<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" encoding="UTF-8" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:sy="http://purl.org/rss/1.0/modules/syndication/" xmlns:admin="http://webns.net/mvcb/" xmlns:atom="http://www.w3.org/2005/Atom/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:googleplay="http://www.google.com/schemas/play-podcasts/1.0" xmlns:itunes="http://www.itunes.com/dtds/podcast-1.0.dtd" xmlns:fireside="http://fireside.fm/modules/rss/fireside">
  <channel>
    <fireside:hostname>web01.fireside.fm</fireside:hostname>
    <fireside:genDate>Sun, 10 May 2026 17:40:42 -0500</fireside:genDate>
    <generator>Fireside (https://fireside.fm)</generator>
    <title>Tech Transforms - Episodes Tagged with “Owlcyberdefense”</title>
    <link>https://techtransforms.fireside.fm/tags/owlcyberdefense</link>
    <pubDate>Thu, 07 May 2026 10:00:00 -0400</pubDate>
    <description>Global technology is changing the way we live. Critical government decisions affect the intersection of technology advancement and human needs. This podcast talks to some of the most prominent influencers shaping the landscape to understand how they are leveraging technology to solve complex challenges while also meeting the needs of today's modern world.
</description>
    <language>en-us</language>
    <itunes:type>episodic</itunes:type>
    <itunes:subtitle>Tech Transforms, brought to you by Owl Cyber Defense, talks to some of the most prominent influencers shaping government technology.</itunes:subtitle>
    <itunes:author>Carolyn Ford</itunes:author>
    <itunes:summary>Global technology is changing the way we live. Critical government decisions affect the intersection of technology advancement and human needs. This podcast talks to some of the most prominent influencers shaping the landscape to understand how they are leveraging technology to solve complex challenges while also meeting the needs of today's modern world.
</itunes:summary>
    <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/8/81d9d6b0-0045-48da-8495-fd87c4613d7f/cover.jpg?v=3"/>
    <itunes:explicit>no</itunes:explicit>
    <itunes:owner>
      <itunes:name>Carolyn Ford</itunes:name>
      <itunes:email>Galadrielford@gmail.com</itunes:email>
    </itunes:owner>
<itunes:category text="Technology"/>
<itunes:category text="Government"/>
<item>
  <title>Episode 123: Breaking the 18-Month Barrier: How StormBreaker is Trading Red Tape for Rapid Delivery</title>
  <link>https://techtransforms.fireside.fm/123</link>
  <guid isPermaLink="false">fbac3197-157c-4228-94d4-eefbc03d7d9c</guid>
  <pubDate>Thu, 07 May 2026 10:00:00 -0400</pubDate>
  <author>Carolyn Ford</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/81d9d6b0-0045-48da-8495-fd87c4613d7f/fbac3197-157c-4228-94d4-eefbc03d7d9c.mp3" length="58659803" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>Carolyn Ford</itunes:author>
  <itunes:subtitle> Dave Raley is transforming federal IT through Operation Stormbreaker, a platform that reduces deployment timelines from months to minutes. By shifting to shared infrastructure, continuous authorization, and containerized development, the Marine Corps is breaking free from the legacy “maintenance trap.” The result is faster, more secure innovation that brings real capability into production—when it actually matters.</itunes:subtitle>
  <itunes:duration>48:50</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/8/81d9d6b0-0045-48da-8495-fd87c4613d7f/episodes/f/fbac3197-157c-4228-94d4-eefbc03d7d9c/cover.jpg?v=1"/>
  <description>&lt;p&gt;In this episode of Tech Transforms, Carolyn Ford sits down with Dave Raley, Chief Digital Business Officer at Marine Corps Community Services, to unpack one of the most persistent challenges in federal IT: why innovation moves so slowly and how that can change.&lt;/p&gt;

&lt;p&gt;At the center of the conversation is Operation Stormbreaker, the Marine Corps’ only RAISE-certified software factory, designed to eliminate the inefficiencies that plague government technology deployment. Dave explains how agencies fall into a “maintenance trap,” where nearly 80% of IT budgets are consumed by legacy systems, leaving little room for modernization. The root issue, he argues, isn’t just technology, it’s architecture. By shifting from rebuilding infrastructure for every application to a shared platform-as-a-service model, Stormbreaker allows mission owners to inherit infrastructure, security, and authorization dramatically reducing both cost and complexity. &lt;/p&gt;

&lt;p&gt;The impact is significant. What once took 12–18 months to deploy can now be achieved in minutes through automated pipelines, containerized workloads, and continuous authorization. Rey breaks down how this model transforms the notoriously slow Authority to Operate (ATO) process, enabling faster innovation without sacrificing security. The discussion also highlights how this approach lowers barriers for vendors, accelerates adoption of emerging technologies like AI, and creates a more agile, production-focused culture within government.&lt;/p&gt;

&lt;p&gt;Beyond the technical architecture, the episode explores the cultural resistance to change across federal systems and the need to simplify complex cybersecurity processes for mission owners. Rey emphasizes that true modernization isn’t about new tools, it’s about rethinking how systems are built, secured, and delivered at scale.&lt;/p&gt;

&lt;p&gt;Show Notes:&lt;br&gt;
Dave Raley LinkedIn:  &lt;a href="https://www.linkedin.com/in/daveraley/" target="_blank" rel="nofollow noopener"&gt;https://www.linkedin.com/in/daveraley/&lt;/a&gt;&lt;br&gt;
Marine Corps Community Service:  &lt;a href="https://www.usmc-mccs.org/" target="_blank" rel="nofollow noopener"&gt;https://www.usmc-mccs.org/&lt;/a&gt;&lt;br&gt;
White Paper: Clarifying Cloud Foundations: Understanding PaaS vs. IaaS &lt;br&gt;
Operation StormBreaker: &lt;a href="https://operationstormbreaker.usmc-mccs.org/" target="_blank" rel="nofollow noopener"&gt;https://operationstormbreaker.usmc-mccs.org/&lt;/a&gt; &lt;/p&gt;
</description>
  <itunes:keywords>Federal IT modernization, Continuous Authorization, Zero Trust architecture</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>In this episode of Tech Transforms, Carolyn Ford sits down with Dave Raley, Chief Digital Business Officer at Marine Corps Community Services, to unpack one of the most persistent challenges in federal IT: why innovation moves so slowly and how that can change.</p>

<p>At the center of the conversation is Operation Stormbreaker, the Marine Corps’ only RAISE-certified software factory, designed to eliminate the inefficiencies that plague government technology deployment. Dave explains how agencies fall into a “maintenance trap,” where nearly 80% of IT budgets are consumed by legacy systems, leaving little room for modernization. The root issue, he argues, isn’t just technology, it’s architecture. By shifting from rebuilding infrastructure for every application to a shared platform-as-a-service model, Stormbreaker allows mission owners to inherit infrastructure, security, and authorization dramatically reducing both cost and complexity. </p>

<p>The impact is significant. What once took 12–18 months to deploy can now be achieved in minutes through automated pipelines, containerized workloads, and continuous authorization. Rey breaks down how this model transforms the notoriously slow Authority to Operate (ATO) process, enabling faster innovation without sacrificing security. The discussion also highlights how this approach lowers barriers for vendors, accelerates adoption of emerging technologies like AI, and creates a more agile, production-focused culture within government.</p>

