<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" encoding="UTF-8" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:sy="http://purl.org/rss/1.0/modules/syndication/" xmlns:admin="http://webns.net/mvcb/" xmlns:atom="http://www.w3.org/2005/Atom/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:googleplay="http://www.google.com/schemas/play-podcasts/1.0" xmlns:itunes="http://www.itunes.com/dtds/podcast-1.0.dtd" xmlns:fireside="http://fireside.fm/modules/rss/fireside">
  <channel>
    <fireside:hostname>web02.fireside.fm</fireside:hostname>
    <fireside:genDate>Sun, 10 May 2026 17:27:15 -0500</fireside:genDate>
    <generator>Fireside (https://fireside.fm)</generator>
    <title>Tech Transforms - Episodes Tagged with “Zero Trust”</title>
    <link>https://techtransforms.fireside.fm/tags/zero%20trust</link>
    <pubDate>Tue, 17 Mar 2026 09:30:00 -0400</pubDate>
    <description>Global technology is changing the way we live. Critical government decisions affect the intersection of technology advancement and human needs. This podcast talks to some of the most prominent influencers shaping the landscape to understand how they are leveraging technology to solve complex challenges while also meeting the needs of today's modern world.
</description>
    <language>en-us</language>
    <itunes:type>episodic</itunes:type>
    <itunes:subtitle>Tech Transforms, brought to you by Owl Cyber Defense, talks to some of the most prominent influencers shaping government technology.</itunes:subtitle>
    <itunes:author>Carolyn Ford</itunes:author>
    <itunes:summary>Global technology is changing the way we live. Critical government decisions affect the intersection of technology advancement and human needs. This podcast talks to some of the most prominent influencers shaping the landscape to understand how they are leveraging technology to solve complex challenges while also meeting the needs of today's modern world.
</itunes:summary>
    <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/8/81d9d6b0-0045-48da-8495-fd87c4613d7f/cover.jpg?v=3"/>
    <itunes:explicit>no</itunes:explicit>
    <itunes:owner>
      <itunes:name>Carolyn Ford</itunes:name>
      <itunes:email>Galadrielford@gmail.com</itunes:email>
    </itunes:owner>
<itunes:category text="Technology"/>
<itunes:category text="Government"/>
<item>
  <title>Episode 119: 5 Steps to Zero Trust</title>
  <link>https://techtransforms.fireside.fm/119</link>
  <guid isPermaLink="false">5c5b615a-5393-47ff-9be4-f8efe6f8897b</guid>
  <pubDate>Tue, 17 Mar 2026 09:30:00 -0400</pubDate>
  <author>Carolyn Ford</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/81d9d6b0-0045-48da-8495-fd87c4613d7f/5c5b615a-5393-47ff-9be4-f8efe6f8897b.mp3" length="33764794" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>Carolyn Ford</itunes:author>
  <itunes:subtitle>In this follow-up episode of Tech Transforms, Carolyn Ford and Michael Blake of Owl Cyber Defense explore what it actually takes to begin implementing Zero Trust. From discovering shadow IT and legacy systems to microsegmentation and access control, the conversation focuses on the practical steps organizations must take to limit the blast radius of a breach. The episode also examines how leaders can prioritize critical assets and build the teams needed to sustain a Zero Trust strategy over time.</itunes:subtitle>
  <itunes:duration>27:29</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/8/81d9d6b0-0045-48da-8495-fd87c4613d7f/episodes/5/5c5b615a-5393-47ff-9be4-f8efe6f8897b/cover.jpg?v=3"/>
  <description>&lt;p&gt;In this follow-up episode of Tech Transforms, Carolyn Ford continues her conversation with Michael Blake of Owl Cyber Defense, shifting from the theory of Zero Trust to the realities of implementing it. The discussion explores the first practical step, network discovery and why organizations are often surprised by shadow IT and legacy systems still operating inside their environments.&lt;/p&gt;

&lt;p&gt;From there, Ford and Blake walk through the key stages of a Zero Trust journey, including microsegmentation, access management, and auditing privileges to prevent lateral movement and privilege creep. They also discuss the operational realities leaders face—budgeting, prioritizing critical assets or “crown jewels,” and ensuring organizations have the talent and resources needed to sustain a Zero Trust architecture.&lt;/p&gt;

