<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" encoding="UTF-8" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:sy="http://purl.org/rss/1.0/modules/syndication/" xmlns:admin="http://webns.net/mvcb/" xmlns:atom="http://www.w3.org/2005/Atom/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:googleplay="http://www.google.com/schemas/play-podcasts/1.0" xmlns:itunes="http://www.itunes.com/dtds/podcast-1.0.dtd" xmlns:fireside="http://fireside.fm/modules/rss/fireside">
  <channel>
    <fireside:hostname>web01.fireside.fm</fireside:hostname>
    <fireside:genDate>Tue, 28 Apr 2026 10:35:17 -0500</fireside:genDate>
    <generator>Fireside (https://fireside.fm)</generator>
    <title>Tech Transforms - Episodes Tagged with “Micro Segmentation”</title>
    <link>https://techtransforms.fireside.fm/tags/micro%20segmentation</link>
    <pubDate>Tue, 17 Mar 2026 09:30:00 -0400</pubDate>
    <description>Global technology is changing the way we live. Critical government decisions affect the intersection of technology advancement and human needs. This podcast talks to some of the most prominent influencers shaping the landscape to understand how they are leveraging technology to solve complex challenges while also meeting the needs of today's modern world.
</description>
    <language>en-us</language>
    <itunes:type>episodic</itunes:type>
    <itunes:subtitle>Tech Transforms, brought to you by Owl Cyber Defense, talks to some of the most prominent influencers shaping government technology.</itunes:subtitle>
    <itunes:author>Carolyn Ford</itunes:author>
    <itunes:summary>Global technology is changing the way we live. Critical government decisions affect the intersection of technology advancement and human needs. This podcast talks to some of the most prominent influencers shaping the landscape to understand how they are leveraging technology to solve complex challenges while also meeting the needs of today's modern world.
</itunes:summary>
    <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/8/81d9d6b0-0045-48da-8495-fd87c4613d7f/cover.jpg?v=3"/>
    <itunes:explicit>no</itunes:explicit>
    <itunes:owner>
      <itunes:name>Carolyn Ford</itunes:name>
      <itunes:email>Galadrielford@gmail.com</itunes:email>
    </itunes:owner>
<itunes:category text="Technology"/>
<itunes:category text="Government"/>
<item>
  <title>Episode 119: 5 Steps to Zero Trust</title>
  <link>https://techtransforms.fireside.fm/119</link>
  <guid isPermaLink="false">5c5b615a-5393-47ff-9be4-f8efe6f8897b</guid>
  <pubDate>Tue, 17 Mar 2026 09:30:00 -0400</pubDate>
  <author>Carolyn Ford</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/81d9d6b0-0045-48da-8495-fd87c4613d7f/5c5b615a-5393-47ff-9be4-f8efe6f8897b.mp3" length="33764794" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>Carolyn Ford</itunes:author>
  <itunes:subtitle>In this follow-up episode of Tech Transforms, Carolyn Ford and Michael Blake of Owl Cyber Defense explore what it actually takes to begin implementing Zero Trust. From discovering shadow IT and legacy systems to microsegmentation and access control, the conversation focuses on the practical steps organizations must take to limit the blast radius of a breach. The episode also examines how leaders can prioritize critical assets and build the teams needed to sustain a Zero Trust strategy over time.</itunes:subtitle>
  <itunes:duration>27:29</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/8/81d9d6b0-0045-48da-8495-fd87c4613d7f/episodes/5/5c5b615a-5393-47ff-9be4-f8efe6f8897b/cover.jpg?v=3"/>
  <description>In this follow-up episode of Tech Transforms, Carolyn Ford continues her conversation with Michael Blake of Owl Cyber Defense, shifting from the theory of Zero Trust to the realities of implementing it. The discussion explores the first practical step, network discovery and why organizations are often surprised by shadow IT and legacy systems still operating inside their environments.
From there, Ford and Blake walk through the key stages of a Zero Trust journey, including microsegmentation, access management, and auditing privileges to prevent lateral movement and privilege creep. They also discuss the operational realities leaders face—budgeting, prioritizing critical assets or “crown jewels,” and ensuring organizations have the talent and resources needed to sustain a Zero Trust architecture.
The takeaway: Zero Trust isn’t a single deployment, it’s an ongoing journey that evolves alongside emerging threats and technologies.
Show Notes:
Michael Blake: https://www.linkedin.com/in/michael-blake-734b0a21/ | Email: mblake@owlcyberdefense.com
DoW  resources https://dowcio.war.gov/Library/: security controls, checklist, self assessment, Penn test guidelines etc
Zero Trust | www.dau.edu
Dell Technologies Project Fort Zero to Transform Security | Dell USA
MITRE papers on evolving  threats of giving AI access to network - https://ctid.mitre.org/blog/2025/05/09/secure-ai-v2/
Owl ZT resources: https://owlcyberdefense.com/zero-trust-cds/  
Vendors that assist with ZTX, listen to the BLUF Podcast summaries to know if they might be able to help you: https://theblufpodcast.podbean.com/e/theblufepisode12/ https://theblufpodcast.podbean.com/e/theblufepisode13/
</description>
  <itunes:keywords>zero trust, micro segmentation, Legacy systems, partnerships</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>In this follow-up episode of Tech Transforms, Carolyn Ford continues her conversation with Michael Blake of Owl Cyber Defense, shifting from the theory of Zero Trust to the realities of implementing it. The discussion explores the first practical step, network discovery and why organizations are often surprised by shadow IT and legacy systems still operating inside their environments.</p>

