<?xml version="1.0" encoding="UTF-8"?>
<!-- This sitemap was dynamically generated on April 3, 2026 at 6:51 pm by All in One SEO Pro v4.9.5.2 - the original SEO plugin for WordPress. -->

<?xml-stylesheet type="text/xsl" href="https://bluegoatcyber.com/video-sitemap.xsl?video-sitemap=root"?>
<urlset
	xmlns="http://www.sitemaps.org/schemas/sitemap/0.9"
	xmlns:video="http://www.google.com/schemas/sitemap-video/1.1"
>
	<url>
		<loc><![CDATA[https://bluegoatcyber.com/]]></loc>
		<lastmod><![CDATA[2026-03-19T08:12:03+00:00]]></lastmod>
		<video:video>
			<video:title><![CDATA[What Is Required for an FDA Premarket Cyber Submission? | Ep. 47]]></video:title>
			<video:description><![CDATA[What Is Required for an FDA Premarket Cyber Submission? | Ep. 47, by Blue Goat Cyber.]]></video:description>
			<video:thumbnail_loc><![CDATA[https://i.ytimg.com/vi/6MHrAO5n2Lo/hqdefault.jpg]]></video:thumbnail_loc>
			<video:player_loc><![CDATA[https://youtu.be/6MHrAO5n2Lo]]></video:player_loc>	
			<video:uploader><![CDATA[Blue Goat Cyber]]></video:uploader>
		</video:video>
		<video:video>
			<video:title><![CDATA[Blue Goat Cyber: Medical Device Cybersecurity Showcase | Podcast, Masterclass, Media, &amp; Testimonials]]></video:title>
			<video:description><![CDATA[Blue Goat Cyber: Medical Device Cybersecurity Showcase | Podcast, Masterclass, Media, &amp; Testimonials, by Blue Goat Cyber.]]></video:description>
			<video:thumbnail_loc><![CDATA[https://i.ytimg.com/vi/h8OcMDdIEUE/hqdefault.jpg]]></video:thumbnail_loc>
			<video:player_loc><![CDATA[https://www.youtube.com/watch?v=h8OcMDdIEUE]]></video:player_loc>	
			<video:uploader><![CDATA[Blue Goat Cyber]]></video:uploader>
		</video:video>
		<video:video>
			<video:title><![CDATA[Blue Goat Cyber Wins MedTech Service Provider Excellence Award | MedTech World Malta 2025]]></video:title>
			<video:description><![CDATA[Blue Goat Cyber Wins MedTech Service Provider Excellence Award | MedTech World Malta 2025, by Blue Goat Cyber.]]></video:description>
			<video:thumbnail_loc><![CDATA[https://i.ytimg.com/vi/ZxIIhgnLOAc/hqdefault.jpg]]></video:thumbnail_loc>
			<video:player_loc><![CDATA[https://www.youtube.com/watch?v=ZxIIhgnLOAc]]></video:player_loc>	
			<video:uploader><![CDATA[Blue Goat Cyber]]></video:uploader>
		</video:video>
	</url>
	<url>
		<loc><![CDATA[https://bluegoatcyber.com/about-us/]]></loc>
		<lastmod><![CDATA[2026-03-18T21:19:09+00:00]]></lastmod>
		<video:video>
			<video:title><![CDATA[Blue Goat Cyber Wins MedTech Service Provider Excellence Award | MedTech World Malta 2025]]></video:title>
			<video:description><![CDATA[Blue Goat Cyber Wins MedTech Service Provider Excellence Award | MedTech World Malta 2025, by Blue Goat Cyber.]]></video:description>
			<video:thumbnail_loc><![CDATA[https://i.ytimg.com/vi/ZxIIhgnLOAc/hqdefault.jpg]]></video:thumbnail_loc>
			<video:player_loc><![CDATA[https://www.youtube.com/watch?v=ZxIIhgnLOAc]]></video:player_loc>	
			<video:uploader><![CDATA[Blue Goat Cyber]]></video:uploader>
		</video:video>
		<video:video>
			<video:title><![CDATA[Webinar: Risk Management Frameworks For Medical Device Safety &amp; Security]]></video:title>
			<video:description><![CDATA[Webinar: Risk Management Frameworks For Medical Device Safety &amp; Security, by Blue Goat Cyber.]]></video:description>
			<video:thumbnail_loc><![CDATA[https://i.ytimg.com/vi/Q2cjmH0BrGo/hqdefault.jpg]]></video:thumbnail_loc>
			<video:player_loc><![CDATA[https://www.youtube.com/watch?v=Q2cjmH0BrGo]]></video:player_loc>	
			<video:uploader><![CDATA[Blue Goat Cyber]]></video:uploader>
		</video:video>
	</url>
	<url>
		<loc><![CDATA[https://bluegoatcyber.com/blog/medical-device-software-testing/]]></loc>
		<lastmod><![CDATA[2025-04-13T16:24:06+00:00]]></lastmod>
		<video:video>
			<video:title><![CDATA[Building Resilient Medical Devices: A Look at the Essential Technologies and Infrastructure | Ep. 4]]></video:title>
			<video:description><![CDATA[Building Resilient Medical Devices: A Look at the Essential Technologies and Infrastructure | Ep. 4, by Blue Goat Cyber.]]></video:description>
			<video:thumbnail_loc><![CDATA[https://i.ytimg.com/vi/Sp7MU3LOGco/hqdefault.jpg]]></video:thumbnail_loc>
			<video:player_loc><![CDATA[https://www.youtube.com/watch?v=Sp7MU3LOGco]]></video:player_loc>	
			<video:uploader><![CDATA[Blue Goat Cyber]]></video:uploader>
		</video:video>
	</url>
	<url>
		<loc><![CDATA[https://bluegoatcyber.com/blog/examples-of-hacked-medical-devices/]]></loc>
		<lastmod><![CDATA[2025-11-19T14:00:12+00:00]]></lastmod>
		<video:video>
			<video:title><![CDATA[The Evolution of Medical Device Cyber Threats: Past, Present, and Future | Ep. 6]]></video:title>
			<video:description><![CDATA[The Evolution of Medical Device Cyber Threats: Past, Present, and Future | Ep. 6, by Blue Goat Cyber.]]></video:description>
			<video:thumbnail_loc><![CDATA[https://i.ytimg.com/vi/Sdp2_7tYhBU/hqdefault.jpg]]></video:thumbnail_loc>
			<video:player_loc><![CDATA[https://www.youtube.com/watch?v=Sdp2_7tYhBU]]></video:player_loc>	
			<video:uploader><![CDATA[Blue Goat Cyber]]></video:uploader>
		</video:video>
	</url>
	<url>
		<loc><![CDATA[https://bluegoatcyber.com/blog/navigating-the-maze-understanding-fda-cybersecurity-requirements-for-medical-devices/]]></loc>
		<lastmod><![CDATA[2025-12-27T17:42:53+00:00]]></lastmod>
		<video:video>
			<video:title><![CDATA[What Is Required for an FDA Premarket Cyber Submission? | Ep. 47]]></video:title>
			<video:description><![CDATA[What Is Required for an FDA Premarket Cyber Submission? | Ep. 47, by Blue Goat Cyber.]]></video:description>
			<video:thumbnail_loc><![CDATA[https://i.ytimg.com/vi/6MHrAO5n2Lo/hqdefault.jpg]]></video:thumbnail_loc>
			<video:player_loc><![CDATA[https://youtu.be/6MHrAO5n2Lo]]></video:player_loc>	
			<video:uploader><![CDATA[Blue Goat Cyber]]></video:uploader>
		</video:video>
	</url>
	<url>
		<loc><![CDATA[https://bluegoatcyber.com/blog/the-role-of-tplc-in-medical-device-security-and-fda-compliance/]]></loc>
		<lastmod><![CDATA[2025-11-19T14:13:47+00:00]]></lastmod>
		<video:video>
			<video:title><![CDATA[Medical Device Cybersecurity: FDA Compliance &amp; Threat Protection | DeviceTalks West 2024]]></video:title>
