalley.com/e/something-to-say-in-cyber-with-jon-dimaggio</loc><lastmod>2024-04-06</lastmod></url><url><loc>https://hackervalley.com/e/episode-168-asking-the-right-cybersecurity-questions-with-ganesh-pai</loc><lastmod>2024-04-06</lastmod></url><url><loc>https://hackervalley.com/e/episode-137-securing-virtual-and-augmented-reality-with-tamas-henning</loc><lastmod>2024-04-06</lastmod></url><url><loc>https://hackervalley.com/e/ai-phishing-fighting-fire-with-fire</loc><lastmod>2024-04-06</lastmod></url><url><loc>https://hackervalley.com/e/episode-66-serial-advocacy-with-chloe-messdaghi</loc><lastmod>2024-04-06</lastmod></url><url><loc>https://hackervalley.com/e/episode-112-cybersecurity-and-ambient-computing-with-dr-james-stanger</loc><lastmod>2024-04-06</lastmod></url><url><loc>https://hackervalley.com/e/keeping-it-open-source-with-metasploits-hd-moore</loc><lastmod>2024-04-06</lastmod></url><url><loc>https://hackervalley.com/e/episode-163-a-blueprint-for-learning-cyber-with-keith-wilson</loc><lastmod>2024-04-06</lastmod></url><url><loc>https://hackervalley.com/e/defending-dignity-in-the-messiest-data-on-earth-with-george-al-koura</loc><lastmod>2026-01-22</lastmod></url><url><loc>https://hackervalley.com/e/episode-81-communicating-in-a-crisis-with-christopher-budd</loc><lastmod>2024-04-06</lastmod></url><url><loc>https://hackervalley.com/e/making-cybersecurity-marketing-creative-and-a-little-sexy-with-maria-velasquez</loc><lastmod>2025-11-06</lastmod></url><url><loc>https://hackervalley.com/e/breaking-into-banks-and-bypassing-modern-security-with-greg-hatcher-and-john-stigerwalt</loc><lastmod>2025-12-18</lastmod></url><url><loc>https://hackervalley.com/e/episode-150-making-a-difference-mindfully-with-natasha-barnes</loc><lastmod>2024-04-06</lastmod></url><url><loc>https://hackervalley.com/e/episode-129-seeing-the-value-in-everything-with-saam-motamedi</loc><lastmod>2024-04-06</lastmod></url><url><loc>https://hackervalley.com/e/supply-chain-security-zero-trust-tech-with-ashish-rajan-shilpi-bhattacharjee</loc><lastmod>2024-04-06</lastmod></url><url><loc>https://hackervalley.com/e/cover-your-saas-navigating-oauth-and-saas-security-challenges</loc><lastmod>2024-04-06</lastmod></url><url><loc>https://hackervalley.com/e/episode-64-becoming-a-networking-machine-with-jordan-harbinger</loc><lastmod>2024-04-06</lastmod></url><url><loc>https://hackervalley.com/e/championing-the-human-in-cybersecurity-with-julie-haney</loc><lastmod>2024-12-03</lastmod></url><url><loc>https://hackervalley.com/e/risk-black-swans-versus-gray-rhinos-with-michele-wucker</loc><lastmod>2024-04-06</lastmod></url><url><loc>https://hackervalley.com/e/representation-without-technicalities-with-mari-galloway</loc><lastmod>2024-04-06</lastmod></url><url><loc>https://hackervalley.com/e/episode-8-serverless-threat-intel-bot</loc><lastmod>2024-04-06</lastmod></url><url><loc>https://hackervalley.com/e/creating-community-for-female-security-practitioners-with-larci-robertson</loc><lastmod>2024-04-06</lastmod></url><url><loc>https://hackervalley.com/e/the-art-of-creating-cybersecurity-content-with-jason-rebholz</loc><lastmod>2024-04-06</lastmod></url><url><loc>https://hackervalley.com/e/episode-22-road-to-the-devguild-conference-with-ody-lupescu</loc><lastmod>2024-04-06</lastmod></url><url><loc>https://hackervalley.com/e/attack-surface-management-the-grit-needed-for-true-cyber-resilience-with-nabil-hannan</loc><lastmod>2024-04-06</lastmod></url><url><loc>https://hackervalley.com/e/episode-54-hiring-leaders-and-finding-talent-with-alex-maestretti</loc><lastmod>2024-04-06</lastmod></url><url><loc>https://hackervalley.com/e/hacker-valley-blue-episode-6-brandon-dixon</loc><lastmod>2024-04-06</lastmod></url><url><loc>https://hackervalley.com/e/resources-that-changed-how-i-approach-cybersecurity</loc><lastmod>2024-04-06</lastmod></url><url><loc>https://hackervalley.com/e/episode-104-analyzing-the-enemy-with-robin-black</loc><lastmod>2024-04-06</lastmod></url><url><loc>https://hackervalley.com/e/a-tale-of-two-risks-third-party-and-saas-security</loc><lastmod>2024-04-06</lastmod></url><url><loc>https://hackervalley.com/e/episode-193-love-is-the-name-of-the-game-with-tyrone-e-wilson</loc><lastmod>2024-04-06</lastmod></url><url><loc>https://hackervalley.com/e/hyperautomation-open-security-data-architecture-and-the-future-of-siem-with-neal-humphrey</loc><lastmod>2024-04-16</lastmod></url><url><loc>https://hackervalley.com/e/episode-46-emotional-intelligence-in-tech-with-deidre-diamond</loc><lastmod>2024-04-06</lastmod></url><url><loc>https://hackervalley.com/e/episode-175-deep-into-the-attacking-mindset-with-maxie-reynolds</loc><lastmod>2024-04-06</lastmod></url><url><loc>https://hackervalley.com/e/episode-23-operating-in-high-performance-environments-with-markus-de-shon</loc><lastmod>2024-04-06</lastmod></url><url><loc>https://hackervalley.com/e/episode-58-having-too-much-fun-with-graham-cluley</loc><lastmod>2024-04-06</lastmod></url><url><loc>https://hackervalley.com/e/chatgpt-cant-take-my-job-and-how-to-become-a-cyber-industry-creative</loc><lastmod>2024-04-06</lastmod></url><url><loc>https://hackervalley.com/blog</loc><image:image><image:loc>https://44814285.fs1.hubspotusercontent-na1.net/hubfs/44814285/1-Mar-13-2025-09-59-56-9976-PM.png</image:loc><image:caption>1Mar1320250959569976PM</image:caption><image:title>1Mar1320250959569976PM</image:title></image:image><image:image><image:loc>https://44814285.fs1.hubspotusercontent-na1.net/hubfs/44814285/How%20to%20Sponsor%20Thumbnail.png</image:loc><image:caption>HowtoSponsorThumbnail</image:caption><image:title>HowtoSponsorThumbnail</image:title></image:image><image:image><image:loc>https://44814285.fs1.hubspotusercontent-na1.net/hubfs/44814285/HVS%20Template%20(Sponsored)%20(4).png</image:loc><image:caption>HVSTemplateSponsored4</image:caption><image:title>HVSTemplateSponsored4</image:title></image:image><image:image><image:loc>https://44814285.fs1.hubspotusercontent-na1.net/hubfs/44814285/NetSPI%20ASM%201%20Blog%20Thumbnail.svg</image:loc><image:caption>NetSPIASM1BlogThumbnail</image:caption><image:title>NetSPIASM1BlogThumbnail</image:title></image:image><lastmod>2024-07-18</lastmod></url><url><loc>https://hackervalley.com/e/slugging-it-out-in-the-soc-to-find-your-niche-in-cyber-with-nate-malicoat</loc><lastmod>2024-04-06</lastmod></url><url><loc>https://hackervalley.com/about-us</loc><image:image><image:loc>https://44814285.fs1.hubspotusercontent-na1.net/hubfs/44814285/our-work-background.jpeg</image:loc><image:caption>ourworkbackground</image:caption><image:title>ourworkbackground</image:title></image:image><image:image><image:loc>https://44814285.fs1.hubspotusercontent-na1.net/hubfs/44814285/width_800.png</image:loc><image:caption>width800</image:caption><image:title>width800</image:title></image:image><image:image><image:loc>https://44814285.fs1.hubspotusercontent-na1.net/hubfs/44814285/SponsoredLivestream.jpeg</image:loc><image:caption>SponsoredLivestream</image:caption><image:title>SponsoredLivestream</image:title></image:image><image:image><image:loc>https://44814285.fs1.hubspotusercontent-na1.net/hubfs/44814285/Sizzle%20Reel%20Thumbnail.webp</image:loc><image:caption>SizzleReelThumbnail</image:caption><image:title>SizzleReelThumbnail</image:title></image:image><image:image><image:loc>https://44814285.fs1.hubspotusercontent-na1.net/hubfs/44814285/Axonius%20Testimonial%20Thumbnail.webp</image:loc><image:caption>AxoniusTestimonialThumbnail</image:caption><image:title>AxoniusTestimonialThumbnail</image:title></image:image><image:image><image:loc>https://44814285.fs1.hubspotusercontent-na1.net/hubfs/44814285/Hacker%20Valley%20Media.png</image:loc><image:caption>HackerValleyMedia</image:caption><image:title>HackerValleyMedia</image:title></image:image><lastmod>2024-10-16</lastmod></url><url><loc>https://hackervalley.com/e/if-its-smart-its-vulnerable-and-the-evolution-of-cybersecurity-with-mikko-hypponen</loc><lastmod>2024-04-06</lastmod></url><url><loc>https://hackervalley.com/e/episode-51-a-threat-intelligence-journey-with-doug-helton</loc><lastmod>2024-04-06</lastmod></url><url><loc>https://hackervalley.com/e/quickq-what-is-threat-hunting</loc><lastmod>2024-04-06</lastmod></url><url><loc>https://hackervalley.com/e/the-end-of-search-and-the-rise-of-ai-browsers-and-voices-with-ron-eddings</loc><lastmod>2025-09-25</lastmod></url><url><loc>https://hackervalley.com/e/quickq-what-the-heck-is-going-on-with-ransomware</loc><lastmod>2024-04-06</lastmod></url><url><loc>https://hackervalley.com/e/episode-44-breaching-and-teaching-with-deviant-ollam</loc><lastmod>2024-04-06</lastmod></url><url><loc>https://hackervalley.com/e/beyond-gold-with-simone-biles</loc><lastmod>2024-04-06</lastmod></url><url><loc>https://hackervalley.com/e/episode-42-ics-threat-intelligence-with-rob-m-lee</loc><lastmod>2024-04-06</lastmod></url><url><loc>https://hackervalley.com/e/episode-121-what-is-your-ip-address-with-chris-parker</loc><lastmod>2024-04-06</lastmod></url><url><loc>https://hackervalley.com/e/episode-68-behavioral-economics-and-cybersecurity-with-kelly-shortridge</loc><lastmod>2024-04-06</lastmod></url><url><loc>https://hackervalley.com/e/being-the-cyber-warrior-with-derek-scheller</loc><lastmod>2024-04-06</lastmod></url><url><loc>https://hackervalley.com/e/sharing-cyber-outside-of-the-security-bubble-with-lesley-carhart</loc><lastmod>2024-04-06</lastmod></url><url><loc>https://hackervalley.com/e/episode-72-security-in-color-with-dominique-west</loc><lastmod>2024-04-06</lastmod></url><url><loc>https://hackervalley.com/e/emotions-in-cybersecurity-with