<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" encoding="UTF-8" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:sy="http://purl.org/rss/1.0/modules/syndication/" xmlns:admin="http://webns.net/mvcb/" xmlns:atom="http://www.w3.org/2005/Atom/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:googleplay="http://www.google.com/schemas/play-podcasts/1.0" xmlns:itunes="http://www.itunes.com/dtds/podcast-1.0.dtd" xmlns:fireside="http://fireside.fm/modules/rss/fireside">
  <channel>
    <fireside:hostname>web02.fireside.fm</fireside:hostname>
    <fireside:genDate>Sun, 10 May 2026 15:11:18 -0500</fireside:genDate>
    <generator>Fireside (https://fireside.fm)</generator>
    <title>Tech Transforms - Episodes Tagged with “Owl Cyber Defense”</title>
    <link>https://techtransforms.fireside.fm/tags/owl%20cyber%20defense</link>
    <pubDate>Tue, 17 Mar 2026 09:30:00 -0400</pubDate>
    <description>Global technology is changing the way we live. Critical government decisions affect the intersection of technology advancement and human needs. This podcast talks to some of the most prominent influencers shaping the landscape to understand how they are leveraging technology to solve complex challenges while also meeting the needs of today's modern world.
</description>
    <language>en-us</language>
    <itunes:type>episodic</itunes:type>
    <itunes:subtitle>Tech Transforms, brought to you by Owl Cyber Defense, talks to some of the most prominent influencers shaping government technology.</itunes:subtitle>
    <itunes:author>Carolyn Ford</itunes:author>
    <itunes:summary>Global technology is changing the way we live. Critical government decisions affect the intersection of technology advancement and human needs. This podcast talks to some of the most prominent influencers shaping the landscape to understand how they are leveraging technology to solve complex challenges while also meeting the needs of today's modern world.
</itunes:summary>
    <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/8/81d9d6b0-0045-48da-8495-fd87c4613d7f/cover.jpg?v=3"/>
    <itunes:explicit>no</itunes:explicit>
    <itunes:owner>
      <itunes:name>Carolyn Ford</itunes:name>
      <itunes:email>Galadrielford@gmail.com</itunes:email>
    </itunes:owner>
<itunes:category text="Technology"/>
<itunes:category text="Government"/>
<item>
  <title>Episode 119: 5 Steps to Zero Trust</title>
  <link>https://techtransforms.fireside.fm/119</link>
  <guid isPermaLink="false">5c5b615a-5393-47ff-9be4-f8efe6f8897b</guid>
  <pubDate>Tue, 17 Mar 2026 09:30:00 -0400</pubDate>
  <author>Carolyn Ford</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/81d9d6b0-0045-48da-8495-fd87c4613d7f/5c5b615a-5393-47ff-9be4-f8efe6f8897b.mp3" length="33764794" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>Carolyn Ford</itunes:author>
  <itunes:subtitle>In this follow-up episode of Tech Transforms, Carolyn Ford and Michael Blake of Owl Cyber Defense explore what it actually takes to begin implementing Zero Trust. From discovering shadow IT and legacy systems to microsegmentation and access control, the conversation focuses on the practical steps organizations must take to limit the blast radius of a breach. The episode also examines how leaders can prioritize critical assets and build the teams needed to sustain a Zero Trust strategy over time.</itunes:subtitle>
  <itunes:duration>27:29</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/8/81d9d6b0-0045-48da-8495-fd87c4613d7f/episodes/5/5c5b615a-5393-47ff-9be4-f8efe6f8897b/cover.jpg?v=3"/>
  <description>&lt;p&gt;In this follow-up episode of Tech Transforms, Carolyn Ford continues her conversation with Michael Blake of Owl Cyber Defense, shifting from the theory of Zero Trust to the realities of implementing it. The discussion explores the first practical step, network discovery and why organizations are often surprised by shadow IT and legacy systems still operating inside their environments.&lt;/p&gt;

&lt;p&gt;From there, Ford and Blake walk through the key stages of a Zero Trust journey, including microsegmentation, access management, and auditing privileges to prevent lateral movement and privilege creep. They also discuss the operational realities leaders face—budgeting, prioritizing critical assets or “crown jewels,” and ensuring organizations have the talent and resources needed to sustain a Zero Trust architecture.&lt;/p&gt;

&lt;p&gt;The takeaway: Zero Trust isn’t a single deployment, it’s an ongoing journey that evolves alongside emerging threats and technologies.&lt;/p&gt;

&lt;p&gt;Show Notes:&lt;br&gt;
Michael Blake: &lt;a href="https://www.linkedin.com/in/michael-blake-734b0a21/" target="_blank" rel="nofollow noopener"&gt;https://www.linkedin.com/in/michael-blake-734b0a21/&lt;/a&gt; | Email: &lt;a href="mailto:mblake@owlcyberdefense.com" target="_blank" rel="nofollow noopener"&gt;mblake@owlcyberdefense.com&lt;/a&gt;&lt;br&gt;
DoW  resources &lt;a href="https://dowcio.war.gov/Library/:" target="_blank" rel="nofollow noopener"&gt;https://dowcio.war.gov/Library/:&lt;/a&gt; security controls, checklist, self assessment, Penn test guidelines etc&lt;br&gt;
Zero Trust | &lt;a href="http://www.dau.edu" target="_blank" rel="nofollow noopener"&gt;www.dau.edu&lt;/a&gt;&lt;br&gt;
Dell Technologies Project Fort Zero to Transform Security | Dell USA&lt;br&gt;
MITRE papers on evolving  threats of giving AI access to network - &lt;a href="https://ctid.mitre.org/blog/2025/05/09/secure-ai-v2/" target="_blank" rel="nofollow noopener"&gt;https://ctid.mitre.org/blog/2025/05/09/secure-ai-v2/&lt;/a&gt;&lt;br&gt;
Owl ZT resources: &lt;a href="https://owlcyberdefense.com/zero-trust-cds/" target="_blank" rel="nofollow noopener"&gt;https://owlcyberdefense.com/zero-trust-cds/&lt;/a&gt;&lt;br&gt;&lt;br&gt;
Vendors that assist with ZTX, listen to the BLUF Podcast summaries to know if they might be able to help you: &lt;a href="https://theblufpodcast.podbean.com/e/thebluf_episode12/" target="_blank" rel="nofollow noopener"&gt;https://theblufpodcast.podbean.com/e/thebluf_episode12/&lt;/a&gt; &lt;a href="https://theblufpodcast.podbean.com/e/thebluf_episode13/" target="_blank" rel="nofollow noopener"&gt;https://theblufpodcast.podbean.com/e/thebluf_episode13/&lt;/a&gt;&lt;/p&gt;
</description>
  <itunes:keywords>zero trust, micro segmentation, Legacy systems, partnerships</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>In this follow-up episode of Tech Transforms, Carolyn Ford continues her conversation with Michael Blake of Owl Cyber Defense, shifting from the theory of Zero Trust to the realities of implementing it. The discussion explores the first practical step, network discovery and why organizations are often surprised by shadow IT and legacy systems still operating inside their environments.</p>