			<video:description><![CDATA[Medical Device Cybersecurity: FDA Compliance &amp; Threat Protection | DeviceTalks West 2024, by Blue Goat Cyber.]]></video:description>
			<video:thumbnail_loc><![CDATA[https://i.ytimg.com/vi/YMVVvS9LAiY/hqdefault.jpg]]></video:thumbnail_loc>
			<video:player_loc><![CDATA[https://www.youtube.com/watch?v=YMVVvS9LAiY]]></video:player_loc>	
			<video:uploader><![CDATA[Blue Goat Cyber]]></video:uploader>
		</video:video>
		<video:video>
			<video:title><![CDATA[Total Product Lifecycle Security: From Design to Disposal | Ep. 27]]></video:title>
			<video:description><![CDATA[Total Product Lifecycle Security: From Design to Disposal | Ep. 27, by Blue Goat Cyber.]]></video:description>
			<video:thumbnail_loc><![CDATA[https://i.ytimg.com/vi/fy5vCShcqMI/hqdefault.jpg]]></video:thumbnail_loc>
			<video:player_loc><![CDATA[https://www.youtube.com/watch?v=fy5vCShcqMI]]></video:player_loc>	
			<video:uploader><![CDATA[Blue Goat Cyber]]></video:uploader>
		</video:video>
	</url>
	<url>
		<loc><![CDATA[https://bluegoatcyber.com/blog/a-critical-alert-the-top-10-most-vulnerable-medical-devices-to-cyber-attacks/]]></loc>
		<lastmod><![CDATA[2025-04-13T21:40:12+00:00]]></lastmod>
		<video:video>
			<video:title><![CDATA[The Evolution of Medical Device Cyber Threats: Past, Present, and Future | Ep. 6]]></video:title>
			<video:description><![CDATA[The Evolution of Medical Device Cyber Threats: Past, Present, and Future | Ep. 6, by Blue Goat Cyber.]]></video:description>
			<video:thumbnail_loc><![CDATA[https://i.ytimg.com/vi/Sdp2_7tYhBU/hqdefault.jpg]]></video:thumbnail_loc>
			<video:player_loc><![CDATA[https://www.youtube.com/watch?v=Sdp2_7tYhBU]]></video:player_loc>	
			<video:uploader><![CDATA[Blue Goat Cyber]]></video:uploader>
		</video:video>
	</url>
	<url>
		<loc><![CDATA[https://bluegoatcyber.com/blog/secure-product-development-frameworks-for-fda-submissions/]]></loc>
		<lastmod><![CDATA[2025-12-26T14:59:16+00:00]]></lastmod>
		<video:video>
			<video:title><![CDATA[Building Resilient Medical Devices: A Look at the Essential Technologies and Infrastructure | Ep. 4]]></video:title>
			<video:description><![CDATA[Building Resilient Medical Devices: A Look at the Essential Technologies and Infrastructure | Ep. 4, by Blue Goat Cyber.]]></video:description>
			<video:thumbnail_loc><![CDATA[https://i.ytimg.com/vi/Sp7MU3LOGco/hqdefault.jpg]]></video:thumbnail_loc>
			<video:player_loc><![CDATA[https://www.youtube.com/watch?v=Sp7MU3LOGco]]></video:player_loc>	
			<video:uploader><![CDATA[Blue Goat Cyber]]></video:uploader>
		</video:video>
	</url>
	<url>
		<loc><![CDATA[https://bluegoatcyber.com/blog/pma-vs-510k-deciphering-the-differences-in-medical-device-regulatory-pathways/]]></loc>
		<lastmod><![CDATA[2025-04-14T17:40:04+00:00]]></lastmod>
		<video:video>
			<video:title><![CDATA[Navigating the Regulatory Landscape of Medical Device Cybersecurity | Ep. 3]]></video:title>
			<video:description><![CDATA[Navigating the Regulatory Landscape of Medical Device Cybersecurity | Ep. 3, by Blue Goat Cyber.]]></video:description>
			<video:thumbnail_loc><![CDATA[https://i.ytimg.com/vi/PHK-tsipeP8/hqdefault.jpg]]></video:thumbnail_loc>
			<video:player_loc><![CDATA[https://www.youtube.com/watch?v=PHK-tsipeP8]]></video:player_loc>	
			<video:uploader><![CDATA[Blue Goat Cyber]]></video:uploader>
		</video:video>
	</url>
	<url>
		<loc><![CDATA[https://bluegoatcyber.com/blog/exploring-the-contrast-between-threat-trees-and-attack-trees-in-medical-device-fda-approval-and-cybersecurity/]]></loc>
		<lastmod><![CDATA[2025-04-14T18:18:36+00:00]]></lastmod>
		<video:video>
			<video:title><![CDATA[Ep. 11: Advanced Threat Modeling in Medical Devices]]></video:title>
			<video:description><![CDATA[Ep. 11: Advanced Threat Modeling in Medical Devices, by Blue Goat Cyber.]]></video:description>
			<video:thumbnail_loc><![CDATA[https://i.ytimg.com/vi/5FyipG_8Skc/hqdefault.jpg]]></video:thumbnail_loc>
			<video:player_loc><![CDATA[https://www.youtube.com/watch?v=5FyipG_8Skc]]></video:player_loc>	
			<video:uploader><![CDATA[Blue Goat Cyber]]></video:uploader>
		</video:video>
	</url>
	<url>
		<loc><![CDATA[https://bluegoatcyber.com/blog/the-top-50-cybersecurity-issues-with-medical-devices/]]></loc>
		<lastmod><![CDATA[2025-04-14T22:42:03+00:00]]></lastmod>
		<video:video>
			<video:title><![CDATA[Webinar: Medical Device Penetration Testing - What Every Manufacturer Must Know]]></video:title>
			<video:description><![CDATA[Webinar: Medical Device Penetration Testing - What Every Manufacturer Must Know, by Blue Goat Cyber.]]></video:description>
			<video:thumbnail_loc><![CDATA[https://i.ytimg.com/vi/SQ-ZhgpoYGg/hqdefault.jpg]]></video:thumbnail_loc>
			<video:player_loc><![CDATA[https://www.youtube.com/watch?v=SQ-ZhgpoYGg]]></video:player_loc>	
			<video:uploader><![CDATA[Blue Goat Cyber]]></video:uploader>
		</video:video>
	</url>
	<url>
		<loc><![CDATA[https://bluegoatcyber.com/blog/enhancing-medical-device-cybersecurity-the-role-of-sbom-and-sast-in-complying-with-fda-guidelines/]]></loc>
		<lastmod><![CDATA[2025-12-25T20:13:02+00:00]]></lastmod>
		<video:video>
			<video:title><![CDATA[SBOMs Unpacked: Myths, Risks, &amp; Benefits with Cortez Frazier Jr. | Ep. 13]]></video:title>
			<video:description><![CDATA[SBOMs Unpacked: Myths, Risks, &amp; Benefits with Cortez Frazier Jr. | Ep. 13, by Blue Goat Cyber.]]></video:description>
			<video:thumbnail_loc><![CDATA[https://i.ytimg.com/vi/wlAEnvc4Y1o/hqdefault.jpg]]></video:thumbnail_loc>
			<video:player_loc><![CDATA[https://www.youtube.com/watch?v=wlAEnvc4Y1o]]></video:player_loc>	
			<video:uploader><![CDATA[Blue Goat Cyber]]></video:uploader>
		</video:video>
	</url>
	<url>
		<loc><![CDATA[https://bluegoatcyber.com/blog/iso-14971-risk-management-in-medical-device-security/]]></loc>
		<lastmod><![CDATA[2025-12-26T14:44:01+00:00]]></lastmod>
		<video:video>
			<video:title><![CDATA[Webinar: Risk Management Frameworks For Medical Device Safety &amp; Security]]></video:title>
			<video:description><![CDATA[Webinar: Risk Management Frameworks For Medical Device Safety &amp; Security, by Blue Goat Cyber.]]></video:description>