<p>Beyond the technical architecture, the episode explores the cultural resistance to change across federal systems and the need to simplify complex cybersecurity processes for mission owners. Rey emphasizes that true modernization isn’t about new tools, it’s about rethinking how systems are built, secured, and delivered at scale.</p>

<p>Show Notes:<br>
Dave Raley LinkedIn:  <a href="https://www.linkedin.com/in/daveraley/" rel="nofollow">https://www.linkedin.com/in/daveraley/</a><br>
Marine Corps Community Service:  <a href="https://www.usmc-mccs.org/" rel="nofollow">https://www.usmc-mccs.org/</a><br>
White Paper: Clarifying Cloud Foundations: Understanding PaaS vs. IaaS <br>
Operation StormBreaker: <a href="https://operationstormbreaker.usmc-mccs.org/" rel="nofollow">https://operationstormbreaker.usmc-mccs.org/</a> </p>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>In this episode of Tech Transforms, Carolyn Ford sits down with Dave Raley, Chief Digital Business Officer at Marine Corps Community Services, to unpack one of the most persistent challenges in federal IT: why innovation moves so slowly and how that can change.</p>

<p>At the center of the conversation is Operation Stormbreaker, the Marine Corps’ only RAISE-certified software factory, designed to eliminate the inefficiencies that plague government technology deployment. Dave explains how agencies fall into a “maintenance trap,” where nearly 80% of IT budgets are consumed by legacy systems, leaving little room for modernization. The root issue, he argues, isn’t just technology, it’s architecture. By shifting from rebuilding infrastructure for every application to a shared platform-as-a-service model, Stormbreaker allows mission owners to inherit infrastructure, security, and authorization dramatically reducing both cost and complexity. </p>

<p>The impact is significant. What once took 12–18 months to deploy can now be achieved in minutes through automated pipelines, containerized workloads, and continuous authorization. Rey breaks down how this model transforms the notoriously slow Authority to Operate (ATO) process, enabling faster innovation without sacrificing security. The discussion also highlights how this approach lowers barriers for vendors, accelerates adoption of emerging technologies like AI, and creates a more agile, production-focused culture within government.</p>

<p>Beyond the technical architecture, the episode explores the cultural resistance to change across federal systems and the need to simplify complex cybersecurity processes for mission owners. Rey emphasizes that true modernization isn’t about new tools, it’s about rethinking how systems are built, secured, and delivered at scale.</p>

<p>Show Notes:<br>
Dave Raley LinkedIn:  <a href="https://www.linkedin.com/in/daveraley/" rel="nofollow">https://www.linkedin.com/in/daveraley/</a><br>
Marine Corps Community Service:  <a href="https://www.usmc-mccs.org/" rel="nofollow">https://www.usmc-mccs.org/</a><br>
White Paper: Clarifying Cloud Foundations: Understanding PaaS vs. IaaS <br>
Operation StormBreaker: <a href="https://operationstormbreaker.usmc-mccs.org/" rel="nofollow">https://operationstormbreaker.usmc-mccs.org/</a> </p>]]>
  </itunes:summary>
</item>
<item>
  <title>Episode 122: Making the Complex, Comprehensible</title>
  <link>https://techtransforms.fireside.fm/122</link>
  <guid isPermaLink="false">26f9f601-b924-410a-bf7f-64adb249b0e2</guid>
  <pubDate>Tue, 28 Apr 2026 10:00:00 -0400</pubDate>
  <author>Carolyn Ford</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/81d9d6b0-0045-48da-8495-fd87c4613d7f/26f9f601-b924-410a-bf7f-64adb249b0e2.mp3" length="67492526" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>Carolyn Ford</itunes:author>
  <itunes:subtitle>Carolyn Ford sits down with Dharma Patner of Contrast &amp; Co. to explore how organizations can turn complex, technical ideas into clear, compelling stories. The conversation dives into the power of metaphors, visual storytelling, and foundational brand ideas to make cybersecurity—and any technology—more understandable and memorable. Ultimately, it’s a reminder that even the most advanced solutions only matter if people can grasp their value.</itunes:subtitle>
  <itunes:duration>56:10</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/8/81d9d6b0-0045-48da-8495-fd87c4613d7f/episodes/2/26f9f601-b924-410a-bf7f-64adb249b0e2/cover.jpg?v=1"/>
  <description>&lt;p&gt;Today we shift the focus from cyber threats to a challenge that may be just as critical: how to communicate complex technology in a way that actually resonates. Joined by Dharma Pachner, Founder and Chief Creative Officer of Contrast &amp;amp; Co., the conversation explores why even the most advanced cybersecurity solutions fail if their value isn’t clearly understood and how better storytelling can change that. &lt;/p&gt;

&lt;p&gt;Dharma breaks down the art and science of simplifying the abstract, showing how strong brand foundations, metaphors, and visual storytelling can transform highly technical concepts into ideas people immediately grasp. From replacing overused “binary code and padlock” imagery with meaningful visual systems, to building foundational brand ideas that elevate messaging beyond features, the discussion highlights how clarity, emotion, and differentiation are essential in crowded tech markets. &lt;/p&gt;

&lt;p&gt;The episode also brings these principles down to a practical level, offering exercises and frameworks that anyone—not just designers—can use to improve communication, whether pitching a solution, securing budget, or aligning a team. Ultimately, the conversation reinforces a powerful idea: in cybersecurity and beyond, success isn’t just about what you build—it’s about how well you make others understand, remember, and care about it.&lt;/p&gt;

&lt;p&gt;Show Notes:&lt;br&gt;
Contrast &amp;amp; Co - &lt;a href="https://www.contrastandco.com/" target="_blank" rel="nofollow noopener"&gt;https://www.contrastandco.com/&lt;/a&gt;&lt;br&gt;
Dharma Pachner - &lt;a href="https://www.linkedin.com/in/dpachner/" target="_blank" rel="nofollow noopener"&gt;https://www.linkedin.com/in/dpachner/&lt;/a&gt;&lt;br&gt;
INKY: &lt;a href="https://inky.com" target="_blank" rel="nofollow noopener"&gt;https://inky.com&lt;/a&gt;&lt;br&gt;
DarkWebID: &lt;a href="https://www.darkwebid.com" target="_blank" rel="nofollow noopener"&gt;https://www.darkwebid.com&lt;/a&gt;&lt;br&gt;
CyCognito: &lt;a href="https://www.cycognito.com" target="_blank" rel="nofollow noopener"&gt;https://www.cycognito.com&lt;/a&gt;&lt;br&gt;
OWL Cyber Defense: &lt;a href="https://owlcyberdefense.com" target="_blank" rel="nofollow noopener"&gt;https://owlcyberdefense.com&lt;/a&gt;&lt;br&gt;
Worksheet:  &lt;a href="https://www.dropbox.com/scl/fi/36n0zjooq4pi7mlv6ugkt/OWL_podcast_worksheets.pdf?rlkey=ssdpyio5cqktsakz5s1vdogcu&amp;amp;dl=0" target="_blank" rel="nofollow noopener"&gt;https://www.dropbox.com/scl/fi/36n0zjooq4pi7mlv6ugkt/OWL_podcast_worksheets.pdf?rlkey=ssdpyio5cqktsakz5s1vdogcu&amp;amp;amp;dl=0&lt;/a&gt; &lt;/p&gt;
</description>
  <itunes:keywords>Technology Storytelling, CyberSecurity Storytelling, communicating technology, go to market, brand identity</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>Today we shift the focus from cyber threats to a challenge that may be just as critical: how to communicate complex technology in a way that actually resonates. Joined by Dharma Pachner, Founder and Chief Creative Officer of Contrast &amp; Co., the conversation explores why even the most advanced cybersecurity solutions fail if their value isn’t clearly understood and how better storytelling can change that. </p>