<p>From there, Ford and Blake walk through the key stages of a Zero Trust journey, including microsegmentation, access management, and auditing privileges to prevent lateral movement and privilege creep. They also discuss the operational realities leaders face—budgeting, prioritizing critical assets or “crown jewels,” and ensuring organizations have the talent and resources needed to sustain a Zero Trust architecture.</p>

<p>The takeaway: Zero Trust isn’t a single deployment, it’s an ongoing journey that evolves alongside emerging threats and technologies.</p>

<p>Show Notes:<br>
Michael Blake: <a href="https://www.linkedin.com/in/michael-blake-734b0a21/" rel="nofollow">https://www.linkedin.com/in/michael-blake-734b0a21/</a> | Email: <a href="mailto:mblake@owlcyberdefense.com" rel="nofollow">mblake@owlcyberdefense.com</a><br>
DoW  resources <a href="https://dowcio.war.gov/Library/:" rel="nofollow">https://dowcio.war.gov/Library/:</a> security controls, checklist, self assessment, Penn test guidelines etc<br>
Zero Trust | <a href="http://www.dau.edu" rel="nofollow">www.dau.edu</a><br>
Dell Technologies Project Fort Zero to Transform Security | Dell USA<br>
MITRE papers on evolving  threats of giving AI access to network - <a href="https://ctid.mitre.org/blog/2025/05/09/secure-ai-v2/" rel="nofollow">https://ctid.mitre.org/blog/2025/05/09/secure-ai-v2/</a><br>
Owl ZT resources: <a href="https://owlcyberdefense.com/zero-trust-cds/" rel="nofollow">https://owlcyberdefense.com/zero-trust-cds/</a><br><br>
Vendors that assist with ZTX, listen to the BLUF Podcast summaries to know if they might be able to help you: <a href="https://theblufpodcast.podbean.com/e/thebluf_episode12/" rel="nofollow">https://theblufpodcast.podbean.com/e/thebluf_episode12/</a> <a href="https://theblufpodcast.podbean.com/e/thebluf_episode13/" rel="nofollow">https://theblufpodcast.podbean.com/e/thebluf_episode13/</a></p>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>In this follow-up episode of Tech Transforms, Carolyn Ford continues her conversation with Michael Blake of Owl Cyber Defense, shifting from the theory of Zero Trust to the realities of implementing it. The discussion explores the first practical step, network discovery and why organizations are often surprised by shadow IT and legacy systems still operating inside their environments.</p>

<p>From there, Ford and Blake walk through the key stages of a Zero Trust journey, including microsegmentation, access management, and auditing privileges to prevent lateral movement and privilege creep. They also discuss the operational realities leaders face—budgeting, prioritizing critical assets or “crown jewels,” and ensuring organizations have the talent and resources needed to sustain a Zero Trust architecture.</p>

<p>The takeaway: Zero Trust isn’t a single deployment, it’s an ongoing journey that evolves alongside emerging threats and technologies.</p>

<p>Show Notes:<br>
Michael Blake: <a href="https://www.linkedin.com/in/michael-blake-734b0a21/" rel="nofollow">https://www.linkedin.com/in/michael-blake-734b0a21/</a> | Email: <a href="mailto:mblake@owlcyberdefense.com" rel="nofollow">mblake@owlcyberdefense.com</a><br>
DoW  resources <a href="https://dowcio.war.gov/Library/:" rel="nofollow">https://dowcio.war.gov/Library/:</a> security controls, checklist, self assessment, Penn test guidelines etc<br>
Zero Trust | <a href="http://www.dau.edu" rel="nofollow">www.dau.edu</a><br>
Dell Technologies Project Fort Zero to Transform Security | Dell USA<br>
MITRE papers on evolving  threats of giving AI access to network - <a href="https://ctid.mitre.org/blog/2025/05/09/secure-ai-v2/" rel="nofollow">https://ctid.mitre.org/blog/2025/05/09/secure-ai-v2/</a><br>
Owl ZT resources: <a href="https://owlcyberdefense.com/zero-trust-cds/" rel="nofollow">https://owlcyberdefense.com/zero-trust-cds/</a><br><br>
Vendors that assist with ZTX, listen to the BLUF Podcast summaries to know if they might be able to help you: <a href="https://theblufpodcast.podbean.com/e/thebluf_episode12/" rel="nofollow">https://theblufpodcast.podbean.com/e/thebluf_episode12/</a> <a href="https://theblufpodcast.podbean.com/e/thebluf_episode13/" rel="nofollow">https://theblufpodcast.podbean.com/e/thebluf_episode13/</a></p>]]>
  </itunes:summary>
</item>
<item>
  <title>Episode 117: 2026 Predictions.  What's Now. What's Next. What's Urgent.</title>
  <link>https://techtransforms.fireside.fm/117</link>
  <guid isPermaLink="false">0d0c1022-0966-4f5b-95b9-5a2414246f50</guid>
  <pubDate>Fri, 27 Feb 2026 09:30:00 -0500</pubDate>
  <author>Carolyn Ford</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/81d9d6b0-0045-48da-8495-fd87c4613d7f/0d0c1022-0966-4f5b-95b9-5a2414246f50.mp3" length="69081976" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>Carolyn Ford</itunes:author>
  <itunes:subtitle>In this special 2026 Predictions episode of Tech Transforms, Carolyn Ford and the Owl Cyber Defense team unpack the signals already reshaping cybersecurity, AI, and defense. From the collapse of content trust to AI containment and hardware-enforced security, they explore why software alone won’t be enough in the year ahead. The message is clear: in 2026, leaders won’t lose because they lacked tools—they’ll lose because they trusted the wrong ones.</itunes:subtitle>
  <itunes:duration>57:31</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/8/81d9d6b0-0045-48da-8495-fd87c4613d7f/episodes/0/0d0c1022-0966-4f5b-95b9-5a2414246f50/cover.jpg?v=1"/>
  <description>&lt;p&gt;In this special 2026 Predictions episode of Tech Transforms, Carolyn Ford is joined by Brian Carter, Scott Orton, Ralph Spa, and Michael Blake from Owl Cyber Defense for a no-crystal-ball conversation about the signals already flashing across cybersecurity, defense, and digital trust.&lt;/p&gt;

&lt;p&gt;This isn’t speculation. It’s trajectory.&lt;/p&gt;