			<video:thumbnail_loc><![CDATA[https://i.ytimg.com/vi/Q2cjmH0BrGo/hqdefault.jpg]]></video:thumbnail_loc>
			<video:player_loc><![CDATA[https://youtu.be/Q2cjmH0BrGo]]></video:player_loc>	
			<video:uploader><![CDATA[Blue Goat Cyber]]></video:uploader>
		</video:video>
	</url>
	<url>
		<loc><![CDATA[https://bluegoatcyber.com/blog/medhacking-and-medjacking/]]></loc>
		<lastmod><![CDATA[2025-04-16T17:29:47+00:00]]></lastmod>
		<video:video>
			<video:title><![CDATA[MedHacking and MedJacking: Navigating the Cybersecurity Threats in Healthcare]]></video:title>
			<video:description><![CDATA[MedHacking and MedJacking: Navigating the Cybersecurity Threats in Healthcare, by Blue Goat Cyber.]]></video:description>
			<video:thumbnail_loc><![CDATA[https://i.ytimg.com/vi/rAkcC8vGFgU/hqdefault.jpg]]></video:thumbnail_loc>
			<video:player_loc><![CDATA[https://youtu.be/rAkcC8vGFgU]]></video:player_loc>	
			<video:uploader><![CDATA[Blue Goat Cyber]]></video:uploader>
		</video:video>
	</url>
	<url>
		<loc><![CDATA[https://bluegoatcyber.com/blog/aami-tir57-risk-management-for-medical-device-security/]]></loc>
		<lastmod><![CDATA[2026-02-08T15:08:14+00:00]]></lastmod>
		<video:video>
			<video:title><![CDATA[Webinar: Risk Management Frameworks For Medical Device Safety &amp; Security]]></video:title>
			<video:description><![CDATA[Webinar: Risk Management Frameworks For Medical Device Safety &amp; Security, by Blue Goat Cyber.]]></video:description>
			<video:thumbnail_loc><![CDATA[https://i.ytimg.com/vi/Q2cjmH0BrGo/hqdefault.jpg]]></video:thumbnail_loc>
			<video:player_loc><![CDATA[https://youtu.be/Q2cjmH0BrGo]]></video:player_loc>	
			<video:uploader><![CDATA[Blue Goat Cyber]]></video:uploader>
		</video:video>
	</url>
	<url>
		<loc><![CDATA[https://bluegoatcyber.com/blog/the-importance-of-cybersecurity-in-the-medical-device-industry/]]></loc>
		<lastmod><![CDATA[2025-12-27T19:09:45+00:00]]></lastmod>
		<video:video>
			<video:title><![CDATA[The Evolution of Medical Device Cyber Threats: Past, Present, and Future | Ep. 6]]></video:title>
			<video:description><![CDATA[The Evolution of Medical Device Cyber Threats: Past, Present, and Future | Ep. 6, by Blue Goat Cyber.]]></video:description>
			<video:thumbnail_loc><![CDATA[https://i.ytimg.com/vi/Sdp2_7tYhBU/hqdefault.jpg]]></video:thumbnail_loc>
			<video:player_loc><![CDATA[https://youtu.be/Sdp2_7tYhBU]]></video:player_loc>	
			<video:uploader><![CDATA[Blue Goat Cyber]]></video:uploader>
		</video:video>
	</url>
	<url>
		<loc><![CDATA[https://bluegoatcyber.com/blog/best-practices-for-medical-device-cybersecurity-ensuring-safety-and-protection/]]></loc>
		<lastmod><![CDATA[2025-12-27T21:52:31+00:00]]></lastmod>
		<video:video>
			<video:title><![CDATA[What Is Required for an FDA Premarket Cyber Submission? | Ep. 47]]></video:title>
			<video:description><![CDATA[What Is Required for an FDA Premarket Cyber Submission? | Ep. 47, by Blue Goat Cyber.]]></video:description>
			<video:thumbnail_loc><![CDATA[https://i.ytimg.com/vi/6MHrAO5n2Lo/hqdefault.jpg]]></video:thumbnail_loc>
			<video:player_loc><![CDATA[https://youtu.be/6MHrAO5n2Lo]]></video:player_loc>	
			<video:uploader><![CDATA[Blue Goat Cyber]]></video:uploader>
		</video:video>
	</url>
	<url>
		<loc><![CDATA[https://bluegoatcyber.com/blog/top-threat-modeling-resources-for-medical-device-cybersecurity/]]></loc>
		<lastmod><![CDATA[2025-12-27T22:03:04+00:00]]></lastmod>
		<video:video>
			<video:title><![CDATA[Advanced Threat Modeling in Medical Devices | Ep. 11]]></video:title>
			<video:description><![CDATA[Advanced Threat Modeling in Medical Devices | Ep. 11, by Blue Goat Cyber.]]></video:description>
			<video:thumbnail_loc><![CDATA[https://i.ytimg.com/vi/5FyipG_8Skc/hqdefault.jpg]]></video:thumbnail_loc>
			<video:player_loc><![CDATA[https://youtu.be/5FyipG_8Skc]]></video:player_loc>	
			<video:uploader><![CDATA[Blue Goat Cyber]]></video:uploader>
		</video:video>
	</url>
	<url>
		<loc><![CDATA[https://bluegoatcyber.com/blog/medical-device-cybersecurity-labeling/]]></loc>
		<lastmod><![CDATA[2025-12-26T15:59:33+00:00]]></lastmod>
		<video:video>
			<video:title><![CDATA[Cybersecurity Labeling and MedTech Transparency | Ep. 25]]></video:title>
			<video:description><![CDATA[Cybersecurity Labeling and MedTech Transparency | Ep. 25, by Blue Goat Cyber.]]></video:description>
			<video:thumbnail_loc><![CDATA[https://i.ytimg.com/vi/G92clizWiJM/hqdefault.jpg]]></video:thumbnail_loc>
			<video:player_loc><![CDATA[https://www.youtube.com/watch?v=G92clizWiJM]]></video:player_loc>	
			<video:uploader><![CDATA[Blue Goat Cyber]]></video:uploader>
		</video:video>
	</url>
	<url>
		<loc><![CDATA[https://bluegoatcyber.com/blog/iso-13485-and-its-relation-to-medical-device-cybersecurity/]]></loc>
		<lastmod><![CDATA[2025-04-17T15:38:15+00:00]]></lastmod>
		<video:video>
			<video:title><![CDATA[Startups, Regulations, &amp; Risk: Insights from MedTech Guru Etienne Nichols | Ep. 7]]></video:title>
			<video:description><![CDATA[Startups, Regulations, &amp; Risk: Insights from MedTech Guru Etienne Nichols | Ep. 7, by Blue Goat Cyber.]]></video:description>
			<video:thumbnail_loc><![CDATA[https://i.ytimg.com/vi/JqtZAUL_Pys/hqdefault.jpg]]></video:thumbnail_loc>
			<video:player_loc><![CDATA[https://www.youtube.com/watch?v=JqtZAUL_Pys]]></video:player_loc>	
			<video:uploader><![CDATA[Blue Goat Cyber]]></video:uploader>
		</video:video>
	</url>
	<url>
		<loc><![CDATA[https://bluegoatcyber.com/blog/corrective-and-preventive-actions-capa-in-medical-device-cybersecurity/]]></loc>
		<lastmod><![CDATA[2024-11-16T16:36:28+00:00]]></lastmod>
		<video:video>
			<video:title><![CDATA[Root Cause Analysis Using the 5 Whys]]></video:title>
			<video:description><![CDATA[Root Cause Analysis Using the 5 Whys, by Christian Espinosa.]]></video:description>
			<video:thumbnail_loc><![CDATA[https://i.ytimg.com/vi/mdSBJS3L-B8/hqdefault.jpg]]></video:thumbnail_loc>
			<video:player_loc><![CDATA[https://www.youtube.com/watch?v=mdSBJS3L-B8]]></video:player_loc>	
			<video:uploader><![CDATA[Christian Espinosa]]></video:uploader>
		</video:video>
	</url>
	<url>