<p>Dharma breaks down the art and science of simplifying the abstract, showing how strong brand foundations, metaphors, and visual storytelling can transform highly technical concepts into ideas people immediately grasp. From replacing overused “binary code and padlock” imagery with meaningful visual systems, to building foundational brand ideas that elevate messaging beyond features, the discussion highlights how clarity, emotion, and differentiation are essential in crowded tech markets. </p>

<p>The episode also brings these principles down to a practical level, offering exercises and frameworks that anyone—not just designers—can use to improve communication, whether pitching a solution, securing budget, or aligning a team. Ultimately, the conversation reinforces a powerful idea: in cybersecurity and beyond, success isn’t just about what you build—it’s about how well you make others understand, remember, and care about it.</p>

<p>Show Notes:<br>
Contrast &amp; Co - <a href="https://www.contrastandco.com/" rel="nofollow">https://www.contrastandco.com/</a><br>
Dharma Pachner - <a href="https://www.linkedin.com/in/dpachner/" rel="nofollow">https://www.linkedin.com/in/dpachner/</a><br>
INKY: <a href="https://inky.com" rel="nofollow">https://inky.com</a><br>
DarkWebID: <a href="https://www.darkwebid.com" rel="nofollow">https://www.darkwebid.com</a><br>
CyCognito: <a href="https://www.cycognito.com" rel="nofollow">https://www.cycognito.com</a><br>
OWL Cyber Defense: <a href="https://owlcyberdefense.com" rel="nofollow">https://owlcyberdefense.com</a><br>
Worksheet:  <a href="https://www.dropbox.com/scl/fi/36n0zjooq4pi7mlv6ugkt/OWL_podcast_worksheets.pdf?rlkey=ssdpyio5cqktsakz5s1vdogcu&dl=0" rel="nofollow">https://www.dropbox.com/scl/fi/36n0zjooq4pi7mlv6ugkt/OWL_podcast_worksheets.pdf?rlkey=ssdpyio5cqktsakz5s1vdogcu&amp;dl=0</a> </p>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>Today we shift the focus from cyber threats to a challenge that may be just as critical: how to communicate complex technology in a way that actually resonates. Joined by Dharma Pachner, Founder and Chief Creative Officer of Contrast &amp; Co., the conversation explores why even the most advanced cybersecurity solutions fail if their value isn’t clearly understood and how better storytelling can change that. </p>

<p>Dharma breaks down the art and science of simplifying the abstract, showing how strong brand foundations, metaphors, and visual storytelling can transform highly technical concepts into ideas people immediately grasp. From replacing overused “binary code and padlock” imagery with meaningful visual systems, to building foundational brand ideas that elevate messaging beyond features, the discussion highlights how clarity, emotion, and differentiation are essential in crowded tech markets. </p>

<p>The episode also brings these principles down to a practical level, offering exercises and frameworks that anyone—not just designers—can use to improve communication, whether pitching a solution, securing budget, or aligning a team. Ultimately, the conversation reinforces a powerful idea: in cybersecurity and beyond, success isn’t just about what you build—it’s about how well you make others understand, remember, and care about it.</p>

<p>Show Notes:<br>
Contrast &amp; Co - <a href="https://www.contrastandco.com/" rel="nofollow">https://www.contrastandco.com/</a><br>
Dharma Pachner - <a href="https://www.linkedin.com/in/dpachner/" rel="nofollow">https://www.linkedin.com/in/dpachner/</a><br>
INKY: <a href="https://inky.com" rel="nofollow">https://inky.com</a><br>
DarkWebID: <a href="https://www.darkwebid.com" rel="nofollow">https://www.darkwebid.com</a><br>
CyCognito: <a href="https://www.cycognito.com" rel="nofollow">https://www.cycognito.com</a><br>
OWL Cyber Defense: <a href="https://owlcyberdefense.com" rel="nofollow">https://owlcyberdefense.com</a><br>
Worksheet:  <a href="https://www.dropbox.com/scl/fi/36n0zjooq4pi7mlv6ugkt/OWL_podcast_worksheets.pdf?rlkey=ssdpyio5cqktsakz5s1vdogcu&dl=0" rel="nofollow">https://www.dropbox.com/scl/fi/36n0zjooq4pi7mlv6ugkt/OWL_podcast_worksheets.pdf?rlkey=ssdpyio5cqktsakz5s1vdogcu&amp;dl=0</a> </p>]]>
  </itunes:summary>
</item>
<item>
  <title>Episode 121: Flying Through Chaos: How to Stay Mission-Ready in High-Stress Environments</title>
  <link>https://techtransforms.fireside.fm/121</link>
  <guid isPermaLink="false">6fb1858f-a981-4d30-8b90-ba7d7e82204b</guid>
  <pubDate>Tue, 14 Apr 2026 10:00:00 -0400</pubDate>
  <author>Carolyn Ford</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/81d9d6b0-0045-48da-8495-fd87c4613d7f/6fb1858f-a981-4d30-8b90-ba7d7e82204b.mp3" length="55961154" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>Carolyn Ford</itunes:author>
  <itunes:subtitle>Carey Lohrenz shares how high performers navigate pressure by focusing on what they can control, even in the most overwhelming situations. Drawing from her experience as a fighter pilot, she breaks down practical strategies for prioritization, teamwork, and staying effective when everything feels chaotic. It’s a powerful conversation on leadership, resilience, and how clarity—not intensity—is the key to performance.</itunes:subtitle>
  <itunes:duration>38:46</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/8/81d9d6b0-0045-48da-8495-fd87c4613d7f/episodes/6/6fb1858f-a981-4d30-8b90-ba7d7e82204b/cover.jpg?v=1"/>
  <description>&lt;p&gt;In this episode of Tech Transforms, Carey Lohrenz shares powerful lessons from her experience as the first female F-14 Tomcat pilot and author of Span of Control. Rather than focusing on aviation war stories, the conversation dives into how high performers navigate overwhelm, uncertainty, and pressure by narrowing their focus to what they can actually control. Drawing on both combat aviation and personal hardship, Carey reframes stress as a necessary component of performance—and offers practical strategies to manage it effectively.&lt;/p&gt;

&lt;p&gt;The discussion explores how elite performers build resilience through training, prioritization, and teamwork—from cockpit checklists to the “meatball, lineup, angle of attack” mindset used in high-stakes landings. Carey also highlights the importance of shared load, trust, and even small moments of celebration in sustaining high-performing teams.&lt;/p&gt;