-sherianna-boyle</loc><lastmod>2024-04-06</lastmod></url><url><loc>https://hackervalley.com/e/hacker-valley-blue-s2-episode-6-john-strand</loc><lastmod>2024-04-06</lastmod></url><url><loc>https://hackervalley.com/e/the-ai-shift-you-cant-ignore-with-marco-figueroa</loc><lastmod>2025-02-28</lastmod></url><url><loc>https://hackervalley.com/e/cyber-is-a-gritty-situation-with-david-fivecoat</loc><lastmod>2024-04-06</lastmod></url><url><loc>https://hackervalley.com/e/episode-187-keep-your-authentic-with-samara-williams</loc><lastmod>2024-04-06</lastmod></url><url><loc>https://hackervalley.com/work/valence</loc><image:image><image:loc>https://44814285.fs1.hubspotusercontent-na1.net/hubfs/44814285/youtube.webp</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://44814285.fs1.hubspotusercontent-na1.net/hubfs/44814285/hearth.png</image:loc><image:caption>hearth</image:caption><image:title>hearth</image:title></image:image><image:image><image:loc>https://44814285.fs1.hubspotusercontent-na1.net/hubfs/44814285/Recent%20Works%20Website%20Images%20(1920%20x%20600%20px).png</image:loc><image:caption>RecentWorksWebsiteImages1920x600px</image:caption><image:title>RecentWorksWebsiteImages1920x600px</image:title></image:image><image:image><image:loc>https://44814285.fs1.hubspotusercontent-na1.net/hubfs/44814285/hashtag.png</image:loc><image:caption>hashtag</image:caption><image:title>hashtag</image:title></image:image><image:image><image:loc>https://44814285.fs1.hubspotusercontent-na1.net/hubfs/44814285/1-3.png</image:loc><image:caption>13</image:caption><image:title>13</image:title></image:image><image:image><image:loc>https://44814285.fs1.hubspotusercontent-na1.net/hubfs/44814285/group_people.png</image:loc><image:caption>grouppeople</image:caption><image:title>grouppeople</image:title></image:image><image:image><image:loc>https://44814285.fs1.hubspotusercontent-na1.net/hubfs/44814285/Valence%20Podcast%20-%20Bob.png</image:loc><image:caption>ValencePodcastBob</image:caption><image:title>ValencePodcastBob</image:title></image:image><image:image><image:loc>https://44814285.fs1.hubspotusercontent-na1.net/hubfs/44814285/HVM-Logo-Color-06-3.png</image:loc><image:caption>HVMLogoColor063</image:caption><image:title>HVMLogoColor063</image:title></image:image><lastmod>2024-09-09</lastmod></url><url><loc>https://hackervalley.com/e/purple-teaming-is-the-new-job-security-with-maril-vernon</loc><lastmod>2025-06-26</lastmod></url><url><loc>https://hackervalley.com/e/building-cyber-resilience-through-culture-with-david-shipley</loc><lastmod>2025-05-15</lastmod></url><url><loc>https://hackervalley.com/e/how-to-become-a-true-security-leader-with-nathan-case</loc><lastmod>2024-10-15</lastmod></url><url><loc>https://hackervalley.com/e/what-is-security-architecture</loc><lastmod>2024-04-06</lastmod></url><url><loc>https://hackervalley.com/e/finding-the-right-it-teacher-with-kevin-apolinario</loc><lastmod>2024-04-06</lastmod></url><url><loc>https://hackervalley.com/e/episode-128-a-masterclass-on-being-yourself-with-ashish-rajan</loc><lastmod>2024-04-06</lastmod></url><url><loc>https://hackervalley.com/e/episode-26-exploring-the-financial-playbook-with-kimberly-hodgdon</loc><lastmod>2024-04-06</lastmod></url><url><loc>https://hackervalley.com/e/growing-a-successful-podcast-with-adam-adams</loc><lastmod>2024-04-06</lastmod></url><url><loc>https://hackervalley.com/e/episode-167-fun-versus-fud-security-with-ashley-rose</loc><lastmod>2024-04-06</lastmod></url><url><loc>https://hackervalley.com/e/episode-71-leading-from-the-front-with-wilson-bautista-jr</loc><lastmod>2024-04-06</lastmod></url><url><loc>https://hackervalley.com/e/saas-opportunities-consequences-of-using-ai</loc><lastmod>2024-04-06</lastmod></url><url><loc>https://hackervalley.com/e/security-team-operating-systems-with-christian-hyatt</loc><lastmod>2024-04-06</lastmod></url><url><loc>https://hackervalley.com/e/episode-39-live-episode-superbowl-edition-with-ron-and-chris</loc><lastmod>2024-04-06</lastmod></url><url><loc>https://hackervalley.com/e/episode-33-demystifying-the-zero-trust-model-with-kathy-wang</loc><lastmod>2024-04-06</lastmod></url><url><loc>https://hackervalley.com/e/confident-communication-through-storytelling-with-anne-ricketts</loc><lastmod>2024-04-06</lastmod></url><url><loc>https://hackervalley.com/e/hacker-valley-red-episode-2-rachel-tobac</loc><lastmod>2024-04-06</lastmod></url><url><loc>https://hackervalley.com/e/why-mfa-isnt-the-safety-net-you-think-it-is-with-yaamini-barathi-mohan</loc><lastmod>2026-01-29</lastmod></url><url><loc>https://hackervalley.com/e/hacker-valley-blue-s2-episode-5-jamie-dicken-and-aaron-rinehart</loc><lastmod>2024-04-06</lastmod></url><url><loc>https://hackervalley.com/e/episode-77-meeting-life-with-grace-with-charles-nwatu</loc><lastmod>2024-04-06</lastmod></url><url><loc>https://hackervalley.com/e/episode-177-winning-in-a-human-centric-cyber-market-with-nathan-burke</loc><lastmod>2024-04-06</lastmod></url><url><loc>https://hackervalley.com/e/episode-156-detection-as-code-with-nick-hakmiller</loc><lastmod>2024-04-06</lastmod></url><url><loc>https://hackervalley.com/e/from-shadow-it-to-full-asset-visibility-with-wes-wright</loc><lastmod>2024-11-12</lastmod></url><url><loc>https://hackervalley.com/e/andrew-forgie-s-path-from-apache-mechanic-to-cybersecurity-sales-leader-and-mastering-cyber-sales</loc><lastmod>2024-04-06</lastmod></url><url><loc>https://hackervalley.com/e/episode-3-all-things-threat-intelligence</loc><lastmod>2024-04-06</lastmod></url><url><loc>https://hackervalley.com/e/ditch-the-spreadsheets-smarter-crypto-security-with-michael-klieman</loc><lastmod>2025-05-08</lastmod></url><url><loc>https://hackervalley.com/e/purposeful-communication-through-plextrac-with-dan-decloss</loc><lastmod>2024-04-06</lastmod></url><url><loc>https://hackervalley.com/e/the-power-of-showing-up-daily-streams-big-impact-with-gerald-auger</loc><lastmod>2025-09-11</lastmod></url><url><loc>https://hackervalley.com/e/episode-76-a-security-leadership-master-class-with-gary-hayslip</loc><lastmod>2024-04-06</lastmod></url><url><loc>https://hackervalley.com/e/securing-your-saas-and-cyber-influencer-networking-with-cro-bob-horn</loc><lastmod>2024-04-09</lastmod></url><url><loc>https://hackervalley.com/e/episode-65-chatting-with-john-kindervag-the-godfather-of-zero-trust</loc><lastmod>2024-04-06</lastmod></url><url><loc>https://hackervalley.com/e/can-ai-run-your-soc-better-than-you-with-ahmed-achchak</loc><lastmod>2025-11-13</lastmod></url><url><loc>https://hackervalley.com/e/episode-101-us-cyberweek-with-congresswoman-yvette-clarke-and-laura-robbins</loc><lastmod>2024-04-06</lastmod></url><url><loc>https://hackervalley.com/e/debt-vs-risk-what-the-sharepoint-breach-taught-us-with-ron-eddings</loc><lastmod>2025-08-07</lastmod></url><url><loc>https://hackervalley.com/e/adversarial-ai-navigating-the-cybersecurity-landscape</loc><lastmod>2024-04-06</lastmod></url><url><loc>https://hackervalley.com/e/the-fabulous-search-for-a-tech-job-with-kyle-elliot</loc><lastmod>2024-04-06</lastmod></url><url><loc>https://hackervalley.com/e/transforming-soc-operations-with-ai-featuring-roy-halevi</loc><lastmod>2024-11-20</lastmod></url><url><loc>https://hackervalley.com/podcast</loc><image:image><image:loc>https://44814285.fs1.hubspotusercontent-na1.net/hubfs/44814285/Hacker%20Valley%20Media.png</image:loc><image:caption>HackerValleyMedia</image:caption><image:title>HackerValleyMedia</image:title></image:image><lastmod>2024-04-01</lastmod></url><url><loc>https://hackervalley.com/e/episode-37-lifestyle-design-priming-for-success-with-charlotte-smith</loc><lastmod>2024-04-06</lastmod></url><url><loc>https://hackervalley.com/e/cyber-warfare-digital-deception-and-the-hidden-threats-we-ignore-with-dr-eric-cole</loc><lastmod>2025-03-08</lastmod></url><url><loc>https://hackervalley.com/e/building-edr-for-ai-controlling-autonomous-agents-before-they-go-rogue-with-ron-eddings</loc><lastmod>2025-12-02</lastmod></url><url><loc>https://hackervalley.com/e/how-to-see-your-organization-like-a-hacker-with-chris-dale</loc><lastmod>2025-10-30</lastmod></url><url><loc>https://hackervalley.com/e/episode-82-what-is-old-is-new-again-with-brian-romansky</loc><lastmod>2024-04-06</lastmod></url><url><loc>https://hackervalley.com/e/hacker-valley-blue-episode-5-susan-peediyakkal</loc><lastmod>2024-04-06</lastmod></url><url><loc>https://hackervalley.com/e/hacker-valley-red-episode-4-alissa-knight</loc><lastmod>2024-04-06</lastmod></url><url><loc>https://hackervalley.com/e/episode-105-striving-for-impact-with-david-tsao</loc><lastmod>2024-04-06</lastmod></url><url><loc>https://hackervalley.com/e/a-human-centric-approach-to-cybersecurity-with-edna-conway</loc><lastmod>2025-02-04</lastmod></url><url><loc>https://hackervalley.com/e/episode-21-changing-the-appsec-game-with-tanya-janca</loc><lastmod>2024-04-06</lastmod></url><url><loc>https://hackervalley.com/e/security-teams-cant-do-it-all-with-rob-wood-ciso-cms</loc><lastmod>2024-04-06</lastmod></url><url><loc>https://hackervalley.com/e/episode-1-cybersecurity-alchemy</loc><lastmod>2024-04-06</lastmod></url><url><loc>https://hackervalley.com/e/episode-63-head-in-the-clouds-with-francesco-cipollone</loc><lastmod>2024-04-06</lastmod></url><url><loc>https://hackervalley.com/our-services</loc><image:image><image:loc>https://44814285.fs1.hubspotusercontent-na1.net/hubfs/44814285/Our%20Services-Podcast.svg</image:loc><image:caption>OurServicesPodcast</image:caption><image:title>OurServicesPodcast</image:title></image:image><image:image><image:loc>https://44814285.fs1.hubspotusercontent-na1.net/hubfs/44814285/Our%20Services-%20Customer%20Testimonial.svg</image:loc><image:caption>OurServicesCustomerTestimonial</image:caption><image:title>OurServicesCustomerTestimonial</image:title></image:image><image:image><image:loc>https://44814285.fs1.hubspotusercontent-na1.net/hubfs/44814285/Contact%20Us%20Button.png</image:loc><image:caption>ContactUsButton</image:caption><image:title>ContactUsButton</image:title></image:image><image:image><image:loc>https://44814285.fs1.hubspotusercontent-na1.net/hubfs/44814285/Our%20Services-%20Events.svg</image:loc><image:caption>OurServicesEvents</image:caption><image:title>OurServicesEvents</image:title></image:image><image:image><image:loc>https://44814285.fs1.hubspotusercontent-na1.net/hubfs/44814285/Our%20Services-%20Brand%20Video.svg</image:loc><image:caption>OurServicesBrandVideo</image:caption><image:title>OurServicesBrandVideo</image:title></image:image><lastmod>2025-07-17</lastmod></url><url><loc>https://hackervalley.com/e/episode-165-living-your-values-with-dean-sysman</loc><lastmod>2024-04-06</lastmod></url><url><loc>https://hackervalley.com/e/episode-106-stacking-the-deck-of-success-with-aj-yawn</loc><lastmod>2024-04-06</lastmod></url><url><loc>https://hackervalley.com/e/vulnerability-hunting-ai-with-brian-contos</loc><lastmod>2024-04-06</lastmod></url><url><loc>https://hackervalley.com/e/staying-ahead-in-the-age-of-ai-agents-with-marco-figueroa</loc><lastmod>2025-03-21</lastmod></url><url><loc>https://hackervalley.com/mastermind</loc><image:image><image:loc>https://44814285.fs1.hubspotusercontent-na1.net/hubfs/44814285/Christopher%20Cottrell%20.jpeg</image:loc><image:caption>ChristopherCottrell</image:caption><image:title>ChristopherCottrell</image:title></image:image><image:image><image:loc>https://44814285.fs1.hubspotusercontent-na1.net/hubfs/44814285/Charles%20N.jpeg</image:loc><image:caption>CharlesN</image:caption><image:title>CharlesN</image:title></image:image><image:image><image:loc>https://44814285.fs1.hubspotusercontent-na1.net/hubfs/44814285/Chad%20Freese.jpeg</image:loc><image:caption>ChadFreese</image:caption><image:title>ChadFreese</image:title></image:image><image:image><image:loc>https://44814285.fs1.hubspotusercontent-na1.net/hubfs/44814285/Perry%20Carpenter%20.jpeg</image:loc><image:caption>PerryCarpenter</image:caption><image:title>PerryCarpenter</image:title></image:image><image:image><image:loc>https://44814285.fs1.hubspotusercontent-na1.net/hubfs/44814285/Rusty%20Newton.jpeg</image:loc><image:caption>RustyNewton</image:caption><image:title>RustyNewton</image:title></image:image><image:image><image:loc>https://44814285.fs1.hubspotusercontent-na1.net/hubfs/44814285/Tia%20Hopkins.jpeg</image:loc><image:caption>TiaHopkins</image:caption><image:title>TiaHopkins</image:title></image:image><image:image><image:loc>https://44814285.fs1.hubspotusercontent-na1.net/hubfs/44814285/William%20Lin%20.jpeg</image:loc><image:caption>WilliamLin</image:caption><image:title>WilliamLin</image:title></image:image><image:image><image:loc>https://44814285.fs1.hubspotusercontent-na1.net/hubfs/44814285/MJ%20Kaufmann%20.jpeg</image:loc><image:caption>MJKaufmann</image:caption><image:title>MJKaufmann</image:title></image:image><image:image><image:loc>https://44814285.fs1.hubspotusercontent-na1.net/hubfs/44814285/Hacker%20Valley%20Media.png</image:loc><image:caption>HackerValleyMedia</image:caption><image:title>HackerValleyMedia</image:title></image:image><image:image><image:loc>https://44814285.fs1.hubspotusercontent-na1.net/hubfs/44814285/Nick%20Fulks.jpeg</image:loc><image:caption>NickFulks</image:caption><image:title>NickFulks</image:title></image:image><image:image><image:loc>https://44814285.fs1.hubspotusercontent-na1.net/hubfs/44814285/Francesco%20Cipollone%20.jpeg</image:loc><image:caption>FrancescoCipollone</image:caption><image:title>FrancescoCipollone</image:title></image:image><lastmod>2024-04-01</lastmod></url><url><loc>https://hackervalley.com/e/the-pod-pack-feat-allan-alford-dave-bittner-graham-cluley-and-jack-rhysider</loc><lastmod>2024-04-06</lastmod></url><url><loc>https://hackervalley.com/e/hacker-valley-blue-s2-episode-4-lenny-zeltser</loc><lastmod>2024-04-06</lastmod></url><url><loc>https://hackervalley.com/e/episode-100-a-very-special-episode</loc><lastmod>2024-04-06</lastmod></url><url><loc>https://hackervalley.com/e/looking-backward-to-grow-forward-in-cybersecurity-in-2024</loc><lastmod>2024-04-06</lastmod></url><url><loc>https://hackervalley.com/e/the-present-and-future-of-ai-in-cyber</loc><lastmod>2024-07-30</lastmod></url><url><loc>https://hackervalley.com/e/episode-131-making-the-most-of-time-off-with-sarah-groen</loc><lastmod>2024-04-06</lastmod></url><url><loc>https://hackervalley.com/e/whats-lurking-in-your-containers-ambersquid-operations-freejacking-and-microservice-exploitation</loc><lastmod>2024-04-06</lastmod></url><url><loc>https://hackervalley.com/e/the-road-less-traveled-with-isabel-leong</loc><lastmod>2024-04-06</lastmod></url><url><loc>https://hackervalley.com/e/the-year-of-the-agent-ai-bug-bounties-and-cybersecurity-insights-with-marco-figueroa</loc><lastmod>2025-01-10</lastmod></url><url><loc>https://hackervalley.com/e/episode-55-a-tech-origin-story-with-sam-crowther</loc><lastmod>2024-04-06</lastmod></url><url><loc>https://hackervalley.com/work/duality</loc><video:video><video:thumbnail_loc>https://44814285.fs1.hubspotusercontent-na1.net/hubfs/44814285/Duality%20Testimonial.mp4/medium.jpg</video:thumbnail_loc><video:title>Duality Testimonial</video:title><video:description>Duality Testimonial</video:description><video:content_loc>https://44814285.fs1.hubspotusercontent-na1.net/hubfs/44814285/Duality%20Testimonial.mp4</video:content_loc><video:duration>70</video:duration><video:requires_subscription>no</video:requires_subscription><video:live>no</video:live></video:video><image:image><image:loc>https://44814285.fs1.hubspotusercontent-na1.net/hubfs/44814285/hearth.png</image:loc><image:caption>hearth</image:caption><image:title>hearth</image:title></image:image><image:image><image:loc>https://44814285.fs1.hubspotusercontent-na1.net/hubfs/44814285/hashtag.png</image:loc><image:caption>hashtag</image:caption><image:title>hashtag</image:title></image:image><image:image><image:loc>https://44814285.fs1.hubspotusercontent-na1.net/hubfs/44814285/Duality%20Episode%20Cover.jpg</image:loc><image:caption>DualityEpisodeCover</image:caption><image:title>DualityEpisodeCover</image:title></image:image><image:image><image:loc>https://44814285.fs1.hubspotusercontent-na1.net/hubfs/44814285/group_people.png</image:loc><image:caption>grouppeople</image:caption><image:title>grouppeople</image:title></image:image><image:image><image:loc>https://44814285.fs1.hubspotusercontent-na1.net/hubfs/44814285/5.png</image:loc><image:caption>5</image:caption><image:title>5</image:title></image:image><image:image><image:loc>https://44814285.fs1.hubspotusercontent-na1.net/hubfs/44814285/HVM-Logo-Color-06-3.png</image:loc><image:caption>HVMLogoColor063</image:caption><image:title>HVMLogoColor063</image:title></image:image><image:image><image:loc>https://44814285.fs1.hubspotusercontent-na1.net/hubfs/44814285/Screenshot%202024-07-08%20at%2012.18.51%20PM.png</image:loc><image:caption>Screenshot20240708at121851PM</image:caption><image:title>Screenshot20240708at121851PM</image:title></image:image><image:image><image:loc>https://44814285.fs1.hubspotusercontent-na1.net/hubfs/44814285/youtube.webp</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><lastmod>2024-09-09</lastmod></url><url><loc>https://hackervalley.com/e/financial-independence-freedom-with-eddie-thomason</loc><lastmod>2024-04-06</lastmod></url><url><loc>https://hackervalley.com/e/protecting-people-not-just-perimeters-with-andrey-suzdaltsev</loc><lastmod>2025-04-24</lastmod></url><url><loc>https://hackervalley.com/e/episode-130-fighting-for-others-with-anne-marie-zettlemoyer</loc><lastmod>2024-04-06</lastmod></url><url><loc>https://hackervalley.com/e/hacking-trust-with-ai-and-deepfakes-featuring-iain-jackson</loc><lastmod>2024-12-12</lastmod></url><url><loc>https://hackervalley.com/e/episode-12-physical-red-teaming-no-lock-left-secured</loc><lastmod>2024-04-06</lastmod></url><url><loc>https://hackervalley.com/e/leadership-in-cybersecurity-with-marty-overman</loc><lastmod>2024-04-06</lastmod></url><url><loc>https://hackervalley.com/e/harness-your-anxiety-in-cyber-with-dr-chloe-carmichael</loc><lastmod>2024-04-06</lastmod></url><url><loc>https://hackervalley.com/e/episode-60-clearing-the-fog-of-cyber-war-with-dr-chase-cunningham</loc><lastmod>2024-04-06</lastmod></url><url><loc>https://hackervalley.com/e/recruiting-talent-for-cybersecuritys-next-open-position-with-renee-small</loc><lastmod>2024-04-06</lastmod></url><url><loc>https://hackervalley.com/e/building-fast-and-not-breaking-things-with-shlomi-matichin</loc><lastmod>2024-05-07</lastmod></url><url><loc>https://hackervalley.com/e/episode-179-management-vs-leadership-in-cyber-major-general-retired-brett-t-williams</loc><lastmod>2024-04-06</lastmod></url><url><loc>https://hackervalley.com/e/ransomware-how-to-use-ai-to-create-a-readiness-kit-with-scott-sutherland</loc><lastmod>2024-04-06</lastmod></url><url><loc>https://hackervalley.com/e/do-you-deserve-to-be-hacked-featuring-ilan-fehler-and-dahvid-schloss</loc><lastmod>2024-11-26</lastmod></url><url><loc>https://hackervalley.com/e/episode-108-behind-the-mic-with-carole-theriault</loc><lastmod>2024-04-06</lastmod></url><url><loc>https://hackervalley.com/e/episode-126-the-grit-of-being-world-champion-part-2-with-lee-kemp</loc><lastmod>2024-04-06</lastmod></url><url><loc>https://hackervalley.com/e/introducing-the-marqeta-leads-podcast</loc><lastmod>2024-04-06</lastmod></url><url><loc>https://hackervalley.com/e/choosing-the-right-words-with-terre-short</loc><lastmod>2024-04-06</lastmod></url><url><loc>https://hackervalley.com/e/making-hacking-accessible-with-deviant-ollam</loc><lastmod>2024-04-06</lastmod></url><url><loc>https://hackervalley.com/e/thriving-beyond-human-labor-with-context-powered-ai-with-daniel-miessler</loc><lastmod>2025-12-04</lastmod></url><url><loc>https://hackervalley.com/e/cyber-defense-reinvented-the-new-era-of-attack-surface-management-with-isaac-clayton</loc><lastmod>2024-04-06</lastmod></url><url><loc>https://hackervalley.com/blog/att-dynamic-defense-security-at-the-front-door-of-your-business</loc><image:image><image:loc>https://44814285.fs1.hubspotusercontent-na1.net/hubfs/44814285/HVS%20Template%20(Sponsored)%20(4).png</image:loc><image:caption>HVSTemplateSponsored4</image:caption><image:title>HVSTemplateSponsored4</image:title></image:image><image:image><image:loc>https://44814285.fs1.hubspotusercontent-na1.net/hubfs/44814285/image-png-1.png</image:loc><image:caption>imagepng1</image:caption><image:title>imagepng1</image:title></image:image><image:image><image:loc>https://44814285.fs1.hubspotusercontent-na1.net/hubfs/44814285/Untitled%20design.svg</image:loc><image:caption>Untitleddesign</image:caption><image:title>Untitleddesign</image:title></image:image><lastmod>2025-05-07</lastmod></url><url><loc>https://hackervalley.com/work/interpres-security</loc><image:image><image:loc>https://44814285.fs1.hubspotusercontent-na1.net/hubfs/44814285/2-Aug-20-2024-08-07-57-5945-PM.png</image:loc><image:caption>2Aug2020240807575945PM</image:caption><image:title>2Aug2020240807575945PM</image:title></image:image><image:image><image:loc>https://44814285.fs1.hubspotusercontent-na1.net/hubfs/44814285/HVM-Logo-Color-06-3.png</image:loc><image:caption>HVMLogoColor063</image:caption><image:title>HVMLogoColor063</image:title></image:image><image:image><image:loc>https://44814285.fs1.hubspotusercontent-na1.net/hubfs/44814285/Screenshot%202024-07-08%20at%2012.18.51%20PM.png</image:loc><image:caption>Screenshot20240708at121851PM</image:caption><image:title>Screenshot20240708at121851PM</image:title></image:image><image:image><image:loc>https://44814285.fs1.hubspotusercontent-na1.net/hubfs/44814285/group_people.png</image:loc><image:caption>grouppeople</image:caption><image:title>grouppeople</image:title></image:image><image:image><image:loc>https://44814285.fs1.hubspotusercontent-na1.net/hubfs/44814285/Recent%20Works%20Website%20Images%20(1920%20x%20400%20px)%20(1920%20x%20550%20px).png</image:loc><image:caption>RecentWorksWebsiteImages1920x400px1920x550px</image:caption><image:title>RecentWorksWebsiteImages1920x400px1920x550px</image:title></image:image><image:image><image:loc>https://44814285.fs1.hubspotusercontent-na1.net/hubfs/44814285/youtube.webp</image:loc><image:caption>youtube</image:caption><image:title>youtube</image:title></image:image><image:image><image:loc>https://44814285.fs1.hubspotusercontent-na1.net/hubfs/44814285/hashtag.png</image:loc><image:caption>hashtag</image:caption><image:title>hashtag</image:title></image:image><image:image><image:loc>https://44814285.fs1.hubspotusercontent-na1.net/hubfs/44814285/3-1.png</image:loc><image:caption>31</image:caption><image:title>31</image:title></image:image><lastmod>2024-09-09</lastmod></url><url><loc>https://hackervalley.com/e/hacker-valley-blue-episode-4-jon-dimaggio</loc><lastmod>2024-04-06</lastmod></url><url><loc>https://hackervalley.com/e/the-future-of-artificial-intelligence-with-jeff-gardner</loc><lastmod>2024-04-06</lastmod></url><url><loc>https://hackervalley.com/e/hacker-valley-red-episode-1</loc><lastmod>2024-04-06</lastmod></url><url><loc>https://hackervalley.com/e/episode-80-leveraging-mitre-att-ck-with-chris-kennedy</loc><lastmod>2024-04-06</lastmod></url><url><loc>https://hackervalley.com/e/episode-138-on-being-us-in-technology-with-kendrick-trotter</loc><lastmod>2024-04-06</lastmod></url><url><loc>https://hackervalley.com/e/the-future-of-cyber-talent-is-african-with-confidence-staveley</loc><lastmod>2025-07-31</lastmod></url><url><loc>https://hackervalley.com/e/accelerate-your-cybersecurity-career</loc><lastmod>2024-04-06</lastmod></url><url><loc>https://hackervalley.com/e/technical-dojos-cultivating-skills-and-navigating-change-in-cybersecurity</loc><lastmod>2024-04-06</lastmod></url><url><loc>https://hackervalley.com/e/hacking-innovation-the-formation-of-the-first-nsa-red-team-with-jeff-man</loc><lastmod>2024-04-06</lastmod></url><url><loc>https://hackervalley.com/e/co-founding-revelstoke-through-communication-with-bob-kruse</loc><lastmod>2024-04-06</lastmod></url><url><loc>https://hackervalley.com/e/the-day-ai-stopped-asking-for-permission-with-marcus-j-carey</loc><lastmod>2026-01-15</lastmod></url><url><loc>https://hackervalley.com/e/the-threat-inside-with-shawnee-delaney</loc><lastmod>2024-04-06</lastmod></url><url><loc>https://hackervalley.com/e/pivotal-policy-in-the-age-of-ai-with-aj-grotto</loc><lastmod>2024-04-06</lastmod></url><url><loc>https://hackervalley.com/e/compliance-isnt-the-enemy-with-jeff-man</loc><lastmod>2025-07-24</lastmod></url><url><loc>https://hackervalley.com/e/how-can-i-best-proactively-secure-my-saas</loc><lastmod>2024-07-22</lastmod></url><url><loc>https://hackervalley.com/e/the-ai-gold-rush-in-cybersecurity-with-chris-cochran</loc><lastmod>2025-06-19</lastmod></url><url><loc>https://hackervalley.com/e/how-ai-elevates-cyber-hygiene-with-jason-rebholz</loc><lastmod>2025-10-10</lastmod></url><url><loc>https://hackervalley.com/e/emerging-cybersecurity-technologies-with-jake-reynolds</loc><lastmod>2024-04-06</lastmod></url><url><loc>https://hackervalley.com/e/episode-149-permission-to-launch-with-kelsey-hightower</loc><lastmod>2024-04-06</lastmod></url><url><loc>https://hackervalley.com/e/protecting-what-you-cant-see-with-hd-moore</loc><lastmod>2024-04-06</lastmod></url><url><loc>https://hackervalley.com/privacy-policy</loc><image:image><image:loc>https://44814285.fs1.hubspotusercontent-na1.net/hubfs/44814285/HVM-Logo-Color-06-3.png</image:loc><image:caption>HVMLogoColor063</image:caption><image:title>HVMLogoColor063</image:title></image:image><lastmod>2024-08-21</lastmod></url><url><loc>https://hackervalley.com/e/learning-to-lead-future-tech-leaders-with-dr-stacey-ashley</loc><lastmod>2024-04-06</lastmod></url><url><loc>https://hackervalley.com/e/superhuman-productivity-and-ai-mastery-with-pedram-amini</loc><lastmod>2025-02-21</lastmod></url><url><loc>https://hackervalley.com/e/episode-73-creating-community-with-shannon-morse</loc><lastmod>2024-04-06</lastmod></url><url><loc>https://hackervalley.com/e/episode-195-shades-of-yes-with-david-chislett</loc><lastmod>2024-04-06</lastmod></url><url><loc>https://hackervalley.com/e/i-failed-over-300-times-trying-to-get-into-security-ft-joe-south</loc><lastmod>2024-09-03</lastmod></url><url><loc>https://hackervalley.com/e/episode16-reading-seeding-and-leading-with-jonathan-wood</loc><lastmod>2024-04-06</lastmod></url><url><loc>https://hackervalley.com/e/security-teams-cant-do-it-all-with-rob-wood-rewind</loc><lastmod>2024-04-06</lastmod></url><url><loc>https://hackervalley.com/e/the-rise-of-the-autonomous-blue-team-with-vineet-edupuganti</loc><lastmod>2025-09-04</lastmod></url><url><loc>https://hackervalley.com/e/solving-fundamental-cybersecurity-problems-with-maxime-lamothe-brassard</loc><lastmod>2024-04-06</lastmod></url><url><loc>https://hackervalley.com/e/advocating-for-better-security-in-healthcare-with-taylor-lehmann</loc><lastmod>2024-04-06</lastmod></url><url><loc>https://hackervalley.com/e/the-future-of-ai-in-cybersecurity</loc><lastmod>2024-04-06</lastmod></url><url><loc>https://hackervalley.com/e/ruse-and-deception-from-hollywood-to-corporate-espionage-with-robert-kerbeck</loc><lastmod>2024-04-06</lastmod></url><url><loc>https://hackervalley.com/e/quickq-what-is-security-architecture</loc><lastmod>2024-04-06</lastmod></url><url><loc>https://hackervalley.com/e/from-hand-to-hand-combat-to-management-in-cyber-with-ofer-gayer</loc><lastmod>2024-04-06</lastmod></url><url><loc>https://hackervalley.com/e/cyber-resilience-unpacked-securing-tomorrow-today-with-bill-bernard</loc><lastmod>2024-04-06</lastmod></url><url><loc>https://hackervalley.com/e/episode-62-broadcasting-your-best-with-dave-bittner</loc><lastmod>2024-04-06</lastmod></url><url><loc>https://hackervalley.com/e/episode-111-getting-back-to-happy-with-suzanne-falter</loc><lastmod>2024-04-06</lastmod></url><url><loc>https://hackervalley.com/e/ciso-burnout-and-gaps-in-cybersecurity-detections-with-jack-roehrig</loc><lastmod>2024-04-06</lastmod></url><url><loc>https://hackervalley.com/e/episode-9-the-intelligence-easy-button</loc><lastmod>2024-04-06</lastmod></url><url><loc>https://hackervalley.com/e/build-vs-buy-the-classic-technologist-conundrum</loc><lastmod>2024-04-06</lastmod></url><url><loc>https://hackervalley.com/e/digital-clutter-and-the-death-of-passwords-with-collin-sweeney-chase-cunningham</loc><lastmod>2025-04-10</lastmod></url><url><loc>https://hackervalley.com/e/adapt-and-overcome-with-amy-bream</loc><lastmod>2024-04-06</lastmod></url><url><loc>https://hackervalley.com/e/offensive-security-unlocking-hidden-roi-with-seemant-sehgal</loc><lastmod>2024-08-16</lastmod></url><url><loc>https://hackervalley.com/e/episode-20-embracing-the-grind-with-will-rankin</loc><lastmod>2024-04-06</lastmod></url><url><loc>https://hackervalley.com/e/episode-174-dont-do-it-for-the-grammys-with-tre-nagella</loc><lastmod>2024-04-06</lastmod></url><url><loc>https://hackervalley.com/e/episode-113-astonishing-stories-with-neil-bearden</loc><lastmod>2024-04-06</lastmod></url><url><loc>https://hackervalley.com/e/episode-192-wisdom-and-celebrity-with-clint-arthur</loc><lastmod>2024-04-06</lastmod></url><url><loc>https://hackervalley.com/podcast/all-episodes</loc><image:image><image:loc>https://44814285.fs1.hubspotusercontent-na1.net/hubfs/44814285/Hacker%20Valley%20Media.png</image:loc><image:caption>HackerValleyMedia</image:caption><image:title>HackerValleyMedia</image:title></image:image><lastmod>2024-04-01</lastmod></url><url><loc>https://hackervalley.com/company-brand-videos</loc><video:video><video:thumbnail_loc>https://44814285.fs1.hubspotusercontent-na1.net/hubfs/44814285/OS24_ORCHID%20Company%20Story_H.264_UHD_24fps_FINAL_02%20(1).mp4.mp4/medium.jpg</video:thumbnail_loc><video:title>Orchid</video:title><video:description>OS24_ORCHID