<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" encoding="UTF-8" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:sy="http://purl.org/rss/1.0/modules/syndication/" xmlns:admin="http://webns.net/mvcb/" xmlns:atom="http://www.w3.org/2005/Atom/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:googleplay="http://www.google.com/schemas/play-podcasts/1.0" xmlns:itunes="http://www.itunes.com/dtds/podcast-1.0.dtd" xmlns:fireside="http://fireside.fm/modules/rss/fireside">
  <channel>
    <fireside:hostname>web01.fireside.fm</fireside:hostname>
    <fireside:genDate>Sun, 10 May 2026 00:54:11 -0500</fireside:genDate>
    <generator>Fireside (https://fireside.fm)</generator>
    <title>Tech Transforms - Episodes Tagged with “Cybersecurity”</title>
    <link>https://techtransforms.fireside.fm/tags/cybersecurity</link>
    <pubDate>Thu, 07 May 2026 10:00:00 -0400</pubDate>
    <description>Global technology is changing the way we live. Critical government decisions affect the intersection of technology advancement and human needs. This podcast talks to some of the most prominent influencers shaping the landscape to understand how they are leveraging technology to solve complex challenges while also meeting the needs of today's modern world.
</description>
    <language>en-us</language>
    <itunes:type>episodic</itunes:type>
    <itunes:subtitle>Tech Transforms, brought to you by Owl Cyber Defense, talks to some of the most prominent influencers shaping government technology.</itunes:subtitle>
    <itunes:author>Carolyn Ford</itunes:author>
    <itunes:summary>Global technology is changing the way we live. Critical government decisions affect the intersection of technology advancement and human needs. This podcast talks to some of the most prominent influencers shaping the landscape to understand how they are leveraging technology to solve complex challenges while also meeting the needs of today's modern world.
</itunes:summary>
    <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/8/81d9d6b0-0045-48da-8495-fd87c4613d7f/cover.jpg?v=3"/>
    <itunes:explicit>no</itunes:explicit>
    <itunes:owner>
      <itunes:name>Carolyn Ford</itunes:name>
      <itunes:email>Galadrielford@gmail.com</itunes:email>
    </itunes:owner>
<itunes:category text="Technology"/>
<itunes:category text="Government"/>
<item>
  <title>Episode 123: Breaking the 18-Month Barrier: How StormBreaker is Trading Red Tape for Rapid Delivery</title>
  <link>https://techtransforms.fireside.fm/123</link>
  <guid isPermaLink="false">fbac3197-157c-4228-94d4-eefbc03d7d9c</guid>
  <pubDate>Thu, 07 May 2026 10:00:00 -0400</pubDate>
  <author>Carolyn Ford</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/81d9d6b0-0045-48da-8495-fd87c4613d7f/fbac3197-157c-4228-94d4-eefbc03d7d9c.mp3" length="58659803" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>Carolyn Ford</itunes:author>
  <itunes:subtitle> Dave Raley is transforming federal IT through Operation Stormbreaker, a platform that reduces deployment timelines from months to minutes. By shifting to shared infrastructure, continuous authorization, and containerized development, the Marine Corps is breaking free from the legacy “maintenance trap.” The result is faster, more secure innovation that brings real capability into production—when it actually matters.</itunes:subtitle>
  <itunes:duration>48:50</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/8/81d9d6b0-0045-48da-8495-fd87c4613d7f/episodes/f/fbac3197-157c-4228-94d4-eefbc03d7d9c/cover.jpg?v=1"/>
  <description>&lt;p&gt;In this episode of Tech Transforms, Carolyn Ford sits down with Dave Raley, Chief Digital Business Officer at Marine Corps Community Services, to unpack one of the most persistent challenges in federal IT: why innovation moves so slowly and how that can change.&lt;/p&gt;

&lt;p&gt;At the center of the conversation is Operation Stormbreaker, the Marine Corps’ only RAISE-certified software factory, designed to eliminate the inefficiencies that plague government technology deployment. Dave explains how agencies fall into a “maintenance trap,” where nearly 80% of IT budgets are consumed by legacy systems, leaving little room for modernization. The root issue, he argues, isn’t just technology, it’s architecture. By shifting from rebuilding infrastructure for every application to a shared platform-as-a-service model, Stormbreaker allows mission owners to inherit infrastructure, security, and authorization dramatically reducing both cost and complexity. &lt;/p&gt;

&lt;p&gt;The impact is significant. What once took 12–18 months to deploy can now be achieved in minutes through automated pipelines, containerized workloads, and continuous authorization. Rey breaks down how this model transforms the notoriously slow Authority to Operate (ATO) process, enabling faster innovation without sacrificing security. The discussion also highlights how this approach lowers barriers for vendors, accelerates adoption of emerging technologies like AI, and creates a more agile, production-focused culture within government.&lt;/p&gt;

&lt;p&gt;Beyond the technical architecture, the episode explores the cultural resistance to change across federal systems and the need to simplify complex cybersecurity processes for mission owners. Rey emphasizes that true modernization isn’t about new tools, it’s about rethinking how systems are built, secured, and delivered at scale.&lt;/p&gt;

&lt;p&gt;Show Notes:&lt;br&gt;
Dave Raley LinkedIn:  &lt;a href="https://www.linkedin.com/in/daveraley/" target="_blank" rel="nofollow noopener"&gt;https://www.linkedin.com/in/daveraley/&lt;/a&gt;&lt;br&gt;
Marine Corps Community Service:  &lt;a href="https://www.usmc-mccs.org/" target="_blank" rel="nofollow noopener"&gt;https://www.usmc-mccs.org/&lt;/a&gt;&lt;br&gt;
White Paper: Clarifying Cloud Foundations: Understanding PaaS vs. IaaS &lt;br&gt;
Operation StormBreaker: &lt;a href="https://operationstormbreaker.usmc-mccs.org/" target="_blank" rel="nofollow noopener"&gt;https://operationstormbreaker.usmc-mccs.org/&lt;/a&gt; &lt;/p&gt;
</description>
  <itunes:keywords>Federal IT modernization, Continuous Authorization, Zero Trust architecture</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>In this episode of Tech Transforms, Carolyn Ford sits down with Dave Raley, Chief Digital Business Officer at Marine Corps Community Services, to unpack one of the most persistent challenges in federal IT: why innovation moves so slowly and how that can change.</p>

<p>At the center of the conversation is Operation Stormbreaker, the Marine Corps’ only RAISE-certified software factory, designed to eliminate the inefficiencies that plague government technology deployment. Dave explains how agencies fall into a “maintenance trap,” where nearly 80% of IT budgets are consumed by legacy systems, leaving little room for modernization. The root issue, he argues, isn’t just technology, it’s architecture. By shifting from rebuilding infrastructure for every application to a shared platform-as-a-service model, Stormbreaker allows mission owners to inherit infrastructure, security, and authorization dramatically reducing both cost and complexity. </p>

<p>The impact is significant. What once took 12–18 months to deploy can now be achieved in minutes through automated pipelines, containerized workloads, and continuous authorization. Rey breaks down how this model transforms the notoriously slow Authority to Operate (ATO) process, enabling faster innovation without sacrificing security. The discussion also highlights how this approach lowers barriers for vendors, accelerates adoption of emerging technologies like AI, and creates a more agile, production-focused culture within government.</p>

<p>Beyond the technical architecture, the episode explores the cultural resistance to change across federal systems and the need to simplify complex cybersecurity processes for mission owners. Rey emphasizes that true modernization isn’t about new tools, it’s about rethinking how systems are built, secured, and delivered at scale.</p>

<p>Show Notes:<br>
Dave Raley LinkedIn:  <a href="https://www.linkedin.com/in/daveraley/" rel="nofollow">https://www.linkedin.com/in/daveraley/</a><br>
Marine Corps Community Service:  <a href="https://www.usmc-mccs.org/" rel="nofollow">https://www.usmc-mccs.org/</a><br>
White Paper: Clarifying Cloud Foundations: Understanding PaaS vs. IaaS <br>
Operation StormBreaker: <a href="https://operationstormbreaker.usmc-mccs.org/" rel="nofollow">https://operationstormbreaker.usmc-mccs.org/</a> </p>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>In this episode of Tech Transforms, Carolyn Ford sits down with Dave Raley, Chief Digital Business Officer at Marine Corps Community Services, to unpack one of the most persistent challenges in federal IT: why innovation moves so slowly and how that can change.</p>

<p>At the center of the conversation is Operation Stormbreaker, the Marine Corps’ only RAISE-certified software factory, designed to eliminate the inefficiencies that plague government technology deployment. Dave explains how agencies fall into a “maintenance trap,” where nearly 80% of IT budgets are consumed by legacy systems, leaving little room for modernization. The root issue, he argues, isn’t just technology, it’s architecture. By shifting from rebuilding infrastructure for every application to a shared platform-as-a-service model, Stormbreaker allows mission owners to inherit infrastructure, security, and authorization dramatically reducing both cost and complexity. </p>

<p>The impact is significant. What once took 12–18 months to deploy can now be achieved in minutes through automated pipelines, containerized workloads, and continuous authorization. Rey breaks down how this model transforms the notoriously slow Authority to Operate (ATO) process, enabling faster innovation without sacrificing security. The discussion also highlights how this approach lowers barriers for vendors, accelerates adoption of emerging technologies like AI, and creates a more agile, production-focused culture within government.</p>

<p>Beyond the technical architecture, the episode explores the cultural resistance to change across federal systems and the need to simplify complex cybersecurity processes for mission owners. Rey emphasizes that true modernization isn’t about new tools, it’s about rethinking how systems are built, secured, and delivered at scale.</p>

<p>Show Notes:<br>
Dave Raley LinkedIn:  <a href="https://www.linkedin.com/in/daveraley/" rel="nofollow">https://www.linkedin.com/in/daveraley/</a><br>
Marine Corps Community Service:  <a href="https://www.usmc-mccs.org/" rel="nofollow">https://www.usmc-mccs.org/</a><br>
White Paper: Clarifying Cloud Foundations: Understanding PaaS vs. IaaS <br>
Operation StormBreaker: <a href="https://operationstormbreaker.usmc-mccs.org/" rel="nofollow">https://operationstormbreaker.usmc-mccs.org/</a> </p>]]>
  </itunes:summary>
</item>
<item>
  <title>Episode 116: So What Returns.....Can the Pentagon Really Boil the Ocean?</title>
  <link>https://techtransforms.fireside.fm/116</link>
  <guid isPermaLink="false">9ea4f6bf-1da6-447e-9306-369116ad2876</guid>
  <pubDate>Tue, 17 Feb 2026 09:30:00 -0500</pubDate>
  <author>Carolyn Ford</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/81d9d6b0-0045-48da-8495-fd87c4613d7f/9ea4f6bf-1da6-447e-9306-369116ad2876.mp3" length="56251592" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>Carolyn Ford</itunes:author>
  <itunes:subtitle>The Pentagon is consolidating R&amp;D, AI, and data under a single CTO and it could reshape how defense innovation moves from research to real-world deployment. In this episode of Tech Transforms, Carolyn Ford and Tracy Bannon break down what this shift actually means beyond the org chart. They explore secure GenAI rollout, data ownership challenges, and the cultural friction that could determine success. If you’re watching the future of AI in national security, this conversation is worth a listen.</itunes:subtitle>
  <itunes:duration>46:48</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/8/81d9d6b0-0045-48da-8495-fd87c4613d7f/episodes/9/9ea4f6bf-1da6-447e-9306-369116ad2876/cover.jpg?v=1"/>
  <description>&lt;p&gt;n this return episode of So What? on Tech Transforms, host Carolyn Ford reconnects with co-host Tracy Bannon to unpack one of the most significant structural shifts happening inside the Pentagon: the consolidation of R&amp;amp;D, AI, and data organizations under a single Chief Technology Officer. On paper, it looks like bureaucratic reorganization. In practice, it could redefine how innovation moves from research to battlefield deployment.&lt;/p&gt;

&lt;p&gt;Tracy, who regularly briefs at the Pentagon, explains why this move is less about reshuffling boxes on an org chart and more about breaking down long-standing silos between research, prototyping, operational deployment, and data governance. By bringing organizations into tighter alignment, the goal is parallel execution with shared visibility, faster momentum without sacrificing mission integrity. But speed brings risk. Cultural friction between research environments (where failure is tolerated) and operational environments (where failure carries consequences) could become the real test of whether this consolidation succeeds.&lt;/p&gt;

&lt;p&gt;Rather than leaving AI adoption to fragmented pilot programs or shadow experimentation, leadership is pushing controlled, enterprise-scale access. Carolyn and Tracy explore why offering multiple models matters strategically, how secure infrastructure is already in place to support it, and what it means when leadership says, “Use it—prove you can’t.”&lt;br&gt;
They also examine the restructuring of Advana, the Pentagon’s enterprise data platform, and what its breakup signals about data ownership, governance, and the ongoing battle between centralized visibility and cultural resistance. The real friction point, Tracy argues, isn’t technology, it’s data stewardship, policy alignment, and whether organizations are willing to move from “my system, my risk” to shared mission accountability.&lt;/p&gt;

&lt;p&gt;Throughout the episode, they return to the central question of the series: So what actually changes? They outline the signals they’ll be watching over the next three months, speed of adoption, policy adaptation, cross-organizational collaboration, and whether cultural barriers soften or harden under pressure.&lt;/p&gt;

&lt;p&gt;This is a conversation for leaders navigating large-scale transformation, those wrestling with how to accelerate innovation without losing control, and how to align people, process, and technology when the mission demands both speed and accountability.&lt;/p&gt;

&lt;p&gt;Show Notes:&lt;br&gt;
LinkedIn: &lt;a href="https://www.linkedin.com/in/Tracyylbannon/" target="_blank" rel="nofollow noopener"&gt;https://www.linkedin.com/in/Tracyylbannon/&lt;/a&gt;&lt;br&gt;
E-mail:  &lt;a href="mailto:Trac@Tracybannon.tech" target="_blank" rel="nofollow noopener"&gt;Trac@Tracybannon.tech&lt;/a&gt; &lt;br&gt;
Website:  &lt;a href="https://Tracybannon.tech/" target="_blank" rel="nofollow noopener"&gt;https://Tracybannon.tech/&lt;/a&gt;&lt;br&gt;
Breaking Defense: Pentagon Reforms R&amp;amp;D and AI- &lt;a href="https://breakingdefense.com/2026/01/pentagon-rolls-out-major-reforms-of-rd-ai/" target="_blank" rel="nofollow noopener"&gt;https://breakingdefense.com/2026/01/pentagon-rolls-out-major-reforms-of-rd-ai/&lt;/a&gt;&lt;br&gt;
Tracy Bannon Blog: &lt;a href="https://straighttalk4gov.org/" target="_blank" rel="nofollow noopener"&gt;https://straighttalk4gov.org/&lt;/a&gt; &lt;br&gt;
GenAI.mil Info: &lt;a href="https://www.war.gov/News/Releases/Release/Article/4354916/the-war-department-unleashes-ai-on-new-genaimil-platform/" target="_blank" rel="nofollow noopener"&gt;https://www.war.gov/News/Releases/Release/Article/4354916/the-war-department-unleashes-ai-on-new-genaimil-platform/&lt;/a&gt;&lt;br&gt;
Advana background: &lt;a href="https://www.ai.mil/Initiatives/Analytic-Tools/" target="_blank" rel="nofollow noopener"&gt;https://www.ai.mil/Initiatives/Analytic-Tools/&lt;/a&gt;&lt;br&gt;
Moltbook:  &lt;a href="https://www.moltbook.com/" target="_blank" rel="nofollow noopener"&gt;https://www.moltbook.com/&lt;/a&gt;&lt;/p&gt;
</description>
  <itunes:keywords>pentagon, R&amp;D, AI, Defense, research, battle field deployment</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>n this return episode of So What? on Tech Transforms, host Carolyn Ford reconnects with co-host Tracy Bannon to unpack one of the most significant structural shifts happening inside the Pentagon: the consolidation of R&amp;D, AI, and data organizations under a single Chief Technology Officer. On paper, it looks like bureaucratic reorganization. In practice, it could redefine how innovation moves from research to battlefield deployment.</p>

<p>Tracy, who regularly briefs at the Pentagon, explains why this move is less about reshuffling boxes on an org chart and more about breaking down long-standing silos between research, prototyping, operational deployment, and data governance. By bringing organizations into tighter alignment, the goal is parallel execution with shared visibility, faster momentum without sacrificing mission integrity. But speed brings risk. Cultural friction between research environments (where failure is tolerated) and operational environments (where failure carries consequences) could become the real test of whether this consolidation succeeds.</p>

<p>Rather than leaving AI adoption to fragmented pilot programs or shadow experimentation, leadership is pushing controlled, enterprise-scale access. Carolyn and Tracy explore why offering multiple models matters strategically, how secure infrastructure is already in place to support it, and what it means when leadership says, “Use it—prove you can’t.”<br>
They also examine the restructuring of Advana, the Pentagon’s enterprise data platform, and what its breakup signals about data ownership, governance, and the ongoing battle between centralized visibility and cultural resistance. The real friction point, Tracy argues, isn’t technology, it’s data stewardship, policy alignment, and whether organizations are willing to move from “my system, my risk” to shared mission accountability.</p>

<p>Throughout the episode, they return to the central question of the series: So what actually changes? They outline the signals they’ll be watching over the next three months, speed of adoption, policy adaptation, cross-organizational collaboration, and whether cultural barriers soften or harden under pressure.</p>

<p>This is a conversation for leaders navigating large-scale transformation, those wrestling with how to accelerate innovation without losing control, and how to align people, process, and technology when the mission demands both speed and accountability.</p>

<p>Show Notes:<br>
LinkedIn: <a href="https://www.linkedin.com/in/Tracyylbannon/" rel="nofollow">https://www.linkedin.com/in/Tracyylbannon/</a><br>
E-mail:  <a href="mailto:Trac@Tracybannon.tech" rel="nofollow">Trac@Tracybannon.tech</a> <br>
Website:  <a href="https://Tracybannon.tech/" rel="nofollow">https://Tracybannon.tech/</a><br>
Breaking Defense: Pentagon Reforms R&amp;D and AI- <a href="https://breakingdefense.com/2026/01/pentagon-rolls-out-major-reforms-of-rd-ai/" rel="nofollow">https://breakingdefense.com/2026/01/pentagon-rolls-out-major-reforms-of-rd-ai/</a><br>
Tracy Bannon Blog: <a href="https://straighttalk4gov.org/" rel="nofollow">https://straighttalk4gov.org/</a> <br>
GenAI.mil Info: <a href="https://www.war.gov/News/Releases/Release/Article/4354916/the-war-department-unleashes-ai-on-new-genaimil-platform/" rel="nofollow">https://www.war.gov/News/Releases/Release/Article/4354916/the-war-department-unleashes-ai-on-new-genaimil-platform/</a><br>
Advana background: <a href="https://www.ai.mil/Initiatives/Analytic-Tools/" rel="nofollow">https://www.ai.mil/Initiatives/Analytic-Tools/</a><br>
Moltbook:  <a href="https://www.moltbook.com/" rel="nofollow">https://www.moltbook.com/</a></p>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>n this return episode of So What? on Tech Transforms, host Carolyn Ford reconnects with co-host Tracy Bannon to unpack one of the most significant structural shifts happening inside the Pentagon: the consolidation of R&amp;D, AI, and data organizations under a single Chief Technology Officer. On paper, it looks like bureaucratic reorganization. In practice, it could redefine how innovation moves from research to battlefield deployment.</p>

<p>Tracy, who regularly briefs at the Pentagon, explains why this move is less about reshuffling boxes on an org chart and more about breaking down long-standing silos between research, prototyping, operational deployment, and data governance. By bringing organizations into tighter alignment, the goal is parallel execution with shared visibility, faster momentum without sacrificing mission integrity. But speed brings risk. Cultural friction between research environments (where failure is tolerated) and operational environments (where failure carries consequences) could become the real test of whether this consolidation succeeds.</p>

<p>Rather than leaving AI adoption to fragmented pilot programs or shadow experimentation, leadership is pushing controlled, enterprise-scale access. Carolyn and Tracy explore why offering multiple models matters strategically, how secure infrastructure is already in place to support it, and what it means when leadership says, “Use it—prove you can’t.”<br>
They also examine the restructuring of Advana, the Pentagon’s enterprise data platform, and what its breakup signals about data ownership, governance, and the ongoing battle between centralized visibility and cultural resistance. The real friction point, Tracy argues, isn’t technology, it’s data stewardship, policy alignment, and whether organizations are willing to move from “my system, my risk” to shared mission accountability.</p>

<p>Throughout the episode, they return to the central question of the series: So what actually changes? They outline the signals they’ll be watching over the next three months, speed of adoption, policy adaptation, cross-organizational collaboration, and whether cultural barriers soften or harden under pressure.</p>

<p>This is a conversation for leaders navigating large-scale transformation, those wrestling with how to accelerate innovation without losing control, and how to align people, process, and technology when the mission demands both speed and accountability.</p>

<p>Show Notes:<br>
LinkedIn: <a href="https://www.linkedin.com/in/Tracyylbannon/" rel="nofollow">https://www.linkedin.com/in/Tracyylbannon/</a><br>
E-mail:  <a href="mailto:Trac@Tracybannon.tech" rel="nofollow">Trac@Tracybannon.tech</a> <br>
Website:  <a href="https://Tracybannon.tech/" rel="nofollow">https://Tracybannon.tech/</a><br>
Breaking Defense: Pentagon Reforms R&amp;D and AI- <a href="https://breakingdefense.com/2026/01/pentagon-rolls-out-major-reforms-of-rd-ai/" rel="nofollow">https://breakingdefense.com/2026/01/pentagon-rolls-out-major-reforms-of-rd-ai/</a><br>
Tracy Bannon Blog: <a href="https://straighttalk4gov.org/" rel="nofollow">https://straighttalk4gov.org/</a> <br>
GenAI.mil Info: <a href="https://www.war.gov/News/Releases/Release/Article/4354916/the-war-department-unleashes-ai-on-new-genaimil-platform/" rel="nofollow">https://www.war.gov/News/Releases/Release/Article/4354916/the-war-department-unleashes-ai-on-new-genaimil-platform/</a><br>
Advana background: <a href="https://www.ai.mil/Initiatives/Analytic-Tools/" rel="nofollow">https://www.ai.mil/Initiatives/Analytic-Tools/</a><br>
Moltbook:  <a href="https://www.moltbook.com/" rel="nofollow">https://www.moltbook.com/</a></p>]]>
  </itunes:summary>
</item>
<item>
  <title>Episode 115: The Uncle Rufus Problem: Fixing Cyber’s Weakest Links Before It’s Too Late</title>
  <link>https://techtransforms.fireside.fm/115</link>
  <guid isPermaLink="false">f18ce239-f021-45e3-978b-feceb71439e4</guid>
  <pubDate>Tue, 20 Jan 2026 09:45:00 -0500</pubDate>
  <author>Carolyn Ford</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/81d9d6b0-0045-48da-8495-fd87c4613d7f/f18ce239-f021-45e3-978b-feceb71439e4.mp3" length="22990392" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>Carolyn Ford</itunes:author>
  <itunes:subtitle>Retired Rear Admiral Mark Montgomery joins Tech Transforms to unpack why military mobility and civilian critical infrastructure may be the most overlooked cybersecurity risks facing the U.S. today. From “Uncle Rufus’s rail switch” to cyber insurance gaps and the case for a dedicated Cyber Force, the conversation explores why resilience must be built before a crisis—not after.</itunes:subtitle>
  <itunes:duration>51:52</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/8/81d9d6b0-0045-48da-8495-fd87c4613d7f/episodes/f/f18ce239-f021-45e3-978b-feceb71439e4/cover.jpg?v=1"/>
  <description>&lt;p&gt;Retired Rear Admiral Mark Montgomery joins Tech Transforms for a blunt, practical look at the cyber risks the U.S. keeps underestimating—and why “Uncle Rufus’s rail switch” may be the weak link that matters most. Montgomery breaks down military mobility as a national security problem hiding in plain sight: once equipment leaves the secure “Noah’s Ark” of a base and hits rural rail networks and switching systems, it enters a “Mad Max” environment with limited redundancy, limited cyber expertise, and huge strategic consequences.&lt;/p&gt;