&lt;p&gt;The group tackles the accelerating collapse of content trust in a world of deepfakes, AI-generated media, and short-form misinformation. As generative tools become indistinguishable from reality, they predict a sharp shift toward deep identity assurance—powered by behavioral biometrics, cryptographic validation, and provable content provenance. In a future where “guaranteed human” becomes a competitive advantage, digital identity won’t be optional—it will be foundational.&lt;br&gt;
From there, the conversation moves into AI containment. The panel argues that we must stop treating AI like helpful software and start treating it like a privileged insider—with unpredictable outputs and real liability attached. The solution? Deterministic boundaries enforced in hardware. As Scott puts it: if you want to confine a tiger, you don’t build the cage out of meat.&lt;/p&gt;

&lt;p&gt;The episode also explores:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;The federal government’s accelerating shift from legacy primes to agile, non-incumbent innovators delivering 80% solutions faster&lt;/li&gt;
&lt;li&gt;Why battlefield communications must evolve beyond encryption to real-time, hardware-enforced trust&lt;/li&gt;
&lt;li&gt;How AI-powered offensive attacks are shrinking from teams to individuals—sometimes in Power Ranger suits&lt;/li&gt;
&lt;li&gt;The limits of Zero Trust when complexity, cost, and talent gaps collide&lt;/li&gt;
&lt;li&gt;Why cross-domain solutions and data diodes may be the real fail-safes in an increasingly networked world&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;Throughout the discussion, a clear thread emerges: software alone won’t save us. As systems grow more interconnected, autonomous, and AI-driven, trust must be anchored in hardware—simple, enforceable, and resistant to both human error and machine-scale attack.&lt;/p&gt;

&lt;p&gt;The takeaway for 2026? Security leaders won’t lose because they lacked tools. They’ll lose because they trusted the wrong ones.&lt;/p&gt;

&lt;p&gt;This episode challenges listeners to rethink modernization, containment, and what real trust looks like when machines are making decisions at machine speed.&lt;/p&gt;

&lt;p&gt;Stay curious. The future isn’t waiting.&lt;/p&gt;

&lt;p&gt;Shownotes&lt;br&gt;
Scott Orton: &lt;a href="https://www.linkedin.com/in/scottorton/" target="_blank" rel="nofollow noopener"&gt;LinkedIn&lt;/a&gt; | Email: &lt;a href="mailto:sorton@owlcyberdefense.com" target="_blank" rel="nofollow noopener"&gt;sorton@owlcyberdefense.com&lt;/a&gt;&lt;br&gt;
Brian Carter: &lt;a href="https://www.linkedin.com/in/brian-carter-4aba4a55/" target="_blank" rel="nofollow noopener"&gt;LinkedIn&lt;/a&gt; | Email:&lt;a href="mailto:bcarter@owlcyberdefense.com" target="_blank" rel="nofollow noopener"&gt;bcarter@owlcyberdefense.com&lt;/a&gt;&lt;br&gt;
Ralph Spada: &lt;a href="https://www.linkedin.com/in/ralphspada/" target="_blank" rel="nofollow noopener"&gt;LinkedIn&lt;/a&gt; | Email: &lt;a href="mailto:rspada@owlcyberdefense.com" target="_blank" rel="nofollow noopener"&gt;rspada@owlcyberdefense.com&lt;/a&gt;&lt;br&gt;
Michael Blake: &lt;a href="https://www.linkedin.com/in/michael-blake-734b0a21/" target="_blank" rel="nofollow noopener"&gt;https://www.linkedin.com/in/michael-blake-734b0a21/&lt;/a&gt; | Email: &lt;a href="mailto:mblake@owlcyberdefense.com" target="_blank" rel="nofollow noopener"&gt;mblake@owlcyberdefense.com&lt;/a&gt;&lt;br&gt;
Owl Cyber Defense: owlcyberdefense.com&lt;br&gt;
Download the 2026 Predictions Report:  &lt;a href="https://owlcyberdefense.com/resource/decision-advantage-forecast-five-security-shifts-in-2026/" target="_blank" rel="nofollow noopener"&gt;https://owlcyberdefense.com/resource/decision-advantage-forecast-five-security-shifts-in-2026/&lt;/a&gt;&lt;br&gt;
Story - Power Ranger Hacker: &lt;a href="https://futurism.com/artificial-intelligence/tinder-for-nazis-hacked" target="_blank" rel="nofollow noopener"&gt;https://futurism.com/artificial-intelligence/tinder-for-nazis-hacked&lt;/a&gt;&lt;/p&gt;
</description>
  <itunes:keywords>zero trust, owl cyber defense, tech transforms, cross-domain</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>In this special 2026 Predictions episode of Tech Transforms, Carolyn Ford is joined by Brian Carter, Scott Orton, Ralph Spa, and Michael Blake from Owl Cyber Defense for a no-crystal-ball conversation about the signals already flashing across cybersecurity, defense, and digital trust.</p>

<p>This isn’t speculation. It’s trajectory.</p>

<p>The group tackles the accelerating collapse of content trust in a world of deepfakes, AI-generated media, and short-form misinformation. As generative tools become indistinguishable from reality, they predict a sharp shift toward deep identity assurance—powered by behavioral biometrics, cryptographic validation, and provable content provenance. In a future where “guaranteed human” becomes a competitive advantage, digital identity won’t be optional—it will be foundational.<br>
From there, the conversation moves into AI containment. The panel argues that we must stop treating AI like helpful software and start treating it like a privileged insider—with unpredictable outputs and real liability attached. The solution? Deterministic boundaries enforced in hardware. As Scott puts it: if you want to confine a tiger, you don’t build the cage out of meat.</p>

<p>The episode also explores:</p>

<ul>
<li>The federal government’s accelerating shift from legacy primes to agile, non-incumbent innovators delivering 80% solutions faster</li>
<li>Why battlefield communications must evolve beyond encryption to real-time, hardware-enforced trust</li>
<li>How AI-powered offensive attacks are shrinking from teams to individuals—sometimes in Power Ranger suits</li>
<li>The limits of Zero Trust when complexity, cost, and talent gaps collide</li>
<li>Why cross-domain solutions and data diodes may be the real fail-safes in an increasingly networked world</li>
</ul>

<p>Throughout the discussion, a clear thread emerges: software alone won’t save us. As systems grow more interconnected, autonomous, and AI-driven, trust must be anchored in hardware—simple, enforceable, and resistant to both human error and machine-scale attack.</p>

<p>The takeaway for 2026? Security leaders won’t lose because they lacked tools. They’ll lose because they trusted the wrong ones.</p>

<p>This episode challenges listeners to rethink modernization, containment, and what real trust looks like when machines are making decisions at machine speed.</p>