&lt;p&gt;The takeaway: Zero Trust isn’t a single deployment, it’s an ongoing journey that evolves alongside emerging threats and technologies.&lt;/p&gt;

&lt;p&gt;Show Notes:&lt;br&gt;
Michael Blake: &lt;a href="https://www.linkedin.com/in/michael-blake-734b0a21/" target="_blank" rel="nofollow noopener"&gt;https://www.linkedin.com/in/michael-blake-734b0a21/&lt;/a&gt; | Email: &lt;a href="mailto:mblake@owlcyberdefense.com" target="_blank" rel="nofollow noopener"&gt;mblake@owlcyberdefense.com&lt;/a&gt;&lt;br&gt;
DoW  resources &lt;a href="https://dowcio.war.gov/Library/:" target="_blank" rel="nofollow noopener"&gt;https://dowcio.war.gov/Library/:&lt;/a&gt; security controls, checklist, self assessment, Penn test guidelines etc&lt;br&gt;
Zero Trust | &lt;a href="http://www.dau.edu" target="_blank" rel="nofollow noopener"&gt;www.dau.edu&lt;/a&gt;&lt;br&gt;
Dell Technologies Project Fort Zero to Transform Security | Dell USA&lt;br&gt;
MITRE papers on evolving  threats of giving AI access to network - &lt;a href="https://ctid.mitre.org/blog/2025/05/09/secure-ai-v2/" target="_blank" rel="nofollow noopener"&gt;https://ctid.mitre.org/blog/2025/05/09/secure-ai-v2/&lt;/a&gt;&lt;br&gt;
Owl ZT resources: &lt;a href="https://owlcyberdefense.com/zero-trust-cds/" target="_blank" rel="nofollow noopener"&gt;https://owlcyberdefense.com/zero-trust-cds/&lt;/a&gt;&lt;br&gt;&lt;br&gt;
Vendors that assist with ZTX, listen to the BLUF Podcast summaries to know if they might be able to help you: &lt;a href="https://theblufpodcast.podbean.com/e/thebluf_episode12/" target="_blank" rel="nofollow noopener"&gt;https://theblufpodcast.podbean.com/e/thebluf_episode12/&lt;/a&gt; &lt;a href="https://theblufpodcast.podbean.com/e/thebluf_episode13/" target="_blank" rel="nofollow noopener"&gt;https://theblufpodcast.podbean.com/e/thebluf_episode13/&lt;/a&gt;&lt;/p&gt;
</description>
  <itunes:keywords>zero trust, micro segmentation, Legacy systems, partnerships</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>In this follow-up episode of Tech Transforms, Carolyn Ford continues her conversation with Michael Blake of Owl Cyber Defense, shifting from the theory of Zero Trust to the realities of implementing it. The discussion explores the first practical step, network discovery and why organizations are often surprised by shadow IT and legacy systems still operating inside their environments.</p>

<p>From there, Ford and Blake walk through the key stages of a Zero Trust journey, including microsegmentation, access management, and auditing privileges to prevent lateral movement and privilege creep. They also discuss the operational realities leaders face—budgeting, prioritizing critical assets or “crown jewels,” and ensuring organizations have the talent and resources needed to sustain a Zero Trust architecture.</p>

<p>The takeaway: Zero Trust isn’t a single deployment, it’s an ongoing journey that evolves alongside emerging threats and technologies.</p>

