<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" encoding="UTF-8" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:sy="http://purl.org/rss/1.0/modules/syndication/" xmlns:admin="http://webns.net/mvcb/" xmlns:atom="http://www.w3.org/2005/Atom/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:googleplay="http://www.google.com/schemas/play-podcasts/1.0" xmlns:itunes="http://www.itunes.com/dtds/podcast-1.0.dtd" xmlns:fireside="http://fireside.fm/modules/rss/fireside">
  <channel>
    <fireside:hostname>web01.fireside.fm</fireside:hostname>
    <fireside:genDate>Sun, 10 May 2026 17:26:59 -0500</fireside:genDate>
    <generator>Fireside (https://fireside.fm)</generator>
    <title>Tech Transforms - Episodes Tagged with “Cyber”</title>
    <link>https://techtransforms.fireside.fm/tags/cyber</link>
    <pubDate>Wed, 24 Sep 2025 10:45:00 -0400</pubDate>
    <description>Global technology is changing the way we live. Critical government decisions affect the intersection of technology advancement and human needs. This podcast talks to some of the most prominent influencers shaping the landscape to understand how they are leveraging technology to solve complex challenges while also meeting the needs of today's modern world.
</description>
    <language>en-us</language>
    <itunes:type>episodic</itunes:type>
    <itunes:subtitle>Tech Transforms, brought to you by Owl Cyber Defense, talks to some of the most prominent influencers shaping government technology.</itunes:subtitle>
    <itunes:author>Carolyn Ford</itunes:author>
    <itunes:summary>Global technology is changing the way we live. Critical government decisions affect the intersection of technology advancement and human needs. This podcast talks to some of the most prominent influencers shaping the landscape to understand how they are leveraging technology to solve complex challenges while also meeting the needs of today's modern world.
</itunes:summary>
    <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/8/81d9d6b0-0045-48da-8495-fd87c4613d7f/cover.jpg?v=3"/>
    <itunes:explicit>no</itunes:explicit>
    <itunes:owner>
      <itunes:name>Carolyn Ford</itunes:name>
      <itunes:email>Galadrielford@gmail.com</itunes:email>
    </itunes:owner>
<itunes:category text="Technology"/>
<itunes:category text="Government"/>
<item>
  <title>Episode 106: Influence, Intel, and Insider Threats: The Human Side of Cyber Risk</title>
  <link>https://techtransforms.fireside.fm/106</link>
  <guid isPermaLink="false">57e49927-13a1-44c7-aa88-6313fd98b782</guid>
  <pubDate>Wed, 24 Sep 2025 10:45:00 -0400</pubDate>
  <author>Carolyn Ford</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/81d9d6b0-0045-48da-8495-fd87c4613d7f/57e49927-13a1-44c7-aa88-6313fd98b782.mp3" length="46725564" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>Carolyn Ford</itunes:author>
  <itunes:subtitle>Host Carolyn Ford interviews Julie Laurin, Cyber Threat Intelligence Consultant with the Mining &amp; Metals ISAC, on the evolving landscape of cybersecurity. They unpack social engineering tactics like the ClickFix malware, the overlooked risks in critical infrastructure, and the geopolitical stakes of mining and minerals. Julie also shares candid perspectives on women in tech leadership, the strengths of neurodiverse professionals, and why empathy is essential in today’s digital age. A thought-provoking conversation at the intersection of technology, security, and human behavior.</itunes:subtitle>
  <itunes:duration>37:56</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/8/81d9d6b0-0045-48da-8495-fd87c4613d7f/episodes/5/57e49927-13a1-44c7-aa88-6313fd98b782/cover.jpg?v=2"/>
  <description>&lt;p&gt;In this episode, host Carolyn Ford sits down with Julie Laurin, a cyber threat intelligence consultant with the Mining and Metals ISAC. Julie brings two decades of expertise in software, a sharp eye for overlooked risks, and a deep curiosity about the intersection of humans and technology. Together, they explore the evolving landscape of cyber threats, from social engineering tactics like the Clickfix malware to the critical role of human behavior in cybersecurity.&lt;/p&gt;

&lt;p&gt;Julie shares fascinating insights into the vulnerabilities of critical infrastructure, the geopolitical implications of mining and minerals, and the challenges of navigating leadership as a woman in tech. They also dive into the neurodiverse superpowers that thrive in the fast-paced world of cybersecurity and the importance of empathy in the digital age.&lt;/p&gt;

&lt;p&gt;With humor, candor, and thought-provoking anecdotes, this episode will leave you rethinking the way we approach technology, security, and the human element. Tune in for a conversation that’s equal parts enlightening and entertaining. Stay curious and keep imagining the future!&lt;/p&gt;