<p>Stay curious. The future isn’t waiting.</p>

<p>Shownotes<br>
Scott Orton: <a href="https://www.linkedin.com/in/scottorton/" rel="nofollow">LinkedIn</a> | Email: <a href="mailto:sorton@owlcyberdefense.com" rel="nofollow">sorton@owlcyberdefense.com</a><br>
Brian Carter: <a href="https://www.linkedin.com/in/brian-carter-4aba4a55/" rel="nofollow">LinkedIn</a> | Email:<a href="mailto:bcarter@owlcyberdefense.com" rel="nofollow">bcarter@owlcyberdefense.com</a><br>
Ralph Spada: <a href="https://www.linkedin.com/in/ralphspada/" rel="nofollow">LinkedIn</a> | Email: <a href="mailto:rspada@owlcyberdefense.com" rel="nofollow">rspada@owlcyberdefense.com</a><br>
Michael Blake: <a href="https://www.linkedin.com/in/michael-blake-734b0a21/" rel="nofollow">https://www.linkedin.com/in/michael-blake-734b0a21/</a> | Email: <a href="mailto:mblake@owlcyberdefense.com" rel="nofollow">mblake@owlcyberdefense.com</a><br>
Owl Cyber Defense: owlcyberdefense.com<br>
Download the 2026 Predictions Report:  <a href="https://owlcyberdefense.com/resource/decision-advantage-forecast-five-security-shifts-in-2026/" rel="nofollow">https://owlcyberdefense.com/resource/decision-advantage-forecast-five-security-shifts-in-2026/</a><br>
Story - Power Ranger Hacker: <a href="https://futurism.com/artificial-intelligence/tinder-for-nazis-hacked" rel="nofollow">https://futurism.com/artificial-intelligence/tinder-for-nazis-hacked</a></p>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>In this special 2026 Predictions episode of Tech Transforms, Carolyn Ford is joined by Brian Carter, Scott Orton, Ralph Spa, and Michael Blake from Owl Cyber Defense for a no-crystal-ball conversation about the signals already flashing across cybersecurity, defense, and digital trust.</p>

<p>This isn’t speculation. It’s trajectory.</p>

<p>The group tackles the accelerating collapse of content trust in a world of deepfakes, AI-generated media, and short-form misinformation. As generative tools become indistinguishable from reality, they predict a sharp shift toward deep identity assurance—powered by behavioral biometrics, cryptographic validation, and provable content provenance. In a future where “guaranteed human” becomes a competitive advantage, digital identity won’t be optional—it will be foundational.<br>
From there, the conversation moves into AI containment. The panel argues that we must stop treating AI like helpful software and start treating it like a privileged insider—with unpredictable outputs and real liability attached. The solution? Deterministic boundaries enforced in hardware. As Scott puts it: if you want to confine a tiger, you don’t build the cage out of meat.</p>

<p>The episode also explores:</p>

<ul>
<li>The federal government’s accelerating shift from legacy primes to agile, non-incumbent innovators delivering 80% solutions faster</li>
<li>Why battlefield communications must evolve beyond encryption to real-time, hardware-enforced trust</li>
<li>How AI-powered offensive attacks are shrinking from teams to individuals—sometimes in Power Ranger suits</li>
<li>The limits of Zero Trust when complexity, cost, and talent gaps collide</li>
<li>Why cross-domain solutions and data diodes may be the real fail-safes in an increasingly networked world</li>
</ul>

<p>Throughout the discussion, a clear thread emerges: software alone won’t save us. As systems grow more interconnected, autonomous, and AI-driven, trust must be anchored in hardware—simple, enforceable, and resistant to both human error and machine-scale attack.</p>

<p>The takeaway for 2026? Security leaders won’t lose because they lacked tools. They’ll lose because they trusted the wrong ones.</p>

<p>This episode challenges listeners to rethink modernization, containment, and what real trust looks like when machines are making decisions at machine speed.</p>

<p>Stay curious. The future isn’t waiting.</p>

<p>Shownotes<br>
Scott Orton: <a href="https://www.linkedin.com/in/scottorton/" rel="nofollow">LinkedIn</a> | Email: <a href="mailto:sorton@owlcyberdefense.com" rel="nofollow">sorton@owlcyberdefense.com</a><br>
Brian Carter: <a href="https://www.linkedin.com/in/brian-carter-4aba4a55/" rel="nofollow">LinkedIn</a> | Email:<a href="mailto:bcarter@owlcyberdefense.com" rel="nofollow">bcarter@owlcyberdefense.com</a><br>
Ralph Spada: <a href="https://www.linkedin.com/in/ralphspada/" rel="nofollow">LinkedIn</a> | Email: <a href="mailto:rspada@owlcyberdefense.com" rel="nofollow">rspada@owlcyberdefense.com</a><br>
Michael Blake: <a href="https://www.linkedin.com/in/michael-blake-734b0a21/" rel="nofollow">https://www.linkedin.com/in/michael-blake-734b0a21/</a> | Email: <a href="mailto:mblake@owlcyberdefense.com" rel="nofollow">mblake@owlcyberdefense.com</a><br>
Owl Cyber Defense: owlcyberdefense.com<br>
Download the 2026 Predictions Report:  <a href="https://owlcyberdefense.com/resource/decision-advantage-forecast-five-security-shifts-in-2026/" rel="nofollow">https://owlcyberdefense.com/resource/decision-advantage-forecast-five-security-shifts-in-2026/</a><br>
Story - Power Ranger Hacker: <a href="https://futurism.com/artificial-intelligence/tinder-for-nazis-hacked" rel="nofollow">https://futurism.com/artificial-intelligence/tinder-for-nazis-hacked</a></p>]]>
  </itunes:summary>
</item>
<item>
  <title>Episode 111: One Woman’s Rebellion Against Reckless AI</title>
  <link>https://techtransforms.fireside.fm/111</link>
  <guid isPermaLink="false">bf31a00f-5ddb-4181-9e9d-b03daadfed94</guid>
  <pubDate>Tue, 25 Nov 2025 10:00:00 -0500</pubDate>
  <author>Carolyn Ford</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/81d9d6b0-0045-48da-8495-fd87c4613d7f/bf31a00f-5ddb-4181-9e9d-b03daadfed94.mp3" length="66886497" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>Carolyn Ford</itunes:author>
  <itunes:subtitle>AI risks aren’t sci-fi — they’re already woven into our schools, healthcare, and public systems.
In this week’s Tech Transforms, Carolyn talks with Janet Kang, Executive Director at Just Horizons Alliance, about ethical AI, real-time risk, and why we need “circuit breakers” for AI before harm scales.</itunes:subtitle>
  <itunes:duration>46:24</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/8/81d9d6b0-0045-48da-8495-fd87c4613d7f/episodes/b/bf31a00f-5ddb-4181-9e9d-b03daadfed94/cover.jpg?v=1"/>
  <description>&lt;p&gt;In this thought-provoking episode of Tech Transforms, host Carolyn Ford welcomes Janet Kang, a Silicon Valley entrepreneur turned nonprofit leader whose work sits at the intersection of AI innovation, ethics, and long-term societal impact. After building companies since age 13, launching multiple ed-tech ventures, and incubating AI-powered products in a corporate venture studio, Janet experienced firsthand the exhilarating speed and unsettling risks of deploying AI in real-world environments. Those experiences ultimately led her to join Just Horizons Alliance, a nonprofit committed to developing open protocols, ethical frameworks, and real-time auditing tools that help organizations build and deploy AI responsibly.&lt;/p&gt;