&lt;p&gt;From there, the conversation moves into what it would take to fix the problem before a crisis: recurring federal assessments, targeted grant programs for smaller operators, and the messy reality of congressional jurisdiction that slows action. Montgomery also makes the case for a dedicated Cyber Force—arguing the current “force generation” model across military branches can’t recruit, train, and retain cyber talent at the scale needed.&lt;/p&gt;

&lt;p&gt;Finally, the episode tackles the cyber insurance market: why organizations are underinsured, why risk is hard to price, and why the most promising models pair insurance with real assessments, remediation, and recurring validation. Montgomery closes with updates on Cyberspace Solarium 2.0 progress, what’s stalled, what’s “backsliding,” and what measurable wins still matter—plus a rapid-fire “Tech Talk” round that includes Batman, battleships, and top-down cyber hygiene.&lt;/p&gt;

&lt;p&gt;Show Notes:&lt;br&gt;
Foundation for Defense of Democracies - fdd.org&lt;br&gt;
LinkedIn: &lt;a href="https://www.linkedin.com/in/mark-montgomery-b8932810/" target="_blank" rel="nofollow noopener"&gt;https://www.linkedin.com/in/mark-montgomery-b8932810/&lt;/a&gt;&lt;br&gt;
Twitter:   @MarkCMontgomergy&lt;br&gt;
Cyber Insurance Reform Op-Ed: &lt;a href="https://cyberscoop.com/congress-cyber-insurance-reform-op-ed" target="_blank" rel="nofollow noopener"&gt;https://cyberscoop.com/congress-cyber-insurance-reform-op-ed&lt;/a&gt;&lt;br&gt;
Cyberspace Solarium Commission Reports: &lt;a href="https://cybersolarium.org" target="_blank" rel="nofollow noopener"&gt;https://cybersolarium.org&lt;/a&gt;&lt;/p&gt;
</description>
  <itunes:keywords>tech transforms, defense, cyber insurance</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>Retired Rear Admiral Mark Montgomery joins Tech Transforms for a blunt, practical look at the cyber risks the U.S. keeps underestimating—and why “Uncle Rufus’s rail switch” may be the weak link that matters most. Montgomery breaks down military mobility as a national security problem hiding in plain sight: once equipment leaves the secure “Noah’s Ark” of a base and hits rural rail networks and switching systems, it enters a “Mad Max” environment with limited redundancy, limited cyber expertise, and huge strategic consequences.</p>

<p>From there, the conversation moves into what it would take to fix the problem before a crisis: recurring federal assessments, targeted grant programs for smaller operators, and the messy reality of congressional jurisdiction that slows action. Montgomery also makes the case for a dedicated Cyber Force—arguing the current “force generation” model across military branches can’t recruit, train, and retain cyber talent at the scale needed.</p>

<p>Finally, the episode tackles the cyber insurance market: why organizations are underinsured, why risk is hard to price, and why the most promising models pair insurance with real assessments, remediation, and recurring validation. Montgomery closes with updates on Cyberspace Solarium 2.0 progress, what’s stalled, what’s “backsliding,” and what measurable wins still matter—plus a rapid-fire “Tech Talk” round that includes Batman, battleships, and top-down cyber hygiene.</p>

<p>Show Notes:<br>
Foundation for Defense of Democracies - fdd.org<br>
LinkedIn: <a href="https://www.linkedin.com/in/mark-montgomery-b8932810/" rel="nofollow">https://www.linkedin.com/in/mark-montgomery-b8932810/</a><br>
Twitter:   @MarkCMontgomergy<br>
Cyber Insurance Reform Op-Ed: <a href="https://cyberscoop.com/congress-cyber-insurance-reform-op-ed" rel="nofollow">https://cyberscoop.com/congress-cyber-insurance-reform-op-ed</a><br>
Cyberspace Solarium Commission Reports: <a href="https://cybersolarium.org" rel="nofollow">https://cybersolarium.org</a></p>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>Retired Rear Admiral Mark Montgomery joins Tech Transforms for a blunt, practical look at the cyber risks the U.S. keeps underestimating—and why “Uncle Rufus’s rail switch” may be the weak link that matters most. Montgomery breaks down military mobility as a national security problem hiding in plain sight: once equipment leaves the secure “Noah’s Ark” of a base and hits rural rail networks and switching systems, it enters a “Mad Max” environment with limited redundancy, limited cyber expertise, and huge strategic consequences.</p>

<p>From there, the conversation moves into what it would take to fix the problem before a crisis: recurring federal assessments, targeted grant programs for smaller operators, and the messy reality of congressional jurisdiction that slows action. Montgomery also makes the case for a dedicated Cyber Force—arguing the current “force generation” model across military branches can’t recruit, train, and retain cyber talent at the scale needed.</p>

<p>Finally, the episode tackles the cyber insurance market: why organizations are underinsured, why risk is hard to price, and why the most promising models pair insurance with real assessments, remediation, and recurring validation. Montgomery closes with updates on Cyberspace Solarium 2.0 progress, what’s stalled, what’s “backsliding,” and what measurable wins still matter—plus a rapid-fire “Tech Talk” round that includes Batman, battleships, and top-down cyber hygiene.</p>

<p>Show Notes:<br>
Foundation for Defense of Democracies - fdd.org<br>
LinkedIn: <a href="https://www.linkedin.com/in/mark-montgomery-b8932810/" rel="nofollow">https://www.linkedin.com/in/mark-montgomery-b8932810/</a><br>
Twitter:   @MarkCMontgomergy<br>
Cyber Insurance Reform Op-Ed: <a href="https://cyberscoop.com/congress-cyber-insurance-reform-op-ed" rel="nofollow">https://cyberscoop.com/congress-cyber-insurance-reform-op-ed</a><br>
Cyberspace Solarium Commission Reports: <a href="https://cybersolarium.org" rel="nofollow">https://cybersolarium.org</a></p>]]>
  </itunes:summary>
</item>
<item>
  <title>Episode 112: Tech Transforms – Live from the Owl Evolution Summit</title>
  <link>https://techtransforms.fireside.fm/112</link>
  <guid isPermaLink="false">507649cd-f89f-409e-99d2-982d12106868</guid>
  <pubDate>Fri, 26 Dec 2025 11:00:00 -0500</pubDate>
  <author>Carolyn Ford</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/81d9d6b0-0045-48da-8495-fd87c4613d7f/507649cd-f89f-409e-99d2-982d12106868.mp3" length="37582180" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>Carolyn Ford</itunes:author>
  <itunes:subtitle></itunes:subtitle>
  <itunes:duration>26:05</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/8/81d9d6b0-0045-48da-8495-fd87c4613d7f/cover.jpg?v=3"/>
  <description>&lt;p&gt;Tech Transforms went live in front of an in-person audience (and simultaneously on the virtual platform and LinkedIn Live) for a special episode featuring Steve Stratton, retired Green Beret, former White House and Secret Service professional, and award-winning author of Skip Jack (included in attendees’ welcome package).&lt;/p&gt;

&lt;p&gt;The conversation explored why storytelling beats “speeds and feeds” when it comes to helping leaders and teams understand technology, remember what matters under pressure, and create real decision advantage. Steve explains how story creates emotional connection, strengthens recall, and gives context that data sheets can’t. Together, the hosts dig into the OODA loop, using a visceral film clip from We Were Soldiers to illustrate what decision-making looks like in chaos—then fast-forward to the near-future battlefield described in Skip Jack, where leaders are overwhelmed by sensors, AI, intel feeds, and massive data volume.&lt;/p&gt;

&lt;p&gt;A highlight is the reading from Chapter Five, where the commander describes mining high-threat networks and the dark web, relying on data diodes to stop malicious payloads hidden in media files, and pushing decisions to the point of information to speed response in a “nonkinetic war… at the speed of the internet.” &lt;/p&gt;

&lt;p&gt;The episode closes with rapid-fire “Tech Talk” questions—night vision tech, dream casting for Nicky Fury, and fictional worlds worth visiting—before the live audience transitions into the event’s first mission brief. &lt;/p&gt;
</description>
  <itunes:keywords>techtransforms, decision advantage, evolution summit, OODA Loop</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>Tech Transforms went live in front of an in-person audience (and simultaneously on the virtual platform and LinkedIn Live) for a special episode featuring Steve Stratton, retired Green Beret, former White House and Secret Service professional, and award-winning author of Skip Jack (included in attendees’ welcome package).</p>

<p>The conversation explored why storytelling beats “speeds and feeds” when it comes to helping leaders and teams understand technology, remember what matters under pressure, and create real decision advantage. Steve explains how story creates emotional connection, strengthens recall, and gives context that data sheets can’t. Together, the hosts dig into the OODA loop, using a visceral film clip from We Were Soldiers to illustrate what decision-making looks like in chaos—then fast-forward to the near-future battlefield described in Skip Jack, where leaders are overwhelmed by sensors, AI, intel feeds, and massive data volume.</p>

<p>A highlight is the reading from Chapter Five, where the commander describes mining high-threat networks and the dark web, relying on data diodes to stop malicious payloads hidden in media files, and pushing decisions to the point of information to speed response in a “nonkinetic war… at the speed of the internet.” </p>

<p>The episode closes with rapid-fire “Tech Talk” questions—night vision tech, dream casting for Nicky Fury, and fictional worlds worth visiting—before the live audience transitions into the event’s first mission brief.</p>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>Tech Transforms went live in front of an in-person audience (and simultaneously on the virtual platform and LinkedIn Live) for a special episode featuring Steve Stratton, retired Green Beret, former White House and Secret Service professional, and award-winning author of Skip Jack (included in attendees’ welcome package).</p>

<p>The conversation explored why storytelling beats “speeds and feeds” when it comes to helping leaders and teams understand technology, remember what matters under pressure, and create real decision advantage. Steve explains how story creates emotional connection, strengthens recall, and gives context that data sheets can’t. Together, the hosts dig into the OODA loop, using a visceral film clip from We Were Soldiers to illustrate what decision-making looks like in chaos—then fast-forward to the near-future battlefield described in Skip Jack, where leaders are overwhelmed by sensors, AI, intel feeds, and massive data volume.</p>