&lt;p&gt;Ultimately, this episode is a grounded, relatable guide for leaders and professionals alike—showing how to stay focused, effective, and human when everything feels like it’s moving at once.&lt;/p&gt;

&lt;p&gt;Show Notes:&lt;br&gt;
Carey Lohrenz Website:&lt;br&gt;
➤ &lt;a href="https://careylohrenz.com/" target="_blank" rel="nofollow noopener"&gt;https://careylohrenz.com/&lt;/a&gt;&lt;br&gt;
Carey on LinkedIn:&lt;br&gt;
➤ &lt;a href="https://www.linkedin.com/in/careylohrenz/" target="_blank" rel="nofollow noopener"&gt;https://www.linkedin.com/in/careylohrenz/&lt;/a&gt;&lt;br&gt;
Carey’s Podcast:&lt;br&gt;
➤ Welcome to My Office:  &lt;a href="https://podcasts.apple.com/us/podcast/trailer-welcome-to-my-office/id1564095883?i=1000520362663" target="_blank" rel="nofollow noopener"&gt;https://podcasts.apple.com/us/podcast/trailer-welcome-to-my-office/id1564095883?i=1000520362663&lt;/a&gt;&lt;br&gt;
Carey’s Book:&lt;br&gt;
➤Span of Control - &lt;a href="https://a.co/d/04zCzjdf" target="_blank" rel="nofollow noopener"&gt;https://a.co/d/04zCzjdf&lt;/a&gt;&lt;/p&gt;
</description>
  <itunes:keywords>Span Of Control, Tech Transforms, Carey Lohrenz, High Achievers</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>In this episode of Tech Transforms, Carey Lohrenz shares powerful lessons from her experience as the first female F-14 Tomcat pilot and author of Span of Control. Rather than focusing on aviation war stories, the conversation dives into how high performers navigate overwhelm, uncertainty, and pressure by narrowing their focus to what they can actually control. Drawing on both combat aviation and personal hardship, Carey reframes stress as a necessary component of performance—and offers practical strategies to manage it effectively.</p>

<p>The discussion explores how elite performers build resilience through training, prioritization, and teamwork—from cockpit checklists to the “meatball, lineup, angle of attack” mindset used in high-stakes landings. Carey also highlights the importance of shared load, trust, and even small moments of celebration in sustaining high-performing teams.</p>

<p>Ultimately, this episode is a grounded, relatable guide for leaders and professionals alike—showing how to stay focused, effective, and human when everything feels like it’s moving at once.</p>

<p>Show Notes:<br>
Carey Lohrenz Website:<br>
➤ <a href="https://careylohrenz.com/" rel="nofollow">https://careylohrenz.com/</a><br>
Carey on LinkedIn:<br>
➤ <a href="https://www.linkedin.com/in/careylohrenz/" rel="nofollow">https://www.linkedin.com/in/careylohrenz/</a><br>
Carey’s Podcast:<br>
➤ Welcome to My Office:  <a href="https://podcasts.apple.com/us/podcast/trailer-welcome-to-my-office/id1564095883?i=1000520362663" rel="nofollow">https://podcasts.apple.com/us/podcast/trailer-welcome-to-my-office/id1564095883?i=1000520362663</a><br>
Carey’s Book:<br>
➤Span of Control - <a href="https://a.co/d/04zCzjdf" rel="nofollow">https://a.co/d/04zCzjdf</a></p>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>In this episode of Tech Transforms, Carey Lohrenz shares powerful lessons from her experience as the first female F-14 Tomcat pilot and author of Span of Control. Rather than focusing on aviation war stories, the conversation dives into how high performers navigate overwhelm, uncertainty, and pressure by narrowing their focus to what they can actually control. Drawing on both combat aviation and personal hardship, Carey reframes stress as a necessary component of performance—and offers practical strategies to manage it effectively.</p>

<p>The discussion explores how elite performers build resilience through training, prioritization, and teamwork—from cockpit checklists to the “meatball, lineup, angle of attack” mindset used in high-stakes landings. Carey also highlights the importance of shared load, trust, and even small moments of celebration in sustaining high-performing teams.</p>

<p>Ultimately, this episode is a grounded, relatable guide for leaders and professionals alike—showing how to stay focused, effective, and human when everything feels like it’s moving at once.</p>

<p>Show Notes:<br>
Carey Lohrenz Website:<br>
➤ <a href="https://careylohrenz.com/" rel="nofollow">https://careylohrenz.com/</a><br>
Carey on LinkedIn:<br>
➤ <a href="https://www.linkedin.com/in/careylohrenz/" rel="nofollow">https://www.linkedin.com/in/careylohrenz/</a><br>
Carey’s Podcast:<br>
➤ Welcome to My Office:  <a href="https://podcasts.apple.com/us/podcast/trailer-welcome-to-my-office/id1564095883?i=1000520362663" rel="nofollow">https://podcasts.apple.com/us/podcast/trailer-welcome-to-my-office/id1564095883?i=1000520362663</a><br>
Carey’s Book:<br>
➤Span of Control - <a href="https://a.co/d/04zCzjdf" rel="nofollow">https://a.co/d/04zCzjdf</a></p>]]>
  </itunes:summary>
</item>
<item>
  <title>Episode 118: Zero Trust ≠ Zero Risk: Debunking the Myths and Building Real Resilience</title>
  <link>https://techtransforms.fireside.fm/118</link>
  <guid isPermaLink="false">0b52b82b-c214-4dea-947c-4220662984b7</guid>
  <pubDate>Tue, 10 Mar 2026 10:30:00 -0400</pubDate>
  <author>Carolyn Ford</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/81d9d6b0-0045-48da-8495-fd87c4613d7f/0b52b82b-c214-4dea-947c-4220662984b7.mp3" length="70436703" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>Carolyn Ford</itunes:author>
  <itunes:subtitle>Unpacking the realities—and myths—of Zero Trust.exploring why Zero Trust is not a product but a strategy for containing breaches, managing legacy systems, and securing increasingly complex networks. The conversation also examines micro segmentation, cross-domain inspection, and how emerging technologies like AI are reshaping the way organizations must think about trust and security.</itunes:subtitle>
  <itunes:duration>58:37</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/8/81d9d6b0-0045-48da-8495-fd87c4613d7f/episodes/0/0b52b82b-c214-4dea-947c-4220662984b7/cover.jpg?v=1"/>
  <description>&lt;p&gt;In this episode of Tech Transforms, Carolyn Ford sits down with Michael Blake of Owl Cyber Defense and Chris Rule of GME to unpack one of cybersecurity’s most misunderstood concepts: Zero Trust. What begins as a discussion of architecture quickly evolves into something broader, an exploration of mindset, modernization, and the reality that today’s networks must operate under the assumption that a breach has already occurred. &lt;/p&gt;

&lt;p&gt;The conversation breaks down the core principle behind Zero Trust: minimizing the “blast radius” of a breach. Instead of assuming everything inside a network is safe, Zero Trust requires constant authentication, strict access controls, and segmentation so that even if an attacker gains entry, they cannot move freely across systems. &lt;/p&gt;