&lt;p&gt;Janet shares candid stories from the early days of AI adoption, where models behaved inconsistently, guardrails lagged behind product timelines, and the pressure to scale fast often overshadowed deeper questions of safety and accountability. She explains why today’s biggest risk isn’t far-off superintelligence; it's the immediate, under-regulated integration of AI into education, healthcare, hiring systems, and public services. For younger users especially, she warns, AI already shapes communication, decision-making, confidence, and even identity and most tech leaders lack the tools to properly assess or mitigate those risks.&lt;/p&gt;

&lt;p&gt;Carolyn and Janet explore why ethical AI requires more than thought leadership and policy statements. It requires action: adversarial testing, real-world simulations, contextual frameworks, and independent audits that account for messy human behavior, not just ideal use cases. They also discuss the structural barriers women face in tech, the mentors who “give up their seat” to make space, and the mindset shift that comes with parenthood thinking in decades, not quarters.&lt;br&gt;
Looking ahead, Janet envisions a future where AI becomes “infrastructure, not the main character” as invisible and reliable as flipping a light switch because circuit breakers, safety layers, and accountability systems are finally in place. Until then, she calls on builders, executives, educators, and policymakers to take practical steps now: test relentlessly, understand failure modes, prioritize vulnerable users, and choose impact over speed.&lt;/p&gt;

&lt;p&gt;This is an episode for leaders who want to innovate boldly and responsibly, those wrestling with how to balance progress with protection, and how to shape an AI-powered future worthy of the next generation.&lt;/p&gt;

&lt;p&gt;Show Notes:&lt;br&gt;
&lt;a href="http://www.justhorizons.org" target="_blank" rel="nofollow noopener"&gt;www.justhorizons.org&lt;/a&gt;&lt;br&gt;
&lt;a href="https://www.linkedin.com/in/kangjanet/" target="_blank" rel="nofollow noopener"&gt;https://www.linkedin.com/in/kangjanet/&lt;/a&gt;&lt;br&gt;
Pause superintelligence petition  - &lt;a href="https://www.axios.com/2025/10/22/superintelligence-ai-pause-yoshua-bengio" target="_blank" rel="nofollow noopener"&gt;https://www.axios.com/2025/10/22/superintelligence-ai-pause-yoshua-bengio&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Books Mentioned&lt;br&gt;
Empire of AI — Karen Hao&lt;br&gt;
The Alignment Problem — Brian Christian&lt;br&gt;
The Broken Earth Trilogy — N.K. Jemisin (recommended by Carolyn)&lt;/p&gt;
</description>
  <itunes:keywords>AI Ethics, TechTransforms,AI governance, AI for Good, AI safety frameworks</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>In this thought-provoking episode of Tech Transforms, host Carolyn Ford welcomes Janet Kang, a Silicon Valley entrepreneur turned nonprofit leader whose work sits at the intersection of AI innovation, ethics, and long-term societal impact. After building companies since age 13, launching multiple ed-tech ventures, and incubating AI-powered products in a corporate venture studio, Janet experienced firsthand the exhilarating speed and unsettling risks of deploying AI in real-world environments. Those experiences ultimately led her to join Just Horizons Alliance, a nonprofit committed to developing open protocols, ethical frameworks, and real-time auditing tools that help organizations build and deploy AI responsibly.</p>

<p>Janet shares candid stories from the early days of AI adoption, where models behaved inconsistently, guardrails lagged behind product timelines, and the pressure to scale fast often overshadowed deeper questions of safety and accountability. She explains why today’s biggest risk isn’t far-off superintelligence; it&#39;s the immediate, under-regulated integration of AI into education, healthcare, hiring systems, and public services. For younger users especially, she warns, AI already shapes communication, decision-making, confidence, and even identity and most tech leaders lack the tools to properly assess or mitigate those risks.</p>

<p>Carolyn and Janet explore why ethical AI requires more than thought leadership and policy statements. It requires action: adversarial testing, real-world simulations, contextual frameworks, and independent audits that account for messy human behavior, not just ideal use cases. They also discuss the structural barriers women face in tech, the mentors who “give up their seat” to make space, and the mindset shift that comes with parenthood thinking in decades, not quarters.<br>
Looking ahead, Janet envisions a future where AI becomes “infrastructure, not the main character” as invisible and reliable as flipping a light switch because circuit breakers, safety layers, and accountability systems are finally in place. Until then, she calls on builders, executives, educators, and policymakers to take practical steps now: test relentlessly, understand failure modes, prioritize vulnerable users, and choose impact over speed.</p>

<p>This is an episode for leaders who want to innovate boldly and responsibly, those wrestling with how to balance progress with protection, and how to shape an AI-powered future worthy of the next generation.</p>

<p>Show Notes:<br>
<a href="http://www.justhorizons.org" rel="nofollow">www.justhorizons.org</a><br>
<a href="https://www.linkedin.com/in/kangjanet/" rel="nofollow">https://www.linkedin.com/in/kangjanet/</a><br>
Pause superintelligence petition  - <a href="https://www.axios.com/2025/10/22/superintelligence-ai-pause-yoshua-bengio" rel="nofollow">https://www.axios.com/2025/10/22/superintelligence-ai-pause-yoshua-bengio</a></p>

<p>Books Mentioned<br>
Empire of AI — Karen Hao<br>
The Alignment Problem — Brian Christian<br>
The Broken Earth Trilogy — N.K. Jemisin (recommended by Carolyn)</p>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>In this thought-provoking episode of Tech Transforms, host Carolyn Ford welcomes Janet Kang, a Silicon Valley entrepreneur turned nonprofit leader whose work sits at the intersection of AI innovation, ethics, and long-term societal impact. After building companies since age 13, launching multiple ed-tech ventures, and incubating AI-powered products in a corporate venture studio, Janet experienced firsthand the exhilarating speed and unsettling risks of deploying AI in real-world environments. Those experiences ultimately led her to join Just Horizons Alliance, a nonprofit committed to developing open protocols, ethical frameworks, and real-time auditing tools that help organizations build and deploy AI responsibly.</p>

