PodcastsGovernmentTech Transforms

Tech Transforms

Carolyn Ford
Tech Transforms
Latest episode

121 episodes

  • Tech Transforms

    Episode 121: Flying Through Chaos: How to Stay Mission-Ready in High-Stress Environments

    14/04/2026 | 38 mins.
    In this episode of Tech Transforms, Carey Lohrenz shares powerful lessons from her experience as the first female F-14 Tomcat pilot and author of Span of Control. Rather than focusing on aviation war stories, the conversation dives into how high performers navigate overwhelm, uncertainty, and pressure by narrowing their focus to what they can actually control. Drawing on both combat aviation and personal hardship, Carey reframes stress as a necessary component of performance—and offers practical strategies to manage it effectively.

    The discussion explores how elite performers build resilience through training, prioritization, and teamwork—from cockpit checklists to the “meatball, lineup, angle of attack” mindset used in high-stakes landings. Carey also highlights the importance of shared load, trust, and even small moments of celebration in sustaining high-performing teams.

    Ultimately, this episode is a grounded, relatable guide for leaders and professionals alike—showing how to stay focused, effective, and human when everything feels like it’s moving at once.

    Show Notes:

    Carey Lohrenz Website:

    ➤ https://careylohrenz.com/

    Carey on LinkedIn:

    ➤ https://www.linkedin.com/in/careylohrenz/

    Carey’s Podcast:

    ➤ Welcome to My Office: https://podcasts.apple.com/us/podcast/trailer-welcome-to-my-office/id1564095883?i=1000520362663

    Carey’s Book:

    ➤Span of Control - https://a.co/d/04zCzjdf
  • Tech Transforms

    This One Trick Transforms Tech Briefings Into Mission-Ready Action

    02/04/2026 | 33 mins.
    Host Carolyn Ford sits down with Eric Monterastelli, technologist at ATP Gov and creator of the BLUF podcast, a new format designed to distill dense technical content into concise, decision ready insights.

    Faced with an overwhelming volume of webinars, white papers, and vendor messaging, Eric saw a critical gap. Even seasoned technologists were walking away from 90 minute briefings unsure of what actually mattered. His solution is simple. Apply a military principle, Bottom Line Up Front (BLUF), to modern tech communication.

    Eric shares how he transforms hours of complex material into 10 minute, highly digestible episodes that help decision makers quickly understand what a technology does, why it matters, and how it applies in real world environments.

    In this conversation, we explore:

    The growing noise problem in cybersecurity and government tech

    Why frameworks like zero trust are often misunderstood and over marketed

    How storytelling and trust outperform AI generated summaries

    The emerging risks in operational technology and infrastructure systems

    A behind the scenes look at Eric’s process for distilling complex information without losing accuracy

    This episode is for anyone navigating today’s crowded tech landscape, from engineers and marketers to executives making high stakes decisions.

    Key takeaway: In a world flooded with information, clarity is power. The ability to distill complexity may be the most valuable skill in tech today.
  • Tech Transforms

    Episode 119: 5 Steps to Zero Trust

    17/03/2026 | 27 mins.
    In this follow-up episode of Tech Transforms, Carolyn Ford continues her conversation with Michael Blake of Owl Cyber Defense, shifting from the theory of Zero Trust to the realities of implementing it. The discussion explores the first practical step, network discovery and why organizations are often surprised by shadow IT and legacy systems still operating inside their environments.

    From there, Ford and Blake walk through the key stages of a Zero Trust journey, including microsegmentation, access management, and auditing privileges to prevent lateral movement and privilege creep. They also discuss the operational realities leaders face—budgeting, prioritizing critical assets or “crown jewels,” and ensuring organizations have the talent and resources needed to sustain a Zero Trust architecture.

    The takeaway: Zero Trust isn’t a single deployment, it’s an ongoing journey that evolves alongside emerging threats and technologies.

    Show Notes:

    Michael Blake: https://www.linkedin.com/in/michael-blake-734b0a21/ | Email: [email protected]

    DoW resources https://dowcio.war.gov/Library/: security controls, checklist, self assessment, Penn test guidelines etc

    Zero Trust | www.dau.edu

    Dell Technologies Project Fort Zero to Transform Security | Dell USA

    MITRE papers on evolving threats of giving AI access to network - https://ctid.mitre.org/blog/2025/05/09/secure-ai-v2/

    Owl ZT resources: https://owlcyberdefense.com/zero-trust-cds/

    Vendors that assist with ZTX, listen to the BLUF Podcast summaries to know if they might be able to help you: https://theblufpodcast.podbean.com/e/thebluf_episode12/ https://theblufpodcast.podbean.com/e/thebluf_episode13/
  • Tech Transforms

    Episode 118: Zero Trust ≠ Zero Risk: Debunking the Myths and Building Real Resilience

    10/03/2026 | 58 mins.
    In this episode of Tech Transforms, Carolyn Ford sits down with Michael Blake of Owl Cyber Defense and Chris Rule of GME to unpack one of cybersecurity’s most misunderstood concepts: Zero Trust. What begins as a discussion of architecture quickly evolves into something broader, an exploration of mindset, modernization, and the reality that today’s networks must operate under the assumption that a breach has already occurred.