&lt;p&gt;We explore common misconceptions, especially the idea that Zero Trust is a product that can simply be purchased and installed. In reality, it’s a whole-of-organization approach involving people, processes, infrastructure modernization, and ongoing monitoring. Legacy systems, skill shortages, and the sheer complexity of modern networks make implementation a long-term journey rather than a quick fix. &lt;/p&gt;

&lt;p&gt;The discussion highlights why segmentation, boundary management, and cross-domain inspection remain critical even in a Zero Trust architecture—particularly in environments with legacy infrastructure, international partnerships, and tactical edge deployments. As AI systems and autonomous technologies increasingly interact with sensitive networks, the need to treat AI as another “actor” with controlled privileges becomes essential. &lt;/p&gt;

&lt;p&gt;The episode concludes with practical guidance for leaders beginning their Zero Trust journey—from inventorying everything on their network and planning segmentation, to implementing role-based access controls, budgeting for modernization, and ensuring organizations have the skilled personnel required to sustain the architecture. &lt;br&gt;
Ultimately, the takeaway is clear: Zero Trust isn’t a tool—it’s a strategy for operating in a world where persistent threats are the norm.&lt;/p&gt;

&lt;p&gt;Show notes:&lt;br&gt;
GME - &lt;a href="http://www.gme.net.au" target="_blank" rel="nofollow noopener"&gt;www.gme.net.au&lt;/a&gt;&lt;br&gt;
Owl Cyber Defense - &lt;a href="http://www.owlcyberdefense.com" target="_blank" rel="nofollow noopener"&gt;www.owlcyberdefense.com&lt;/a&gt;&lt;br&gt;
Modern Defense Architecture (Australia) - &lt;a href="https://www.cyber.gov.au/business-government/secure-design/secure-by-design/modern-defensible-architecture" target="_blank" rel="nofollow noopener"&gt;https://www.cyber.gov.au/business-government/secure-design/secure-by-design/modern-defensible-architecture&lt;/a&gt;&lt;br&gt;
Chris Rule - &lt;a href="https://www.linkedin.com/in/christopher-rule-fieaust-cpeng-gaicd-05600b30/" target="_blank" rel="nofollow noopener"&gt;https://www.linkedin.com/in/christopher-rule-fieaust-cpeng-gaicd-05600b30/&lt;/a&gt;&lt;br&gt;
Michael Blake - &lt;a href="https://www.linkedin.com/in/michael-blake-734b0a21/" target="_blank" rel="nofollow noopener"&gt;https://www.linkedin.com/in/michael-blake-734b0a21/&lt;/a&gt;&lt;/p&gt;
</description>
  <itunes:keywords>zero trust, micro segmentation, Legacy systems, partnerships</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>In this episode of Tech Transforms, Carolyn Ford sits down with Michael Blake of Owl Cyber Defense and Chris Rule of GME to unpack one of cybersecurity’s most misunderstood concepts: Zero Trust. What begins as a discussion of architecture quickly evolves into something broader, an exploration of mindset, modernization, and the reality that today’s networks must operate under the assumption that a breach has already occurred. </p>

<p>The conversation breaks down the core principle behind Zero Trust: minimizing the “blast radius” of a breach. Instead of assuming everything inside a network is safe, Zero Trust requires constant authentication, strict access controls, and segmentation so that even if an attacker gains entry, they cannot move freely across systems. </p>

<p>We explore common misconceptions, especially the idea that Zero Trust is a product that can simply be purchased and installed. In reality, it’s a whole-of-organization approach involving people, processes, infrastructure modernization, and ongoing monitoring. Legacy systems, skill shortages, and the sheer complexity of modern networks make implementation a long-term journey rather than a quick fix. </p>

<p>The discussion highlights why segmentation, boundary management, and cross-domain inspection remain critical even in a Zero Trust architecture—particularly in environments with legacy infrastructure, international partnerships, and tactical edge deployments. As AI systems and autonomous technologies increasingly interact with sensitive networks, the need to treat AI as another “actor” with controlled privileges becomes essential. </p>

<p>The episode concludes with practical guidance for leaders beginning their Zero Trust journey—from inventorying everything on their network and planning segmentation, to implementing role-based access controls, budgeting for modernization, and ensuring organizations have the skilled personnel required to sustain the architecture. <br>
Ultimately, the takeaway is clear: Zero Trust isn’t a tool—it’s a strategy for operating in a world where persistent threats are the norm.</p>

<p>Show notes:<br>
GME - <a href="http://www.gme.net.au" rel="nofollow">www.gme.net.au</a><br>
Owl Cyber Defense - <a href="http://www.owlcyberdefense.com" rel="nofollow">www.owlcyberdefense.com</a><br>
Modern Defense Architecture (Australia) - <a href="https://www.cyber.gov.au/business-government/secure-design/secure-by-design/modern-defensible-architecture" rel="nofollow">https://www.cyber.gov.au/business-government/secure-design/secure-by-design/modern-defensible-architecture</a><br>
Chris Rule - <a href="https://www.linkedin.com/in/christopher-rule-fieaust-cpeng-gaicd-05600b30/" rel="nofollow">https://www.linkedin.com/in/christopher-rule-fieaust-cpeng-gaicd-05600b30/</a><br>
Michael Blake - <a href="https://www.linkedin.com/in/michael-blake-734b0a21/" rel="nofollow">https://www.linkedin.com/in/michael-blake-734b0a21/</a></p>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>In this episode of Tech Transforms, Carolyn Ford sits down with Michael Blake of Owl Cyber Defense and Chris Rule of GME to unpack one of cybersecurity’s most misunderstood concepts: Zero Trust. What begins as a discussion of architecture quickly evolves into something broader, an exploration of mindset, modernization, and the reality that today’s networks must operate under the assumption that a breach has already occurred. </p>

<p>The conversation breaks down the core principle behind Zero Trust: minimizing the “blast radius” of a breach. Instead of assuming everything inside a network is safe, Zero Trust requires constant authentication, strict access controls, and segmentation so that even if an attacker gains entry, they cannot move freely across systems. </p>

<p>We explore common misconceptions, especially the idea that Zero Trust is a product that can simply be purchased and installed. In reality, it’s a whole-of-organization approach involving people, processes, infrastructure modernization, and ongoing monitoring. Legacy systems, skill shortages, and the sheer complexity of modern networks make implementation a long-term journey rather than a quick fix. </p>

<p>The discussion highlights why segmentation, boundary management, and cross-domain inspection remain critical even in a Zero Trust architecture—particularly in environments with legacy infrastructure, international partnerships, and tactical edge deployments. As AI systems and autonomous technologies increasingly interact with sensitive networks, the need to treat AI as another “actor” with controlled privileges becomes essential. </p>

<p>The episode concludes with practical guidance for leaders beginning their Zero Trust journey—from inventorying everything on their network and planning segmentation, to implementing role-based access controls, budgeting for modernization, and ensuring organizations have the skilled personnel required to sustain the architecture. <br>
Ultimately, the takeaway is clear: Zero Trust isn’t a tool—it’s a strategy for operating in a world where persistent threats are the norm.</p>