<p>Show Notes:<br>
Michael Blake: <a href="https://www.linkedin.com/in/michael-blake-734b0a21/" rel="nofollow">https://www.linkedin.com/in/michael-blake-734b0a21/</a> | Email: <a href="mailto:mblake@owlcyberdefense.com" rel="nofollow">mblake@owlcyberdefense.com</a><br>
DoW  resources <a href="https://dowcio.war.gov/Library/:" rel="nofollow">https://dowcio.war.gov/Library/:</a> security controls, checklist, self assessment, Penn test guidelines etc<br>
Zero Trust | <a href="http://www.dau.edu" rel="nofollow">www.dau.edu</a><br>
Dell Technologies Project Fort Zero to Transform Security | Dell USA<br>
MITRE papers on evolving  threats of giving AI access to network - <a href="https://ctid.mitre.org/blog/2025/05/09/secure-ai-v2/" rel="nofollow">https://ctid.mitre.org/blog/2025/05/09/secure-ai-v2/</a><br>
Owl ZT resources: <a href="https://owlcyberdefense.com/zero-trust-cds/" rel="nofollow">https://owlcyberdefense.com/zero-trust-cds/</a><br><br>
Vendors that assist with ZTX, listen to the BLUF Podcast summaries to know if they might be able to help you: <a href="https://theblufpodcast.podbean.com/e/thebluf_episode12/" rel="nofollow">https://theblufpodcast.podbean.com/e/thebluf_episode12/</a> <a href="https://theblufpodcast.podbean.com/e/thebluf_episode13/" rel="nofollow">https://theblufpodcast.podbean.com/e/thebluf_episode13/</a></p>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>In this follow-up episode of Tech Transforms, Carolyn Ford continues her conversation with Michael Blake of Owl Cyber Defense, shifting from the theory of Zero Trust to the realities of implementing it. The discussion explores the first practical step, network discovery and why organizations are often surprised by shadow IT and legacy systems still operating inside their environments.</p>

<p>From there, Ford and Blake walk through the key stages of a Zero Trust journey, including microsegmentation, access management, and auditing privileges to prevent lateral movement and privilege creep. They also discuss the operational realities leaders face—budgeting, prioritizing critical assets or “crown jewels,” and ensuring organizations have the talent and resources needed to sustain a Zero Trust architecture.</p>

<p>The takeaway: Zero Trust isn’t a single deployment, it’s an ongoing journey that evolves alongside emerging threats and technologies.</p>

<p>Show Notes:<br>
Michael Blake: <a href="https://www.linkedin.com/in/michael-blake-734b0a21/" rel="nofollow">https://www.linkedin.com/in/michael-blake-734b0a21/</a> | Email: <a href="mailto:mblake@owlcyberdefense.com" rel="nofollow">mblake@owlcyberdefense.com</a><br>
DoW  resources <a href="https://dowcio.war.gov/Library/:" rel="nofollow">https://dowcio.war.gov/Library/:</a> security controls, checklist, self assessment, Penn test guidelines etc<br>
Zero Trust | <a href="http://www.dau.edu" rel="nofollow">www.dau.edu</a><br>
Dell Technologies Project Fort Zero to Transform Security | Dell USA<br>
MITRE papers on evolving  threats of giving AI access to network - <a href="https://ctid.mitre.org/blog/2025/05/09/secure-ai-v2/" rel="nofollow">https://ctid.mitre.org/blog/2025/05/09/secure-ai-v2/</a><br>
Owl ZT resources: <a href="https://owlcyberdefense.com/zero-trust-cds/" rel="nofollow">https://owlcyberdefense.com/zero-trust-cds/</a><br><br>
Vendors that assist with ZTX, listen to the BLUF Podcast summaries to know if they might be able to help you: <a href="https://theblufpodcast.podbean.com/e/thebluf_episode12/" rel="nofollow">https://theblufpodcast.podbean.com/e/thebluf_episode12/</a> <a href="https://theblufpodcast.podbean.com/e/thebluf_episode13/" rel="nofollow">https://theblufpodcast.podbean.com/e/thebluf_episode13/</a></p>]]>
  </itunes:summary>
</item>
<item>
  <title>Episode 117: 2026 Predictions.  What's Now. What's Next. What's Urgent.</title>
  <link>https://techtransforms.fireside.fm/117</link>
  <guid isPermaLink="false">0d0c1022-0966-4f5b-95b9-5a2414246f50</guid>
  <pubDate>Fri, 27 Feb 2026 09:30:00 -0500</pubDate>
  <author>Carolyn Ford</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/81d9d6b0-0045-48da-8495-fd87c4613d7f/0d0c1022-0966-4f5b-95b9-5a2414246f50.mp3" length="69081976" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>Carolyn Ford</itunes:author>
  <itunes:subtitle>In this special 2026 Predictions episode of Tech Transforms, Carolyn Ford and the Owl Cyber Defense team unpack the signals already reshaping cybersecurity, AI, and defense. From the collapse of content trust to AI containment and hardware-enforced security, they explore why software alone won’t be enough in the year ahead. The message is clear: in 2026, leaders won’t lose because they lacked tools—they’ll lose because they trusted the wrong ones.</itunes:subtitle>
  <itunes:duration>57:31</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/8/81d9d6b0-0045-48da-8495-fd87c4613d7f/episodes/0/0d0c1022-0966-4f5b-95b9-5a2414246f50/cover.jpg?v=1"/>
  <description>&lt;p&gt;In this special 2026 Predictions episode of Tech Transforms, Carolyn Ford is joined by Brian Carter, Scott Orton, Ralph Spa, and Michael Blake from Owl Cyber Defense for a no-crystal-ball conversation about the signals already flashing across cybersecurity, defense, and digital trust.&lt;/p&gt;

