Tech Transforms

Carolyn Ford

Global technology is changing the way we live. Critical government decisions affect the intersection of technology advancement and human needs. This podcast talks to some of the most prominent influencers shaping the landscape to understand how they are leveraging technology to solve complex challenges while also meeting the needs of today's modern world.

  1. Episode 119: 5 Steps to Zero Trust

    1D AGO

    Episode 119: 5 Steps to Zero Trust

    In this follow-up episode of Tech Transforms, Carolyn Ford continues her conversation with Michael Blake of Owl Cyber Defense, shifting from the theory of Zero Trust to the realities of implementing it. The discussion explores the first practical step, network discovery and why organizations are often surprised by shadow IT and legacy systems still operating inside their environments. From there, Ford and Blake walk through the key stages of a Zero Trust journey, including microsegmentation, access management, and auditing privileges to prevent lateral movement and privilege creep. They also discuss the operational realities leaders face—budgeting, prioritizing critical assets or “crown jewels,” and ensuring organizations have the talent and resources needed to sustain a Zero Trust architecture. The takeaway: Zero Trust isn’t a single deployment, it’s an ongoing journey that evolves alongside emerging threats and technologies. Show Notes: Michael Blake: https://www.linkedin.com/in/michael-blake-734b0a21/ | Email: mblake@owlcyberdefense.com DoW resources https://dowcio.war.gov/Library/: security controls, checklist, self assessment, Penn test guidelines etc Zero Trust | www.dau.edu Dell Technologies Project Fort Zero to Transform Security | Dell USA MITRE papers on evolving threats of giving AI access to network - https://ctid.mitre.org/blog/2025/05/09/secure-ai-v2/ Owl ZT resources: https://owlcyberdefense.com/zero-trust-cds/ Vendors that assist with ZTX, listen to the BLUF Podcast summaries to know if they might be able to help you: https://theblufpodcast.podbean.com/e/thebluf_episode12/ https://theblufpodcast.podbean.com/e/thebluf_episode13/

    27 min
  2. Episode 118: Zero Trust ≠ Zero Risk: Debunking the Myths and Building Real Resilience

    MAR 10

    Episode 118: Zero Trust ≠ Zero Risk: Debunking the Myths and Building Real Resilience

    In this episode of Tech Transforms, Carolyn Ford sits down with Michael Blake of Owl Cyber Defense and Chris Rule of GME to unpack one of cybersecurity’s most misunderstood concepts: Zero Trust. What begins as a discussion of architecture quickly evolves into something broader, an exploration of mindset, modernization, and the reality that today’s networks must operate under the assumption that a breach has already occurred. The conversation breaks down the core principle behind Zero Trust: minimizing the “blast radius” of a breach. Instead of assuming everything inside a network is safe, Zero Trust requires constant authentication, strict access controls, and segmentation so that even if an attacker gains entry, they cannot move freely across systems. We explore common misconceptions, especially the idea that Zero Trust is a product that can simply be purchased and installed. In reality, it’s a whole-of-organization approach involving people, processes, infrastructure modernization, and ongoing monitoring. Legacy systems, skill shortages, and the sheer complexity of modern networks make implementation a long-term journey rather than a quick fix. The discussion highlights why segmentation, boundary management, and cross-domain inspection remain critical even in a Zero Trust architecture—particularly in environments with legacy infrastructure, international partnerships, and tactical edge deployments. As AI systems and autonomous technologies increasingly interact with sensitive networks, the need to treat AI as another “actor” with controlled privileges becomes essential. The episode concludes with practical guidance for leaders beginning their Zero Trust journey—from inventorying everything on their network and planning segmentation, to implementing role-based access controls, budgeting for modernization, and ensuring organizations have the skilled personnel required to sustain the architecture. Ultimately, the takeaway is clear: Zero Trust isn’t a tool—it’s a strategy for operating in a world where persistent threats are the norm. Show notes: GME - www.gme.net.au Owl Cyber Defense - www.owlcyberdefense.com Modern Defense Architecture (Australia) - https://www.cyber.gov.au/business-government/secure-design/secure-by-design/modern-defensible-architecture Chris Rule - https://www.linkedin.com/in/christopher-rule-fieaust-cpeng-gaicd-05600b30/ Michael Blake - https://www.linkedin.com/in/michael-blake-734b0a21/

    59 min
  3. Episode 117: 2026 Predictions.  What's Now. What's Next. What's Urgent.