Company Story_H.264_UHD_24fps_FINAL_02 (1).mp4</video:description><video:content_loc>https://44814285.fs1.hubspotusercontent-na1.net/hubfs/44814285/OS24_ORCHID%20Company%20Story_H.264_UHD_24fps_FINAL_02%20(1).mp4.mp4</video:content_loc><video:duration>378</video:duration><video:requires_subscription>no</video:requires_subscription><video:live>no</video:live></video:video><image:image><image:loc>https://44814285.fs1.hubspotusercontent-na1.net/hubfs/44814285/Contact%20Us%20Button.png</image:loc><image:caption>ContactUsButton</image:caption><image:title>ContactUsButton</image:title></image:image><image:image><image:loc>https://44814285.fs1.hubspotusercontent-na1.net/hubfs/44814285/Screenshot%202025-05-22%20at%201.29.51%20PM.png</image:loc><image:caption>Screenshot20250522at12951PM</image:caption><image:title>Screenshot20250522at12951PM</image:title></image:image><image:image><image:loc>https://44814285.fs1.hubspotusercontent-na1.net/hubfs/44814285/What%20You%20Get_%20company%20story%20video%20services.svg</image:loc><image:caption>WhatYouGetcompanystoryvideoservices</image:caption><image:title>WhatYouGetcompanystoryvideoservices</image:title></image:image><image:image><image:loc>https://44814285.fs1.hubspotusercontent-na1.net/hubfs/44814285/Top%20Image_company%20Story%20Video%20Services.png</image:loc><image:caption>TopImagecompanyStoryVideoServices</image:caption><image:title>TopImagecompanyStoryVideoServices</image:title></image:image><image:image><image:loc>https://44814285.fs1.hubspotusercontent-na1.net/hubfs/44814285/WebDesign-Company%20Story%20Video%20Services%20Images%20(2).svg</image:loc><image:caption>WebDesignCompanyStoryVideoServicesImages2</image:caption><image:title>WebDesignCompanyStoryVideoServicesImages2</image:title></image:image><image:image><image:loc>https://44814285.fs1.hubspotusercontent-na1.net/hubfs/44814285/Screenshot%202025-05-16%20at%2012.53.33%20PM.png</image:loc><image:caption>Screenshot20250516at125333PM</image:caption><image:title>Screenshot20250516at125333PM</image:title></image:image><lastmod>2025-07-15</lastmod></url><url><loc>https://hackervalley.com/e/episode-38-social-engineering-the-human-hacker-with-chris-hadnagy</loc><lastmod>2024-04-06</lastmod></url><url><loc>https://hackervalley.com/e/episode-6-mitre-att-cktm-matrix-overview</loc><lastmod>2024-04-06</lastmod></url><url><loc>https://hackervalley.com/e</loc><lastmod>2024-04-06</lastmod><changefreq>always</changefreq></url><url><loc>https://hackervalley.com/e/becoming-team-tech-boy-with-dejuan-strickland</loc><lastmod>2024-04-06</lastmod></url><url><loc>https://hackervalley.com/e/episode-70-finding-the-genius-within-with-laura-garnett</loc><lastmod>2024-04-06</lastmod></url><url><loc>https://hackervalley.com/e/how-threat-actors-are-accessing-your-saas-environments-with-jaime-blasco</loc><lastmod>2024-04-06</lastmod></url><url><loc>https://hackervalley.com/e/episode-5-what-legacy-do-you-want-to-leave</loc><lastmod>2024-04-06</lastmod></url><url><loc>https://hackervalley.com/e/zero-trust-tactics-preventing-breaches-with-ivan-fonseca-nick-cottrell</loc><lastmod>2024-05-28</lastmod></url><url><loc>https://hackervalley.com/e/an-unstoppable-mind-with-david-pearson</loc><lastmod>2024-04-06</lastmod></url><url><loc>https://hackervalley.com/e/turning-ai-into-your-super-tool-with-ron-eddings</loc><lastmod>2025-08-28</lastmod></url><url><loc>https://hackervalley.com/e/hacking-the-tiktok-algorithm-with-caitlin-aka-cybersecurity-girl</loc><lastmod>2024-04-06</lastmod></url><url><loc>https://hackervalley.com/e/hacker-valley-blue-s2-episode-7-kevin-allison</loc><lastmod>2024-04-06</lastmod></url><url><loc>https://hackervalley.com/e/epsode-31-the-future-of-work-and-your-purpose-with-tim-salau</loc><lastmod>2024-04-06</lastmod></url><url><loc>https://hackervalley.com/e/episode-117-technically-unstoppable-with-tia-hopkins</loc><lastmod>2024-04-06</lastmod></url><url><loc>https://hackervalley.com/e/how-to-hack-your-career-building-a-vciso-business-with-ayman-elsawah</loc><lastmod>2024-04-23</lastmod></url><url><loc>https://hackervalley.com/e/hacker-valley-red-episode-3-alex-rice</loc><lastmod>2024-04-06</lastmod></url><url><loc>https://hackervalley.com/e/episode-181-the-calling-of-cyber-with-jerich-beason</loc><lastmod>2024-04-06</lastmod></url><url><loc>https://hackervalley.com/e/episode-24-decoding-linkedin-with-brynne-tillman</loc><lastmod>2024-04-06</lastmod></url><url><loc>https://hackervalley.com/e/episode-103-social-influence-and-voting-in-cyber-with-kiersten-todd</loc><lastmod>2024-04-06</lastmod></url><url><loc>https://hackervalley.com/e/episode-52-from-librarian-to-osint-with-tracy-maleeff</loc><lastmod>2024-04-06</lastmod></url><url><loc>https://hackervalley.com/e/the-secret-sauce-of-sans-instructors-with-john-hubbard</loc><lastmod>2024-04-06</lastmod></url><url><loc>https://hackervalley.com/e/challenges-opportunities-in-cyber-threat-intelligence-with-brian-kime</loc><lastmod>2024-04-06</lastmod></url><url><loc>https://hackervalley.com/e/from-black-hat-to-bug-bounties-pt-2-with-thomas-devoss</loc><lastmod>2024-04-06</lastmod></url><url><loc>https://hackervalley.com/e/episode-194-priming-the-mind-for-happiness-with-zahra-karsan</loc><lastmod>2024-04-06</lastmod></url><url><loc>https://hackervalley.com/e/episode-45-the-more-things-change-with-katie-nickels</loc><lastmod>2024-04-06</lastmod></url><url><loc>https://hackervalley.com/e/when-ai-ships-the-code-who-owns-the-risk-with-varun-badhwar-and-henrik-plate</loc><lastmod>2026-01-08</lastmod></url><url><loc>https://hackervalley.com/e/vote-for-hacker-valley-to-win-a-webby-award</loc><lastmod>2024-04-06</lastmod></url><url><loc>https://hackervalley.com/e/and-the-academy-award-goes-to-with-evan-mayfield</loc><lastmod>2024-04-06</lastmod></url><url><loc>https://hackervalley.com/e/episode-102-tale-of-three-c-s-craig-corey-and-cyvatar</loc><lastmod>2024-04-06</lastmod></url><url><loc>https://hackervalley.com/e/episode-10-breaking-barriers-gatekeepers-and-glass-ceilings</loc><lastmod>2024-04-06</lastmod></url><url><loc>https://hackervalley.com/e/starting-at-the-endpoint-with-danny-jenkins</loc><lastmod>2024-04-06</lastmod></url><url><loc>https://hackervalley.com/e/recon-like-an-adversary-uncovering-modern-techniques-in-attack-surface-management-with-jason-haddix</loc><lastmod>2024-09-10</lastmod></url><url><loc>https://hackervalley.com/e/the-ai-that-tried-to-escape-with-ron-eddings</loc><lastmod>2025-06-12</lastmod></url><url><loc>https://hackervalley.com/e/we-are-here-season-2-premiere-with-minda-harts</loc><lastmod>2024-04-06</lastmod></url><url><loc>https://hackervalley.com/e/episode-41-leading-marines-agents-and-infosec-with-m-k-palmore</loc><lastmod>2024-04-06</lastmod></url><url><loc>https://hackervalley.com/f1d38776-0870-4b83-b457-237bcd93fd81/-temporary-slug-bd590962-b4d6-4d2d-85d6-3db4ec0c98d9</loc><lastmod>2025-02-27</lastmod></url><url><loc>https://hackervalley.com/e/episode-124-the-learning-leader-with-allan-alford</loc><lastmod>2024-04-06</lastmod></url><url><loc>https://hackervalley.com/e/episode-15-thrill-of-the-hunt-finding-your-path</loc><lastmod>2024-04-06</lastmod></url><url><loc>https://hackervalley.com/e/leaving-an-impression-strategies-for-captivating-a-massive-audience</loc><lastmod>2024-07-23</lastmod></url><url><loc>https://hackervalley.com/e/episode-170-the-beauty-of-cybersecurity-with-grace-chi</loc><lastmod>2024-04-06</lastmod></url><url><loc>https://hackervalley.com/e/we-are-here-finale-a-case-study-of-dei-at-crowdstrike</loc><lastmod>2024-04-06</lastmod></url><url><loc>https://hackervalley.com/e/ai-deepfakes-and-human-risk-in-cybersecurity-with-perry-carpenter</loc><lastmod>2024-10-22</lastmod></url><url><loc>https://hackervalley.com/e/how-ai-is-the-key-turning-point-in-tprm-with-paul-valente</loc><lastmod>2024-06-11</lastmod></url><url><loc>https://hackervalley.com/e/putting-your-cyber-marketing-audience-first-with-dani-woolf</loc><lastmod>2024-04-06</lastmod></url><url><loc>https://hackervalley.com/e/soft-skills-in-technical-sales-to-connect-and-sell-more-with-evgeniy-kharam</loc><lastmod>2024-09-17</lastmod></url><url><loc>https://hackervalley.com/e/leaping-over-the-bar-to-leading-cyber-in-africa-with-confidence-staveley</loc><lastmod>2024-04-30</lastmod></url><url><loc>https://hackervalley.com/e/rethinking-cybersecurity-hiring-with-naomi-buckwalter</loc><lastmod>2024-10-29</lastmod></url><url><loc>https://hackervalley.com/blog/hd-moore-the-hacker-who-changed-everything</loc><image:image><image:loc>https://44814285.fs1.hubspotusercontent-na1.net/hubfs