&lt;p&gt;Summary Notes&lt;br&gt;
Julie’s LinkedIn Profile:   &lt;a href="https://www.linkedin.com/in/jlaurin/" target="_blank" rel="nofollow noopener"&gt;https://www.linkedin.com/in/jlaurin/&lt;/a&gt;&lt;br&gt;
Mining and Metals ISAC - &lt;a href="https://mmisac.org/" target="_blank" rel="nofollow noopener"&gt;https://mmisac.org/&lt;/a&gt;&lt;br&gt;
ClickFix Analysis - &lt;a href="https://www.microsoft.com/en-us/security/blog/2025/08/21/think-before-you-clickfix-analyzing-the-clickfix-social-engineering-technique/" target="_blank" rel="nofollow noopener"&gt;https://www.microsoft.com/en-us/security/blog/2025/08/21/think-before-you-clickfix-analyzing-the-clickfix-social-engineering-technique/&lt;/a&gt;&lt;br&gt;
ISO/IEC 27001 - &lt;a href="https://www.iso.org/standard/27001" target="_blank" rel="nofollow noopener"&gt;https://www.iso.org/standard/27001&lt;/a&gt;&lt;/p&gt;
</description>
  <itunes:keywords>cyber, critical infrastructure, cybersecurity, cyber defense</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>In this episode, host Carolyn Ford sits down with Julie Laurin, a cyber threat intelligence consultant with the Mining and Metals ISAC. Julie brings two decades of expertise in software, a sharp eye for overlooked risks, and a deep curiosity about the intersection of humans and technology. Together, they explore the evolving landscape of cyber threats, from social engineering tactics like the Clickfix malware to the critical role of human behavior in cybersecurity.</p>

<p>Julie shares fascinating insights into the vulnerabilities of critical infrastructure, the geopolitical implications of mining and minerals, and the challenges of navigating leadership as a woman in tech. They also dive into the neurodiverse superpowers that thrive in the fast-paced world of cybersecurity and the importance of empathy in the digital age.</p>

<p>With humor, candor, and thought-provoking anecdotes, this episode will leave you rethinking the way we approach technology, security, and the human element. Tune in for a conversation that’s equal parts enlightening and entertaining. Stay curious and keep imagining the future!</p>

<p>Summary Notes<br>
Julie’s LinkedIn Profile:   <a href="https://www.linkedin.com/in/jlaurin/" rel="nofollow">https://www.linkedin.com/in/jlaurin/</a><br>
Mining and Metals ISAC - <a href="https://mmisac.org/" rel="nofollow">https://mmisac.org/</a><br>
ClickFix Analysis - <a href="https://www.microsoft.com/en-us/security/blog/2025/08/21/think-before-you-clickfix-analyzing-the-clickfix-social-engineering-technique/" rel="nofollow">https://www.microsoft.com/en-us/security/blog/2025/08/21/think-before-you-clickfix-analyzing-the-clickfix-social-engineering-technique/</a><br>
ISO/IEC 27001 - <a href="https://www.iso.org/standard/27001" rel="nofollow">https://www.iso.org/standard/27001</a></p>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>In this episode, host Carolyn Ford sits down with Julie Laurin, a cyber threat intelligence consultant with the Mining and Metals ISAC. Julie brings two decades of expertise in software, a sharp eye for overlooked risks, and a deep curiosity about the intersection of humans and technology. Together, they explore the evolving landscape of cyber threats, from social engineering tactics like the Clickfix malware to the critical role of human behavior in cybersecurity.</p>

<p>Julie shares fascinating insights into the vulnerabilities of critical infrastructure, the geopolitical implications of mining and minerals, and the challenges of navigating leadership as a woman in tech. They also dive into the neurodiverse superpowers that thrive in the fast-paced world of cybersecurity and the importance of empathy in the digital age.</p>

<p>With humor, candor, and thought-provoking anecdotes, this episode will leave you rethinking the way we approach technology, security, and the human element. Tune in for a conversation that’s equal parts enlightening and entertaining. Stay curious and keep imagining the future!</p>

