PodcastsGovernmentTech Transforms

Tech Transforms

Carolyn Ford
Tech Transforms
Latest episode

119 episodes

  • Tech Transforms

    Episode 119: 5 Steps to Zero Trust

    17/03/2026 | 27 mins.
    In this follow-up episode of Tech Transforms, Carolyn Ford continues her conversation with Michael Blake of Owl Cyber Defense, shifting from the theory of Zero Trust to the realities of implementing it. The discussion explores the first practical step, network discovery and why organizations are often surprised by shadow IT and legacy systems still operating inside their environments.

    From there, Ford and Blake walk through the key stages of a Zero Trust journey, including microsegmentation, access management, and auditing privileges to prevent lateral movement and privilege creep. They also discuss the operational realities leaders face—budgeting, prioritizing critical assets or “crown jewels,” and ensuring organizations have the talent and resources needed to sustain a Zero Trust architecture.

    The takeaway: Zero Trust isn’t a single deployment, it’s an ongoing journey that evolves alongside emerging threats and technologies.

    Show Notes:

    Michael Blake: https://www.linkedin.com/in/michael-blake-734b0a21/ | Email: [email protected]

    DoW resources https://dowcio.war.gov/Library/: security controls, checklist, self assessment, Penn test guidelines etc

    Zero Trust | www.dau.edu

    Dell Technologies Project Fort Zero to Transform Security | Dell USA

    MITRE papers on evolving threats of giving AI access to network - https://ctid.mitre.org/blog/2025/05/09/secure-ai-v2/

    Owl ZT resources: https://owlcyberdefense.com/zero-trust-cds/

    Vendors that assist with ZTX, listen to the BLUF Podcast summaries to know if they might be able to help you: https://theblufpodcast.podbean.com/e/thebluf_episode12/ https://theblufpodcast.podbean.com/e/thebluf_episode13/
  • Tech Transforms

    Episode 118: Zero Trust ≠ Zero Risk: Debunking the Myths and Building Real Resilience

    10/03/2026 | 58 mins.
    In this episode of Tech Transforms, Carolyn Ford sits down with Michael Blake of Owl Cyber Defense and Chris Rule of GME to unpack one of cybersecurity’s most misunderstood concepts: Zero Trust. What begins as a discussion of architecture quickly evolves into something broader, an exploration of mindset, modernization, and the reality that today’s networks must operate under the assumption that a breach has already occurred.

    The conversation breaks down the core principle behind Zero Trust: minimizing the “blast radius” of a breach. Instead of assuming everything inside a network is safe, Zero Trust requires constant authentication, strict access controls, and segmentation so that even if an attacker gains entry, they cannot move freely across systems.

    We explore common misconceptions, especially the idea that Zero Trust is a product that can simply be purchased and installed. In reality, it’s a whole-of-organization approach involving people, processes, infrastructure modernization, and ongoing monitoring. Legacy systems, skill shortages, and the sheer complexity of modern networks make implementation a long-term journey rather than a quick fix.

    The discussion highlights why segmentation, boundary management, and cross-domain inspection remain critical even in a Zero Trust architecture—particularly in environments with legacy infrastructure, international partnerships, and tactical edge deployments. As AI systems and autonomous technologies increasingly interact with sensitive networks, the need to treat AI as another “actor” with controlled privileges becomes essential.

    The episode concludes with practical guidance for leaders beginning their Zero Trust journey—from inventorying everything on their network and planning segmentation, to implementing role-based access controls, budgeting for modernization, and ensuring organizations have the skilled personnel required to sustain the architecture.

    Ultimately, the takeaway is clear: Zero Trust isn’t a tool—it’s a strategy for operating in a world where persistent threats are the norm.

    Show notes:

    GME - www.gme.net.au

    Owl Cyber Defense - www.owlcyberdefense.com

    Modern Defense Architecture (Australia) - https://www.cyber.gov.au/business-government/secure-design/secure-by-design/modern-defensible-architecture

    Chris Rule - https://www.linkedin.com/in/christopher-rule-fieaust-cpeng-gaicd-05600b30/

    Michael Blake - https://www.linkedin.com/in/michael-blake-734b0a21/
  • Tech Transforms

    Episode 117: 2026 Predictions. What's Now. What's Next. What's Urgent.