<p>Show notes:<br>
GME - <a href="http://www.gme.net.au" rel="nofollow">www.gme.net.au</a><br>
Owl Cyber Defense - <a href="http://www.owlcyberdefense.com" rel="nofollow">www.owlcyberdefense.com</a><br>
Modern Defense Architecture (Australia) - <a href="https://www.cyber.gov.au/business-government/secure-design/secure-by-design/modern-defensible-architecture" rel="nofollow">https://www.cyber.gov.au/business-government/secure-design/secure-by-design/modern-defensible-architecture</a><br>
Chris Rule - <a href="https://www.linkedin.com/in/christopher-rule-fieaust-cpeng-gaicd-05600b30/" rel="nofollow">https://www.linkedin.com/in/christopher-rule-fieaust-cpeng-gaicd-05600b30/</a><br>
Michael Blake - <a href="https://www.linkedin.com/in/michael-blake-734b0a21/" rel="nofollow">https://www.linkedin.com/in/michael-blake-734b0a21/</a></p>]]>
  </itunes:summary>
</item>
<item>
  <title>Episode 110: Stealth Mode: Unmasking Cyber Threats Hiding in Plain Sight</title>
  <link>https://techtransforms.fireside.fm/110</link>
  <guid isPermaLink="false">cb21ed1a-1e9f-4ae6-9f2d-9e4760757aeb</guid>
  <pubDate>Wed, 12 Nov 2025 09:30:00 -0500</pubDate>
  <author>Carolyn Ford</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/81d9d6b0-0045-48da-8495-fd87c4613d7f/cb21ed1a-1e9f-4ae6-9f2d-9e4760757aeb.mp3" length="68683663" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>Carolyn Ford</itunes:author>
  <itunes:subtitle>Ever wonder what’s hiding inside your “safe” files? On Tech Transforms, Carolyn Ford and Glasswall’s Connor Morley unpack steganography, polyglot files, QR code traps &amp; how Zero Trust file filtering/CDR shuts it all down.</itunes:subtitle>
  <itunes:duration>57:10</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/8/81d9d6b0-0045-48da-8495-fd87c4613d7f/episodes/c/cb21ed1a-1e9f-4ae6-9f2d-9e4760757aeb/cover.jpg?v=1"/>
  <description>&lt;p&gt;In this episode of Tech Transforms, host Carolyn Ford welcomes Connor Morley, Head of Security Research at Glasswall, for a deep dive into the spy-thriller world of modern file security. From malware hidden in images and PDFs to “polyglot” files that can appear as multiple formats at once, Morley exposes how attackers are redefining what a “safe file” really means.&lt;/p&gt;

&lt;p&gt;They explore how artificial intelligence is supercharging phishing and social-engineering campaigns, making malicious messages nearly indistinguishable from legitimate ones. Morley explains the evolution of steganography—the art of concealing code inside digital images and why emerging threats like QR-code hijacking (“quishing”) have become one of the easiest ways to breach both corporate and personal devices.&lt;/p&gt;

&lt;p&gt;But this isn’t a doom-and-gloom story. Morley shows how zero-trust file filtering and Content Disarm &amp;amp; Reconstruction (CDR) can neutralize hidden payloads without disrupting everyday workflows. He also reveals how these proactive defenses reduce “SOC noise,” giving security teams back valuable focus time and keeping threats from ever reaching end users.&lt;/p&gt;

&lt;p&gt;From AI-powered deception to invisible payloads hidden in plain sight, this conversation uncovers the unseen layer of cyber defense and reminds leaders that innovation, not fear, is the best shield against tomorrow’s threats.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Show Notes:&lt;/strong&gt;&lt;br&gt;
• Whitepapers: &lt;br&gt;
&lt;a href="https://www.glasswall.com/blog/unmasking-polyglot-files-how-glasswalls-cdr-technology-tackles-this-stealthy-threat" target="_blank" rel="nofollow noopener"&gt;Polyglot Files: Unmasking Images &amp;amp; PDFs&lt;/a&gt;&lt;br&gt;
&lt;a href="https://www.glasswall.com/blog/innovative-steganography-mitigation-research-safeguarding-against-covert-data-concealment" target="_blank" rel="nofollow noopener"&gt;Steganography: Smudging the Invisible Ink&lt;/a&gt;&lt;br&gt;
&lt;a href="https://www.glasswall.com/blog/beyond-the-scan-why-government-agencies-and-enterprises-must-tackle-qr-code-security-now" target="_blank" rel="nofollow noopener"&gt;QR Codes: Neutralizing Threats with CDR&lt;/a&gt;&lt;br&gt;
• Webinar: &lt;a href="https://www.youtube.com/watch?v=FCBYEDCXpXk" target="_blank" rel="nofollow noopener"&gt;File Analysis &amp;amp; CDR: Forging A Formidable Defense&lt;/a&gt;&lt;br&gt;
• Website: &lt;a href="https://www.glasswall.com/" target="_blank" rel="nofollow noopener"&gt;https://www.glasswall.com/&lt;/a&gt;&lt;br&gt;
• Connor Morley - &lt;a href="https://www.linkedin.com/in/connormorley/" target="_blank" rel="nofollow noopener"&gt;https://www.linkedin.com/in/connormorley/&lt;/a&gt;&lt;/p&gt;
</description>
  <itunes:keywords>CDR, QR codes, Polyglot, zero trust, TechTransforms</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>In this episode of Tech Transforms, host Carolyn Ford welcomes Connor Morley, Head of Security Research at Glasswall, for a deep dive into the spy-thriller world of modern file security. From malware hidden in images and PDFs to “polyglot” files that can appear as multiple formats at once, Morley exposes how attackers are redefining what a “safe file” really means.</p>

<p>They explore how artificial intelligence is supercharging phishing and social-engineering campaigns, making malicious messages nearly indistinguishable from legitimate ones. Morley explains the evolution of steganography—the art of concealing code inside digital images and why emerging threats like QR-code hijacking (“quishing”) have become one of the easiest ways to breach both corporate and personal devices.</p>

<p>But this isn’t a doom-and-gloom story. Morley shows how zero-trust file filtering and Content Disarm &amp; Reconstruction (CDR) can neutralize hidden payloads without disrupting everyday workflows. He also reveals how these proactive defenses reduce “SOC noise,” giving security teams back valuable focus time and keeping threats from ever reaching end users.</p>

<p>From AI-powered deception to invisible payloads hidden in plain sight, this conversation uncovers the unseen layer of cyber defense and reminds leaders that innovation, not fear, is the best shield against tomorrow’s threats.</p>

<p><strong>Show Notes:</strong><br>
• Whitepapers: <br>
<a href="https://www.glasswall.com/blog/unmasking-polyglot-files-how-glasswalls-cdr-technology-tackles-this-stealthy-threat" rel="nofollow">Polyglot Files: Unmasking Images &amp; PDFs</a><br>
<a href="https://www.glasswall.com/blog/innovative-steganography-mitigation-research-safeguarding-against-covert-data-concealment" rel="nofollow">Steganography: Smudging the Invisible Ink</a><br>
<a href="https://www.glasswall.com/blog/beyond-the-scan-why-government-agencies-and-enterprises-must-tackle-qr-code-security-now" rel="nofollow">QR Codes: Neutralizing Threats with CDR</a><br>
• Webinar: <a href="https://www.youtube.com/watch?v=FCBYEDCXpXk" rel="nofollow">File Analysis &amp; CDR: Forging A Formidable Defense</a><br>
• Website: <a href="https://www.glasswall.com/" rel="nofollow">https://www.glasswall.com/</a><br>
• Connor Morley - <a href="https://www.linkedin.com/in/connormorley/" rel="nofollow">https://www.linkedin.com/in/connormorley/</a></p>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>In this episode of Tech Transforms, host Carolyn Ford welcomes Connor Morley, Head of Security Research at Glasswall, for a deep dive into the spy-thriller world of modern file security. From malware hidden in images and PDFs to “polyglot” files that can appear as multiple formats at once, Morley exposes how attackers are redefining what a “safe file” really means.</p>