&lt;p&gt;This isn’t speculation. It’s trajectory.&lt;/p&gt;

&lt;p&gt;The group tackles the accelerating collapse of content trust in a world of deepfakes, AI-generated media, and short-form misinformation. As generative tools become indistinguishable from reality, they predict a sharp shift toward deep identity assurance—powered by behavioral biometrics, cryptographic validation, and provable content provenance. In a future where “guaranteed human” becomes a competitive advantage, digital identity won’t be optional—it will be foundational.&lt;br&gt;
From there, the conversation moves into AI containment. The panel argues that we must stop treating AI like helpful software and start treating it like a privileged insider—with unpredictable outputs and real liability attached. The solution? Deterministic boundaries enforced in hardware. As Scott puts it: if you want to confine a tiger, you don’t build the cage out of meat.&lt;/p&gt;

&lt;p&gt;The episode also explores:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;The federal government’s accelerating shift from legacy primes to agile, non-incumbent innovators delivering 80% solutions faster&lt;/li&gt;
&lt;li&gt;Why battlefield communications must evolve beyond encryption to real-time, hardware-enforced trust&lt;/li&gt;
&lt;li&gt;How AI-powered offensive attacks are shrinking from teams to individuals—sometimes in Power Ranger suits&lt;/li&gt;
&lt;li&gt;The limits of Zero Trust when complexity, cost, and talent gaps collide&lt;/li&gt;
&lt;li&gt;Why cross-domain solutions and data diodes may be the real fail-safes in an increasingly networked world&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;Throughout the discussion, a clear thread emerges: software alone won’t save us. As systems grow more interconnected, autonomous, and AI-driven, trust must be anchored in hardware—simple, enforceable, and resistant to both human error and machine-scale attack.&lt;/p&gt;

&lt;p&gt;The takeaway for 2026? Security leaders won’t lose because they lacked tools. They’ll lose because they trusted the wrong ones.&lt;/p&gt;

&lt;p&gt;This episode challenges listeners to rethink modernization, containment, and what real trust looks like when machines are making decisions at machine speed.&lt;/p&gt;

&lt;p&gt;Stay curious. The future isn’t waiting.&lt;/p&gt;