<p>A highlight is the reading from Chapter Five, where the commander describes mining high-threat networks and the dark web, relying on data diodes to stop malicious payloads hidden in media files, and pushing decisions to the point of information to speed response in a “nonkinetic war… at the speed of the internet.” </p>

<p>The episode closes with rapid-fire “Tech Talk” questions—night vision tech, dream casting for Nicky Fury, and fictional worlds worth visiting—before the live audience transitions into the event’s first mission brief.</p>]]>
  </itunes:summary>
</item>
<item>
  <title>Episode 106: Influence, Intel, and Insider Threats: The Human Side of Cyber Risk</title>
  <link>https://techtransforms.fireside.fm/106</link>
  <guid isPermaLink="false">57e49927-13a1-44c7-aa88-6313fd98b782</guid>
  <pubDate>Wed, 24 Sep 2025 10:45:00 -0400</pubDate>
  <author>Carolyn Ford</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/81d9d6b0-0045-48da-8495-fd87c4613d7f/57e49927-13a1-44c7-aa88-6313fd98b782.mp3" length="46725564" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>Carolyn Ford</itunes:author>
  <itunes:subtitle>Host Carolyn Ford interviews Julie Laurin, Cyber Threat Intelligence Consultant with the Mining &amp; Metals ISAC, on the evolving landscape of cybersecurity. They unpack social engineering tactics like the ClickFix malware, the overlooked risks in critical infrastructure, and the geopolitical stakes of mining and minerals. Julie also shares candid perspectives on women in tech leadership, the strengths of neurodiverse professionals, and why empathy is essential in today’s digital age. A thought-provoking conversation at the intersection of technology, security, and human behavior.</itunes:subtitle>
  <itunes:duration>37:56</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/8/81d9d6b0-0045-48da-8495-fd87c4613d7f/episodes/5/57e49927-13a1-44c7-aa88-6313fd98b782/cover.jpg?v=2"/>
  <description>&lt;p&gt;In this episode, host Carolyn Ford sits down with Julie Laurin, a cyber threat intelligence consultant with the Mining and Metals ISAC. Julie brings two decades of expertise in software, a sharp eye for overlooked risks, and a deep curiosity about the intersection of humans and technology. Together, they explore the evolving landscape of cyber threats, from social engineering tactics like the Clickfix malware to the critical role of human behavior in cybersecurity.&lt;/p&gt;

&lt;p&gt;Julie shares fascinating insights into the vulnerabilities of critical infrastructure, the geopolitical implications of mining and minerals, and the challenges of navigating leadership as a woman in tech. They also dive into the neurodiverse superpowers that thrive in the fast-paced world of cybersecurity and the importance of empathy in the digital age.&lt;/p&gt;

&lt;p&gt;With humor, candor, and thought-provoking anecdotes, this episode will leave you rethinking the way we approach technology, security, and the human element. Tune in for a conversation that’s equal parts enlightening and entertaining. Stay curious and keep imagining the future!&lt;/p&gt;

&lt;p&gt;Summary Notes&lt;br&gt;
Julie’s LinkedIn Profile:   &lt;a href="https://www.linkedin.com/in/jlaurin/" target="_blank" rel="nofollow noopener"&gt;https://www.linkedin.com/in/jlaurin/&lt;/a&gt;&lt;br&gt;
Mining and Metals ISAC - &lt;a href="https://mmisac.org/" target="_blank" rel="nofollow noopener"&gt;https://mmisac.org/&lt;/a&gt;&lt;br&gt;
ClickFix Analysis - &lt;a href="https://www.microsoft.com/en-us/security/blog/2025/08/21/think-before-you-clickfix-analyzing-the-clickfix-social-engineering-technique/" target="_blank" rel="nofollow noopener"&gt;https://www.microsoft.com/en-us/security/blog/2025/08/21/think-before-you-clickfix-analyzing-the-clickfix-social-engineering-technique/&lt;/a&gt;&lt;br&gt;
ISO/IEC 27001 - &lt;a href="https://www.iso.org/standard/27001" target="_blank" rel="nofollow noopener"&gt;https://www.iso.org/standard/27001&lt;/a&gt;&lt;/p&gt;
</description>
  <itunes:keywords>cyber, critical infrastructure, cybersecurity, cyber defense</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>In this episode, host Carolyn Ford sits down with Julie Laurin, a cyber threat intelligence consultant with the Mining and Metals ISAC. Julie brings two decades of expertise in software, a sharp eye for overlooked risks, and a deep curiosity about the intersection of humans and technology. Together, they explore the evolving landscape of cyber threats, from social engineering tactics like the Clickfix malware to the critical role of human behavior in cybersecurity.</p>

<p>Julie shares fascinating insights into the vulnerabilities of critical infrastructure, the geopolitical implications of mining and minerals, and the challenges of navigating leadership as a woman in tech. They also dive into the neurodiverse superpowers that thrive in the fast-paced world of cybersecurity and the importance of empathy in the digital age.</p>

<p>With humor, candor, and thought-provoking anecdotes, this episode will leave you rethinking the way we approach technology, security, and the human element. Tune in for a conversation that’s equal parts enlightening and entertaining. Stay curious and keep imagining the future!</p>

<p>Summary Notes<br>
Julie’s LinkedIn Profile:   <a href="https://www.linkedin.com/in/jlaurin/" rel="nofollow">https://www.linkedin.com/in/jlaurin/</a><br>
Mining and Metals ISAC - <a href="https://mmisac.org/" rel="nofollow">https://mmisac.org/</a><br>
ClickFix Analysis - <a href="https://www.microsoft.com/en-us/security/blog/2025/08/21/think-before-you-clickfix-analyzing-the-clickfix-social-engineering-technique/" rel="nofollow">https://www.microsoft.com/en-us/security/blog/2025/08/21/think-before-you-clickfix-analyzing-the-clickfix-social-engineering-technique/</a><br>
ISO/IEC 27001 - <a href="https://www.iso.org/standard/27001" rel="nofollow">https://www.iso.org/standard/27001</a></p>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>In this episode, host Carolyn Ford sits down with Julie Laurin, a cyber threat intelligence consultant with the Mining and Metals ISAC. Julie brings two decades of expertise in software, a sharp eye for overlooked risks, and a deep curiosity about the intersection of humans and technology. Together, they explore the evolving landscape of cyber threats, from social engineering tactics like the Clickfix malware to the critical role of human behavior in cybersecurity.</p>

<p>Julie shares fascinating insights into the vulnerabilities of critical infrastructure, the geopolitical implications of mining and minerals, and the challenges of navigating leadership as a woman in tech. They also dive into the neurodiverse superpowers that thrive in the fast-paced world of cybersecurity and the importance of empathy in the digital age.</p>

<p>With humor, candor, and thought-provoking anecdotes, this episode will leave you rethinking the way we approach technology, security, and the human element. Tune in for a conversation that’s equal parts enlightening and entertaining. Stay curious and keep imagining the future!</p>

<p>Summary Notes<br>
Julie’s LinkedIn Profile:   <a href="https://www.linkedin.com/in/jlaurin/" rel="nofollow">https://www.linkedin.com/in/jlaurin/</a><br>
Mining and Metals ISAC - <a href="https://mmisac.org/" rel="nofollow">https://mmisac.org/</a><br>
ClickFix Analysis - <a href="https://www.microsoft.com/en-us/security/blog/2025/08/21/think-before-you-clickfix-analyzing-the-clickfix-social-engineering-technique/" rel="nofollow">https://www.microsoft.com/en-us/security/blog/2025/08/21/think-before-you-clickfix-analyzing-the-clickfix-social-engineering-technique/</a><br>
ISO/IEC 27001 - <a href="https://www.iso.org/standard/27001" rel="nofollow">https://www.iso.org/standard/27001</a></p>]]>
  </itunes:summary>
</item>
<item>
  <title>Episode 105: From Compliance to Capability: Securing the Federal Software Supply Chain in the Age of AI</title>
  <link>https://techtransforms.fireside.fm/105</link>
  <guid isPermaLink="false">b78757c1-8167-4e0d-8921-afe3fa00ca3b</guid>
  <pubDate>Tue, 09 Sep 2025 10:30:00 -0400</pubDate>
  <author>Carolyn Ford</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/81d9d6b0-0045-48da-8495-fd87c4613d7f/b78757c1-8167-4e0d-8921-afe3fa00ca3b.mp3" length="49888610" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>Carolyn Ford</itunes:author>
  <itunes:subtitle>On this episode of Tech Transforms, host Carolyn Ford welcomes Antoine Harden, Regional VP of Federal at Sonatype, to unpack one of the most urgent challenges in federal cybersecurity.</itunes:subtitle>
  <itunes:duration>40:57</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/8/81d9d6b0-0045-48da-8495-fd87c4613d7f/episodes/b/b78757c1-8167-4e0d-8921-afe3fa00ca3b/cover.jpg?v=1"/>
  <description>&lt;p&gt;On this episode of Tech Transforms, host Carolyn Ford welcomes Antoine Harden, Regional VP of Federal at Sonatype, to unpack one of the most urgent challenges in federal cybersecurity: securing the software supply chain. With more than 25 years of experience at Oracle, Google, and now Sonatype, Antoine shares why software supply chain risks from SolarWinds to Log4j have pushed SBOMs (Software Bills of Materials) and continuous monitoring into the spotlight.&lt;/p&gt;

&lt;p&gt;Together, they break down what SBOMs are (think nutrition labels for software), how mandates like Executive Order 14028 and frameworks like NIST’s Secure Software Development Framework (SSDF) and DoD’s SWFT are changing the compliance landscape, and why automation is essential to get from static ATOs to continuous authorization.&lt;/p&gt;

&lt;p&gt;Antoine also explains how Sonatype uses AI and software composition analysis tools to close critical gaps in open source and AI-heavy environments, helping agencies shift left, reduce vulnerabilities, and accelerate secure delivery of mission-critical systems. Along the way, the conversation covers everything from JFK delays caused by vulnerabilities, to the risks of “ludicrous speed” AI adoption, to the surprising history of Project Pigeon in WWII.&lt;/p&gt;

&lt;p&gt;For federal leaders ready to take action, Antoine offers one concrete step: start with a single mission-critical application, mandate an SBOM, and see what hidden risks you uncover.&lt;/p&gt;