		<loc><![CDATA[https://bluegoatcyber.com/services/legacy-medical-device-cybersecurity-services/]]></loc>
		<lastmod><![CDATA[2025-12-27T22:21:44+00:00]]></lastmod>
		<video:video>
			<video:title><![CDATA[Cyber Risk Management for MedTech Legacy Devices | Ep. 44]]></video:title>
			<video:description><![CDATA[Cyber Risk Management for MedTech Legacy Devices | Ep. 44, by Blue Goat Cyber.]]></video:description>
			<video:thumbnail_loc><![CDATA[https://i.ytimg.com/vi/K0O25GB4-6k/hqdefault.jpg]]></video:thumbnail_loc>
			<video:player_loc><![CDATA[https://youtu.be/K0O25GB4-6k]]></video:player_loc>	
			<video:uploader><![CDATA[Blue Goat Cyber]]></video:uploader>
		</video:video>
	</url>
	<url>
		<loc><![CDATA[https://bluegoatcyber.com/blog/homeland-episode-with-pacemaker-attack-assessing-the-realism/]]></loc>
		<lastmod><![CDATA[2025-03-10T02:43:58+00:00]]></lastmod>
		<video:video>
			<video:title><![CDATA[Cheney&apos;s heart device altered to prevent assassination]]></video:title>
			<video:description><![CDATA[Cheney&apos;s heart device altered to prevent assassination, by CBS Evening News.]]></video:description>
			<video:thumbnail_loc><![CDATA[https://i.ytimg.com/vi/X19Y3SwvCqM/hqdefault.jpg]]></video:thumbnail_loc>
			<video:player_loc><![CDATA[https://www.youtube.com/watch?v=X19Y3SwvCqM]]></video:player_loc>	
			<video:uploader><![CDATA[CBS Evening News]]></video:uploader>
		</video:video>
	</url>
	<url>
		<loc><![CDATA[https://bluegoatcyber.com/resources/]]></loc>
		<lastmod><![CDATA[2026-02-16T07:08:23+00:00]]></lastmod>
		<video:video>
			<video:title><![CDATA[Christian Espinosa Debunks MedTech Cybersecurity Myths | MedTech World Asia 2025]]></video:title>
			<video:description><![CDATA[Christian Espinosa Debunks MedTech Cybersecurity Myths | MedTech World Asia 2025, by Blue Goat Cyber.]]></video:description>
			<video:thumbnail_loc><![CDATA[https://i.ytimg.com/vi/-CVtl1eSVto/hqdefault.jpg]]></video:thumbnail_loc>
			<video:player_loc><![CDATA[https://www.youtube.com/watch?v=-CVtl1eSVto]]></video:player_loc>	
			<video:uploader><![CDATA[Blue Goat Cyber]]></video:uploader>
		</video:video>
		<video:video>
			<video:title><![CDATA[How to Get FDA Approval with Cybersecurity by Design | Blue Goat Cyber at DeviceTalks Boston 2025]]></video:title>
			<video:description><![CDATA[How to Get FDA Approval with Cybersecurity by Design | Blue Goat Cyber at DeviceTalks Boston 2025, by Blue Goat Cyber.]]></video:description>
			<video:thumbnail_loc><![CDATA[https://i.ytimg.com/vi/ISEIkQ8IHFE/hqdefault.jpg]]></video:thumbnail_loc>
			<video:player_loc><![CDATA[https://youtu.be/ISEIkQ8IHFE]]></video:player_loc>	
			<video:uploader><![CDATA[Blue Goat Cyber]]></video:uploader>
		</video:video>
		<video:video>
			<video:title><![CDATA[Cybersecurity as a Competitive Edge in MedTech | LSI Europe 2025]]></video:title>
			<video:description><![CDATA[Cybersecurity as a Competitive Edge in MedTech | LSI Europe 2025, by Blue Goat Cyber.]]></video:description>
			<video:thumbnail_loc><![CDATA[https://i.ytimg.com/vi/D15EFk9LTsQ/hqdefault.jpg]]></video:thumbnail_loc>
			<video:player_loc><![CDATA[https://www.youtube.com/watch?v=D15EFk9LTsQ]]></video:player_loc>	
			<video:uploader><![CDATA[Blue Goat Cyber]]></video:uploader>
		</video:video>
		<video:video>
			<video:title><![CDATA[Regulatory to Revenue: How MedTech Startups Align Product, Compliance &amp; Growth | MTW Bay Area 2025]]></video:title>
			<video:description><![CDATA[Regulatory to Revenue: How MedTech Startups Align Product, Compliance &amp; Growth | MTW Bay Area 2025, by MedTech World.]]></video:description>
			<video:thumbnail_loc><![CDATA[https://i.ytimg.com/vi/9-Lz5xqkeHE/hqdefault.jpg]]></video:thumbnail_loc>
			<video:player_loc><![CDATA[https://youtu.be/9-Lz5xqkeHE]]></video:player_loc>	
			<video:uploader><![CDATA[MedTech World]]></video:uploader>
		</video:video>
		<video:video>
			<video:title><![CDATA[The Silent Killer — How Poor Cybersecurity Can Halt Market Entry | LSI USA &apos;25]]></video:title>
			<video:description><![CDATA[The Silent Killer — How Poor Cybersecurity Can Halt Market Entry | LSI USA &apos;25, by LSI - Life Science Intelligence™.]]></video:description>
			<video:thumbnail_loc><![CDATA[https://i.ytimg.com/vi/5Uc1lSvDNBk/hqdefault.jpg]]></video:thumbnail_loc>
			<video:player_loc><![CDATA[https://youtu.be/5Uc1lSvDNBk]]></video:player_loc>	
			<video:uploader><![CDATA[LSI - Life Science Intelligence™]]></video:uploader>
		</video:video>
		<video:video>
			<video:title><![CDATA[Christian Espinosa, Blue Goat Cyber - Medical Device Cybersecurity Specialists | LSI USA &apos;25]]></video:title>
			<video:description><![CDATA[Christian Espinosa, Blue Goat Cyber - Medical Device Cybersecurity Specialists | LSI USA &apos;25, by LSI - Life Science Intelligence™.]]></video:description>
			<video:thumbnail_loc><![CDATA[https://i.ytimg.com/vi/xuqzoEOiCAs/hqdefault.jpg]]></video:thumbnail_loc>
			<video:player_loc><![CDATA[https://youtu.be/xuqzoEOiCAs]]></video:player_loc>	
			<video:uploader><![CDATA[LSI - Life Science Intelligence™]]></video:uploader>
		</video:video>
	</url>
	<url>
		<loc><![CDATA[https://bluegoatcyber.com/blog/medical-device-software-functional-and-non-functional-aspects-explained/]]></loc>
		<lastmod><![CDATA[2025-03-01T22:33:29+00:00]]></lastmod>
		<video:video>
			<video:title><![CDATA[Functional vs. Non-Functional Requirements: The Key to Medical Device Cybersecurity]]></video:title>
			<video:description><![CDATA[Functional vs. Non-Functional Requirements: The Key to Medical Device Cybersecurity, by Blue Goat Cyber.]]></video:description>
			<video:thumbnail_loc><![CDATA[https://i.ytimg.com/vi/gR5afgjUIyM/hq2.jpg]]></video:thumbnail_loc>
			<video:player_loc><![CDATA[https://youtube.com/shorts/gR5afgjUIyM]]></video:player_loc>	
			<video:uploader><![CDATA[Blue Goat Cyber]]></video:uploader>
		</video:video>
	</url>
	<url>
		<loc><![CDATA[https://bluegoatcyber.com/blog/traditional-cybersecurity-vs-medical-device-cybersecurity/]]></loc>
		<lastmod><![CDATA[2025-03-10T03:00:37+00:00]]></lastmod>
		<video:video>
			<video:title><![CDATA[Medical Device vs. Traditional Cybersecurity: What&apos;s the Difference?]]></video:title>