/44814285/1-Mar-13-2025-09-59-56-9976-PM.png</image:loc><image:caption>1Mar1320250959569976PM</image:caption><image:title>1Mar1320250959569976PM</image:title></image:image><lastmod>2025-05-06</lastmod></url><url><loc>https://hackervalley.com/e/becoming-the-maestro-with-rob-white</loc><lastmod>2024-04-06</lastmod></url><url><loc>https://hackervalley.com/e/episode-110-becoming-material-security-with-ryan-noon-and-abhishek-agrawal</loc><lastmod>2024-04-06</lastmod></url><url><loc>https://hackervalley.com/e/episode-29-road-to-the-sans-cti-summit-with-rick-holland</loc><lastmod>2024-04-06</lastmod></url><url><loc>https://hackervalley.com/e/from-mcp-risks-to-ai-jailbreaks-with-marco-figueroa</loc><lastmod>2025-08-14</lastmod></url><url><loc>https://hackervalley.com/e/episode-158-wild-adventures-with-chef-bri-van-scotter</loc><lastmod>2024-04-06</lastmod></url><url><loc>https://hackervalley.com/e/pivotal-moments-in-our-cybersecurity-career-and-making-our-first-100k-in-cyber</loc><lastmod>2024-04-06</lastmod></url><url><loc>https://hackervalley.com/e/enterprise-browsers-works-natural-next-step</loc><lastmod>2024-05-21</lastmod></url><url><loc>https://hackervalley.com/blog/your-attack-surface-is-a-dumpster-fire-lets-fix-that</loc><video:video><video:thumbnail_loc>https://44814285.fs1.hubspotusercontent-na1.net/hubfs/44814285/NE25_AS_NetSPI_Social%20Clip1_04.mp4/medium.jpg</video:thumbnail_loc><video:title>NE25_AS_NetSPI_Social Clip1_04</video:title><video:description>NE25_AS_NetSPI_Social Clip1_04</video:description><video:content_loc>https://44814285.fs1.hubspotusercontent-na1.net/hubfs/44814285/NE25_AS_NetSPI_Social%20Clip1_04.mp4</video:content_loc><video:duration>44</video:duration><video:requires_subscription>no</video:requires_subscription><video:live>no</video:live></video:video><image:image><image:loc>https://44814285.fs1.hubspotusercontent-na1.net/hubfs/44814285/NE25_AS_On%20Demand%20Thumbnail%201.png</image:loc><image:caption>NE25ASOnDemandThumbnail1</image:caption><image:title>NE25ASOnDemandThumbnail1</image:title></image:image><image:image><image:loc>https://44814285.fs1.hubspotusercontent-na1.net/hubfs/44814285/NetSPI%20ASM%201%20Blog%20Thumbnail.svg</image:loc><image:caption>NetSPIASM1BlogThumbnail</image:caption><image:title>NetSPIASM1BlogThumbnail</image:title></image:image><lastmod>2025-05-08</lastmod></url><url><loc>https://hackervalley.com/e/we-are-here-part-3-allyship-and-representation</loc><lastmod>2024-04-06</lastmod></url><url><loc>https://hackervalley.com/e/episode-125-the-grit-of-being-world-champion-with-lee-kemp</loc><lastmod>2024-04-06</lastmod></url><url><loc>https://hackervalley.com/e/cybersecurity-layoffs-and-diversity-with-mckenna-yeakey</loc><lastmod>2024-04-06</lastmod></url><url><loc>https://hackervalley.com/e/managing-and-mitigating-cyber-risks-for-your-assets-with-jerich-beason-and-wes-wright</loc><lastmod>2025-01-15</lastmod></url><url><loc>https://hackervalley.com/e/creating-value-in-the-cyber-industry-with-nick-lantuh</loc><lastmod>2024-04-06</lastmod></url><url><loc>https://hackervalley.com/e/defending-your-cyber-systems-and-your-mental-attack-surface-with-chris-hughes</loc><lastmod>2025-12-11</lastmod></url><url><loc>https://hackervalley.com/e/a-deep-dive-into-mssps-understanding-the-evolution-and-secrets-within-with-ricardo-nicolini</loc><lastmod>2024-06-04</lastmod></url><url><loc>https://hackervalley.com/e/ai-is-the-tool-not-the-toolbox</loc><lastmod>2024-04-06</lastmod></url><url><loc>https://hackervalley.com/e/episode-11-selling-cybersecurity-doing-business-in-an-increasingly-connected-world</loc><lastmod>2024-04-06</lastmod></url><url><loc>https://hackervalley.com/e/special-featured-episode-purple-teams-threat-informed-defenses-with-ben-opel</loc><lastmod>2024-04-06</lastmod></url><url><loc>https://hackervalley.com/e/episode-53-in-the-depths-of-deception-with-jenny-radcliffe</loc><lastmod>2024-04-06</lastmod></url><url><loc>https://hackervalley.com/e/leading-cybersecurity-incidents-as-incident-commander-and-responding-to-a-cyber-crisis</loc><lastmod>2024-04-06</lastmod></url><url><loc>https://hackervalley.com/e/cyber-espionage-entrepreneurship-with-karim-hijazi</loc><lastmod>2024-04-06</lastmod></url><url><loc>https://hackervalley.com/e/episode-115-podcast-takeover-with-carole-theriault</loc><lastmod>2024-04-06</lastmod></url><url><loc>https://hackervalley.com/e/when-automation-outruns-control-with-joshua-bregler</loc><lastmod>2026-01-18</lastmod></url><url><loc>https://hackervalley.com/e/episode-47-the-role-of-a-ciso-with-lenny-zeltser</loc><lastmod>2024-04-06</lastmod></url><url><loc>https://hackervalley.com/e/episode-69-paving-a-path-with-georgia-weidman</loc><lastmod>2024-04-06</lastmod></url><url><loc>https://hackervalley.com/e/paying-the-piper-in-cybersecurity-balancing-success-and-personal-life</loc><lastmod>2024-04-06</lastmod></url><url><loc>https://hackervalley.com/e/hacker-valley-blue-s2-episode-3-chani-simms</loc><lastmod>2024-04-06</lastmod></url><url><loc>https://hackervalley.com/e/episode-199-sharing-the-mic-with-camille-stewart</loc><lastmod>2024-04-06</lastmod></url><url><loc>https://hackervalley.com/e/episode-19-dressed-for-success-in-cyber-with-ashley-tolbert</loc><lastmod>2024-04-06</lastmod></url><url><loc>https://hackervalley.com/e/when-cybercrime-learned-how-to-make-money-and-never-looked-back-with-graham-cluley</loc><lastmod>2026-01-25</lastmod></url><url><loc>https://hackervalley.com/e/episode-13-a-journey-through-venture-capitalism-mentoring-and-leading-in-silicon-valley</loc><lastmod>2024-04-06</lastmod></url><url><loc>https://hackervalley.com/e/hacker-valley-red-episode-7-maurice-ashley</loc><lastmod>2024-04-06</lastmod></url><url><loc>https://hackervalley.com/e/episode-2-layer-8-level-up-career-life-and-self</loc><lastmod>2024-04-06</lastmod></url><url><loc>https://hackervalley.com/e/keeping-cyber-course-prices-equitable-with-kenneth-ellington</loc><lastmod>2024-04-06</lastmod></url><url><loc>https://hackervalley.com/e/we-are-here-part-2-a-tech-titans-roundtable</loc><lastmod>2024-04-06</lastmod></url><url><loc>https://hackervalley.com/e/episode-176-technical-education-with-dr-sk-moreland-and-terri-oropeza</loc><lastmod>2024-04-06</lastmod></url><url><loc>https://hackervalley.com/e/episode-34-cybersecurity-new-to-good-to-great-with-susan-peediyakkal</loc><lastmod>2024-04-06</lastmod></url><url><loc>https://hackervalley.com/e/hiring-the-next-fractional-ciso-with-michael-piacente</loc><lastmod>2024-04-06</lastmod></url><url><loc>https://hackervalley.com/e/privacy-by-design-the-future-of-homomorphic-encryption-secure-data-analytics</loc><lastmod>2024-04-06</lastmod></url><url><loc>https://hackervalley.com/e/hacker-valley-blue-season-finale</loc><lastmod>2024-04-06</lastmod></url><url><loc>https://hackervalley.com/customer-testimonials</loc><video:video><video:thumbnail_loc>https://44814285.fs1.hubspotusercontent-na1.net/hubfs/44814285/OS24_ORCHID_CUSTOMER%20TESTIMONIAL_COSTCO_H.264_UHD_FINAL_04.mp4.mp4/medium.jpg</video:thumbnail_loc><video:title>OS24_ORCHID_CUSTOMER TESTIMONIAL_COSTCO_H.264_UHD_FINAL_04.mp4</video:title><video:description>OS24_ORCHID_CUSTOMER TESTIMONIAL_COSTCO_H.264_UHD_FINAL_04.mp4</video:description><video:content_loc>https://44814285.fs1.hubspotusercontent-na1.net/hubfs/44814285/OS24_ORCHID_CUSTOMER%20TESTIMONIAL_COSTCO_H.264_UHD_FINAL_04.mp4.mp4</video:content_loc><video:duration>195</video:duration><video:requires_subscription>no</video:requires_subscription><video:live>no</video:live></video:video><image:image><image:loc>https://44814285.fs1.hubspotusercontent-na1.net/hubfs/44814285/Contact%20Us%20Button.png</image:loc><image:caption>ContactUsButton</image:caption><image:title>ContactUsButton</image:title></image:image><image:image><image:loc>https://44814285.fs1.hubspotusercontent-na1.net/hubfs/44814285/Orchid%20Photo.png</image:loc><image:caption>OrchidPhoto</image:caption><image:title>OrchidPhoto</image:title></image:image><image:image><image:loc>https://44814285.fs1.hubspotusercontent-na1.net/hubfs/44814285/WebDesign-Company%20Story%20Video%20Services%20Images%20(2).svg</image:loc><image:caption>WebDesignCompanyStoryVideoServicesImages2</image:caption><image:title>WebDesignCompanyStoryVideoServicesImages2</image:title></image:image><image:image><image:loc>https://44814285.fs1.hubspotusercontent-na1.net/hubfs/44814285/Screenshot%202025-05-22%20at%201.29.51%20PM.png</image:loc><image:caption>Screenshot20250522at12951PM</image:caption><image:title>Screenshot20250522at12951PM</image:title></image:image><image:image><image:loc>https://44814285.fs1.hubspotusercontent-na1.net/hubfs/44814285/Blackhat%20Photo.png</image:loc><image:caption>BlackhatPhoto</image:caption><image:title>BlackhatPhoto</image:title></image:image><lastmod>2025-07-17</lastmod></url><url><loc>https://hackervalley.com/e/badge-cloning-alarm-triggers-getting-hired-to-hack-with-greg-hatcher-john-stigerwalt</loc><lastmod>2025-05-22</lastmod></url><url><loc>https://hackervalley.com/e/hacker-valley-red-finale-marco-figueroa</loc><lastmod>2024-04-06</lastmod></url><url><loc>https://hackervalley.com/e/the-untold-story-of-browser-risks-pioneering-enterprise-browser-security-with-or-eshed</loc><lastmod>2024-04-06</lastmod></url><url><loc>https://hackervalley.com/e/episode-123-adventures-in-venture-capital-with-lindsay-lee</loc><lastmod>2024-04-06</lastmod></url><url><loc>https://hackervalley.com/e/the-future-of-endpoint-threats-and-why-zero-trust-is-the-only-option-with-rob-allen</loc><lastmod>2024-04-06</lastmod></url><url><loc>https://hackervalley.com/e/where-cyber-meets-content