<p>They explore how artificial intelligence is supercharging phishing and social-engineering campaigns, making malicious messages nearly indistinguishable from legitimate ones. Morley explains the evolution of steganography—the art of concealing code inside digital images and why emerging threats like QR-code hijacking (“quishing”) have become one of the easiest ways to breach both corporate and personal devices.</p>

<p>But this isn’t a doom-and-gloom story. Morley shows how zero-trust file filtering and Content Disarm &amp; Reconstruction (CDR) can neutralize hidden payloads without disrupting everyday workflows. He also reveals how these proactive defenses reduce “SOC noise,” giving security teams back valuable focus time and keeping threats from ever reaching end users.</p>

<p>From AI-powered deception to invisible payloads hidden in plain sight, this conversation uncovers the unseen layer of cyber defense and reminds leaders that innovation, not fear, is the best shield against tomorrow’s threats.</p>

<p><strong>Show Notes:</strong><br>
• Whitepapers: <br>
<a href="https://www.glasswall.com/blog/unmasking-polyglot-files-how-glasswalls-cdr-technology-tackles-this-stealthy-threat" rel="nofollow">Polyglot Files: Unmasking Images &amp; PDFs</a><br>
<a href="https://www.glasswall.com/blog/innovative-steganography-mitigation-research-safeguarding-against-covert-data-concealment" rel="nofollow">Steganography: Smudging the Invisible Ink</a><br>
<a href="https://www.glasswall.com/blog/beyond-the-scan-why-government-agencies-and-enterprises-must-tackle-qr-code-security-now" rel="nofollow">QR Codes: Neutralizing Threats with CDR</a><br>
• Webinar: <a href="https://www.youtube.com/watch?v=FCBYEDCXpXk" rel="nofollow">File Analysis &amp; CDR: Forging A Formidable Defense</a><br>
• Website: <a href="https://www.glasswall.com/" rel="nofollow">https://www.glasswall.com/</a><br>
• Connor Morley - <a href="https://www.linkedin.com/in/connormorley/" rel="nofollow">https://www.linkedin.com/in/connormorley/</a></p>]]>
  </itunes:summary>
</item>
<item>
  <title>Episode 104: Securing the Future: AI, Cyber Risk, and the Federal Mission</title>
  <link>https://techtransforms.fireside.fm/104</link>
  <guid isPermaLink="false">6e6b136b-79de-4ba1-870e-79089db0897c</guid>
  <pubDate>Tue, 26 Aug 2025 10:00:00 -0400</pubDate>
  <author>Carolyn Ford</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/81d9d6b0-0045-48da-8495-fd87c4613d7f/6e6b136b-79de-4ba1-870e-79089db0897c.mp3" length="69695506" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>Carolyn Ford</itunes:author>
  <itunes:subtitle>AI isn’t coming to government, it’s already here. In this episode of Tech Transforms, host Carolyn Ford sits down with Martin Stanley, Senior Advisor at NIST, to explore how federal agencies can secure AI systems, protect sensitive training data, and prepare for “machine speed” cyber defense. From NIST’s new AI Risk Management Framework to guardrails for generative AI, Martin explains what leaders need to know to adopt AI responsibly without sacrificing security.</itunes:subtitle>
  <itunes:duration>48:21</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/8/81d9d6b0-0045-48da-8495-fd87c4613d7f/episodes/6/6e6b136b-79de-4ba1-870e-79089db0897c/cover.jpg?v=1"/>
  <description>&lt;p&gt;In this episode of TechTransforms, host Carolyn Ford sits down with Martin Stanley, Senior Advisor at NIST, to explore how AI is reshaping federal cybersecurity. They dive into NIST’s AI Risk Management Framework, the growing need for secure and resilient AI systems, and what it takes to build a “risk-aware” culture in government. Stanley shares insights on guarding against threats like model theft and prompt injection, how agencies are adapting zero trust principles for AI, and why explainability is essential in machine learning models. Whether you're new to AI governance or advancing your cybersecurity strategy, this episode offers practical guidance for navigating the evolving AI risk landscape.&lt;/p&gt;

&lt;p&gt;Show Notes:&lt;br&gt;
NIST AI resources: &lt;a href="https://www.nist.gov/artificial-intelligence/ai-resources" target="_blank" rel="nofollow noopener"&gt;https://www.nist.gov/artificial-intelligence/ai-resources&lt;/a&gt;&lt;br&gt;
AI Risk Management Framework &lt;a href="https://www.nist.gov/itl/ai-risk-management-framework" target="_blank" rel="nofollow noopener"&gt;https://www.nist.gov/itl/ai-risk-management-framework&lt;/a&gt;&lt;br&gt;
NIST-AI-600-1: AI RMF Generative AI Profile &lt;a href="https://airc.nist.gov/docs/NIST.AI.600-1.GenAI-Profile.ipd.pdf" target="_blank" rel="nofollow noopener"&gt;https://airc.nist.gov/docs/NIST.AI.600-1.GenAI-Profile.ipd.pdf&lt;/a&gt;&lt;br&gt;
Secure Software Development Practices for Generative AI and Dual-Use Foundation Models: An SSDF Community Profile  &lt;a href="https://doi.org/10.6028/NIST.SP.800-218A" target="_blank" rel="nofollow noopener"&gt;https://doi.org/10.6028/NIST.SP.800-218A&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Email: &lt;a href="mailto:martin.stanley@nist.gov" target="_blank" rel="nofollow noopener"&gt;martin.stanley@nist.gov&lt;/a&gt;&lt;br&gt;
LinkedIn: &lt;a href="https://www.linkedin.com/in/mcs729/" target="_blank" rel="nofollow noopener"&gt;https://www.linkedin.com/in/mcs729/&lt;/a&gt;&lt;/p&gt;
</description>
  <itunes:keywords>NIST, TechTransforms, Cybersecurity, AI, cyber defense</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>In this episode of TechTransforms, host Carolyn Ford sits down with Martin Stanley, Senior Advisor at NIST, to explore how AI is reshaping federal cybersecurity. They dive into NIST’s AI Risk Management Framework, the growing need for secure and resilient AI systems, and what it takes to build a “risk-aware” culture in government. Stanley shares insights on guarding against threats like model theft and prompt injection, how agencies are adapting zero trust principles for AI, and why explainability is essential in machine learning models. Whether you&#39;re new to AI governance or advancing your cybersecurity strategy, this episode offers practical guidance for navigating the evolving AI risk landscape.</p>