			<video:description><![CDATA[Medical Device vs. Traditional Cybersecurity: What&apos;s the Difference?, by Blue Goat Cyber.]]></video:description>
			<video:thumbnail_loc><![CDATA[https://i.ytimg.com/vi/a8D8z_kTWbk/hq2.jpg]]></video:thumbnail_loc>
			<video:player_loc><![CDATA[https://www.youtube.com/shorts/a8D8z_kTWbk]]></video:player_loc>	
			<video:uploader><![CDATA[Blue Goat Cyber]]></video:uploader>
		</video:video>
	</url>
	<url>
		<loc><![CDATA[https://bluegoatcyber.com/blog/ota-update-vulnerabilities/]]></loc>
		<lastmod><![CDATA[2025-03-10T02:26:16+00:00]]></lastmod>
		<video:video>
			<video:title><![CDATA[Ep. 12: Postmarket Surveillance and Anomaly Detection for Medical Devices]]></video:title>
			<video:description><![CDATA[Ep. 12: Postmarket Surveillance and Anomaly Detection for Medical Devices, by Blue Goat Cyber.]]></video:description>
			<video:thumbnail_loc><![CDATA[https://i.ytimg.com/vi/OjwgYmZl81Y/hqdefault.jpg]]></video:thumbnail_loc>
			<video:player_loc><![CDATA[https://www.youtube.com/watch?v=OjwgYmZl81Y]]></video:player_loc>	
			<video:uploader><![CDATA[Blue Goat Cyber]]></video:uploader>
		</video:video>
	</url>
	<url>
		<loc><![CDATA[https://bluegoatcyber.com/blog/secure-updates-for-medical-devices/]]></loc>
		<lastmod><![CDATA[2025-03-10T01:07:47+00:00]]></lastmod>
		<video:video>
			<video:title><![CDATA[Ep. 12: Postmarket Surveillance and Anomaly Detection for Medical Devices]]></video:title>
			<video:description><![CDATA[Ep. 12: Postmarket Surveillance and Anomaly Detection for Medical Devices, by Blue Goat Cyber.]]></video:description>
			<video:thumbnail_loc><![CDATA[https://i.ytimg.com/vi/OjwgYmZl81Y/hqdefault.jpg]]></video:thumbnail_loc>
			<video:player_loc><![CDATA[https://www.youtube.com/watch?v=OjwgYmZl81Y]]></video:player_loc>	
			<video:uploader><![CDATA[Blue Goat Cyber]]></video:uploader>
		</video:video>
	</url>
	<url>
		<loc><![CDATA[https://bluegoatcyber.com/blog/ai-overfitting-cybersecurity-threats-in-medical-devices/]]></loc>
		<lastmod><![CDATA[2025-03-10T02:04:15+00:00]]></lastmod>
		<video:video>
			<video:title><![CDATA[Ep. 9: FDA AI Guidance Explained: What It Means for Medical Device Cybersecurity]]></video:title>
			<video:description><![CDATA[Ep. 9: FDA AI Guidance Explained: What It Means for Medical Device Cybersecurity, by Blue Goat Cyber.]]></video:description>
			<video:thumbnail_loc><![CDATA[https://i.ytimg.com/vi/b05uDkh0CI8/hqdefault.jpg]]></video:thumbnail_loc>
			<video:player_loc><![CDATA[https://www.youtube.com/watch?v=b05uDkh0CI8]]></video:player_loc>	
			<video:uploader><![CDATA[Blue Goat Cyber]]></video:uploader>
		</video:video>
	</url>
	<url>
		<loc><![CDATA[https://bluegoatcyber.com/blog/understanding-ai-performance-drift-ensuring-medical-device-safety/]]></loc>
		<lastmod><![CDATA[2025-03-10T00:39:03+00:00]]></lastmod>
		<video:video>
			<video:title><![CDATA[Ep. 9: FDA AI Guidance Explained: What It Means for Medical Device Cybersecurity]]></video:title>
			<video:description><![CDATA[Ep. 9: FDA AI Guidance Explained: What It Means for Medical Device Cybersecurity, by Blue Goat Cyber.]]></video:description>
			<video:thumbnail_loc><![CDATA[https://i.ytimg.com/vi/b05uDkh0CI8/hqdefault.jpg]]></video:thumbnail_loc>
			<video:player_loc><![CDATA[https://www.youtube.com/watch?v=b05uDkh0CI8]]></video:player_loc>	
			<video:uploader><![CDATA[Blue Goat Cyber]]></video:uploader>
		</video:video>
	</url>
	<url>
		<loc><![CDATA[https://bluegoatcyber.com/blog/postmarket-management-of-cybersecurity-in-medical-devices/]]></loc>
		<lastmod><![CDATA[2025-12-27T15:13:31+00:00]]></lastmod>
		<video:video>
			<video:title><![CDATA[Unpacking Post-Market Management and Incident Response for Medical Devices | Ep. 23]]></video:title>
			<video:description><![CDATA[Unpacking Post-Market Management and Incident Response for Medical Devices | Ep. 23, by Blue Goat Cyber.]]></video:description>
			<video:thumbnail_loc><![CDATA[https://i.ytimg.com/vi/m30wfBFoim0/hqdefault.jpg]]></video:thumbnail_loc>
			<video:player_loc><![CDATA[https://youtu.be/m30wfBFoim0]]></video:player_loc>	
			<video:uploader><![CDATA[Blue Goat Cyber]]></video:uploader>
		</video:video>
	</url>
	<url>
		<loc><![CDATA[https://bluegoatcyber.com/blog/safeguarding-medical-device-ai-combating-data-poisoning-cybersecurity-threats/]]></loc>
		<lastmod><![CDATA[2025-04-12T22:41:38+00:00]]></lastmod>
		<video:video>
			<video:title><![CDATA[Ep. 9: FDA AI Guidance Explained: What It Means for Medical Device Cybersecurity]]></video:title>
			<video:description><![CDATA[Ep. 9: FDA AI Guidance Explained: What It Means for Medical Device Cybersecurity, by Blue Goat Cyber.]]></video:description>
			<video:thumbnail_loc><![CDATA[https://i.ytimg.com/vi/b05uDkh0CI8/hqdefault.jpg]]></video:thumbnail_loc>
			<video:player_loc><![CDATA[https://www.youtube.com/watch?v=b05uDkh0CI8]]></video:player_loc>	
			<video:uploader><![CDATA[Blue Goat Cyber]]></video:uploader>
		</video:video>
	</url>
	<url>
		<loc><![CDATA[https://bluegoatcyber.com/medical-device-penetration-testing-services/]]></loc>
		<lastmod><![CDATA[2025-12-27T16:28:22+00:00]]></lastmod>
		<video:video>
			<video:title><![CDATA[Top 10 Medical Device Vulnerabilities with Myles Kellerman  | Ep. 38]]></video:title>
			<video:description><![CDATA[Top 10 Medical Device Vulnerabilities with Myles Kellerman  | Ep. 38, by Blue Goat Cyber.]]></video:description>
			<video:thumbnail_loc><![CDATA[https://i.ytimg.com/vi/Jim4edjcbmI/hqdefault.jpg]]></video:thumbnail_loc>
			<video:player_loc><![CDATA[https://youtu.be/Jim4edjcbmI]]></video:player_loc>	
			<video:uploader><![CDATA[Blue Goat Cyber]]></video:uploader>
		</video:video>
	</url>
	<url>
		<loc><![CDATA[https://bluegoatcyber.com/fda-postmarket-cybersecurity-services/]]></loc>
		<lastmod><![CDATA[2025-12-27T15:45:55+00:00]]></lastmod>
		<video:video>
			<video:title><![CDATA[Webinar: Postmarket Cybersecurity Management]]></video:title>
			<video:description><![CDATA[Webinar: Postmarket Cybersecurity Management, by Blue Goat Cyber.]]></video:description>
			<video:thumbnail_loc><![CDATA[https://i.ytimg.com/vi/AdDiEdI-Pl8/hqdefault.jpg]]></video:thumbnail_loc>