-creation-with-henri-davis</loc><lastmod>2024-04-06</lastmod></url><url><loc>https://hackervalley.com/e/how-a-game-turned-a-watchmaker-into-a-cybersecurity-pro-with-simeon-kakpovi</loc><lastmod>2025-01-22</lastmod></url><url><loc>https://hackervalley.com/e/from-black-hat-to-bug-bounties-pt-1-with-tommy-devoss</loc><lastmod>2024-04-06</lastmod></url><url><loc>https://hackervalley.com/e/episode-166-there-is-no-skills-gap-with-andy-ellis</loc><lastmod>2024-04-06</lastmod></url><url><loc>https://hackervalley.com/e/cybersecurity-meets-ai-the-good-the-bad-the-janky</loc><lastmod>2025-02-13</lastmod></url><url><loc>https://hackervalley.com/e/metaversable-exploring-the-metaverse-thru-nfts-nft-art-and-cryptocurrency</loc><lastmod>2024-04-06</lastmod></url><url><loc>https://hackervalley.com/e/episode-30-threat-hunting-with-data-science-roberto-rodriguez</loc><lastmod>2024-04-06</lastmod></url><url><loc>https://hackervalley.com/work/cyware</loc><image:image><image:loc>https://44814285.fs1.hubspotusercontent-na1.net/hubfs/44814285/Recent%20Works%20Website%20Images%20(1920%20x%20400%20px)%20(1920%20x%20550%20px)%20(1).png</image:loc><image:caption>RecentWorksWebsiteImages1920x400px1920x550px1</image:caption><image:title>RecentWorksWebsiteImages1920x400px1920x550px1</image:title></image:image><image:image><image:loc>https://44814285.fs1.hubspotusercontent-na1.net/hubfs/44814285/1-2.png</image:loc><image:caption>12</image:caption><image:title>12</image:title></image:image><image:image><image:loc>https://44814285.fs1.hubspotusercontent-na1.net/hubfs/44814285/Recent%20Works%20Website%20Images%20(1920%20x%20400%20px).png</image:loc><image:caption>RecentWorksWebsiteImages1920x400px</image:caption><image:title>RecentWorksWebsiteImages1920x400px</image:title></image:image><image:image><image:loc>https://44814285.fs1.hubspotusercontent-na1.net/hubfs/44814285/hearth.png</image:loc><image:caption>hearth</image:caption><image:title>hearth</image:title></image:image><image:image><image:loc>https://44814285.fs1.hubspotusercontent-na1.net/hubfs/44814285/group_people.png</image:loc><image:caption>grouppeople</image:caption><image:title>grouppeople</image:title></image:image><image:image><image:loc>https://44814285.fs1.hubspotusercontent-na1.net/hubfs/44814285/HVM-Logo-Color-06-3.png</image:loc><image:caption>HVMLogoColor063</image:caption><image:title>HVMLogoColor063</image:title></image:image><lastmod>2024-09-09</lastmod></url><url><loc>https://hackervalley.com/e/episode-27-mark-metry-podcasting-with-purpose</loc><lastmod>2024-04-06</lastmod></url><url><loc>https://hackervalley.com/e/understanding-the-psychology-of-cyber-risk-with-david-shipley</loc><lastmod>2025-01-07</lastmod></url><url><loc>https://hackervalley.com/work-with-us</loc><video:video><video:thumbnail_loc>https://44814285.fs1.hubspotusercontent-na1.net/hubfs/44814285/AxoniusTestimonial.mp4/medium.jpg</video:thumbnail_loc><video:title>AxoniusTestimonial</video:title><video:description>AxoniusTestimonial</video:description><video:content_loc>https://44814285.fs1.hubspotusercontent-na1.net/hubfs/44814285/AxoniusTestimonial.mp4</video:content_loc><video:duration>72</video:duration><video:requires_subscription>no</video:requires_subscription><video:live>no</video:live></video:video><image:image><image:loc>https://44814285.fs1.hubspotusercontent-na1.net/hubfs/44814285/Hacker%20Valley%20Media.png</image:loc><image:caption>HackerValleyMedia</image:caption><image:title>HackerValleyMedia</image:title></image:image><lastmod>2024-04-01</lastmod></url><url><loc>https://hackervalley.com</loc><video:video><video:thumbnail_loc>https://44814285.fs1.hubspotusercontent-na1.net/hubfs/44814285/HVM2.mp4/medium.jpg</video:thumbnail_loc><video:title>HVM2</video:title><video:description>HVM2</video:description><video:content_loc>https://44814285.fs1.hubspotusercontent-na1.net/hubfs/44814285/HVM2.mp4</video:content_loc><video:duration>31</video:duration><video:requires_subscription>no</video:requires_subscription><video:live>no</video:live></video:video><video:video><video:thumbnail_loc>https://44814285.fs1.hubspotusercontent-na1.net/hubfs/44814285/HVM1.mp4/medium.jpg</video:thumbnail_loc><video:title>HVM1</video:title><video:description>HVM1</video:description><video:content_loc>https://44814285.fs1.hubspotusercontent-na1.net/hubfs/44814285/HVM1.mp4</video:content_loc><video:duration>12</video:duration><video:requires_subscription>no</video:requires_subscription><video:live>no</video:live></video:video><image:image><image:loc>https://44814285.fs1.hubspotusercontent-na1.net/hubfs/44814285/SV%20ISSA.png</image:loc><image:caption>SVISSA</image:caption><image:title>SVISSA</image:title></image:image><image:image><image:loc>https://44814285.fs1.hubspotusercontent-na1.net/hubfs/44814285/ValenceSecurity.png</image:loc><image:caption>ValenceSecurity</image:caption><image:title>ValenceSecurity</image:title></image:image><image:image><image:loc>https://44814285.fs1.hubspotusercontent-na1.net/hubfs/44814285/Descope.jpeg</image:loc><image:caption>Descope</image:caption><image:title>Descope</image:title></image:image><image:image><image:loc>https://44814285.fs1.hubspotusercontent-na1.net/hubfs/44814285/LayerX.jpeg</image:loc><image:caption>LayerX</image:caption><image:title>LayerX</image:title></image:image><image:image><image:loc>https://44814285.fs1.hubspotusercontent-na1.net/hubfs/44814285/Votiro.png</image:loc><image:caption>Votiro</image:caption><image:title>Votiro</image:title></image:image><image:image><image:loc>https://44814285.fs1.hubspotusercontent-na1.net/hubfs/44814285/Dazz.png</image:loc><image:caption>Dazz</image:caption><image:title>Dazz</image:title></image:image><image:image><image:loc>https://44814285.fs1.hubspotusercontent-na1.net/hubfs/44814285/Nudge.png</image:loc><image:caption>Nudge</image:caption><image:title>Nudge</image:title></image:image><image:image><image:loc>https://44814285.fs1.hubspotusercontent-na1.net/hubfs/44814285/Cyware%20Panel.webp</image:loc><image:caption>CywarePanel</image:caption><image:title>CywarePanel</image:title></image:image><image:image><image:loc>https://44814285.fs1.hubspotusercontent-na1.net/hubfs/44814285/Duality.png</image:loc><image:caption>Duality</image:caption><image:title>Duality</image:title></image:image><image:image><image:loc>https://44814285.fs1.hubspotusercontent-na1.net/hubfs/44814285/Living%20Security.png</image:loc><image:caption>LivingSecurity</image:caption><image:title>LivingSecurity</image:title></image:image><image:image><image:loc>https://44814285.fs1.hubspotusercontent-na1.net/hubfs/44814285/interpres-security.png</image:loc><image:caption>interpressecurity</image:caption><image:title>interpressecurity</image:title></image:image><image:image><image:loc>https://44814285.fs1.hubspotusercontent-na1.net/hubfs/44814285/Covertswarm%20Logo.png</image:loc><image:caption>CovertswarmLogo</image:caption><image:title>CovertswarmLogo</image:title></image:image><image:image><image:loc>https://44814285.fs1.hubspotusercontent-na1.net/hubfs/44814285/SolCyber.png</image:loc><image:caption>SolCyber</image:caption><image:title>SolCyber</image:title></image:image><image:image><image:loc>https://44814285.fs1.hubspotusercontent-na1.net/hubfs/44814285/NetSPI-Horizontal-Logo-RGB-Color%20(1).png</image:loc><image:caption>NetSPIHorizontalLogoRGBColor1</image:caption><image:title>NetSPIHorizontalLogoRGBColor1</image:title></image:image><image:image><image:loc>https://44814285.fs1.hubspotusercontent-na1.net/hubfs/44814285/Hacker%20Valley%20Media.png</image:loc><image:caption>HackerValleyMedia</image:caption><image:title>HackerValleyMedia</image:title></image:image><image:image><image:loc>https://44814285.fs1.hubspotusercontent-na1.net/hubfs/44814285/Axonius.png</image:loc><image:caption>Axonius</image:caption><image:title>Axonius</image:title></image:image><image:image><image:loc>https://44814285.fs1.hubspotusercontent-na1.net/hubfs/44814285/Island.svg</image:loc><image:caption>Island</image:caption><image:title>Island</image:title></image:image><image:image><image:loc>https://44814285.fs1.hubspotusercontent-na1.net/hubfs/44814285/CrowdStrike.png</image:loc><image:caption>CrowdStrike</image:caption><image:title>CrowdStrike</image:title></image:image><image:image><image:loc>https://44814285.fs1.hubspotusercontent-na1.net/hubfs/44814285/AttackIQ.png</image:loc><image:caption>AttackIQ</image:caption><image:title>AttackIQ</image:title></image:image><image:image><image:loc>https://44814285.fs1.hubspotusercontent-na1.net/hubfs/44814285/DualityCover.png</image:loc><image:caption>DualityCover</image:caption><image:title>DualityCover</image:title></image:image><image:image><image:loc>https://44814285.fs1.hubspotusercontent-na1.net/hubfs/44814285/PlexTrac.png</image:loc><image:caption>PlexTrac</image:caption><image:title>PlexTrac</image:title></image:image><image:image><image:loc>https://44814285.fs1.hubspotusercontent-na1.net/hubfs/44814285/Interpres%20Security.png</image:loc><image:caption>InterpresSecurity</image:caption><image:title>InterpresSecurity</image:title></image:image><image:image><image:loc>https://44814285.fs1.hubspotusercontent-na1.net/hubfs/44814285/Deepwatch.png</image:loc><image:caption>Deepwatch</image:caption><image:title>Deepwatch</image:title></image:image><lastmod>2024-07-22</lastmod></url><url><loc>https://hackervalley.com/e/hacker-valley-red-is-back-episode-1-sample</loc><lastmod>2024-04-06</lastmod></url><url><loc>https://hackervalley.com/e/episode-188-making-friends-spies-and-traitors-with-james-lawler</loc><lastmod>2024-04-06</lastmod></url><url><loc>https://hackervalley.com/e/cybersecurity-challenges-ai-burnout-and-insider-threats-with-kayla-williams</loc><lastmod>2024-08-27</lastmod></url><url><loc>https://hackervalley.com/e/episode-198-scaling-your-efforts-with-veronica-kirin</loc><lastmod>2024-04-06</lastmod></url><url><loc>https://hackervalley.com/e/episode-114-the-good-bad-and-ugly-of-threat-intelligence-with-patrick-coughlin</loc><lastmod>2024-04-06</lastmod></url><url><loc>https://hackervalley.com/e/mentorship-to-mastery-ai-and-community-lessons-with-ron-eddings</loc><lastmod>2025-08-21</lastmod></url><url><loc>https://hackervalley.com/e/episode-67-doubling-down-on-humans-with-caroline-wong</loc><lastmod>2024-04-06</lastmod></url><url><loc>https://hackervalley.com/e/episode-32-cyber-transformations-and-migrations-with-talha-tariq</loc><lastmod>2024-04-06</lastmod></url><url><loc>https://hackervalley.com/sponsorship</loc><video:video><video:thumbnail_loc>https://44814285.fs1.hubspotusercontent-na1.net/hubfs/44814285/Axonius%20Testimonial.mp4/medium.jpg</video:thumbnail_loc><video:title>Axonius