<p>Show Notes:<br>
NIST AI resources: <a href="https://www.nist.gov/artificial-intelligence/ai-resources" rel="nofollow">https://www.nist.gov/artificial-intelligence/ai-resources</a><br>
AI Risk Management Framework <a href="https://www.nist.gov/itl/ai-risk-management-framework" rel="nofollow">https://www.nist.gov/itl/ai-risk-management-framework</a><br>
NIST-AI-600-1: AI RMF Generative AI Profile <a href="https://airc.nist.gov/docs/NIST.AI.600-1.GenAI-Profile.ipd.pdf" rel="nofollow">https://airc.nist.gov/docs/NIST.AI.600-1.GenAI-Profile.ipd.pdf</a><br>
Secure Software Development Practices for Generative AI and Dual-Use Foundation Models: An SSDF Community Profile  <a href="https://doi.org/10.6028/NIST.SP.800-218A" rel="nofollow">https://doi.org/10.6028/NIST.SP.800-218A</a></p>

<p>Email: <a href="mailto:martin.stanley@nist.gov" rel="nofollow">martin.stanley@nist.gov</a><br>
LinkedIn: <a href="https://www.linkedin.com/in/mcs729/" rel="nofollow">https://www.linkedin.com/in/mcs729/</a></p>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>In this episode of TechTransforms, host Carolyn Ford sits down with Martin Stanley, Senior Advisor at NIST, to explore how AI is reshaping federal cybersecurity. They dive into NIST’s AI Risk Management Framework, the growing need for secure and resilient AI systems, and what it takes to build a “risk-aware” culture in government. Stanley shares insights on guarding against threats like model theft and prompt injection, how agencies are adapting zero trust principles for AI, and why explainability is essential in machine learning models. Whether you&#39;re new to AI governance or advancing your cybersecurity strategy, this episode offers practical guidance for navigating the evolving AI risk landscape.</p>

<p>Show Notes:<br>
NIST AI resources: <a href="https://www.nist.gov/artificial-intelligence/ai-resources" rel="nofollow">https://www.nist.gov/artificial-intelligence/ai-resources</a><br>
AI Risk Management Framework <a href="https://www.nist.gov/itl/ai-risk-management-framework" rel="nofollow">https://www.nist.gov/itl/ai-risk-management-framework</a><br>
NIST-AI-600-1: AI RMF Generative AI Profile <a href="https://airc.nist.gov/docs/NIST.AI.600-1.GenAI-Profile.ipd.pdf" rel="nofollow">https://airc.nist.gov/docs/NIST.AI.600-1.GenAI-Profile.ipd.pdf</a><br>
Secure Software Development Practices for Generative AI and Dual-Use Foundation Models: An SSDF Community Profile  <a href="https://doi.org/10.6028/NIST.SP.800-218A" rel="nofollow">https://doi.org/10.6028/NIST.SP.800-218A</a></p>

<p>Email: <a href="mailto:martin.stanley@nist.gov" rel="nofollow">martin.stanley@nist.gov</a><br>
LinkedIn: <a href="https://www.linkedin.com/in/mcs729/" rel="nofollow">https://www.linkedin.com/in/mcs729/</a></p>]]>
  </itunes:summary>
</item>
<item>
  <title>Episode 101: The Fast Track to Global Defense Collaboration</title>
  <link>https://techtransforms.fireside.fm/101</link>
  <guid isPermaLink="false">25790936-7a28-4d52-9040-1f587692e66c</guid>
  <pubDate>Tue, 15 Jul 2025 13:00:00 -0400</pubDate>
  <author>Carolyn Ford</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/81d9d6b0-0045-48da-8495-fd87c4613d7f/25790936-7a28-4d52-9040-1f587692e66c.mp3" length="27491940" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>Carolyn Ford</itunes:author>
  <itunes:subtitle>Carolyn Ford sits down with Mat Cantagallo, Defense Director at Austrade, to unpack how OWL, GME, and Austrade became the first to use the AUKUS exemption, streamlining defense tech transfer and training between allied nations. This episode highlights how strategic policy shifts and trusted partnerships are accelerating innovation and reshaping the future of international defense collaboration.</itunes:subtitle>
  <itunes:duration>40:30</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/8/81d9d6b0-0045-48da-8495-fd87c4613d7f/episodes/2/25790936-7a28-4d52-9040-1f587692e66c/cover.jpg?v=1"/>
  <description>&lt;p&gt;What happens when bureaucratic red tape meets bold collaboration? In this episode of Tech Transforms, Carolyn Ford is joined by Mat Cantagallo, Defense Director at Austrade, to explore how OWL, GME, and Austrade became the first to successfully leverage the AUKUS exemption, cutting through years of export restrictions to enable real-time defense collaboration between the U.S. and Australia.&lt;/p&gt;

&lt;p&gt;From simplifying tech transfer to accelerating mission-critical training, this conversation offers a powerful look at how smart policy and strategic partnerships are setting a new benchmark for global security innovation.&lt;/p&gt;

&lt;p&gt;If you’re in defense, cybersecurity, international trade, or just love a good story about making the impossible possible, this one’s for you.&lt;/p&gt;

&lt;p&gt;Contact Mat &lt;a href="https://www.linkedin.com/in/mat-c-a377937/" target="_blank" rel="nofollow noopener"&gt;https://www.linkedin.com/in/mat-c-a377937/&lt;/a&gt; &lt;/p&gt;
</description>
  <itunes:keywords>cybersecurity, international trade, OWL Cyber Defense, AUKUS</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>What happens when bureaucratic red tape meets bold collaboration? In this episode of Tech Transforms, Carolyn Ford is joined by Mat Cantagallo, Defense Director at Austrade, to explore how OWL, GME, and Austrade became the first to successfully leverage the AUKUS exemption, cutting through years of export restrictions to enable real-time defense collaboration between the U.S. and Australia.</p>

<p>From simplifying tech transfer to accelerating mission-critical training, this conversation offers a powerful look at how smart policy and strategic partnerships are setting a new benchmark for global security innovation.</p>

<p>If you’re in defense, cybersecurity, international trade, or just love a good story about making the impossible possible, this one’s for you.</p>

<p>Contact Mat <a href="https://www.linkedin.com/in/mat-c-a377937/" rel="nofollow">https://www.linkedin.com/in/mat-c-a377937/</a></p>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>What happens when bureaucratic red tape meets bold collaboration? In this episode of Tech Transforms, Carolyn Ford is joined by Mat Cantagallo, Defense Director at Austrade, to explore how OWL, GME, and Austrade became the first to successfully leverage the AUKUS exemption, cutting through years of export restrictions to enable real-time defense collaboration between the U.S. and Australia.</p>

<p>From simplifying tech transfer to accelerating mission-critical training, this conversation offers a powerful look at how smart policy and strategic partnerships are setting a new benchmark for global security innovation.</p>

<p>If you’re in defense, cybersecurity, international trade, or just love a good story about making the impossible possible, this one’s for you.</p>

<p>Contact Mat <a href="https://www.linkedin.com/in/mat-c-a377937/" rel="nofollow">https://www.linkedin.com/in/mat-c-a377937/</a></p>]]>
  </itunes:summary>
</item>
  </channel>
</rss>