<p>Janet shares candid stories from the early days of AI adoption, where models behaved inconsistently, guardrails lagged behind product timelines, and the pressure to scale fast often overshadowed deeper questions of safety and accountability. She explains why today’s biggest risk isn’t far-off superintelligence; it&#39;s the immediate, under-regulated integration of AI into education, healthcare, hiring systems, and public services. For younger users especially, she warns, AI already shapes communication, decision-making, confidence, and even identity and most tech leaders lack the tools to properly assess or mitigate those risks.</p>

<p>Carolyn and Janet explore why ethical AI requires more than thought leadership and policy statements. It requires action: adversarial testing, real-world simulations, contextual frameworks, and independent audits that account for messy human behavior, not just ideal use cases. They also discuss the structural barriers women face in tech, the mentors who “give up their seat” to make space, and the mindset shift that comes with parenthood thinking in decades, not quarters.<br>
Looking ahead, Janet envisions a future where AI becomes “infrastructure, not the main character” as invisible and reliable as flipping a light switch because circuit breakers, safety layers, and accountability systems are finally in place. Until then, she calls on builders, executives, educators, and policymakers to take practical steps now: test relentlessly, understand failure modes, prioritize vulnerable users, and choose impact over speed.</p>

<p>This is an episode for leaders who want to innovate boldly and responsibly, those wrestling with how to balance progress with protection, and how to shape an AI-powered future worthy of the next generation.</p>

<p>Show Notes:<br>
<a href="http://www.justhorizons.org" rel="nofollow">www.justhorizons.org</a><br>
<a href="https://www.linkedin.com/in/kangjanet/" rel="nofollow">https://www.linkedin.com/in/kangjanet/</a><br>
Pause superintelligence petition  - <a href="https://www.axios.com/2025/10/22/superintelligence-ai-pause-yoshua-bengio" rel="nofollow">https://www.axios.com/2025/10/22/superintelligence-ai-pause-yoshua-bengio</a></p>

<p>Books Mentioned<br>
Empire of AI — Karen Hao<br>
The Alignment Problem — Brian Christian<br>
The Broken Earth Trilogy — N.K. Jemisin (recommended by Carolyn)</p>]]>
  </itunes:summary>
</item>
<item>
  <title>Episode 105: From Compliance to Capability: Securing the Federal Software Supply Chain in the Age of AI</title>
  <link>https://techtransforms.fireside.fm/105</link>
  <guid isPermaLink="false">b78757c1-8167-4e0d-8921-afe3fa00ca3b</guid>
  <pubDate>Tue, 09 Sep 2025 10:30:00 -0400</pubDate>
  <author>Carolyn Ford</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/81d9d6b0-0045-48da-8495-fd87c4613d7f/b78757c1-8167-4e0d-8921-afe3fa00ca3b.mp3" length="49888610" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>Carolyn Ford</itunes:author>
  <itunes:subtitle>On this episode of Tech Transforms, host Carolyn Ford welcomes Antoine Harden, Regional VP of Federal at Sonatype, to unpack one of the most urgent challenges in federal cybersecurity.</itunes:subtitle>
  <itunes:duration>40:57</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/8/81d9d6b0-0045-48da-8495-fd87c4613d7f/episodes/b/b78757c1-8167-4e0d-8921-afe3fa00ca3b/cover.jpg?v=1"/>
  <description>&lt;p&gt;On this episode of Tech Transforms, host Carolyn Ford welcomes Antoine Harden, Regional VP of Federal at Sonatype, to unpack one of the most urgent challenges in federal cybersecurity: securing the software supply chain. With more than 25 years of experience at Oracle, Google, and now Sonatype, Antoine shares why software supply chain risks from SolarWinds to Log4j have pushed SBOMs (Software Bills of Materials) and continuous monitoring into the spotlight.&lt;/p&gt;

&lt;p&gt;Together, they break down what SBOMs are (think nutrition labels for software), how mandates like Executive Order 14028 and frameworks like NIST’s Secure Software Development Framework (SSDF) and DoD’s SWFT are changing the compliance landscape, and why automation is essential to get from static ATOs to continuous authorization.&lt;/p&gt;

&lt;p&gt;Antoine also explains how Sonatype uses AI and software composition analysis tools to close critical gaps in open source and AI-heavy environments, helping agencies shift left, reduce vulnerabilities, and accelerate secure delivery of mission-critical systems. Along the way, the conversation covers everything from JFK delays caused by vulnerabilities, to the risks of “ludicrous speed” AI adoption, to the surprising history of Project Pigeon in WWII.&lt;/p&gt;

&lt;p&gt;For federal leaders ready to take action, Antoine offers one concrete step: start with a single mission-critical application, mandate an SBOM, and see what hidden risks you uncover.&lt;/p&gt;

&lt;p&gt;Show Notes:&lt;br&gt;
Connect with Antoine  &lt;a href="https://www.linkedin.com/in/antoine-harden-mba-035a441/" target="_blank" rel="nofollow noopener"&gt;https://www.linkedin.com/in/antoine-harden-mba-035a441/&lt;/a&gt; &lt;br&gt;
&lt;a href="https://www.federalregister.gov/documents/2021/05/17/2021-10460/improving-the-nations-cybersecurity" target="_blank" rel="nofollow noopener"&gt;Executive Order 14028&lt;/a&gt;&lt;a href="https://nvlpubs.nist.gov/nistpubs/specialpublications/nist.sp.800-218.pdf" target="_blank" rel="nofollow noopener"&gt;NIST Secure Software Development Framework (SSDF)&lt;/a&gt;&lt;br&gt;
&lt;a href="https://www.cisa.gov/zero-trust-maturity-model" target="_blank" rel="nofollow noopener"&gt;CISA Zero Trust Maturity Model&lt;/a&gt;&lt;br&gt;
&lt;a href="https://www.defense.gov/News/Releases/Release/Article/4174350/software-fast-track-initiative/" target="_blank" rel="nofollow noopener"&gt;DoD’s SWFT (Software Fast Track Initiative) &lt;/a&gt;&lt;br&gt;
&lt;a href="https://www.sonatype.com/resources?_gl=1*1jtfn7r*_up*MQ..*_ga*Mzc1ODU4NTM3LjE3NTYzMTc3NTc.*_ga_3W70E95Z6Q*czE3NTYzMTc3NTUkbzEkZzAkdDE3NTYzMTc3NTUkajYwJGwwJGgw*_ga_2TMM6KZPXQ*czE3NTYzMTc3NTUkbzEkZzAkdDE3NTYzMTc3NTUkajYwJGwwJGgw*_ga_08HT33J01V*czE3NTYzMTc3NTUkbzEkZzAkdDE3NTYzMTc3NTUkajYwJGwwJGgw" target="_blank" rel="nofollow noopener"&gt;Sonatype Resource Center&lt;/a&gt; &lt;/p&gt;
</description>
  <itunes:keywords>SBOM, Software Supply Chain, Compliance, AI</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>On this episode of Tech Transforms, host Carolyn Ford welcomes Antoine Harden, Regional VP of Federal at Sonatype, to unpack one of the most urgent challenges in federal cybersecurity: securing the software supply chain. With more than 25 years of experience at Oracle, Google, and now Sonatype, Antoine shares why software supply chain risks from SolarWinds to Log4j have pushed SBOMs (Software Bills of Materials) and continuous monitoring into the spotlight.</p>