    The conversation breaks down the core principle behind Zero Trust: minimizing the “blast radius” of a breach. Instead of assuming everything inside a network is safe, Zero Trust requires constant authentication, strict access controls, and segmentation so that even if an attacker gains entry, they cannot move freely across systems.

    We explore common misconceptions, especially the idea that Zero Trust is a product that can simply be purchased and installed. In reality, it’s a whole-of-organization approach involving people, processes, infrastructure modernization, and ongoing monitoring. Legacy systems, skill shortages, and the sheer complexity of modern networks make implementation a long-term journey rather than a quick fix.

    The discussion highlights why segmentation, boundary management, and cross-domain inspection remain critical even in a Zero Trust architecture—particularly in environments with legacy infrastructure, international partnerships, and tactical edge deployments. As AI systems and autonomous technologies increasingly interact with sensitive networks, the need to treat AI as another “actor” with controlled privileges becomes essential.

    The episode concludes with practical guidance for leaders beginning their Zero Trust journey—from inventorying everything on their network and planning segmentation, to implementing role-based access controls, budgeting for modernization, and ensuring organizations have the skilled personnel required to sustain the architecture.

    Ultimately, the takeaway is clear: Zero Trust isn’t a tool—it’s a strategy for operating in a world where persistent threats are the norm.

    Show notes:

    GME - www.gme.net.au

    Owl Cyber Defense - www.owlcyberdefense.com

    Modern Defense Architecture (Australia) - https://www.cyber.gov.au/business-government/secure-design/secure-by-design/modern-defensible-architecture

    Chris Rule - https://www.linkedin.com/in/christopher-rule-fieaust-cpeng-gaicd-05600b30/

    Michael Blake - https://www.linkedin.com/in/michael-blake-734b0a21/
  • Tech Transforms

    Episode 117: 2026 Predictions. What's Now. What's Next. What's Urgent.

    27/02/2026 | 57 mins.
    In this special 2026 Predictions episode of Tech Transforms, Carolyn Ford is joined by Brian Carter, Scott Orton, Ralph Spa, and Michael Blake from Owl Cyber Defense for a no-crystal-ball conversation about the signals already flashing across cybersecurity, defense, and digital trust.

    This isn’t speculation. It’s trajectory.

    The group tackles the accelerating collapse of content trust in a world of deepfakes, AI-generated media, and short-form misinformation. As generative tools become indistinguishable from reality, they predict a sharp shift toward deep identity assurance—powered by behavioral biometrics, cryptographic validation, and provable content provenance. In a future where “guaranteed human” becomes a competitive advantage, digital identity won’t be optional—it will be foundational.

    From there, the conversation moves into AI containment. The panel argues that we must stop treating AI like helpful software and start treating it like a privileged insider—with unpredictable outputs and real liability attached. The solution? Deterministic boundaries enforced in hardware. As Scott puts it: if you want to confine a tiger, you don’t build the cage out of meat.

    The episode also explores:

    The federal government’s accelerating shift from legacy primes to agile, non-incumbent innovators delivering 80% solutions faster

    Why battlefield communications must evolve beyond encryption to real-time, hardware-enforced trust

    How AI-powered offensive attacks are shrinking from teams to individuals—sometimes in Power Ranger suits

    The limits of Zero Trust when complexity, cost, and talent gaps collide

    Why cross-domain solutions and data diodes may be the real fail-safes in an increasingly networked world

    Throughout the discussion, a clear thread emerges: software alone won’t save us. As systems grow more interconnected, autonomous, and AI-driven, trust must be anchored in hardware—simple, enforceable, and resistant to both human error and machine-scale attack.

    The takeaway for 2026? Security leaders won’t lose because they lacked tools. They’ll lose because they trusted the wrong ones.

    This episode challenges listeners to rethink modernization, containment, and what real trust looks like when machines are making decisions at machine speed.

    Stay curious. The future isn’t waiting.

    Shownotes

    Scott Orton: LinkedIn | Email: [email protected]

    Brian Carter: LinkedIn | Email:[email protected]

    Ralph Spada: LinkedIn | Email: [email protected]

    Michael Blake: https://www.linkedin.com/in/michael-blake-734b0a21/ | Email: [email protected]

    Owl Cyber Defense: owlcyberdefense.com

    Download the 2026 Predictions Report: https://owlcyberdefense.com/resource/decision-advantage-forecast-five-security-shifts-in-2026/

    Story - Power Ranger Hacker: https://futurism.com/artificial-intelligence/tinder-for-nazis-hacked

More Government podcasts

About Tech Transforms

Global technology is changing the way we live. Critical government decisions affect the intersection of technology advancement and human needs. This podcast talks to some of the most prominent influencers shaping the landscape to understand how they are leveraging technology to solve complex challenges while also meeting the needs of today's modern world.
Podcast website

Listen to Tech Transforms, Question Time and many other podcasts from around the world with the radio.net app

Get the free radio.net app

  • Stations and podcasts to bookmark
  • Stream via Wi-Fi or Bluetooth
  • Supports Carplay & Android Auto
  • Many other app features