			<video:player_loc><![CDATA[https://youtu.be/AdDiEdI-Pl8]]></video:player_loc>	
			<video:uploader><![CDATA[Blue Goat Cyber]]></video:uploader>
		</video:video>
	</url>
	<url>
		<loc><![CDATA[https://bluegoatcyber.com/news/blue-goat-cyber-named-medical-device-cybersecurity-services-company-of-the-year-by-healthcare-business-review/]]></loc>
		<lastmod><![CDATA[2025-02-23T07:15:56+00:00]]></lastmod>
		<video:video>
			<video:title><![CDATA[Christian Espinosa’s Origin Story: Securing Medical Devices | DeviceTalks West 2024]]></video:title>
			<video:description><![CDATA[Christian Espinosa’s Origin Story: Securing Medical Devices | DeviceTalks West 2024, by Blue Goat Cyber.]]></video:description>
			<video:thumbnail_loc><![CDATA[https://i.ytimg.com/vi/vOdmGowR1Vw/hqdefault.jpg]]></video:thumbnail_loc>
			<video:player_loc><![CDATA[https://www.youtube.com/watch?v=vOdmGowR1Vw]]></video:player_loc>	
			<video:uploader><![CDATA[Blue Goat Cyber]]></video:uploader>
		</video:video>
	</url>
	<url>
		<loc><![CDATA[https://bluegoatcyber.com/fda-compliant-sbom-services-for-medtech/]]></loc>
		<lastmod><![CDATA[2025-12-27T15:46:27+00:00]]></lastmod>
		<video:video>
			<video:title><![CDATA[SBOMs Unpacked: Myths, Risks, &amp; Benefits with Cortez Frazier Jr. | Ep. 13]]></video:title>
			<video:description><![CDATA[SBOMs Unpacked: Myths, Risks, &amp; Benefits with Cortez Frazier Jr. | Ep. 13, by Blue Goat Cyber.]]></video:description>
			<video:thumbnail_loc><![CDATA[https://i.ytimg.com/vi/wlAEnvc4Y1o/hqdefault.jpg]]></video:thumbnail_loc>
			<video:player_loc><![CDATA[https://youtu.be/wlAEnvc4Y1o]]></video:player_loc>	
			<video:uploader><![CDATA[Blue Goat Cyber]]></video:uploader>
		</video:video>
	</url>
	<url>
		<loc><![CDATA[https://bluegoatcyber.com/news/blue-goat-cyber-launches-milestone-25th-podcast-episode-cybersecurity-labeling-and-medtech-transparency/]]></loc>
		<lastmod><![CDATA[2025-11-30T20:33:07+00:00]]></lastmod>
		<video:video>
			<video:title><![CDATA[Cybersecurity Labeling and MedTech Transparency | Ep. 25]]></video:title>
			<video:description><![CDATA[Cybersecurity Labeling and MedTech Transparency | Ep. 25, by Blue Goat Cyber.]]></video:description>
			<video:thumbnail_loc><![CDATA[https://i.ytimg.com/vi/G92clizWiJM/hqdefault.jpg]]></video:thumbnail_loc>
			<video:player_loc><![CDATA[https://www.youtube.com/watch?v=G92clizWiJM]]></video:player_loc>	
			<video:uploader><![CDATA[Blue Goat Cyber]]></video:uploader>
		</video:video>
	</url>
	<url>
		<loc><![CDATA[https://bluegoatcyber.com/blog/top-10-medical-device-vulnerabilities-revealed-protecting-patient-safety/]]></loc>
		<lastmod><![CDATA[2025-09-29T02:29:54+00:00]]></lastmod>
		<video:video>
			<video:title><![CDATA[Top 10 Medical Device Vulnerabilities with Myles Kellerman  | Ep 38]]></video:title>
			<video:description><![CDATA[Top 10 Medical Device Vulnerabilities with Myles Kellerman  | Ep 38, by Blue Goat Cyber.]]></video:description>
			<video:thumbnail_loc><![CDATA[https://i.ytimg.com/vi/Jim4edjcbmI/hqdefault.jpg]]></video:thumbnail_loc>
			<video:player_loc><![CDATA[https://www.youtube.com/watch?v=Jim4edjcbmI]]></video:player_loc>	
			<video:uploader><![CDATA[Blue Goat Cyber]]></video:uploader>
		</video:video>
	</url>
	<url>
		<loc><![CDATA[https://bluegoatcyber.com/blog/mastering-cybersecurity-in-medtech-the-key-to-accelerating-innovation-and-ensuring-patient-safety/]]></loc>
		<lastmod><![CDATA[2025-09-29T07:29:22+00:00]]></lastmod>
		<video:video>
			<video:title><![CDATA[Navigating the Cybersecurity Minefield in MedTech | Blue Goat Cyber at LSI Singapore 2025]]></video:title>
			<video:description><![CDATA[Navigating the Cybersecurity Minefield in MedTech | Blue Goat Cyber at LSI Singapore 2025, by Blue Goat Cyber.]]></video:description>
			<video:thumbnail_loc><![CDATA[https://i.ytimg.com/vi/fjPpcH7PeQU/hqdefault.jpg]]></video:thumbnail_loc>
			<video:player_loc><![CDATA[https://youtu.be/fjPpcH7PeQU]]></video:player_loc>	
			<video:uploader><![CDATA[Blue Goat Cyber]]></video:uploader>
		</video:video>
	</url>
	<url>
		<loc><![CDATA[https://bluegoatcyber.com/blog/securing-medical-devices-the-key-to-faster-fda-approval-and-investor-confidence/]]></loc>
		<lastmod><![CDATA[2025-09-29T07:29:03+00:00]]></lastmod>
		<video:video>
			<video:title><![CDATA[Christian Espinosa   Blue Goat Cyber]]></video:title>
			<video:description><![CDATA[Christian Espinosa   Blue Goat Cyber, by Blue Goat Cyber.]]></video:description>
			<video:thumbnail_loc><![CDATA[https://i.ytimg.com/vi/lSype0dfa5Y/hqdefault.jpg]]></video:thumbnail_loc>
			<video:player_loc><![CDATA[https://www.youtube.com/watch?v=lSype0dfa5Y]]></video:player_loc>	
			<video:uploader><![CDATA[Blue Goat Cyber]]></video:uploader>
		</video:video>
	</url>
	<url>
		<loc><![CDATA[https://bluegoatcyber.com/blog/navigating-the-evolving-cybersecurity-landscape-for-medical-devices/]]></loc>
		<lastmod><![CDATA[2025-09-29T08:31:15+00:00]]></lastmod>
		<video:video>
			<video:title><![CDATA[Overcoming AI and Data Security Challenges in MedTech with May Lee  | Ep 37]]></video:title>
			<video:description><![CDATA[Overcoming AI and Data Security Challenges in MedTech with May Lee  | Ep 37, by Blue Goat Cyber.]]></video:description>
			<video:thumbnail_loc><![CDATA[https://i.ytimg.com/vi/aiLo-aBoGwk/hqdefault.jpg]]></video:thumbnail_loc>
			<video:player_loc><![CDATA[https://youtu.be/aiLo-aBoGwk]]></video:player_loc>	
			<video:uploader><![CDATA[Blue Goat Cyber]]></video:uploader>
		</video:video>
	</url>
	<url>
		<loc><![CDATA[https://bluegoatcyber.com/blog/the-overlooked-threat-in-medtech-innovation-cybersecurity-risks-every-founder-must-address/]]></loc>
		<lastmod><![CDATA[2025-11-04T20:16:45+00:00]]></lastmod>
		<video:video>
			<video:title><![CDATA[The Overlooked Threat in MedTech Innovation | LSI USA 2025 Interview]]></video:title>
			<video:description><![CDATA[The Overlooked Threat in MedTech Innovation | LSI USA 2025 Interview, by Blue Goat Cyber.]]></video:description>
			<video:thumbnail_loc><![CDATA[https://i.ytimg.com/vi/TAlEWInd0cw/hqdefault.jpg]]></video:thumbnail_loc>
			<video:player_loc><![CDATA[https://youtu.be/TAlEWInd0cw]]></video:player_loc>	