&lt;p&gt;Show Notes:&lt;br&gt;
Connect with Antoine  &lt;a href="https://www.linkedin.com/in/antoine-harden-mba-035a441/" target="_blank" rel="nofollow noopener"&gt;https://www.linkedin.com/in/antoine-harden-mba-035a441/&lt;/a&gt; &lt;br&gt;
&lt;a href="https://www.federalregister.gov/documents/2021/05/17/2021-10460/improving-the-nations-cybersecurity" target="_blank" rel="nofollow noopener"&gt;Executive Order 14028&lt;/a&gt;&lt;a href="https://nvlpubs.nist.gov/nistpubs/specialpublications/nist.sp.800-218.pdf" target="_blank" rel="nofollow noopener"&gt;NIST Secure Software Development Framework (SSDF)&lt;/a&gt;&lt;br&gt;
&lt;a href="https://www.cisa.gov/zero-trust-maturity-model" target="_blank" rel="nofollow noopener"&gt;CISA Zero Trust Maturity Model&lt;/a&gt;&lt;br&gt;
&lt;a href="https://www.defense.gov/News/Releases/Release/Article/4174350/software-fast-track-initiative/" target="_blank" rel="nofollow noopener"&gt;DoD’s SWFT (Software Fast Track Initiative) &lt;/a&gt;&lt;br&gt;
&lt;a href="https://www.sonatype.com/resources?_gl=1*1jtfn7r*_up*MQ..*_ga*Mzc1ODU4NTM3LjE3NTYzMTc3NTc.*_ga_3W70E95Z6Q*czE3NTYzMTc3NTUkbzEkZzAkdDE3NTYzMTc3NTUkajYwJGwwJGgw*_ga_2TMM6KZPXQ*czE3NTYzMTc3NTUkbzEkZzAkdDE3NTYzMTc3NTUkajYwJGwwJGgw*_ga_08HT33J01V*czE3NTYzMTc3NTUkbzEkZzAkdDE3NTYzMTc3NTUkajYwJGwwJGgw" target="_blank" rel="nofollow noopener"&gt;Sonatype Resource Center&lt;/a&gt; &lt;/p&gt;
</description>
  <itunes:keywords>SBOM, Software Supply Chain, Compliance, AI</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>On this episode of Tech Transforms, host Carolyn Ford welcomes Antoine Harden, Regional VP of Federal at Sonatype, to unpack one of the most urgent challenges in federal cybersecurity: securing the software supply chain. With more than 25 years of experience at Oracle, Google, and now Sonatype, Antoine shares why software supply chain risks from SolarWinds to Log4j have pushed SBOMs (Software Bills of Materials) and continuous monitoring into the spotlight.</p>

<p>Together, they break down what SBOMs are (think nutrition labels for software), how mandates like Executive Order 14028 and frameworks like NIST’s Secure Software Development Framework (SSDF) and DoD’s SWFT are changing the compliance landscape, and why automation is essential to get from static ATOs to continuous authorization.</p>

<p>Antoine also explains how Sonatype uses AI and software composition analysis tools to close critical gaps in open source and AI-heavy environments, helping agencies shift left, reduce vulnerabilities, and accelerate secure delivery of mission-critical systems. Along the way, the conversation covers everything from JFK delays caused by vulnerabilities, to the risks of “ludicrous speed” AI adoption, to the surprising history of Project Pigeon in WWII.</p>

<p>For federal leaders ready to take action, Antoine offers one concrete step: start with a single mission-critical application, mandate an SBOM, and see what hidden risks you uncover.</p>

<p>Show Notes:<br>
Connect with Antoine  <a href="https://www.linkedin.com/in/antoine-harden-mba-035a441/" rel="nofollow">https://www.linkedin.com/in/antoine-harden-mba-035a441/</a> <br>
<a href="https://www.federalregister.gov/documents/2021/05/17/2021-10460/improving-the-nations-cybersecurity" rel="nofollow">Executive Order 14028</a><a href="https://nvlpubs.nist.gov/nistpubs/specialpublications/nist.sp.800-218.pdf" rel="nofollow">NIST Secure Software Development Framework (SSDF)</a><br>
<a href="https://www.cisa.gov/zero-trust-maturity-model" rel="nofollow">CISA Zero Trust Maturity Model</a><br>
<a href="https://www.defense.gov/News/Releases/Release/Article/4174350/software-fast-track-initiative/" rel="nofollow">DoD’s SWFT (Software Fast Track Initiative) </a><br>
<a href="https://www.sonatype.com/resources?_gl=1*1jtfn7r*_up*MQ..*_ga*Mzc1ODU4NTM3LjE3NTYzMTc3NTc.*_ga_3W70E95Z6Q*czE3NTYzMTc3NTUkbzEkZzAkdDE3NTYzMTc3NTUkajYwJGwwJGgw*_ga_2TMM6KZPXQ*czE3NTYzMTc3NTUkbzEkZzAkdDE3NTYzMTc3NTUkajYwJGwwJGgw*_ga_08HT33J01V*czE3NTYzMTc3NTUkbzEkZzAkdDE3NTYzMTc3NTUkajYwJGwwJGgw" rel="nofollow">Sonatype Resource Center</a></p>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>On this episode of Tech Transforms, host Carolyn Ford welcomes Antoine Harden, Regional VP of Federal at Sonatype, to unpack one of the most urgent challenges in federal cybersecurity: securing the software supply chain. With more than 25 years of experience at Oracle, Google, and now Sonatype, Antoine shares why software supply chain risks from SolarWinds to Log4j have pushed SBOMs (Software Bills of Materials) and continuous monitoring into the spotlight.</p>

<p>Together, they break down what SBOMs are (think nutrition labels for software), how mandates like Executive Order 14028 and frameworks like NIST’s Secure Software Development Framework (SSDF) and DoD’s SWFT are changing the compliance landscape, and why automation is essential to get from static ATOs to continuous authorization.</p>

<p>Antoine also explains how Sonatype uses AI and software composition analysis tools to close critical gaps in open source and AI-heavy environments, helping agencies shift left, reduce vulnerabilities, and accelerate secure delivery of mission-critical systems. Along the way, the conversation covers everything from JFK delays caused by vulnerabilities, to the risks of “ludicrous speed” AI adoption, to the surprising history of Project Pigeon in WWII.</p>

<p>For federal leaders ready to take action, Antoine offers one concrete step: start with a single mission-critical application, mandate an SBOM, and see what hidden risks you uncover.</p>

<p>Show Notes:<br>
Connect with Antoine  <a href="https://www.linkedin.com/in/antoine-harden-mba-035a441/" rel="nofollow">https://www.linkedin.com/in/antoine-harden-mba-035a441/</a> <br>
<a href="https://www.federalregister.gov/documents/2021/05/17/2021-10460/improving-the-nations-cybersecurity" rel="nofollow">Executive Order 14028</a><a href="https://nvlpubs.nist.gov/nistpubs/specialpublications/nist.sp.800-218.pdf" rel="nofollow">NIST Secure Software Development Framework (SSDF)</a><br>
<a href="https://www.cisa.gov/zero-trust-maturity-model" rel="nofollow">CISA Zero Trust Maturity Model</a><br>
<a href="https://www.defense.gov/News/Releases/Release/Article/4174350/software-fast-track-initiative/" rel="nofollow">DoD’s SWFT (Software Fast Track Initiative) </a><br>
<a href="https://www.sonatype.com/resources?_gl=1*1jtfn7r*_up*MQ..*_ga*Mzc1ODU4NTM3LjE3NTYzMTc3NTc.*_ga_3W70E95Z6Q*czE3NTYzMTc3NTUkbzEkZzAkdDE3NTYzMTc3NTUkajYwJGwwJGgw*_ga_2TMM6KZPXQ*czE3NTYzMTc3NTUkbzEkZzAkdDE3NTYzMTc3NTUkajYwJGwwJGgw*_ga_08HT33J01V*czE3NTYzMTc3NTUkbzEkZzAkdDE3NTYzMTc3NTUkajYwJGwwJGgw" rel="nofollow">Sonatype Resource Center</a></p>]]>
  </itunes:summary>
</item>
<item>
  <title>Episode 104: Securing the Future: AI, Cyber Risk, and the Federal Mission</title>
  <link>https://techtransforms.fireside.fm/104</link>
  <guid isPermaLink="false">6e6b136b-79de-4ba1-870e-79089db0897c</guid>
  <pubDate>Tue, 26 Aug 2025 10:00:00 -0400</pubDate>
  <author>Carolyn Ford</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/81d9d6b0-0045-48da-8495-fd87c4613d7f/6e6b136b-79de-4ba1-870e-79089db0897c.mp3" length="69695506" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>Carolyn Ford</itunes:author>
  <itunes:subtitle>AI isn’t coming to government, it’s already here. In this episode of Tech Transforms, host Carolyn Ford sits down with Martin Stanley, Senior Advisor at NIST, to explore how federal agencies can secure AI systems, protect sensitive training data, and prepare for “machine speed” cyber defense. From NIST’s new AI Risk Management Framework to guardrails for generative AI, Martin explains what leaders need to know to adopt AI responsibly without sacrificing security.</itunes:subtitle>
  <itunes:duration>48:21</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/8/81d9d6b0-0045-48da-8495-fd87c4613d7f/episodes/6/6e6b136b-79de-4ba1-870e-79089db0897c/cover.jpg?v=1"/>
  <description>&lt;p&gt;In this episode of TechTransforms, host Carolyn Ford sits down with Martin Stanley, Senior Advisor at NIST, to explore how AI is reshaping federal cybersecurity. They dive into NIST’s AI Risk Management Framework, the growing need for secure and resilient AI systems, and what it takes to build a “risk-aware” culture in government. Stanley shares insights on guarding against threats like model theft and prompt injection, how agencies are adapting zero trust principles for AI, and why explainability is essential in machine learning models. Whether you're new to AI governance or advancing your cybersecurity strategy, this episode offers practical guidance for navigating the evolving AI risk landscape.&lt;/p&gt;

&lt;p&gt;Show Notes:&lt;br&gt;
NIST AI resources: &lt;a href="https://www.nist.gov/artificial-intelligence/ai-resources" target="_blank" rel="nofollow noopener"&gt;https://www.nist.gov/artificial-intelligence/ai-resources&lt;/a&gt;&lt;br&gt;
AI Risk Management Framework &lt;a href="https://www.nist.gov/itl/ai-risk-management-framework" target="_blank" rel="nofollow noopener"&gt;https://www.nist.gov/itl/ai-risk-management-framework&lt;/a&gt;&lt;br&gt;
NIST-AI-600-1: AI RMF Generative AI Profile &lt;a href="https://airc.nist.gov/docs/NIST.AI.600-1.GenAI-Profile.ipd.pdf" target="_blank" rel="nofollow noopener"&gt;https://airc.nist.gov/docs/NIST.AI.600-1.GenAI-Profile.ipd.pdf&lt;/a&gt;&lt;br&gt;
Secure Software Development Practices for Generative AI and Dual-Use Foundation Models: An SSDF Community Profile  &lt;a href="https://doi.org/10.6028/NIST.SP.800-218A" target="_blank" rel="nofollow noopener"&gt;https://doi.org/10.6028/NIST.SP.800-218A&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Email: &lt;a href="mailto:martin.stanley@nist.gov" target="_blank" rel="nofollow noopener"&gt;martin.stanley@nist.gov&lt;/a&gt;&lt;br&gt;
LinkedIn: &lt;a href="https://www.linkedin.com/in/mcs729/" target="_blank" rel="nofollow noopener"&gt;https://www.linkedin.com/in/mcs729/&lt;/a&gt;&lt;/p&gt;
</description>
  <itunes:keywords>NIST, TechTransforms, Cybersecurity, AI, cyber defense</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>In this episode of TechTransforms, host Carolyn Ford sits down with Martin Stanley, Senior Advisor at NIST, to explore how AI is reshaping federal cybersecurity. They dive into NIST’s AI Risk Management Framework, the growing need for secure and resilient AI systems, and what it takes to build a “risk-aware” culture in government. Stanley shares insights on guarding against threats like model theft and prompt injection, how agencies are adapting zero trust principles for AI, and why explainability is essential in machine learning models. Whether you&#39;re new to AI governance or advancing your cybersecurity strategy, this episode offers practical guidance for navigating the evolving AI risk landscape.</p>