&lt;p&gt;Shownotes&lt;br&gt;
Scott Orton: &lt;a href="https://www.linkedin.com/in/scottorton/" target="_blank" rel="nofollow noopener"&gt;LinkedIn&lt;/a&gt; | Email: &lt;a href="mailto:sorton@owlcyberdefense.com" target="_blank" rel="nofollow noopener"&gt;sorton@owlcyberdefense.com&lt;/a&gt;&lt;br&gt;
Brian Carter: &lt;a href="https://www.linkedin.com/in/brian-carter-4aba4a55/" target="_blank" rel="nofollow noopener"&gt;LinkedIn&lt;/a&gt; | Email:&lt;a href="mailto:bcarter@owlcyberdefense.com" target="_blank" rel="nofollow noopener"&gt;bcarter@owlcyberdefense.com&lt;/a&gt;&lt;br&gt;
Ralph Spada: &lt;a href="https://www.linkedin.com/in/ralphspada/" target="_blank" rel="nofollow noopener"&gt;LinkedIn&lt;/a&gt; | Email: &lt;a href="mailto:rspada@owlcyberdefense.com" target="_blank" rel="nofollow noopener"&gt;rspada@owlcyberdefense.com&lt;/a&gt;&lt;br&gt;
Michael Blake: &lt;a href="https://www.linkedin.com/in/michael-blake-734b0a21/" target="_blank" rel="nofollow noopener"&gt;https://www.linkedin.com/in/michael-blake-734b0a21/&lt;/a&gt; | Email: &lt;a href="mailto:mblake@owlcyberdefense.com" target="_blank" rel="nofollow noopener"&gt;mblake@owlcyberdefense.com&lt;/a&gt;&lt;br&gt;
Owl Cyber Defense: owlcyberdefense.com&lt;br&gt;
Download the 2026 Predictions Report:  &lt;a href="https://owlcyberdefense.com/resource/decision-advantage-forecast-five-security-shifts-in-2026/" target="_blank" rel="nofollow noopener"&gt;https://owlcyberdefense.com/resource/decision-advantage-forecast-five-security-shifts-in-2026/&lt;/a&gt;&lt;br&gt;
Story - Power Ranger Hacker: &lt;a href="https://futurism.com/artificial-intelligence/tinder-for-nazis-hacked" target="_blank" rel="nofollow noopener"&gt;https://futurism.com/artificial-intelligence/tinder-for-nazis-hacked&lt;/a&gt;&lt;/p&gt;
</description>
  <itunes:keywords>zero trust, owl cyber defense, tech transforms, cross-domain</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>In this special 2026 Predictions episode of Tech Transforms, Carolyn Ford is joined by Brian Carter, Scott Orton, Ralph Spa, and Michael Blake from Owl Cyber Defense for a no-crystal-ball conversation about the signals already flashing across cybersecurity, defense, and digital trust.</p>

<p>This isn’t speculation. It’s trajectory.</p>

<p>The group tackles the accelerating collapse of content trust in a world of deepfakes, AI-generated media, and short-form misinformation. As generative tools become indistinguishable from reality, they predict a sharp shift toward deep identity assurance—powered by behavioral biometrics, cryptographic validation, and provable content provenance. In a future where “guaranteed human” becomes a competitive advantage, digital identity won’t be optional—it will be foundational.<br>
From there, the conversation moves into AI containment. The panel argues that we must stop treating AI like helpful software and start treating it like a privileged insider—with unpredictable outputs and real liability attached. The solution? Deterministic boundaries enforced in hardware. As Scott puts it: if you want to confine a tiger, you don’t build the cage out of meat.</p>

<p>The episode also explores:</p>

<ul>
<li>The federal government’s accelerating shift from legacy primes to agile, non-incumbent innovators delivering 80% solutions faster</li>
<li>Why battlefield communications must evolve beyond encryption to real-time, hardware-enforced trust</li>
<li>How AI-powered offensive attacks are shrinking from teams to individuals—sometimes in Power Ranger suits</li>
<li>The limits of Zero Trust when complexity, cost, and talent gaps collide</li>
<li>Why cross-domain solutions and data diodes may be the real fail-safes in an increasingly networked world</li>
</ul>

<p>Throughout the discussion, a clear thread emerges: software alone won’t save us. As systems grow more interconnected, autonomous, and AI-driven, trust must be anchored in hardware—simple, enforceable, and resistant to both human error and machine-scale attack.</p>

<p>The takeaway for 2026? Security leaders won’t lose because they lacked tools. They’ll lose because they trusted the wrong ones.</p>

<p>This episode challenges listeners to rethink modernization, containment, and what real trust looks like when machines are making decisions at machine speed.</p>