<p>From there, Ford and Blake walk through the key stages of a Zero Trust journey, including microsegmentation, access management, and auditing privileges to prevent lateral movement and privilege creep. They also discuss the operational realities leaders face—budgeting, prioritizing critical assets or “crown jewels,” and ensuring organizations have the talent and resources needed to sustain a Zero Trust architecture.</p>

<p>The takeaway: Zero Trust isn’t a single deployment, it’s an ongoing journey that evolves alongside emerging threats and technologies.</p>

<p>Show Notes:<br>
Michael Blake: <a href="https://www.linkedin.com/in/michael-blake-734b0a21/" rel="nofollow">https://www.linkedin.com/in/michael-blake-734b0a21/</a> | Email: <a href="mailto:mblake@owlcyberdefense.com" rel="nofollow">mblake@owlcyberdefense.com</a><br>
DoW  resources <a href="https://dowcio.war.gov/Library/:" rel="nofollow">https://dowcio.war.gov/Library/:</a> security controls, checklist, self assessment, Penn test guidelines etc<br>
Zero Trust | <a href="http://www.dau.edu" rel="nofollow">www.dau.edu</a><br>
Dell Technologies Project Fort Zero to Transform Security | Dell USA<br>
MITRE papers on evolving  threats of giving AI access to network - <a href="https://ctid.mitre.org/blog/2025/05/09/secure-ai-v2/" rel="nofollow">https://ctid.mitre.org/blog/2025/05/09/secure-ai-v2/</a><br>
Owl ZT resources: <a href="https://owlcyberdefense.com/zero-trust-cds/" rel="nofollow">https://owlcyberdefense.com/zero-trust-cds/</a><br><br>
Vendors that assist with ZTX, listen to the BLUF Podcast summaries to know if they might be able to help you: <a href="https://theblufpodcast.podbean.com/e/thebluf_episode12/" rel="nofollow">https://theblufpodcast.podbean.com/e/thebluf_episode12/</a> <a href="https://theblufpodcast.podbean.com/e/thebluf_episode13/" rel="nofollow">https://theblufpodcast.podbean.com/e/thebluf_episode13/</a></p>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>In this follow-up episode of Tech Transforms, Carolyn Ford continues her conversation with Michael Blake of Owl Cyber Defense, shifting from the theory of Zero Trust to the realities of implementing it. The discussion explores the first practical step, network discovery and why organizations are often surprised by shadow IT and legacy systems still operating inside their environments.</p>

<p>From there, Ford and Blake walk through the key stages of a Zero Trust journey, including microsegmentation, access management, and auditing privileges to prevent lateral movement and privilege creep. They also discuss the operational realities leaders face—budgeting, prioritizing critical assets or “crown jewels,” and ensuring organizations have the talent and resources needed to sustain a Zero Trust architecture.</p>

<p>The takeaway: Zero Trust isn’t a single deployment, it’s an ongoing journey that evolves alongside emerging threats and technologies.</p>

<p>Show Notes:<br>
Michael Blake: <a href="https://www.linkedin.com/in/michael-blake-734b0a21/" rel="nofollow">https://www.linkedin.com/in/michael-blake-734b0a21/</a> | Email: <a href="mailto:mblake@owlcyberdefense.com" rel="nofollow">mblake@owlcyberdefense.com</a><br>
DoW  resources <a href="https://dowcio.war.gov/Library/:" rel="nofollow">https://dowcio.war.gov/Library/:</a> security controls, checklist, self assessment, Penn test guidelines etc<br>
Zero Trust | <a href="http://www.dau.edu" rel="nofollow">www.dau.edu</a><br>
Dell Technologies Project Fort Zero to Transform Security | Dell USA<br>
MITRE papers on evolving  threats of giving AI access to network - <a href="https://ctid.mitre.org/blog/2025/05/09/secure-ai-v2/" rel="nofollow">https://ctid.mitre.org/blog/2025/05/09/secure-ai-v2/</a><br>
Owl ZT resources: <a href="https://owlcyberdefense.com/zero-trust-cds/" rel="nofollow">https://owlcyberdefense.com/zero-trust-cds/</a><br><br>
Vendors that assist with ZTX, listen to the BLUF Podcast summaries to know if they might be able to help you: <a href="https://theblufpodcast.podbean.com/e/thebluf_episode12/" rel="nofollow">https://theblufpodcast.podbean.com/e/thebluf_episode12/</a> <a href="https://theblufpodcast.podbean.com/e/thebluf_episode13/" rel="nofollow">https://theblufpodcast.podbean.com/e/thebluf_episode13/</a></p>]]>
  </itunes:summary>
</item>
  </channel>
</rss>