<p>Together, they break down what SBOMs are (think nutrition labels for software), how mandates like Executive Order 14028 and frameworks like NIST’s Secure Software Development Framework (SSDF) and DoD’s SWFT are changing the compliance landscape, and why automation is essential to get from static ATOs to continuous authorization.</p>

<p>Antoine also explains how Sonatype uses AI and software composition analysis tools to close critical gaps in open source and AI-heavy environments, helping agencies shift left, reduce vulnerabilities, and accelerate secure delivery of mission-critical systems. Along the way, the conversation covers everything from JFK delays caused by vulnerabilities, to the risks of “ludicrous speed” AI adoption, to the surprising history of Project Pigeon in WWII.</p>

<p>For federal leaders ready to take action, Antoine offers one concrete step: start with a single mission-critical application, mandate an SBOM, and see what hidden risks you uncover.</p>

<p>Show Notes:<br>
Connect with Antoine  <a href="https://www.linkedin.com/in/antoine-harden-mba-035a441/" rel="nofollow">https://www.linkedin.com/in/antoine-harden-mba-035a441/</a> <br>
<a href="https://www.federalregister.gov/documents/2021/05/17/2021-10460/improving-the-nations-cybersecurity" rel="nofollow">Executive Order 14028</a><a href="https://nvlpubs.nist.gov/nistpubs/specialpublications/nist.sp.800-218.pdf" rel="nofollow">NIST Secure Software Development Framework (SSDF)</a><br>
<a href="https://www.cisa.gov/zero-trust-maturity-model" rel="nofollow">CISA Zero Trust Maturity Model</a><br>
<a href="https://www.defense.gov/News/Releases/Release/Article/4174350/software-fast-track-initiative/" rel="nofollow">DoD’s SWFT (Software Fast Track Initiative) </a><br>
<a href="https://www.sonatype.com/resources?_gl=1*1jtfn7r*_up*MQ..*_ga*Mzc1ODU4NTM3LjE3NTYzMTc3NTc.*_ga_3W70E95Z6Q*czE3NTYzMTc3NTUkbzEkZzAkdDE3NTYzMTc3NTUkajYwJGwwJGgw*_ga_2TMM6KZPXQ*czE3NTYzMTc3NTUkbzEkZzAkdDE3NTYzMTc3NTUkajYwJGwwJGgw*_ga_08HT33J01V*czE3NTYzMTc3NTUkbzEkZzAkdDE3NTYzMTc3NTUkajYwJGwwJGgw" rel="nofollow">Sonatype Resource Center</a></p>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>On this episode of Tech Transforms, host Carolyn Ford welcomes Antoine Harden, Regional VP of Federal at Sonatype, to unpack one of the most urgent challenges in federal cybersecurity: securing the software supply chain. With more than 25 years of experience at Oracle, Google, and now Sonatype, Antoine shares why software supply chain risks from SolarWinds to Log4j have pushed SBOMs (Software Bills of Materials) and continuous monitoring into the spotlight.</p>

<p>Together, they break down what SBOMs are (think nutrition labels for software), how mandates like Executive Order 14028 and frameworks like NIST’s Secure Software Development Framework (SSDF) and DoD’s SWFT are changing the compliance landscape, and why automation is essential to get from static ATOs to continuous authorization.</p>

<p>Antoine also explains how Sonatype uses AI and software composition analysis tools to close critical gaps in open source and AI-heavy environments, helping agencies shift left, reduce vulnerabilities, and accelerate secure delivery of mission-critical systems. Along the way, the conversation covers everything from JFK delays caused by vulnerabilities, to the risks of “ludicrous speed” AI adoption, to the surprising history of Project Pigeon in WWII.</p>

<p>For federal leaders ready to take action, Antoine offers one concrete step: start with a single mission-critical application, mandate an SBOM, and see what hidden risks you uncover.</p>

<p>Show Notes:<br>
Connect with Antoine  <a href="https://www.linkedin.com/in/antoine-harden-mba-035a441/" rel="nofollow">https://www.linkedin.com/in/antoine-harden-mba-035a441/</a> <br>
<a href="https://www.federalregister.gov/documents/2021/05/17/2021-10460/improving-the-nations-cybersecurity" rel="nofollow">Executive Order 14028</a><a href="https://nvlpubs.nist.gov/nistpubs/specialpublications/nist.sp.800-218.pdf" rel="nofollow">NIST Secure Software Development Framework (SSDF)</a><br>
<a href="https://www.cisa.gov/zero-trust-maturity-model" rel="nofollow">CISA Zero Trust Maturity Model</a><br>
<a href="https://www.defense.gov/News/Releases/Release/Article/4174350/software-fast-track-initiative/" rel="nofollow">DoD’s SWFT (Software Fast Track Initiative) </a><br>
<a href="https://www.sonatype.com/resources?_gl=1*1jtfn7r*_up*MQ..*_ga*Mzc1ODU4NTM3LjE3NTYzMTc3NTc.*_ga_3W70E95Z6Q*czE3NTYzMTc3NTUkbzEkZzAkdDE3NTYzMTc3NTUkajYwJGwwJGgw*_ga_2TMM6KZPXQ*czE3NTYzMTc3NTUkbzEkZzAkdDE3NTYzMTc3NTUkajYwJGwwJGgw*_ga_08HT33J01V*czE3NTYzMTc3NTUkbzEkZzAkdDE3NTYzMTc3NTUkajYwJGwwJGgw" rel="nofollow">Sonatype Resource Center</a></p>]]>
  </itunes:summary>
</item>
<item>
  <title>Episode 103: From GOTS to COTS: How Policy and Innovation Are Reshaping the Tactical Edge</title>
  <link>https://techtransforms.fireside.fm/103</link>
  <guid isPermaLink="false">6ca06898-4ba5-4774-9fcb-b3bd6f16366e</guid>
  <pubDate>Tue, 12 Aug 2025 12:00:00 -0400</pubDate>
  <author>Carolyn Ford</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/81d9d6b0-0045-48da-8495-fd87c4613d7f/6ca06898-4ba5-4774-9fcb-b3bd6f16366e.mp3" length="51151022" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>Carolyn Ford</itunes:author>
  <itunes:subtitle>What does the federal government’s new COTS-first mandate really mean for defense tech? Carolyn Ford talks with Dom Perez, CTO at Curtiss-Wright Defense Solutions, about the pressure to justify GOTS in 60 days, how CSFC is reshaping secure comms, and why real innovation might just come in a Rubbermaid tote.</itunes:subtitle>
  <itunes:duration>42:33</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/8/81d9d6b0-0045-48da-8495-fd87c4613d7f/episodes/6/6ca06898-4ba5-4774-9fcb-b3bd6f16366e/cover.jpg?v=1"/>
  <description>&lt;p&gt;*&lt;em&gt;COTS vs. GOTS: What the Federal Mandate Really Means with Dom Perez&lt;br&gt;
*&lt;/em&gt;&lt;br&gt;
In this episode of Tech Transforms, host Carolyn Ford is joined by Dominic Perez, CTO of Curtiss-Wright Defense Solutions, to break down one of the hottest topics in defense tech: the federal government’s new COTS-first mandate.&lt;/p&gt;