    FEB 27

    Episode 117: 2026 Predictions. What's Now. What's Next. What's Urgent.

    In this special 2026 Predictions episode of Tech Transforms, Carolyn Ford is joined by Brian Carter, Scott Orton, Ralph Spa, and Michael Blake from Owl Cyber Defense for a no-crystal-ball conversation about the signals already flashing across cybersecurity, defense, and digital trust. This isn’t speculation. It’s trajectory. The group tackles the accelerating collapse of content trust in a world of deepfakes, AI-generated media, and short-form misinformation. As generative tools become indistinguishable from reality, they predict a sharp shift toward deep identity assurance—powered by behavioral biometrics, cryptographic validation, and provable content provenance. In a future where “guaranteed human” becomes a competitive advantage, digital identity won’t be optional—it will be foundational. From there, the conversation moves into AI containment. The panel argues that we must stop treating AI like helpful software and start treating it like a privileged insider—with unpredictable outputs and real liability attached. The solution? Deterministic boundaries enforced in hardware. As Scott puts it: if you want to confine a tiger, you don’t build the cage out of meat. The episode also explores: The federal government’s accelerating shift from legacy primes to agile, non-incumbent innovators delivering 80% solutions faster Why battlefield communications must evolve beyond encryption to real-time, hardware-enforced trust How AI-powered offensive attacks are shrinking from teams to individuals—sometimes in Power Ranger suits The limits of Zero Trust when complexity, cost, and talent gaps collide Why cross-domain solutions and data diodes may be the real fail-safes in an increasingly networked world Throughout the discussion, a clear thread emerges: software alone won’t save us. As systems grow more interconnected, autonomous, and AI-driven, trust must be anchored in hardware—simple, enforceable, and resistant to both human error and machine-scale attack. The takeaway for 2026? Security leaders won’t lose because they lacked tools. They’ll lose because they trusted the wrong ones. This episode challenges listeners to rethink modernization, containment, and what real trust looks like when machines are making decisions at machine speed. Stay curious. The future isn’t waiting. Shownotes Scott Orton: LinkedIn | Email: sorton@owlcyberdefense.com Brian Carter: LinkedIn | Email:bcarter@owlcyberdefense.com Ralph Spada: LinkedIn | Email: rspada@owlcyberdefense.com Michael Blake: https://www.linkedin.com/in/michael-blake-734b0a21/ | Email: mblake@owlcyberdefense.com Owl Cyber Defense: owlcyberdefense.com Download the 2026 Predictions Report: https://owlcyberdefense.com/resource/decision-advantage-forecast-five-security-shifts-in-2026/ Story - Power Ranger Hacker: https://futurism.com/artificial-intelligence/tinder-for-nazis-hacked

    58 min
  4. Episode 116: So What Returns.....Can the Pentagon Really Boil the Ocean?

    FEB 17

    Episode 116: So What Returns.....Can the Pentagon Really Boil the Ocean?

    n this return episode of So What? on Tech Transforms, host Carolyn Ford reconnects with co-host Tracy Bannon to unpack one of the most significant structural shifts happening inside the Pentagon: the consolidation of R&D, AI, and data organizations under a single Chief Technology Officer. On paper, it looks like bureaucratic reorganization. In practice, it could redefine how innovation moves from research to battlefield deployment. Tracy, who regularly briefs at the Pentagon, explains why this move is less about reshuffling boxes on an org chart and more about breaking down long-standing silos between research, prototyping, operational deployment, and data governance. By bringing organizations into tighter alignment, the goal is parallel execution with shared visibility, faster momentum without sacrificing mission integrity. But speed brings risk. Cultural friction between research environments (where failure is tolerated) and operational environments (where failure carries consequences) could become the real test of whether this consolidation succeeds. Rather than leaving AI adoption to fragmented pilot programs or shadow experimentation, leadership is pushing controlled, enterprise-scale access. Carolyn and Tracy explore why offering multiple models matters strategically, how secure infrastructure is already in place to support it, and what it means when leadership says, “Use it—prove you can’t.” They also examine the restructuring of Advana, the Pentagon’s enterprise data platform, and what its breakup signals about data ownership, governance, and the ongoing battle between centralized visibility and cultural resistance. The real friction point, Tracy argues, isn’t technology, it’s data stewardship, policy alignment, and whether organizations are willing to move from “my system, my risk” to shared mission accountability. Throughout the episode, they return to the central question of the series: So what actually changes? They outline the signals they’ll be watching over the next three months, speed of adoption, policy adaptation, cross-organizational collaboration, and whether cultural barriers soften or harden under pressure. This is a conversation for leaders navigating large-scale transformation, those wrestling with how to accelerate innovation without losing control, and how to align people, process, and technology when the mission demands both speed and accountability. Show Notes: LinkedIn: https://www.linkedin.com/in/Tracyylbannon/ E-mail: Trac@Tracybannon.tech Website: https://Tracybannon.tech/ Breaking Defense: Pentagon Reforms R&D and AI- https://breakingdefense.com/2026/01/pentagon-rolls-out-major-reforms-of-rd-ai/ Tracy Bannon Blog: https://straighttalk4gov.org/ GenAI.mil Info: https://www.war.gov/News/Releases/Release/Article/4354916/the-war-department-unleashes-ai-on-new-genaimil-platform/ Advana background: https://www.ai.mil/Initiatives/Analytic-Tools/ Moltbook: https://www.moltbook.com/

    47 min
  5. Episode 115: The Uncle Rufus Problem: Fixing Cyber’s Weakest Links Before It’s Too Late

    JAN 20

    Episode 115: The Uncle Rufus Problem: Fixing Cyber’s Weakest Links Before It’s Too Late

    Retired Rear Admiral Mark Montgomery joins Tech Transforms for a blunt, practical look at the cyber risks the U.S. keeps underestimating—and why “Uncle Rufus’s rail switch” may be the weak link that matters most. Montgomery breaks down military mobility as a national security problem hiding in plain sight: once equipment leaves the secure “Noah’s Ark” of a base and hits rural rail networks and switching systems, it enters a “Mad Max” environment with limited redundancy, limited cyber expertise, and huge strategic consequences. From there, the conversation moves into what it would take to fix the problem before a crisis: recurring federal assessments, targeted grant programs for smaller operators, and the messy reality of congressional jurisdiction that slows action. Montgomery also makes the case for a dedicated Cyber Force—arguing the current “force generation” model across military branches can’t recruit, train, and retain cyber talent at the scale needed. Finally, the episode tackles the cyber insurance market: why organizations are underinsured, why risk is hard to price, and why the most promising models pair insurance with real assessments, remediation, and recurring validation. Montgomery closes with updates on Cyberspace Solarium 2.0 progress, what’s stalled, what’s “backsliding,” and what measurable wins still matter—plus a rapid-fire “Tech Talk” round that includes Batman, battleships, and top-down cyber hygiene. Show Notes: Foundation for Defense of Democracies - fdd.org LinkedIn: https://www.linkedin.com/in/mark-montgomery-b8932810/ Twitter: @MarkCMontgomergy Cyber Insurance Reform Op-Ed: https://cyberscoop.com/congress-cyber-insurance-reform-op-ed Cyberspace Solarium Commission Reports: https://cybersolarium.org