<p>Show Notes:<br>
NIST AI resources: <a href="https://www.nist.gov/artificial-intelligence/ai-resources" rel="nofollow">https://www.nist.gov/artificial-intelligence/ai-resources</a><br>
AI Risk Management Framework <a href="https://www.nist.gov/itl/ai-risk-management-framework" rel="nofollow">https://www.nist.gov/itl/ai-risk-management-framework</a><br>
NIST-AI-600-1: AI RMF Generative AI Profile <a href="https://airc.nist.gov/docs/NIST.AI.600-1.GenAI-Profile.ipd.pdf" rel="nofollow">https://airc.nist.gov/docs/NIST.AI.600-1.GenAI-Profile.ipd.pdf</a><br>
Secure Software Development Practices for Generative AI and Dual-Use Foundation Models: An SSDF Community Profile  <a href="https://doi.org/10.6028/NIST.SP.800-218A" rel="nofollow">https://doi.org/10.6028/NIST.SP.800-218A</a></p>

<p>Email: <a href="mailto:martin.stanley@nist.gov" rel="nofollow">martin.stanley@nist.gov</a><br>
LinkedIn: <a href="https://www.linkedin.com/in/mcs729/" rel="nofollow">https://www.linkedin.com/in/mcs729/</a></p>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>In this episode of TechTransforms, host Carolyn Ford sits down with Martin Stanley, Senior Advisor at NIST, to explore how AI is reshaping federal cybersecurity. They dive into NIST’s AI Risk Management Framework, the growing need for secure and resilient AI systems, and what it takes to build a “risk-aware” culture in government. Stanley shares insights on guarding against threats like model theft and prompt injection, how agencies are adapting zero trust principles for AI, and why explainability is essential in machine learning models. Whether you&#39;re new to AI governance or advancing your cybersecurity strategy, this episode offers practical guidance for navigating the evolving AI risk landscape.</p>

<p>Show Notes:<br>
NIST AI resources: <a href="https://www.nist.gov/artificial-intelligence/ai-resources" rel="nofollow">https://www.nist.gov/artificial-intelligence/ai-resources</a><br>
AI Risk Management Framework <a href="https://www.nist.gov/itl/ai-risk-management-framework" rel="nofollow">https://www.nist.gov/itl/ai-risk-management-framework</a><br>
NIST-AI-600-1: AI RMF Generative AI Profile <a href="https://airc.nist.gov/docs/NIST.AI.600-1.GenAI-Profile.ipd.pdf" rel="nofollow">https://airc.nist.gov/docs/NIST.AI.600-1.GenAI-Profile.ipd.pdf</a><br>
Secure Software Development Practices for Generative AI and Dual-Use Foundation Models: An SSDF Community Profile  <a href="https://doi.org/10.6028/NIST.SP.800-218A" rel="nofollow">https://doi.org/10.6028/NIST.SP.800-218A</a></p>

<p>Email: <a href="mailto:martin.stanley@nist.gov" rel="nofollow">martin.stanley@nist.gov</a><br>
LinkedIn: <a href="https://www.linkedin.com/in/mcs729/" rel="nofollow">https://www.linkedin.com/in/mcs729/</a></p>]]>
  </itunes:summary>
</item>
<item>
  <title>Episode 101: The Fast Track to Global Defense Collaboration</title>
  <link>https://techtransforms.fireside.fm/101</link>
  <guid isPermaLink="false">25790936-7a28-4d52-9040-1f587692e66c</guid>
  <pubDate>Tue, 15 Jul 2025 13:00:00 -0400</pubDate>
  <author>Carolyn Ford</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/81d9d6b0-0045-48da-8495-fd87c4613d7f/25790936-7a28-4d52-9040-1f587692e66c.mp3" length="27491940" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>Carolyn Ford</itunes:author>
  <itunes:subtitle>Carolyn Ford sits down with Mat Cantagallo, Defense Director at Austrade, to unpack how OWL, GME, and Austrade became the first to use the AUKUS exemption, streamlining defense tech transfer and training between allied nations. This episode highlights how strategic policy shifts and trusted partnerships are accelerating innovation and reshaping the future of international defense collaboration.</itunes:subtitle>
  <itunes:duration>40:30</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/8/81d9d6b0-0045-48da-8495-fd87c4613d7f/episodes/2/25790936-7a28-4d52-9040-1f587692e66c/cover.jpg?v=1"/>
  <description>&lt;p&gt;What happens when bureaucratic red tape meets bold collaboration? In this episode of Tech Transforms, Carolyn Ford is joined by Mat Cantagallo, Defense Director at Austrade, to explore how OWL, GME, and Austrade became the first to successfully leverage the AUKUS exemption, cutting through years of export restrictions to enable real-time defense collaboration between the U.S. and Australia.&lt;/p&gt;

&lt;p&gt;From simplifying tech transfer to accelerating mission-critical training, this conversation offers a powerful look at how smart policy and strategic partnerships are setting a new benchmark for global security innovation.&lt;/p&gt;

&lt;p&gt;If you’re in defense, cybersecurity, international trade, or just love a good story about making the impossible possible, this one’s for you.&lt;/p&gt;

&lt;p&gt;Contact Mat &lt;a href="https://www.linkedin.com/in/mat-c-a377937/" target="_blank" rel="nofollow noopener"&gt;https://www.linkedin.com/in/mat-c-a377937/&lt;/a&gt; &lt;/p&gt;
</description>
  <itunes:keywords>cybersecurity, international trade, OWL Cyber Defense, AUKUS</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>What happens when bureaucratic red tape meets bold collaboration? In this episode of Tech Transforms, Carolyn Ford is joined by Mat Cantagallo, Defense Director at Austrade, to explore how OWL, GME, and Austrade became the first to successfully leverage the AUKUS exemption, cutting through years of export restrictions to enable real-time defense collaboration between the U.S. and Australia.</p>

<p>From simplifying tech transfer to accelerating mission-critical training, this conversation offers a powerful look at how smart policy and strategic partnerships are setting a new benchmark for global security innovation.</p>

<p>If you’re in defense, cybersecurity, international trade, or just love a good story about making the impossible possible, this one’s for you.</p>

<p>Contact Mat <a href="https://www.linkedin.com/in/mat-c-a377937/" rel="nofollow">https://www.linkedin.com/in/mat-c-a377937/</a></p>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>What happens when bureaucratic red tape meets bold collaboration? In this episode of Tech Transforms, Carolyn Ford is joined by Mat Cantagallo, Defense Director at Austrade, to explore how OWL, GME, and Austrade became the first to successfully leverage the AUKUS exemption, cutting through years of export restrictions to enable real-time defense collaboration between the U.S. and Australia.</p>

<p>From simplifying tech transfer to accelerating mission-critical training, this conversation offers a powerful look at how smart policy and strategic partnerships are setting a new benchmark for global security innovation.</p>

<p>If you’re in defense, cybersecurity, international trade, or just love a good story about making the impossible possible, this one’s for you.</p>

<p>Contact Mat <a href="https://www.linkedin.com/in/mat-c-a377937/" rel="nofollow">https://www.linkedin.com/in/mat-c-a377937/</a></p>]]>
  </itunes:summary>
</item>
<item>
  <title>Episode 100: Trusting AI and Warfighting Technologies</title>
  <link>https://techtransforms.fireside.fm/100</link>
  <guid isPermaLink="false">c334be8e-9ddc-4201-83e3-605b840a08d7</guid>
  <pubDate>Tue, 01 Jul 2025 10:30:00 -0400</pubDate>
  <author>Carolyn Ford</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/81d9d6b0-0045-48da-8495-fd87c4613d7f/c334be8e-9ddc-4201-83e3-605b840a08d7.mp3" length="64734028" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>Carolyn Ford</itunes:author>
  <itunes:subtitle>In our 100th episode, Lt. General Susan Lawrence, President &amp; CEO of AFCEA International and former CIO of the U.S. Army, joins Tech Transforms to talk trusted AI, cyber readiness, and how the human element must remain central in defense innovation. From battlefield examples to the future of cross-sector collaboration, this conversation is a powerful look at what it really takes to secure tomorrow.</itunes:subtitle>
  <itunes:duration>44:53</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/8/81d9d6b0-0045-48da-8495-fd87c4613d7f/episodes/c/c334be8e-9ddc-4201-83e3-605b840a08d7/cover.jpg?v=1"/>
  <description>&lt;p&gt;What does it take to trust AI in the highest-stakes environments and how do we make sure people stay at the center of every innovation?&lt;/p&gt;

&lt;p&gt;In our milestone 100th episode, Lt. General Susan Lawrence, President &amp;amp; CEO of AFCEA International and former CIO of the U.S. Army, joins host Carolyn Ford for a compelling conversation about the future of national defense in an AI-powered world. Together, they unpack:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Why cybersecurity and data integrity must be the foundation of AI adoption&lt;/li&gt;
&lt;li&gt;How real-world conflicts like Ukraine are reshaping battlefield technologies&lt;/li&gt;
&lt;li&gt;What ethical AI deployment looks like across the military, government, and industry&lt;/li&gt;
&lt;li&gt;Why collaboration, not competition, is key to staying ahead of adversaries&lt;/li&gt;
&lt;li&gt;How to prepare today’s workforce for tomorrow’s digital fight&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;Whether you're in the public sector, tech, or defense, this episode is packed with powerful insights on innovation, leadership, and national resilience. &lt;/p&gt;
</description>
  <itunes:keywords>Cybersecurity, Defense, Innovation, AFCEA, EmergingTech, AI Ethics, Data Integrity</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>What does it take to trust AI in the highest-stakes environments and how do we make sure people stay at the center of every innovation?</p>

<p>In our milestone 100th episode, Lt. General Susan Lawrence, President &amp; CEO of AFCEA International and former CIO of the U.S. Army, joins host Carolyn Ford for a compelling conversation about the future of national defense in an AI-powered world. Together, they unpack:</p>

<ul>
<li>Why cybersecurity and data integrity must be the foundation of AI adoption</li>
<li>How real-world conflicts like Ukraine are reshaping battlefield technologies</li>
<li>What ethical AI deployment looks like across the military, government, and industry</li>
<li>Why collaboration, not competition, is key to staying ahead of adversaries</li>
<li>How to prepare today’s workforce for tomorrow’s digital fight</li>
</ul>

<p>Whether you&#39;re in the public sector, tech, or defense, this episode is packed with powerful insights on innovation, leadership, and national resilience.</p>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>What does it take to trust AI in the highest-stakes environments and how do we make sure people stay at the center of every innovation?</p>

<p>In our milestone 100th episode, Lt. General Susan Lawrence, President &amp; CEO of AFCEA International and former CIO of the U.S. Army, joins host Carolyn Ford for a compelling conversation about the future of national defense in an AI-powered world. Together, they unpack:</p>

<ul>
<li>Why cybersecurity and data integrity must be the foundation of AI adoption</li>
<li>How real-world conflicts like Ukraine are reshaping battlefield technologies</li>
<li>What ethical AI deployment looks like across the military, government, and industry</li>
<li>Why collaboration, not competition, is key to staying ahead of adversaries</li>
<li>How to prepare today’s workforce for tomorrow’s digital fight</li>
</ul>