			<video:uploader><![CDATA[Blue Goat Cyber]]></video:uploader>
		</video:video>
	</url>
	<url>
		<loc><![CDATA[https://bluegoatcyber.com/blog/navigating-cybersecurity-challenges-for-medtech-legacy-devices/]]></loc>
		<lastmod><![CDATA[2025-11-05T12:50:19+00:00]]></lastmod>
		<video:video>
			<video:title><![CDATA[Cyber Risk Management for MedTech Legacy Devices | Ep. 44]]></video:title>
			<video:description><![CDATA[Cyber Risk Management for MedTech Legacy Devices | Ep. 44, by Blue Goat Cyber.]]></video:description>
			<video:thumbnail_loc><![CDATA[https://i.ytimg.com/vi/K0O25GB4-6k/hqdefault.jpg]]></video:thumbnail_loc>
			<video:player_loc><![CDATA[https://www.youtube.com/watch?v=K0O25GB4-6k]]></video:player_loc>	
			<video:uploader><![CDATA[Blue Goat Cyber]]></video:uploader>
		</video:video>
	</url>
	<url>
		<loc><![CDATA[https://bluegoatcyber.com/blog/cybersecurity-as-a-competitive-edge-in-medtech/]]></loc>
		<lastmod><![CDATA[2025-11-05T12:35:37+00:00]]></lastmod>
		<video:video>
			<video:title><![CDATA[Cybersecurity as a Competitive Edge in MedTech | LSI Europe 2025]]></video:title>
			<video:description><![CDATA[Cybersecurity as a Competitive Edge in MedTech | LSI Europe 2025, by Blue Goat Cyber.]]></video:description>
			<video:thumbnail_loc><![CDATA[https://i.ytimg.com/vi/D15EFk9LTsQ/hqdefault.jpg]]></video:thumbnail_loc>
			<video:player_loc><![CDATA[https://www.youtube.com/watch?v=D15EFk9LTsQ]]></video:player_loc>	
			<video:uploader><![CDATA[Blue Goat Cyber]]></video:uploader>
		</video:video>
		<video:video>
			<video:title><![CDATA[What Is A Medical Cyber Device? | Ep. 42]]></video:title>
			<video:description><![CDATA[What Is A Medical Cyber Device? | Ep. 42, by Blue Goat Cyber.]]></video:description>
			<video:thumbnail_loc><![CDATA[https://i.ytimg.com/vi/OUYBM_gFyd0/hqdefault.jpg]]></video:thumbnail_loc>
			<video:player_loc><![CDATA[https://www.youtube.com/watch?v=OUYBM_gFyd0]]></video:player_loc>	
			<video:uploader><![CDATA[Blue Goat Cyber]]></video:uploader>
		</video:video>
	</url>
	<url>
		<loc><![CDATA[https://bluegoatcyber.com/blog/debunking-the-top-5-medical-device-cybersecurity-myths-holding-back-innovation/]]></loc>
		<lastmod><![CDATA[2025-11-05T12:35:51+00:00]]></lastmod>
		<video:video>
			<video:title><![CDATA[Christian Espinosa Debunks MedTech Cybersecurity Myths | MedTech World Asia 2025]]></video:title>
			<video:description><![CDATA[Christian Espinosa Debunks MedTech Cybersecurity Myths | MedTech World Asia 2025, by Blue Goat Cyber.]]></video:description>
			<video:thumbnail_loc><![CDATA[https://i.ytimg.com/vi/-CVtl1eSVto/hqdefault.jpg]]></video:thumbnail_loc>
			<video:player_loc><![CDATA[https://www.youtube.com/watch?v=-CVtl1eSVto]]></video:player_loc>	
			<video:uploader><![CDATA[Blue Goat Cyber]]></video:uploader>
		</video:video>
		<video:video>
			<video:title><![CDATA[When Medical Device Cybersecurity Becomes a Crime | Ep. 36]]></video:title>
			<video:description><![CDATA[When Medical Device Cybersecurity Becomes a Crime | Ep. 36, by Blue Goat Cyber.]]></video:description>
			<video:thumbnail_loc><![CDATA[https://i.ytimg.com/vi/rZoYDXiZCus/hqdefault.jpg]]></video:thumbnail_loc>
			<video:player_loc><![CDATA[https://youtu.be/rZoYDXiZCus]]></video:player_loc>	
			<video:uploader><![CDATA[Blue Goat Cyber]]></video:uploader>
		</video:video>
	</url>
	<url>
		<loc><![CDATA[https://bluegoatcyber.com/blog/what-is-a-medical-cyber-device-unraveling-the-fdas-cyber-device-definition/]]></loc>
		<lastmod><![CDATA[2025-12-27T17:14:47+00:00]]></lastmod>
		<video:video>
			<video:title><![CDATA[What Is A Medical Cyber Device? | Ep. 42]]></video:title>
			<video:description><![CDATA[What Is A Medical Cyber Device? | Ep. 42, by Blue Goat Cyber.]]></video:description>
			<video:thumbnail_loc><![CDATA[https://i.ytimg.com/vi/OUYBM_gFyd0/hqdefault.jpg]]></video:thumbnail_loc>
			<video:player_loc><![CDATA[https://www.youtube.com/watch?v=OUYBM_gFyd0]]></video:player_loc>	
			<video:uploader><![CDATA[Blue Goat Cyber]]></video:uploader>
		</video:video>
	</url>
	<url>
		<loc><![CDATA[https://bluegoatcyber.com/about-us/awards/]]></loc>
		<lastmod><![CDATA[2025-11-19T15:57:29+00:00]]></lastmod>
		<video:video>
			<video:title><![CDATA[Blue Goat Cyber Wins MedTech Service Provider Excellence Award | MedTech World Malta 2025]]></video:title>
			<video:description><![CDATA[Blue Goat Cyber Wins MedTech Service Provider Excellence Award | MedTech World Malta 2025, by Blue Goat Cyber.]]></video:description>
			<video:thumbnail_loc><![CDATA[https://i.ytimg.com/vi/ZxIIhgnLOAc/hqdefault.jpg]]></video:thumbnail_loc>
			<video:player_loc><![CDATA[https://www.youtube.com/watch?v=ZxIIhgnLOAc]]></video:player_loc>	
			<video:uploader><![CDATA[Blue Goat Cyber]]></video:uploader>
		</video:video>
	</url>
	<url>
		<loc><![CDATA[https://bluegoatcyber.com/blog/two-medical-device-cybersecurity-gaps-dispersed-responsibility-and-a-scarcity-of-asset-inventory/]]></loc>
		<lastmod><![CDATA[2025-11-30T16:43:56+00:00]]></lastmod>
		<video:video>
			<video:title><![CDATA[Cyber Risk Management for MedTech Legacy Devices | Ep. 44]]></video:title>
			<video:description><![CDATA[Cyber Risk Management for MedTech Legacy Devices | Ep. 44, by Blue Goat Cyber.]]></video:description>
			<video:thumbnail_loc><![CDATA[https://i.ytimg.com/vi/K0O25GB4-6k/hqdefault.jpg]]></video:thumbnail_loc>
			<video:player_loc><![CDATA[https://youtu.be/K0O25GB4-6k]]></video:player_loc>	
			<video:uploader><![CDATA[Blue Goat Cyber]]></video:uploader>
		</video:video>
	</url>
	<url>
		<loc><![CDATA[https://bluegoatcyber.com/blog/navigating-the-fdas-18-cybersecurity-deliverables-for-medical-device-submissions/]]></loc>
		<lastmod><![CDATA[2025-11-30T19:35:05+00:00]]></lastmod>
		<video:video>
			<video:title><![CDATA[What Is Required for an FDA Premarket Cyber Submission? | Ep. 47]]></video:title>
			<video:description><![CDATA[What Is Required for an FDA Premarket Cyber Submission? | Ep. 47, by Blue Goat Cyber.]]></video:description>
			<video:thumbnail_loc><![CDATA[https://i.ytimg.com/vi/6MHrAO5n2Lo/hqdefault.jpg]]></video:thumbnail_loc>