&lt;p&gt;What happens when agencies must justify government-off-the-shelf (GOTS) solutions in 60 days or lose funding? Dom shares what this means for acquisition teams, why the policy might create more confusion than clarity, and how commercial solutions for classified (CSfC) are transforming secure communications in the field.&lt;/p&gt;

&lt;p&gt;From rugged mesh networks to “MacGyvered” mission-ready tech, Dom takes us behind the scenes of CSFC innovation, explaining how rapid deployment, lifecycle savings, and mission flexibility are driving real change.&lt;/p&gt;

&lt;p&gt;If you’ve ever wondered how defense innovation happens at the speed of relevance or what’s really in that “Rubbermaid tote” this one’s for you.&lt;/p&gt;

&lt;p&gt;Topics include:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;The 60-day COTS mandate and its real-world impact&lt;/li&gt;
&lt;li&gt;CSFC vs. Type 1: Speed, security, and scale&lt;/li&gt;
&lt;li&gt;What government and industry must do better&lt;/li&gt;
&lt;li&gt;Why the coolest tech might not come from GOTS anymore&lt;/li&gt;
&lt;li&gt;The value of failure, fast iteration, and field-informed design&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;Follow Dom Perez on LinkedIn for more insights and check out Curtiss-Wright’s whitepapers on modular open systems, CSFC, and edge AI.&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Dominic Perez LinkedIn:  &lt;a href="https://www.linkedin.com/in/dominicperez/" target="_blank" rel="nofollow noopener"&gt;https://www.linkedin.com/in/dominicperez/&lt;/a&gt;
&lt;/li&gt;
&lt;li&gt;Curtiss Wright White Papers:  &lt;a href="https://www.curtisswrightds.com/resources/white-papers" target="_blank" rel="nofollow noopener"&gt;https://www.curtisswrightds.com/resources/white-papers&lt;/a&gt;
&lt;/li&gt;
&lt;/ul&gt;
</description>
  <itunes:keywords>COTS, GOTS, CSfC, Defense Tech, Cybersecurity</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>*<em>COTS vs. GOTS: What the Federal Mandate Really Means with Dom Perez<br>
*</em><br>
In this episode of Tech Transforms, host Carolyn Ford is joined by Dominic Perez, CTO of Curtiss-Wright Defense Solutions, to break down one of the hottest topics in defense tech: the federal government’s new COTS-first mandate.</p>

<p>What happens when agencies must justify government-off-the-shelf (GOTS) solutions in 60 days or lose funding? Dom shares what this means for acquisition teams, why the policy might create more confusion than clarity, and how commercial solutions for classified (CSfC) are transforming secure communications in the field.</p>

<p>From rugged mesh networks to “MacGyvered” mission-ready tech, Dom takes us behind the scenes of CSFC innovation, explaining how rapid deployment, lifecycle savings, and mission flexibility are driving real change.</p>

<p>If you’ve ever wondered how defense innovation happens at the speed of relevance or what’s really in that “Rubbermaid tote” this one’s for you.</p>

<p>Topics include:</p>

<ul>
<li>The 60-day COTS mandate and its real-world impact</li>
<li>CSFC vs. Type 1: Speed, security, and scale</li>
<li>What government and industry must do better</li>
<li>Why the coolest tech might not come from GOTS anymore</li>
<li>The value of failure, fast iteration, and field-informed design</li>
</ul>

<p>Follow Dom Perez on LinkedIn for more insights and check out Curtiss-Wright’s whitepapers on modular open systems, CSFC, and edge AI.</p>

<ul>
<li>Dominic Perez LinkedIn:  <a href="https://www.linkedin.com/in/dominicperez/" rel="nofollow">https://www.linkedin.com/in/dominicperez/</a></li>
<li>Curtiss Wright White Papers:  <a href="https://www.curtisswrightds.com/resources/white-papers" rel="nofollow">https://www.curtisswrightds.com/resources/white-papers</a></li>
</ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>*<em>COTS vs. GOTS: What the Federal Mandate Really Means with Dom Perez<br>
*</em><br>
In this episode of Tech Transforms, host Carolyn Ford is joined by Dominic Perez, CTO of Curtiss-Wright Defense Solutions, to break down one of the hottest topics in defense tech: the federal government’s new COTS-first mandate.</p>

<p>What happens when agencies must justify government-off-the-shelf (GOTS) solutions in 60 days or lose funding? Dom shares what this means for acquisition teams, why the policy might create more confusion than clarity, and how commercial solutions for classified (CSfC) are transforming secure communications in the field.</p>

<p>From rugged mesh networks to “MacGyvered” mission-ready tech, Dom takes us behind the scenes of CSFC innovation, explaining how rapid deployment, lifecycle savings, and mission flexibility are driving real change.</p>

<p>If you’ve ever wondered how defense innovation happens at the speed of relevance or what’s really in that “Rubbermaid tote” this one’s for you.</p>

<p>Topics include:</p>

<ul>
<li>The 60-day COTS mandate and its real-world impact</li>
<li>CSFC vs. Type 1: Speed, security, and scale</li>
<li>What government and industry must do better</li>
<li>Why the coolest tech might not come from GOTS anymore</li>
<li>The value of failure, fast iteration, and field-informed design</li>
</ul>

<p>Follow Dom Perez on LinkedIn for more insights and check out Curtiss-Wright’s whitepapers on modular open systems, CSFC, and edge AI.</p>

<ul>
<li>Dominic Perez LinkedIn:  <a href="https://www.linkedin.com/in/dominicperez/" rel="nofollow">https://www.linkedin.com/in/dominicperez/</a></li>
<li>Curtiss Wright White Papers:  <a href="https://www.curtisswrightds.com/resources/white-papers" rel="nofollow">https://www.curtisswrightds.com/resources/white-papers</a></li>
</ul>]]>
  </itunes:summary>
</item>
  </channel>
</rss>