    27/02/2026 | 57 mins.
    In this special 2026 Predictions episode of Tech Transforms, Carolyn Ford is joined by Brian Carter, Scott Orton, Ralph Spa, and Michael Blake from Owl Cyber Defense for a no-crystal-ball conversation about the signals already flashing across cybersecurity, defense, and digital trust.

    This isn’t speculation. It’s trajectory.

    The group tackles the accelerating collapse of content trust in a world of deepfakes, AI-generated media, and short-form misinformation. As generative tools become indistinguishable from reality, they predict a sharp shift toward deep identity assurance—powered by behavioral biometrics, cryptographic validation, and provable content provenance. In a future where “guaranteed human” becomes a competitive advantage, digital identity won’t be optional—it will be foundational.

    From there, the conversation moves into AI containment. The panel argues that we must stop treating AI like helpful software and start treating it like a privileged insider—with unpredictable outputs and real liability attached. The solution? Deterministic boundaries enforced in hardware. As Scott puts it: if you want to confine a tiger, you don’t build the cage out of meat.

    The episode also explores:

    The federal government’s accelerating shift from legacy primes to agile, non-incumbent innovators delivering 80% solutions faster

    Why battlefield communications must evolve beyond encryption to real-time, hardware-enforced trust

    How AI-powered offensive attacks are shrinking from teams to individuals—sometimes in Power Ranger suits

    The limits of Zero Trust when complexity, cost, and talent gaps collide

    Why cross-domain solutions and data diodes may be the real fail-safes in an increasingly networked world

    Throughout the discussion, a clear thread emerges: software alone won’t save us. As systems grow more interconnected, autonomous, and AI-driven, trust must be anchored in hardware—simple, enforceable, and resistant to both human error and machine-scale attack.

    The takeaway for 2026? Security leaders won’t lose because they lacked tools. They’ll lose because they trusted the wrong ones.

    This episode challenges listeners to rethink modernization, containment, and what real trust looks like when machines are making decisions at machine speed.

    Stay curious. The future isn’t waiting.

    Shownotes

    Scott Orton: LinkedIn | Email: [email protected]

    Brian Carter: LinkedIn | Email:[email protected]

    Ralph Spada: LinkedIn | Email: [email protected]

    Michael Blake: https://www.linkedin.com/in/michael-blake-734b0a21/ | Email: [email protected]

    Owl Cyber Defense: owlcyberdefense.com

    Download the 2026 Predictions Report: https://owlcyberdefense.com/resource/decision-advantage-forecast-five-security-shifts-in-2026/

    Story - Power Ranger Hacker: https://futurism.com/artificial-intelligence/tinder-for-nazis-hacked
  • Tech Transforms

    Episode 116: So What Returns.....Can the Pentagon Really Boil the Ocean?

    17/02/2026 | 46 mins.
    n this return episode of So What? on Tech Transforms, host Carolyn Ford reconnects with co-host Tracy Bannon to unpack one of the most significant structural shifts happening inside the Pentagon: the consolidation of R&D, AI, and data organizations under a single Chief Technology Officer. On paper, it looks like bureaucratic reorganization. In practice, it could redefine how innovation moves from research to battlefield deployment.

    Tracy, who regularly briefs at the Pentagon, explains why this move is less about reshuffling boxes on an org chart and more about breaking down long-standing silos between research, prototyping, operational deployment, and data governance. By bringing organizations into tighter alignment, the goal is parallel execution with shared visibility, faster momentum without sacrificing mission integrity. But speed brings risk. Cultural friction between research environments (where failure is tolerated) and operational environments (where failure carries consequences) could become the real test of whether this consolidation succeeds.