<p>Whether you&#39;re in the public sector, tech, or defense, this episode is packed with powerful insights on innovation, leadership, and national resilience.</p>]]>
  </itunes:summary>
</item>
<item>
  <title>Cyber Resilience Starts with Culture: Building Trust in the Age of AI </title>
  <link>https://techtransforms.fireside.fm/99</link>
  <guid isPermaLink="false">66c6e735-d0be-4c7b-a2b4-052f7555bac3</guid>
  <pubDate>Tue, 17 Jun 2025 11:30:00 -0400</pubDate>
  <author>Carolyn Ford</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/81d9d6b0-0045-48da-8495-fd87c4613d7f/66c6e735-d0be-4c7b-a2b4-052f7555bac3.mp3" length="56709391" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>Carolyn Ford</itunes:author>
  <itunes:subtitle>In this episode of Tech Transforms, Carolyn Ford chats with Bart McDonough, Founder of Agio and author of Cyber Smart and Cyber Guardians. Bart unpacks why social engineering, like phishing, remains the #1 threat to individuals and organizations, despite all our tech defenses. He shares simple, real-world habits to strengthen your cyber posture, explains how AI is changing the game for both attackers and defenders, and makes a strong case for building a resilient cyber culture rooted in open communication and continuous learning.</itunes:subtitle>
  <itunes:duration>39:20</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/8/81d9d6b0-0045-48da-8495-fd87c4613d7f/episodes/6/66c6e735-d0be-4c7b-a2b4-052f7555bac3/cover.jpg?v=1"/>
  <description>&lt;p&gt;Why do phishing scams still work, even on the savviest among us? In this episode, host Carolyn Ford welcomes Bart McDonough, Founder of Agio and author of Cyber Smart and Cyber Guardians to break down the human side of cybersecurity. Bart shares practical tips to protect yourself and your organization from today’s most common threats, explains why a resilient cyber culture matters more than ever, and reveals how AI is shaping both the future of cyber defense and cybercrime. Packed with relatable stories and expert advice, this conversation is a must-listen for anyone who thinks they’re too smart to get hacked.&lt;/p&gt;

&lt;p&gt;Key topics:&lt;/p&gt;

&lt;p&gt;Why social engineering remains the top attack vector&lt;br&gt;
How to build defense-in-depth at work and at home&lt;br&gt;
Practical habits for better passwords and safer devices&lt;br&gt;
The evolving role of AI in cyber threats and defense&lt;br&gt;
Why a strong cyber culture starts with open, blame-free communication&lt;/p&gt;

&lt;p&gt;Tune in and level up your cyber smarts today! &lt;/p&gt;
</description>
  <itunes:keywords>cyber defense, cyber crime, cybersecurity</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>Why do phishing scams still work, even on the savviest among us? In this episode, host Carolyn Ford welcomes Bart McDonough, Founder of Agio and author of Cyber Smart and Cyber Guardians to break down the human side of cybersecurity. Bart shares practical tips to protect yourself and your organization from today’s most common threats, explains why a resilient cyber culture matters more than ever, and reveals how AI is shaping both the future of cyber defense and cybercrime. Packed with relatable stories and expert advice, this conversation is a must-listen for anyone who thinks they’re too smart to get hacked.</p>

<p>Key topics:</p>

<p>Why social engineering remains the top attack vector<br>
How to build defense-in-depth at work and at home<br>
Practical habits for better passwords and safer devices<br>
The evolving role of AI in cyber threats and defense<br>
Why a strong cyber culture starts with open, blame-free communication</p>

<p>Tune in and level up your cyber smarts today!</p>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>Why do phishing scams still work, even on the savviest among us? In this episode, host Carolyn Ford welcomes Bart McDonough, Founder of Agio and author of Cyber Smart and Cyber Guardians to break down the human side of cybersecurity. Bart shares practical tips to protect yourself and your organization from today’s most common threats, explains why a resilient cyber culture matters more than ever, and reveals how AI is shaping both the future of cyber defense and cybercrime. Packed with relatable stories and expert advice, this conversation is a must-listen for anyone who thinks they’re too smart to get hacked.</p>

<p>Key topics:</p>

<p>Why social engineering remains the top attack vector<br>
How to build defense-in-depth at work and at home<br>
Practical habits for better passwords and safer devices<br>
The evolving role of AI in cyber threats and defense<br>
Why a strong cyber culture starts with open, blame-free communication</p>

<p>Tune in and level up your cyber smarts today!</p>]]>
  </itunes:summary>
</item>
<item>
  <title>Episode 98: SCRM: Securing the Federal Technology Supply Chain</title>
  <link>https://techtransforms.fireside.fm/98</link>
  <guid isPermaLink="false">816bd0eb-6750-4019-8470-1231c5a716f4</guid>
  <pubDate>Wed, 04 Jun 2025 09:00:00 -0400</pubDate>
  <author>Carolyn Ford</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/81d9d6b0-0045-48da-8495-fd87c4613d7f/816bd0eb-6750-4019-8470-1231c5a716f4.mp3" length="43860046" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>Carolyn Ford</itunes:author>
  <itunes:subtitle>Supply Chain Risk Management isn’t just a cybersecurity issue—it’s a leadership imperative. In this episode, Timothy Amerson, CEO of CASMO Consulting and Army veteran, breaks down how agencies can build real resilience in a world of insider threats, tech bans, and shifting global risks.</itunes:subtitle>
  <itunes:duration>45:41</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/8/81d9d6b0-0045-48da-8495-fd87c4613d7f/episodes/8/816bd0eb-6750-4019-8470-1231c5a716f4/cover.jpg?v=1"/>
  <description>&lt;p&gt;What do Dune’s spice trade, HAL 9000, and federal supply chains have in common? They all reveal how deeply our systems rely on trust—and how dangerous things get when that trust breaks down. I’m joined by Timothy Amerson, CEO of CASMO Consulting, former Chief Information Security Officer at the Social Security Administration, and Army veteran, to explore why Supply Chain Risk Management is no longer just a CISO concern. From insider threats to shifting geopolitical pressures, Tim brings sharp, actionable insight for leaders navigating today’s complex cyber landscape. If you’re serious about moving from compliance to real resilience, this episode is for you. &lt;/p&gt;
</description>
  <itunes:keywords>Supply Chain Risk Management, Cybersecurity, Federal Technology, Zero Trust, Insider Threats</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>What do Dune’s spice trade, HAL 9000, and federal supply chains have in common? They all reveal how deeply our systems rely on trust—and how dangerous things get when that trust breaks down. I’m joined by Timothy Amerson, CEO of CASMO Consulting, former Chief Information Security Officer at the Social Security Administration, and Army veteran, to explore why Supply Chain Risk Management is no longer just a CISO concern. From insider threats to shifting geopolitical pressures, Tim brings sharp, actionable insight for leaders navigating today’s complex cyber landscape. If you’re serious about moving from compliance to real resilience, this episode is for you.</p>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>What do Dune’s spice trade, HAL 9000, and federal supply chains have in common? They all reveal how deeply our systems rely on trust—and how dangerous things get when that trust breaks down. I’m joined by Timothy Amerson, CEO of CASMO Consulting, former Chief Information Security Officer at the Social Security Administration, and Army veteran, to explore why Supply Chain Risk Management is no longer just a CISO concern. From insider threats to shifting geopolitical pressures, Tim brings sharp, actionable insight for leaders navigating today’s complex cyber landscape. If you’re serious about moving from compliance to real resilience, this episode is for you.</p>]]>
  </itunes:summary>
</item>
<item>
  <title>Episode 96: Tech Transforms + ATARC: AI, Oceans, and Innovation with NOAA’s Frank Indiviglio</title>
  <link>https://techtransforms.fireside.fm/96</link>
  <guid isPermaLink="false">98de7466-e44b-4f25-90ba-08930b50a145</guid>
  <pubDate>Tue, 06 May 2025 13:00:00 -0400</pubDate>
  <author>Carolyn Ford</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/81d9d6b0-0045-48da-8495-fd87c4613d7f/98de7466-e44b-4f25-90ba-08930b50a145.mp3" length="3609884" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>Carolyn Ford</itunes:author>
  <itunes:subtitle>In this special crossover episode with ATARC, I sit down with Frank Indiviglio, Chief Technology Officer at NOAA, to explore how cutting-edge technology is revolutionizing our understanding of the planet. From hurricane forecasting to coral reef monitoring, Frank unpacks how AI, data science, and high-performance computing transform vast raw data into real-world impact. We dive into everything from boosting data processing efficiency to balancing open data with cybersecurity—all while showing how cross-sector collaboration drives innovation at NOAA. Don’t miss this fascinating ATARC-powered conversation!</itunes:subtitle>
  <itunes:duration>30:01</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/8/81d9d6b0-0045-48da-8495-fd87c4613d7f/episodes/9/98de7466-e44b-4f25-90ba-08930b50a145/cover.jpg?v=1"/>
  <description>&lt;p&gt;Show Notes:&lt;/p&gt;

&lt;p&gt;In this special Tech Transforms + ATARC crossover episode, Carolyn Ford talks with Frank Indiviglio, Chief Technology Officer at NOAA, about how AI, data science, and high-performance computing are transforming weather forecasting, climate modeling, and ocean research. Frank shares how NOAA uses tools like REMUS underwater vehicles, balances open data with cybersecurity, and drives innovation through cross-sector collaboration.&lt;/p&gt;

&lt;p&gt;Resources &amp;amp; Links:&lt;br&gt;
🌐 Learn more about NOAA’s AI initiatives: noaa.gov/ai&lt;br&gt;
🔗 Connect with Frank Indiviglio on LinkedIn: Frank Indiviglio&lt;/p&gt;

&lt;p&gt;Tune in for insights on the future of AI, oceans, and innovation! &lt;/p&gt;
</description>
  <itunes:keywords>#AIatScale #GovernmentInnovation #ClimateTechnology #NOAA #ATARC</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>Show Notes:</p>

<p>In this special Tech Transforms + ATARC crossover episode, Carolyn Ford talks with Frank Indiviglio, Chief Technology Officer at NOAA, about how AI, data science, and high-performance computing are transforming weather forecasting, climate modeling, and ocean research. Frank shares how NOAA uses tools like REMUS underwater vehicles, balances open data with cybersecurity, and drives innovation through cross-sector collaboration.</p>

<p>Resources &amp; Links:<br>
🌐 Learn more about NOAA’s AI initiatives: noaa.gov/ai<br>
🔗 Connect with Frank Indiviglio on LinkedIn: Frank Indiviglio</p>

<p>Tune in for insights on the future of AI, oceans, and innovation!</p>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>Show Notes:</p>

<p>In this special Tech Transforms + ATARC crossover episode, Carolyn Ford talks with Frank Indiviglio, Chief Technology Officer at NOAA, about how AI, data science, and high-performance computing are transforming weather forecasting, climate modeling, and ocean research. Frank shares how NOAA uses tools like REMUS underwater vehicles, balances open data with cybersecurity, and drives innovation through cross-sector collaboration.</p>

<p>Resources &amp; Links:<br>
🌐 Learn more about NOAA’s AI initiatives: noaa.gov/ai<br>
🔗 Connect with Frank Indiviglio on LinkedIn: Frank Indiviglio</p>