    52 min
  6. Episode 114: Trust by Design: Why AI Needs a New Digital Foundation

    JAN 6

    Episode 114: Trust by Design: Why AI Needs a New Digital Foundation

    In this episode of Tech Transforms, Carolyn Ford sits down with Will Roper, one of the key architects of modern defense digital transformation, for a wide-ranging conversation that challenges a core assumption of today’s tech landscape: what if AI can’t scale because the Internet was never designed to support it? Drawing on his experience leading Project Maven, overseeing the Air Force’s cloud adoption, and placing AI on a U-2 spy plane, Roper explains why the real barrier to AI adoption isn’t algorithms, it’s infrastructure. He explores how today’s Internet favors centralization, making it powerful for consumers but fundamentally misaligned with highly regulated, IP-sensitive industries like aerospace, defense, and critical infrastructure. The conversation dives deep into sovereign data territories, zero-trust collaboration, and why data should never have to move in order to be useful. Using vivid analogies—from Formula One racing and digital twins to The Matrix, Roper outlines a new model for federated infrastructure that enables secure collaboration without sacrificing ownership, trust, or governance. Carolyn and Will also explore digital certification, continuous airworthiness, and the idea of a “digital flight envelope,” where physical systems can validate and recertify themselves in real time, reshaping how safety, speed, and innovation coexist. The episode wraps with rapid-fire Tech Talk questions, a philosophical discussion on simulations and trust, and a look ahead at what the next decade of technology may bring. This is a must-listen episode for leaders rethinking infrastructure, AI readiness, and what it truly means to build systems that scale—securely, ethically, and intelligently. Show Notes: Email: roper@istaridigital.com LinkedIn: https://www.linkedin.com/in/williamroper/ Summary "There is No Spoon" Talk: https://www.youtube.com/watch?v=dEcPlqImjWc Dr. Roper’s Paper: There Is No Spoon - The New Digital Acquisition Reality https://www.af.mil/Portals/1/documents/2020SAF/There_Is_No_Spoon_Digital_Acquisition_7_Oct_2020_digital_version.pdf Official Bio: https://www.af.mil/About-Us/Biographies/Display/article/1467795/dr-will-roper/ Istari https://www.istaridigital.com/ Flyer One: https://www.executivebiz.com/articles/istari-digitals-flyer-one-x-plane-on-track-for-digital-certification-will-roper-quoted

    49 min
  7. 12/26/2025

    Episode 112: Tech Transforms – Live from the Owl Evolution Summit

    Tech Transforms went live in front of an in-person audience (and simultaneously on the virtual platform and LinkedIn Live) for a special episode featuring Steve Stratton, retired Green Beret, former White House and Secret Service professional, and award-winning author of Skip Jack (included in attendees’ welcome package). The conversation explored why storytelling beats “speeds and feeds” when it comes to helping leaders and teams understand technology, remember what matters under pressure, and create real decision advantage. Steve explains how story creates emotional connection, strengthens recall, and gives context that data sheets can’t. Together, the hosts dig into the OODA loop, using a visceral film clip from We Were Soldiers to illustrate what decision-making looks like in chaos—then fast-forward to the near-future battlefield described in Skip Jack, where leaders are overwhelmed by sensors, AI, intel feeds, and massive data volume. A highlight is the reading from Chapter Five, where the commander describes mining high-threat networks and the dark web, relying on data diodes to stop malicious payloads hidden in media files, and pushing decisions to the point of information to speed response in a “nonkinetic war… at the speed of the internet.” The episode closes with rapid-fire “Tech Talk” questions—night vision tech, dream casting for Nicky Fury, and fictional worlds worth visiting—before the live audience transitions into the event’s first mission brief.

    26 min
5
out of 5
10 Ratings

About

Global technology is changing the way we live. Critical government decisions affect the intersection of technology advancement and human needs. This podcast talks to some of the most prominent influencers shaping the landscape to understand how they are leveraging technology to solve complex challenges while also meeting the needs of today's modern world.