<p>Stay curious. The future isn’t waiting.</p>

<p>Shownotes<br>
Scott Orton: <a href="https://www.linkedin.com/in/scottorton/" rel="nofollow">LinkedIn</a> | Email: <a href="mailto:sorton@owlcyberdefense.com" rel="nofollow">sorton@owlcyberdefense.com</a><br>
Brian Carter: <a href="https://www.linkedin.com/in/brian-carter-4aba4a55/" rel="nofollow">LinkedIn</a> | Email:<a href="mailto:bcarter@owlcyberdefense.com" rel="nofollow">bcarter@owlcyberdefense.com</a><br>
Ralph Spada: <a href="https://www.linkedin.com/in/ralphspada/" rel="nofollow">LinkedIn</a> | Email: <a href="mailto:rspada@owlcyberdefense.com" rel="nofollow">rspada@owlcyberdefense.com</a><br>
Michael Blake: <a href="https://www.linkedin.com/in/michael-blake-734b0a21/" rel="nofollow">https://www.linkedin.com/in/michael-blake-734b0a21/</a> | Email: <a href="mailto:mblake@owlcyberdefense.com" rel="nofollow">mblake@owlcyberdefense.com</a><br>
Owl Cyber Defense: owlcyberdefense.com<br>
Download the 2026 Predictions Report:  <a href="https://owlcyberdefense.com/resource/decision-advantage-forecast-five-security-shifts-in-2026/" rel="nofollow">https://owlcyberdefense.com/resource/decision-advantage-forecast-five-security-shifts-in-2026/</a><br>
Story - Power Ranger Hacker: <a href="https://futurism.com/artificial-intelligence/tinder-for-nazis-hacked" rel="nofollow">https://futurism.com/artificial-intelligence/tinder-for-nazis-hacked</a></p>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>In this special 2026 Predictions episode of Tech Transforms, Carolyn Ford is joined by Brian Carter, Scott Orton, Ralph Spa, and Michael Blake from Owl Cyber Defense for a no-crystal-ball conversation about the signals already flashing across cybersecurity, defense, and digital trust.</p>

<p>This isn’t speculation. It’s trajectory.</p>

<p>The group tackles the accelerating collapse of content trust in a world of deepfakes, AI-generated media, and short-form misinformation. As generative tools become indistinguishable from reality, they predict a sharp shift toward deep identity assurance—powered by behavioral biometrics, cryptographic validation, and provable content provenance. In a future where “guaranteed human” becomes a competitive advantage, digital identity won’t be optional—it will be foundational.<br>
From there, the conversation moves into AI containment. The panel argues that we must stop treating AI like helpful software and start treating it like a privileged insider—with unpredictable outputs and real liability attached. The solution? Deterministic boundaries enforced in hardware. As Scott puts it: if you want to confine a tiger, you don’t build the cage out of meat.</p>

<p>The episode also explores:</p>

<ul>
<li>The federal government’s accelerating shift from legacy primes to agile, non-incumbent innovators delivering 80% solutions faster</li>
<li>Why battlefield communications must evolve beyond encryption to real-time, hardware-enforced trust</li>
<li>How AI-powered offensive attacks are shrinking from teams to individuals—sometimes in Power Ranger suits</li>
<li>The limits of Zero Trust when complexity, cost, and talent gaps collide</li>
<li>Why cross-domain solutions and data diodes may be the real fail-safes in an increasingly networked world</li>
</ul>

<p>Throughout the discussion, a clear thread emerges: software alone won’t save us. As systems grow more interconnected, autonomous, and AI-driven, trust must be anchored in hardware—simple, enforceable, and resistant to both human error and machine-scale attack.</p>

<p>The takeaway for 2026? Security leaders won’t lose because they lacked tools. They’ll lose because they trusted the wrong ones.</p>

<p>This episode challenges listeners to rethink modernization, containment, and what real trust looks like when machines are making decisions at machine speed.</p>