<p>Tune in for insights on the future of AI, oceans, and innovation!</p>]]>
  </itunes:summary>
</item>
<item>
  <title>Zero Trust at the Edge: Securing Data, Devices, and Decisions</title>
  <link>https://techtransforms.fireside.fm/95</link>
  <guid isPermaLink="false">7c0dc3cc-0072-464b-9128-02e00c6ed9e5</guid>
  <pubDate>Tue, 29 Apr 2025 16:00:00 -0400</pubDate>
  <author>Carolyn Ford</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/81d9d6b0-0045-48da-8495-fd87c4613d7f/7c0dc3cc-0072-464b-9128-02e00c6ed9e5.mp3" length="54360953" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>Carolyn Ford</itunes:author>
  <itunes:subtitle>Randy Clark, cybersecurity strategist and contributor to SIGNAL Magazine, joins Carolyn Ford to explain why the future of secure data lies at the edge. From smart cities to AI-driven infrastructure, Randy breaks down how zero trust data works — and why labeling, encrypting, and governing data from the moment it’s created can change everything. They talk edge AI, data sovereignty, and why trusting your thermostat might be harder than it looks. Plus: why the 1980s weren’t ready for this tech, and how protecting data—not just networks—could reshape public safety and defense.</itunes:subtitle>
  <itunes:duration>45:16</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/8/81d9d6b0-0045-48da-8495-fd87c4613d7f/episodes/7/7c0dc3cc-0072-464b-9128-02e00c6ed9e5/cover.jpg?v=1"/>
  <description>&lt;p&gt;What if we could trust the data flying out of streetlights, drones, and smart thermostats — right from the source? In this episode of &lt;em&gt;Tech Transforms&lt;/em&gt;, Randy Clark breaks down the principles of zero trust data and its transformative power for smart cities, IoT, and AI at the edge. Randy shares why protecting data packets (not just networks) is critical for security and innovation—and how it opens up new opportunities for collaboration, compliance, and even battlefield awareness. Tune in for a fascinating conversation on the future of digital trust. &lt;/p&gt;
</description>
  <itunes:keywords>zero trust, IoT, AI, data, cybersecurity</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>What if we could trust the data flying out of streetlights, drones, and smart thermostats — right from the source? In this episode of <em>Tech Transforms</em>, Randy Clark breaks down the principles of zero trust data and its transformative power for smart cities, IoT, and AI at the edge. Randy shares why protecting data packets (not just networks) is critical for security and innovation—and how it opens up new opportunities for collaboration, compliance, and even battlefield awareness. Tune in for a fascinating conversation on the future of digital trust.</p>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>What if we could trust the data flying out of streetlights, drones, and smart thermostats — right from the source? In this episode of <em>Tech Transforms</em>, Randy Clark breaks down the principles of zero trust data and its transformative power for smart cities, IoT, and AI at the edge. Randy shares why protecting data packets (not just networks) is critical for security and innovation—and how it opens up new opportunities for collaboration, compliance, and even battlefield awareness. Tune in for a fascinating conversation on the future of digital trust.</p>]]>
  </itunes:summary>
</item>
<item>
  <title>Open Source for Classified Environments</title>
  <link>https://techtransforms.fireside.fm/90</link>
  <guid isPermaLink="false">edf6d919-406f-49f7-9394-46cf8c2d5dca</guid>
  <pubDate>Thu, 13 Feb 2025 14:00:00 -0500</pubDate>
  <author>Carolyn Ford</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/81d9d6b0-0045-48da-8495-fd87c4613d7f/edf6d919-406f-49f7-9394-46cf8c2d5dca.mp3" length="127304788" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>Carolyn Ford</itunes:author>
  <itunes:subtitle>In this episode of Tech Transforms, host Carolyn Ford dives into the world of secure software development with guests Scott Orton and Mike Mehlberg. They explore the critical challenges of implementing Software Bills of Materials (SBOMs), securing open-source software, and using Rust programming language for safer, memory-secure coding. The conversation also covers AI's growing role in code development, the evolving landscape of cross-domain solutions, and the race between cybersecurity advancements and ever-evolving threats.

From real-world implementation challenges to insights on automating security measures in classified environments, Scott and Mike break down the risks and opportunities in today's software ecosystem. Whether you're a developer, cybersecurity professional, or just curious about how technology is shaping secure systems, this episode is packed with expert insights and actionable takeaways.</itunes:subtitle>
  <itunes:duration>53:02</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/8/81d9d6b0-0045-48da-8495-fd87c4613d7f/episodes/e/edf6d919-406f-49f7-9394-46cf8c2d5dca/cover.jpg?v=1"/>
  <description>&lt;p&gt;🔒 How do we secure software in an era of open-source dominance and AI-driven threats?&lt;/p&gt;

&lt;p&gt;On this episode of Tech Transforms, Scott Orton and Mike Mehlberg join Carolyn Ford to explore the future of secure software development. They tackle:&lt;/p&gt;

&lt;p&gt;✅ The Power of SBOMs – Why software transparency is a game-changer (and why some companies still resist it)&lt;br&gt;
✅ Open-Source Risks – How attackers exploit vulnerabilities in widely used packages and what to do about it&lt;br&gt;
✅ Rust Programming Language – The case for transitioning to a more secure, memory-safe coding environment&lt;br&gt;
✅ AI in Software Development – How AI is transforming cybersecurity, from automated vulnerability detection to mitigating risks before they happen&lt;br&gt;
✅ Cross-Domain Solutions – The push toward hygienic networks and a proactive approach to security in classified environments&lt;/p&gt;

&lt;p&gt;They also discuss real-world security threats, including a recent open-source software attack that nearly went undetected. Plus, Scott shares his vision for AI inspired by non-human intelligence (think squids and insects! 🦑).&lt;/p&gt;

&lt;p&gt;🔹 If you're in software development, cybersecurity, or tech leadership, this episode is a must-listen!&lt;/p&gt;

&lt;p&gt;📲 Connect with Scott and Mike on LinkedIn for more insights.&lt;/p&gt;

&lt;p&gt;🎧 Listen now and stay ahead in the world of secure software and cyber defense! &lt;/p&gt;
</description>
  <itunes:keywords>open source, software development, risk, tech, security, cybersecurity, AI, software</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>🔒 How do we secure software in an era of open-source dominance and AI-driven threats?</p>

<p>On this episode of Tech Transforms, Scott Orton and Mike Mehlberg join Carolyn Ford to explore the future of secure software development. They tackle:</p>

<p>✅ The Power of SBOMs – Why software transparency is a game-changer (and why some companies still resist it)<br>
✅ Open-Source Risks – How attackers exploit vulnerabilities in widely used packages and what to do about it<br>
✅ Rust Programming Language – The case for transitioning to a more secure, memory-safe coding environment<br>
✅ AI in Software Development – How AI is transforming cybersecurity, from automated vulnerability detection to mitigating risks before they happen<br>
✅ Cross-Domain Solutions – The push toward hygienic networks and a proactive approach to security in classified environments</p>

<p>They also discuss real-world security threats, including a recent open-source software attack that nearly went undetected. Plus, Scott shares his vision for AI inspired by non-human intelligence (think squids and insects! 🦑).</p>

<p>🔹 If you&#39;re in software development, cybersecurity, or tech leadership, this episode is a must-listen!</p>

<p>📲 Connect with Scott and Mike on LinkedIn for more insights.</p>

<p>🎧 Listen now and stay ahead in the world of secure software and cyber defense!</p>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>🔒 How do we secure software in an era of open-source dominance and AI-driven threats?</p>

<p>On this episode of Tech Transforms, Scott Orton and Mike Mehlberg join Carolyn Ford to explore the future of secure software development. They tackle:</p>

<p>✅ The Power of SBOMs – Why software transparency is a game-changer (and why some companies still resist it)<br>
✅ Open-Source Risks – How attackers exploit vulnerabilities in widely used packages and what to do about it<br>
✅ Rust Programming Language – The case for transitioning to a more secure, memory-safe coding environment<br>
✅ AI in Software Development – How AI is transforming cybersecurity, from automated vulnerability detection to mitigating risks before they happen<br>
✅ Cross-Domain Solutions – The push toward hygienic networks and a proactive approach to security in classified environments</p>

<p>They also discuss real-world security threats, including a recent open-source software attack that nearly went undetected. Plus, Scott shares his vision for AI inspired by non-human intelligence (think squids and insects! 🦑).</p>

<p>🔹 If you&#39;re in software development, cybersecurity, or tech leadership, this episode is a must-listen!</p>

<p>📲 Connect with Scott and Mike on LinkedIn for more insights.</p>

<p>🎧 Listen now and stay ahead in the world of secure software and cyber defense!</p>]]>
  </itunes:summary>
</item>
<item>
  <title>New: Building a Stronger Team: How Data is Transforming Workforce Development in the Public Sector</title>
  <link>https://techtransforms.fireside.fm/new</link>
  <guid isPermaLink="false">d15c20ff-e5c1-4086-b5c2-8e6726d10150</guid>
  <pubDate>Tue, 29 Oct 2024 16:00:00 -0400</pubDate>
  <author>Carolyn Ford</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/81d9d6b0-0045-48da-8495-fd87c4613d7f/d15c20ff-e5c1-4086-b5c2-8e6726d10150.mp3" length="117194117" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>Carolyn Ford</itunes:author>
  <itunes:subtitle>In this episode, host Carolyn Ford sits down with Kris Saling, Director of Talent Analytics and Data Strategy for the U.S. Army, to dive into her new book, Data-Driven Talent Management. Kris shares how data is changing the game when it comes to recruitment, retention, and employee engagement. We discuss practical ways leaders can use analytics to build stronger teams and keep top talent motivated. If you're looking for actionable insights on how data can transform the way we work, you won’t want to miss this conversation!
</itunes:subtitle>
  <itunes:duration>48:28</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/8/81d9d6b0-0045-48da-8495-fd87c4613d7f/episodes/d/d15c20ff-e5c1-4086-b5c2-8e6726d10150/cover.jpg?v=2"/>
  <description>&lt;p&gt;In this episode of Tech Transforms, host Carolyn Ford welcomes back Kris Saling, the Director of Talent Analytics and Data Strategy for the U.S. Army, to discuss her new book, Data-Driven Talent Management. Kris shares how analytics is reshaping recruitment, retention, and employee engagement across both the public sector and private industry, providing leaders with powerful tools to build stronger, more motivated teams. From the value of non-monetary incentives to the evolving role of AI in hiring, Kris reveals practical ways data can transform talent management. Whether you're in marketing, cybersecurity, or beyond, this episode is packed with actionable insights on creating a people-first workplace. Join us for a deep dive into the future of workforce management!&lt;/p&gt;
</description>
  <itunes:keywords>workforce management, talent management, public sector, AI, US Army, marketing, cybersecurity</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>In this episode of Tech Transforms, host Carolyn Ford welcomes back Kris Saling, the Director of Talent Analytics and Data Strategy for the U.S. Army, to discuss her new book, Data-Driven Talent Management. Kris shares how analytics is reshaping recruitment, retention, and employee engagement across both the public sector and private industry, providing leaders with powerful tools to build stronger, more motivated teams. From the value of non-monetary incentives to the evolving role of AI in hiring, Kris reveals practical ways data can transform talent management. Whether you&#39;re in marketing, cybersecurity, or beyond, this episode is packed with actionable insights on creating a people-first workplace. Join us for a deep dive into the future of workforce management!</p>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>In this episode of Tech Transforms, host Carolyn Ford welcomes back Kris Saling, the Director of Talent Analytics and Data Strategy for the U.S. Army, to discuss her new book, Data-Driven Talent Management. Kris shares how analytics is reshaping recruitment, retention, and employee engagement across both the public sector and private industry, providing leaders with powerful tools to build stronger, more motivated teams. From the value of non-monetary incentives to the evolving role of AI in hiring, Kris reveals practical ways data can transform talent management. Whether you&#39;re in marketing, cybersecurity, or beyond, this episode is packed with actionable insights on creating a people-first workplace. Join us for a deep dive into the future of workforce management!</p>]]>
  </itunes:summary>
</item>
  </channel>
</rss>