    Rather than leaving AI adoption to fragmented pilot programs or shadow experimentation, leadership is pushing controlled, enterprise-scale access. Carolyn and Tracy explore why offering multiple models matters strategically, how secure infrastructure is already in place to support it, and what it means when leadership says, “Use it—prove you can’t.”

    They also examine the restructuring of Advana, the Pentagon’s enterprise data platform, and what its breakup signals about data ownership, governance, and the ongoing battle between centralized visibility and cultural resistance. The real friction point, Tracy argues, isn’t technology, it’s data stewardship, policy alignment, and whether organizations are willing to move from “my system, my risk” to shared mission accountability.

    Throughout the episode, they return to the central question of the series: So what actually changes? They outline the signals they’ll be watching over the next three months, speed of adoption, policy adaptation, cross-organizational collaboration, and whether cultural barriers soften or harden under pressure.

    This is a conversation for leaders navigating large-scale transformation, those wrestling with how to accelerate innovation without losing control, and how to align people, process, and technology when the mission demands both speed and accountability.

    Show Notes:

    LinkedIn: https://www.linkedin.com/in/Tracyylbannon/

    E-mail: [email protected]

    Website: https://Tracybannon.tech/

    Breaking Defense: Pentagon Reforms R&D and AI- https://breakingdefense.com/2026/01/pentagon-rolls-out-major-reforms-of-rd-ai/

    Tracy Bannon Blog: https://straighttalk4gov.org/

    GenAI.mil Info: https://www.war.gov/News/Releases/Release/Article/4354916/the-war-department-unleashes-ai-on-new-genaimil-platform/

    Advana background: https://www.ai.mil/Initiatives/Analytic-Tools/

    Moltbook: https://www.moltbook.com/
  • Tech Transforms

    Episode 115: The Uncle Rufus Problem: Fixing Cyber’s Weakest Links Before It’s Too Late

    20/01/2026 | 51 mins.
    Retired Rear Admiral Mark Montgomery joins Tech Transforms for a blunt, practical look at the cyber risks the U.S. keeps underestimating—and why “Uncle Rufus’s rail switch” may be the weak link that matters most. Montgomery breaks down military mobility as a national security problem hiding in plain sight: once equipment leaves the secure “Noah’s Ark” of a base and hits rural rail networks and switching systems, it enters a “Mad Max” environment with limited redundancy, limited cyber expertise, and huge strategic consequences.

    From there, the conversation moves into what it would take to fix the problem before a crisis: recurring federal assessments, targeted grant programs for smaller operators, and the messy reality of congressional jurisdiction that slows action. Montgomery also makes the case for a dedicated Cyber Force—arguing the current “force generation” model across military branches can’t recruit, train, and retain cyber talent at the scale needed.

    Finally, the episode tackles the cyber insurance market: why organizations are underinsured, why risk is hard to price, and why the most promising models pair insurance with real assessments, remediation, and recurring validation. Montgomery closes with updates on Cyberspace Solarium 2.0 progress, what’s stalled, what’s “backsliding,” and what measurable wins still matter—plus a rapid-fire “Tech Talk” round that includes Batman, battleships, and top-down cyber hygiene.

    Show Notes:

    Foundation for Defense of Democracies - fdd.org

    LinkedIn: https://www.linkedin.com/in/mark-montgomery-b8932810/

    Twitter: @MarkCMontgomergy

    Cyber Insurance Reform Op-Ed: https://cyberscoop.com/congress-cyber-insurance-reform-op-ed

    Cyberspace Solarium Commission Reports: https://cybersolarium.org

More Government podcasts

About Tech Transforms

Global technology is changing the way we live. Critical government decisions affect the intersection of technology advancement and human needs. This podcast talks to some of the most prominent influencers shaping the landscape to understand how they are leveraging technology to solve complex challenges while also meeting the needs of today's modern world.
Podcast website

Listen to Tech Transforms, The Beef Edge and many other podcasts from around the world with the radio.net app

Get the free radio.net app

  • Stations and podcasts to bookmark
  • Stream via Wi-Fi or Bluetooth
  • Supports Carplay & Android Auto
  • Many other app features