			<video:player_loc><![CDATA[https://youtu.be/6MHrAO5n2Lo]]></video:player_loc>	
			<video:uploader><![CDATA[Blue Goat Cyber]]></video:uploader>
		</video:video>
		<video:video>
			<video:title><![CDATA[What Is Required for an FDA Premarket Cyber Submission? | Ep. 47]]></video:title>
			<video:description><![CDATA[What Is Required for an FDA Premarket Cyber Submission? | Ep. 47, by Blue Goat Cyber.]]></video:description>
			<video:thumbnail_loc><![CDATA[https://i.ytimg.com/vi/6MHrAO5n2Lo/hqdefault.jpg]]></video:thumbnail_loc>
			<video:player_loc><![CDATA[https://www.youtube.com/watch?v=6MHrAO5n2Lo]]></video:player_loc>	
			<video:uploader><![CDATA[Blue Goat Cyber]]></video:uploader>
		</video:video>
	</url>
	<url>
		<loc><![CDATA[https://bluegoatcyber.com/news/blue-goat-cyber-wins-medtech-service-provider-excellence-award-of-the-year-at-medtech-malta-2025/]]></loc>
		<lastmod><![CDATA[2025-11-30T20:21:08+00:00]]></lastmod>
		<video:video>
			<video:title><![CDATA[Blue Goat Cyber Wins MedTech Service Provider Excellence Award | MedTech World Malta 2025]]></video:title>
			<video:description><![CDATA[Blue Goat Cyber Wins MedTech Service Provider Excellence Award | MedTech World Malta 2025, by Blue Goat Cyber.]]></video:description>
			<video:thumbnail_loc><![CDATA[https://i.ytimg.com/vi/ZxIIhgnLOAc/hqdefault.jpg]]></video:thumbnail_loc>
			<video:player_loc><![CDATA[https://www.youtube.com/watch?v=ZxIIhgnLOAc]]></video:player_loc>	
			<video:uploader><![CDATA[Blue Goat Cyber]]></video:uploader>
		</video:video>
	</url>
	<url>
		<loc><![CDATA[https://bluegoatcyber.com/blog/navigating-the-cybersecurity-landscape-for-medtech-innovators-key-insights-from-the-experts/]]></loc>
		<lastmod><![CDATA[2025-12-03T10:22:50+00:00]]></lastmod>
		<video:video>
			<video:title><![CDATA[Cybersecurity Qs MedTech Innovators Ask: Christian’s Hot Seat  | Ep. 48]]></video:title>
			<video:description><![CDATA[Cybersecurity Qs MedTech Innovators Ask: Christian’s Hot Seat  | Ep. 48, by Blue Goat Cyber.]]></video:description>
			<video:thumbnail_loc><![CDATA[https://i.ytimg.com/vi/OU9OYj8g3kg/hqdefault.jpg]]></video:thumbnail_loc>
			<video:player_loc><![CDATA[https://www.youtube.com/watch?v=OU9OYj8g3kg]]></video:player_loc>	
			<video:uploader><![CDATA[Blue Goat Cyber]]></video:uploader>
		</video:video>
	</url>
	<url>
		<loc><![CDATA[https://bluegoatcyber.com/blog/leveraging-market-intelligence-and-cybersecurity-to-drive-medtech-growth/]]></loc>
		<lastmod><![CDATA[2025-12-03T10:30:48+00:00]]></lastmod>
		<video:video>
			<video:title><![CDATA[How Market Intelligence Shapes MedTech Growth with Kevin Saem | Ep. 46]]></video:title>
			<video:description><![CDATA[How Market Intelligence Shapes MedTech Growth with Kevin Saem | Ep. 46, by Blue Goat Cyber.]]></video:description>
			<video:thumbnail_loc><![CDATA[https://i.ytimg.com/vi/vRTOJaKxM7I/hqdefault.jpg]]></video:thumbnail_loc>
			<video:player_loc><![CDATA[https://www.youtube.com/watch?v=vRTOJaKxM7I]]></video:player_loc>	
			<video:uploader><![CDATA[Blue Goat Cyber]]></video:uploader>
		</video:video>
	</url>
	<url>
		<loc><![CDATA[https://bluegoatcyber.com/blog/cybersecurity-measures-and-metrics-for-medical-devices-navigating-fda-compliance/]]></loc>
		<lastmod><![CDATA[2025-12-04T14:36:06+00:00]]></lastmod>
		<video:video>
			<video:title><![CDATA[Understanding Cybersecurity Measures and Metrics for Medical Devices | Ep. 31]]></video:title>
			<video:description><![CDATA[Understanding Cybersecurity Measures and Metrics for Medical Devices | Ep. 31, by Blue Goat Cyber.]]></video:description>
			<video:thumbnail_loc><![CDATA[https://i.ytimg.com/vi/YQGPXIHEQnI/hqdefault.jpg]]></video:thumbnail_loc>
			<video:player_loc><![CDATA[https://www.youtube.com/watch?v=YQGPXIHEQnI]]></video:player_loc>	
			<video:uploader><![CDATA[Blue Goat Cyber]]></video:uploader>
		</video:video>
	</url>
	<url>
		<loc><![CDATA[https://bluegoatcyber.com/blog/securing-the-total-product-lifecycle-protecting-medical-devices-from-concept-to-disposal/]]></loc>
		<lastmod><![CDATA[2025-12-04T14:59:03+00:00]]></lastmod>
		<video:video>
			<video:title><![CDATA[Total Product Lifecycle Security: From Design to Disposal | Ep. 27]]></video:title>
			<video:description><![CDATA[Total Product Lifecycle Security: From Design to Disposal | Ep. 27, by Blue Goat Cyber.]]></video:description>
			<video:thumbnail_loc><![CDATA[https://i.ytimg.com/vi/fy5vCShcqMI/hqdefault.jpg]]></video:thumbnail_loc>
			<video:player_loc><![CDATA[https://www.youtube.com/watch?v=fy5vCShcqMI]]></video:player_loc>	
			<video:uploader><![CDATA[Blue Goat Cyber]]></video:uploader>
		</video:video>
	</url>
	<url>
		<loc><![CDATA[https://bluegoatcyber.com/blog/cybersecurity-labeling-the-key-to-transparency-and-accountability-in-medical-device-security/]]></loc>
		<lastmod><![CDATA[2025-12-04T14:58:14+00:00]]></lastmod>
		<video:video>
			<video:title><![CDATA[Cybersecurity Labeling and MedTech Transparency | Ep. 25]]></video:title>
			<video:description><![CDATA[Cybersecurity Labeling and MedTech Transparency | Ep. 25, by Blue Goat Cyber.]]></video:description>
			<video:thumbnail_loc><![CDATA[https://i.ytimg.com/vi/G92clizWiJM/hqdefault.jpg]]></video:thumbnail_loc>
			<video:player_loc><![CDATA[https://www.youtube.com/watch?v=G92clizWiJM]]></video:player_loc>	
			<video:uploader><![CDATA[Blue Goat Cyber]]></video:uploader>
		</video:video>
	</url>
	<url>
		<loc><![CDATA[https://bluegoatcyber.com/blog/from-idea-to-fda-clearance-what-nobody-tells-medtech-founders/]]></loc>
		<lastmod><![CDATA[2026-02-16T08:08:17+00:00]]></lastmod>
		<video:video>
			<video:title><![CDATA[From Idea to FDA Clearance: What Nobody Tells Medtech Founders with Darcy Bachert | Ep. 57]]></video:title>
			<video:description><![CDATA[From Idea to FDA Clearance: What Nobody Tells Medtech Founders with Darcy Bachert | Ep. 57, by Blue Goat Cyber.]]></video:description>
			<video:thumbnail_loc><![CDATA[https://i.ytimg.com/vi/IYv05m74Ros/hqdefault.jpg]]></video:thumbnail_loc>
			<video:player_loc><![CDATA[https://www.youtube.com/watch?v=IYv05m74Ros]]></video:player_loc>	
			<video:uploader><![CDATA[Blue Goat Cyber]]></video:uploader>
		</video:video>
	</url>
</urlset>