Testimonial</video:title><video:description>Axonius Testimonial</video:description><video:content_loc>https://44814285.fs1.hubspotusercontent-na1.net/hubfs/44814285/Axonius%20Testimonial.mp4</video:content_loc><video:duration>72</video:duration><video:requires_subscription>no</video:requires_subscription><video:live>no</video:live></video:video><video:video><video:thumbnail_loc>https://44814285.fs1.hubspotusercontent-na1.net/hubfs/44814285/Hacker%20Valley%20Studio%20Podcast%20Sponsorship.mov/medium.jpg</video:thumbnail_loc><video:title>Hacker Valley Studio Podcast Sponsorship</video:title><video:description>Hacker Valley Studio Podcast Sponsorship</video:description><video:content_loc>https://44814285.fs1.hubspotusercontent-na1.net/hubfs/44814285/Hacker%20Valley%20Studio%20Podcast%20Sponsorship.mov</video:content_loc><video:duration>128</video:duration><video:requires_subscription>no</video:requires_subscription><video:live>no</video:live></video:video><image:image><image:loc>https://44814285.fs1.hubspotusercontent-na1.net/hubfs/44814285/Sponsor%20and%20Record.png</image:loc><image:caption>SponsorandRecord</image:caption><image:title>SponsorandRecord</image:title></image:image><image:image><image:loc>https://44814285.fs1.hubspotusercontent-na1.net/hubfs/44814285/Featured%20Guest.png</image:loc><image:caption>FeaturedGuest</image:caption><image:title>FeaturedGuest</image:title></image:image><image:image><image:loc>https://44814285.fs1.hubspotusercontent-na1.net/hubfs/44814285/ABM%20Audience.png</image:loc><image:caption>ABMAudience</image:caption><image:title>ABMAudience</image:title></image:image><image:image><image:loc>https://44814285.fs1.hubspotusercontent-na1.net/hubfs/44814285/HVM-Logo-Color-06-2.png</image:loc><image:caption>HVMLogoColor062</image:caption><image:title>HVMLogoColor062</image:title></image:image><lastmod>2024-09-09</lastmod></url><url><loc>https://hackervalley.com/e/hacker-valley-blue-episode-2-jack-rhysider</loc><lastmod>2024-04-06</lastmod></url><url><loc>https://hackervalley.com/e/how-adversaries-are-living-off-the-dark-web-with-jason-haddix</loc><lastmod>2024-10-01</lastmod></url><url><loc>https://hackervalley.com/e/episode-57-underrepresented-iii</loc><lastmod>2024-04-06</lastmod></url><url><loc>https://hackervalley.com/e/unlocking-cyber-education-with-john-hammond</loc><lastmod>2024-04-06</lastmod></url><url><loc>https://hackervalley.com/e/hacker-valley-blue-episode-3-valentina-palacin</loc><lastmod>2024-04-06</lastmod></url><url><loc>https://hackervalley.com/e/hacker-valley-blue-episode-1</loc><lastmod>2024-04-06</lastmod></url><url><loc>https://hackervalley.com/e/beers-tears-breaking-through-in-cybersecurity-marketing-with-gianna-whitver-maria-velasquez</loc><lastmod>2024-04-06</lastmod></url><url><loc>https://hackervalley.com/e/building-opportunities-for-women-and-minorities-in-cybersecurity-with-connie-matthews</loc><lastmod>2024-11-06</lastmod></url><url><loc>https://hackervalley.com/e/we-are-here-part-2-a-cyber-masterminds-discussion</loc><lastmod>2024-04-06</lastmod></url><url><loc>https://hackervalley.com/e/unleashing-the-power-of-cybersecurity-purple-teams-with-maril-vernon</loc><lastmod>2024-04-06</lastmod></url><url><loc>https://hackervalley.com/e/having-resilience-in-your-cyber-career-with-erika-eakins</loc><lastmod>2024-04-06</lastmod></url><url><loc>https://hackervalley.com/e/navigating-ai-as-a-ciso-with-whitney-palacios</loc><lastmod>2024-07-22</lastmod></url><url><loc>https://hackervalley.com/e/the-future-of-pen-testing-automation-with-alton-johnson</loc><lastmod>2024-04-06</lastmod></url><url><loc>https://hackervalley.com/e/adventures-in-the-outerverse-with-robin-thurston</loc><lastmod>2024-04-06</lastmod></url><url><loc>https://hackervalley.com/e/hacker-culture-and-adhd-with-kim-crawley</loc><lastmod>2024-04-06</lastmod></url><url><loc>https://hackervalley.com/e/the-power-of-appsec-cyber-education-and-friendship-with-tanya-janca</loc><lastmod>2024-07-22</lastmod></url><url><loc>https://hackervalley.com/e/a-solopreneurs-first-imperfect-step-with-claire-gallagher</loc><lastmod>2024-04-06</lastmod></url><url><loc>https://hackervalley.com/e/zero-trust-isnt-a-tool-its-everything-with-george-finney</loc><lastmod>2025-06-05</lastmod></url><url><loc>https://hackervalley.com/e/mastering-the-art-of-storytelling-in-cybersecurity</loc><lastmod>2024-04-06</lastmod></url><url><loc>https://hackervalley.com/e/coding-by-vibe-the-future-of-ai-built-security-with-ron-eddings</loc><lastmod>2025-10-24</lastmod></url><url><loc>https://hackervalley.com/e/hacker-valley-blue-episode-7-d-arcy-webb</loc><lastmod>2024-04-06</lastmod></url><url><loc>https://hackervalley.com/e/mastering-focus-with-simone-biles-and-amy-bream-at-rsa</loc><lastmod>2024-04-06</lastmod></url><url><loc>https://hackervalley.com/e/humility-in-product-management-with-eric-avigdor</loc><lastmod>2024-04-06</lastmod></url><url><loc>https://hackervalley.com/e/finding-your-imposter-syndrome-origin-story-with-sheryl-anjanette</loc><lastmod>2024-04-06</lastmod></url><url><loc>https://hackervalley.com/event-content-and-coverage</loc><video:video><video:thumbnail_loc>https://44814285.fs1.hubspotusercontent-na1.net/hubfs/44814285/TI25_RA_INT%20HIGHLIGHT%20VIDEO_FINAL_01.mp4/medium.jpg</video:thumbnail_loc><video:title>TI25_RA_INT HIGHLIGHT VIDEO_FINAL_01</video:title><video:description>TI25_RA_INT HIGHLIGHT VIDEO_FINAL_01</video:description><video:content_loc>https://44814285.fs1.hubspotusercontent-na1.net/hubfs/44814285/TI25_RA_INT%20HIGHLIGHT%20VIDEO_FINAL_01.mp4</video:content_loc><video:duration>244</video:duration><video:requires_subscription>no</video:requires_subscription><video:live>no</video:live></video:video><image:image><image:loc>https://44814285.fs1.hubspotusercontent-na1.net/hubfs/44814285/Event%20Coverage%20Photo%201.svg</image:loc><image:caption>EventCoveragePhoto1</image:caption><image:title>EventCoveragePhoto1</image:title></image:image><image:image><image:loc>https://44814285.fs1.hubspotusercontent-na1.net/hubfs/44814285/Contact%20Us%20Button.png</image:loc><image:caption>ContactUsButton</image:caption><image:title>ContactUsButton</image:title></image:image><image:image><image:loc>https://44814285.fs1.hubspotusercontent-na1.net/hubfs/44814285/Event%20Coverage%20Photo%202.svg</image:loc><image:caption>EventCoveragePhoto2</image:caption><image:title>EventCoveragePhoto2</image:title></image:image><lastmod>2025-07-17</lastmod></url><url><loc>https://hackervalley.com/e/episode-173-laughing-your-cyber-off-with-ian-murphy</loc><lastmod>2024-04-06</lastmod></url><url><loc>https://hackervalley.com/e/episode-169-art-science-and-nanotechnology-with-dr-bahijja-raimi-abraham</loc><lastmod>2024-04-06</lastmod></url><url><loc>https://hackervalley.com/e/episode-191-listen-as-i-fall-out-of-this-window-with-tyler-foley</loc><lastmod>2024-04-06</lastmod></url><url><loc>https://hackervalley.com/e/episode-190-maintaining-a-fuel-for-life-with-nate-palmer</loc><lastmod>2024-04-06</lastmod></url><url><loc>https://hackervalley.com/e/paving-the-path-for-cisos-of-the-future-with-gary-hayslip</loc><lastmod>2024-04-06</lastmod></url><url><loc>https://hackervalley.com/e/securing-software-at-ai-speed-with-varun-badhwar</loc><lastmod>2025-10-02</lastmod></url><url><loc>https://hackervalley.com/e/quickq-what-is-threat-intelligence</loc><lastmod>2024-04-06</lastmod></url><url><loc>https://hackervalley.com/e/zinet-kemal-s-journey-from-ethiopian-immigrant-to-tedx-speaker-cloud-security-engineer-at-fortune</loc><lastmod>2024-04-06</lastmod></url><url><loc>https://hackervalley.com/e/episode-79-finding-our-genius-with-laura-garnett</loc><lastmod>2024-04-06</lastmod></url><url><loc>https://hackervalley.com/e/making-corporate-leadership-human-with-ginny-clarke</loc><lastmod>2024-04-06</lastmod></url><url><loc>https://hackervalley.com/e/rsa-with-purpose-sealing-deals-getting-hired-and-networking-with-industry-leaders</loc><lastmod>2024-04-06</lastmod></url><url><loc>https://hackervalley.com/e/at-t-dynamic-defense-security-before-it-reaches-your-company-s-doorstep-with-senthil-ramakrishnan</loc><lastmod>2024-09-24</lastmod></url><url><loc>https://hackervalley.com/e/episode-153-your-personal-brand-in-demand-with-stephen-hart</loc><lastmod>2024-04-06</lastmod></url><url><loc>https://hackervalley.com/e/episode-196-cybersecurity-advocates-with-julie-haney</loc><lastmod>2024-04-06</lastmod></url><url><loc>https://hackervalley.com/e/road-to-the-webby-s-an-underdog-story</loc><lastmod>2024-04-06</lastmod></url></urlset>