<p>Summary Notes<br>
Julie’s LinkedIn Profile:   <a href="https://www.linkedin.com/in/jlaurin/" rel="nofollow">https://www.linkedin.com/in/jlaurin/</a><br>
Mining and Metals ISAC - <a href="https://mmisac.org/" rel="nofollow">https://mmisac.org/</a><br>
ClickFix Analysis - <a href="https://www.microsoft.com/en-us/security/blog/2025/08/21/think-before-you-clickfix-analyzing-the-clickfix-social-engineering-technique/" rel="nofollow">https://www.microsoft.com/en-us/security/blog/2025/08/21/think-before-you-clickfix-analyzing-the-clickfix-social-engineering-technique/</a><br>
ISO/IEC 27001 - <a href="https://www.iso.org/standard/27001" rel="nofollow">https://www.iso.org/standard/27001</a></p>]]>
  </itunes:summary>
</item>
<item>
  <title>Episode 87: The Future of Tactical Networks: Connecting Warfighters in Real Time</title>
  <link>https://techtransforms.fireside.fm/87</link>
  <guid isPermaLink="false">a5103130-9c91-41fd-95b7-9f8e2051e77e</guid>
  <pubDate>Thu, 12 Dec 2024 12:00:00 -0500</pubDate>
  <author>Carolyn Ford</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/81d9d6b0-0045-48da-8495-fd87c4613d7f/a5103130-9c91-41fd-95b7-9f8e2051e77e.mp3" length="133357566" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>Carolyn Ford</itunes:author>
  <itunes:subtitle>In this episode of Tech Transforms, Carolyn welcomes Dan O'Donohue, Vice President of Business Development for Secure Communications at Owl Cyber Defense and retired U.S. Marine Corps Lieutenant General. With a distinguished military career that included leadership roles in cyber operations and joint force development, Dan shares his expertise on the evolution of secure communication technologies in multi-domain operations. The discussion delves into the critical role of tactical networks in empowering warfighters, overcoming challenges in disrupted environments, and integrating advanced technologies like AI and edge computing to gain a decision-making edge. From cross-domain solutions to coalition interoperability, Dan offers actionable insights for leaders navigating the complex landscape of secure communications.</itunes:subtitle>
  <itunes:duration>55:10</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/8/81d9d6b0-0045-48da-8495-fd87c4613d7f/episodes/a/a5103130-9c91-41fd-95b7-9f8e2051e77e/cover.jpg?v=3"/>
  <description>&lt;p&gt;How do we empower warfighters with real-time, secure communication in the most challenging operational environments? In this episode of Tech Transforms, Carolyn sits down with Dan O'Donohue, VP of Secure Communications at Owl Cyber Defense and retired U.S. Marine Corps Lieutenant General, to explore the cutting-edge of tactical network technologies. With firsthand experience leading Marine Forces Cyber and Joint Force Development, Dan discusses the evolution of secure data exchange, the integration of AI, and the significance of adaptability in disrupted environments.&lt;/p&gt;

&lt;p&gt;Discover how secure communication networks drive operational success, how cross-domain solutions enhance coalition interoperability, and why a modernized, data-driven military is essential in today’s battlespace. Whether you're a tech enthusiast or a leader seeking insights on the future of tactical networks, this episode will transform the way you think about secure communications.&lt;/p&gt;

&lt;p&gt;Tune in for expert perspectives and actionable takeaways from one of the foremost leaders in the field. &lt;/p&gt;
</description>
  <itunes:keywords>cyber, defense, data, warfighter</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>How do we empower warfighters with real-time, secure communication in the most challenging operational environments? In this episode of Tech Transforms, Carolyn sits down with Dan O&#39;Donohue, VP of Secure Communications at Owl Cyber Defense and retired U.S. Marine Corps Lieutenant General, to explore the cutting-edge of tactical network technologies. With firsthand experience leading Marine Forces Cyber and Joint Force Development, Dan discusses the evolution of secure data exchange, the integration of AI, and the significance of adaptability in disrupted environments.</p>

<p>Discover how secure communication networks drive operational success, how cross-domain solutions enhance coalition interoperability, and why a modernized, data-driven military is essential in today’s battlespace. Whether you&#39;re a tech enthusiast or a leader seeking insights on the future of tactical networks, this episode will transform the way you think about secure communications.</p>

<p>Tune in for expert perspectives and actionable takeaways from one of the foremost leaders in the field.</p>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>How do we empower warfighters with real-time, secure communication in the most challenging operational environments? In this episode of Tech Transforms, Carolyn sits down with Dan O&#39;Donohue, VP of Secure Communications at Owl Cyber Defense and retired U.S. Marine Corps Lieutenant General, to explore the cutting-edge of tactical network technologies. With firsthand experience leading Marine Forces Cyber and Joint Force Development, Dan discusses the evolution of secure data exchange, the integration of AI, and the significance of adaptability in disrupted environments.</p>

<p>Discover how secure communication networks drive operational success, how cross-domain solutions enhance coalition interoperability, and why a modernized, data-driven military is essential in today’s battlespace. Whether you&#39;re a tech enthusiast or a leader seeking insights on the future of tactical networks, this episode will transform the way you think about secure communications.</p>

<p>Tune in for expert perspectives and actionable takeaways from one of the foremost leaders in the field.</p>]]>
  </itunes:summary>
</item>
  </channel>
</rss>