<p>Stay curious. The future isn’t waiting.</p>

<p>Shownotes<br>
Scott Orton: <a href="https://www.linkedin.com/in/scottorton/" rel="nofollow">LinkedIn</a> | Email: <a href="mailto:sorton@owlcyberdefense.com" rel="nofollow">sorton@owlcyberdefense.com</a><br>
Brian Carter: <a href="https://www.linkedin.com/in/brian-carter-4aba4a55/" rel="nofollow">LinkedIn</a> | Email:<a href="mailto:bcarter@owlcyberdefense.com" rel="nofollow">bcarter@owlcyberdefense.com</a><br>
Ralph Spada: <a href="https://www.linkedin.com/in/ralphspada/" rel="nofollow">LinkedIn</a> | Email: <a href="mailto:rspada@owlcyberdefense.com" rel="nofollow">rspada@owlcyberdefense.com</a><br>
Michael Blake: <a href="https://www.linkedin.com/in/michael-blake-734b0a21/" rel="nofollow">https://www.linkedin.com/in/michael-blake-734b0a21/</a> | Email: <a href="mailto:mblake@owlcyberdefense.com" rel="nofollow">mblake@owlcyberdefense.com</a><br>
Owl Cyber Defense: owlcyberdefense.com<br>
Download the 2026 Predictions Report:  <a href="https://owlcyberdefense.com/resource/decision-advantage-forecast-five-security-shifts-in-2026/" rel="nofollow">https://owlcyberdefense.com/resource/decision-advantage-forecast-five-security-shifts-in-2026/</a><br>
Story - Power Ranger Hacker: <a href="https://futurism.com/artificial-intelligence/tinder-for-nazis-hacked" rel="nofollow">https://futurism.com/artificial-intelligence/tinder-for-nazis-hacked</a></p>]]>
  </itunes:summary>
</item>
<item>
  <title>Episode 114: Trust by Design: Why AI Needs a New Digital Foundation</title>
  <link>https://techtransforms.fireside.fm/114</link>
  <guid isPermaLink="false">1e96fd71-5340-4dc7-b2fc-dcb32942aee2</guid>
  <pubDate>Tue, 06 Jan 2026 11:00:00 -0500</pubDate>
  <author>Carolyn Ford</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/81d9d6b0-0045-48da-8495-fd87c4613d7f/1e96fd71-5340-4dc7-b2fc-dcb32942aee2.mp3" length="59861352" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>Carolyn Ford</itunes:author>
  <itunes:subtitle>What if AI can’t scale because the Internet was never designed to support it? In this episode of Tech Transforms, Carolyn Ford speaks with Will Roper, CEO of Istari, about why infrastructure, not algorithms, is the real barrier to AI, and how federated, zero-trust data models could reshape defense, aerospace, and regulated industries.</itunes:subtitle>
  <itunes:duration>49:16</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/8/81d9d6b0-0045-48da-8495-fd87c4613d7f/episodes/1/1e96fd71-5340-4dc7-b2fc-dcb32942aee2/cover.jpg?v=1"/>
  <description>&lt;p&gt;In this episode of Tech Transforms, Carolyn Ford sits down with Will Roper, one of the key architects of modern defense digital transformation, for a wide-ranging conversation that challenges a core assumption of today’s tech landscape: what if AI can’t scale because the Internet was never designed to support it?&lt;/p&gt;

&lt;p&gt;Drawing on his experience leading Project Maven, overseeing the Air Force’s cloud adoption, and placing AI on a U-2 spy plane, Roper explains why the real barrier to AI adoption isn’t algorithms, it’s infrastructure. He explores how today’s Internet favors centralization, making it powerful for consumers but fundamentally misaligned with highly regulated, IP-sensitive industries like aerospace, defense, and critical infrastructure.&lt;/p&gt;

&lt;p&gt;The conversation dives deep into sovereign data territories, zero-trust collaboration, and why data should never have to move in order to be useful. Using vivid analogies—from Formula One racing and digital twins to The Matrix, Roper outlines a new model for federated infrastructure that enables secure collaboration without sacrificing ownership, trust, or governance.&lt;/p&gt;

&lt;p&gt;Carolyn and Will also explore digital certification, continuous airworthiness, and the idea of a “digital flight envelope,” where physical systems can validate and recertify themselves in real time, reshaping how safety, speed, and innovation coexist.&lt;/p&gt;

&lt;p&gt;The episode wraps with rapid-fire Tech Talk questions, a philosophical discussion on simulations and trust, and a look ahead at what the next decade of technology may bring.&lt;/p&gt;

&lt;p&gt;This is a must-listen episode for leaders rethinking infrastructure, AI readiness, and what it truly means to build systems that scale—securely, ethically, and intelligently.&lt;/p&gt;

&lt;p&gt;Show Notes:&lt;br&gt;
Email: &lt;a href="mailto:roper@istaridigital.com" target="_blank" rel="nofollow noopener"&gt;roper@istaridigital.com&lt;/a&gt;&lt;br&gt;
LinkedIn: &lt;a href="https://www.linkedin.com/in/williamroper/" target="_blank" rel="nofollow noopener"&gt;https://www.linkedin.com/in/williamroper/&lt;/a&gt;&lt;br&gt;
Summary  "There is No Spoon" Talk: &lt;a href="https://www.youtube.com/watch?v=dEcPlqImjWc" target="_blank" rel="nofollow noopener"&gt;https://www.youtube.com/watch?v=dEcPlqImjWc&lt;/a&gt; &lt;br&gt;
Dr. Roper’s Paper:  There Is No Spoon - The New Digital Acquisition Reality &lt;a href="https://www.af.mil/Portals/1/documents/2020SAF/There_Is_No_Spoon_Digital_Acquisition_7_Oct_2020_digital_version.pdf" target="_blank" rel="nofollow noopener"&gt;https://www.af.mil/Portals/1/documents/2020SAF/There_Is_No_Spoon_Digital_Acquisition_7_Oct_2020_digital_version.pdf&lt;/a&gt;&lt;br&gt;
Official Bio: &lt;a href="https://www.af.mil/About-Us/Biographies/Display/article/1467795/dr-will-roper/" target="_blank" rel="nofollow noopener"&gt;https://www.af.mil/About-Us/Biographies/Display/article/1467795/dr-will-roper/&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Istari&lt;br&gt;
&lt;a href="https://www.istaridigital.com/" target="_blank" rel="nofollow noopener"&gt;https://www.istaridigital.com/&lt;/a&gt; &lt;br&gt;
Flyer One: &lt;a href="https://www.executivebiz.com/articles/istari-digitals-flyer-one-x-plane-on-track-for-digital-certification-will-roper-quoted" target="_blank" rel="nofollow noopener"&gt;https://www.executivebiz.com/articles/istari-digitals-flyer-one-x-plane-on-track-for-digital-certification-will-roper-quoted&lt;/a&gt; &lt;/p&gt;
</description>
  <itunes:keywords>digital, owlcyberdefense, istaridigital, sovereign data, zerotrust, techtransforms</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>In this episode of Tech Transforms, Carolyn Ford sits down with Will Roper, one of the key architects of modern defense digital transformation, for a wide-ranging conversation that challenges a core assumption of today’s tech landscape: what if AI can’t scale because the Internet was never designed to support it?</p>

<p>Drawing on his experience leading Project Maven, overseeing the Air Force’s cloud adoption, and placing AI on a U-2 spy plane, Roper explains why the real barrier to AI adoption isn’t algorithms, it’s infrastructure. He explores how today’s Internet favors centralization, making it powerful for consumers but fundamentally misaligned with highly regulated, IP-sensitive industries like aerospace, defense, and critical infrastructure.</p>

<p>The conversation dives deep into sovereign data territories, zero-trust collaboration, and why data should never have to move in order to be useful. Using vivid analogies—from Formula One racing and digital twins to The Matrix, Roper outlines a new model for federated infrastructure that enables secure collaboration without sacrificing ownership, trust, or governance.</p>

<p>Carolyn and Will also explore digital certification, continuous airworthiness, and the idea of a “digital flight envelope,” where physical systems can validate and recertify themselves in real time, reshaping how safety, speed, and innovation coexist.</p>

<p>The episode wraps with rapid-fire Tech Talk questions, a philosophical discussion on simulations and trust, and a look ahead at what the next decade of technology may bring.</p>

<p>This is a must-listen episode for leaders rethinking infrastructure, AI readiness, and what it truly means to build systems that scale—securely, ethically, and intelligently.</p>

<p>Show Notes:<br>
Email: <a href="mailto:roper@istaridigital.com" rel="nofollow">roper@istaridigital.com</a><br>
LinkedIn: <a href="https://www.linkedin.com/in/williamroper/" rel="nofollow">https://www.linkedin.com/in/williamroper/</a><br>
Summary  &quot;There is No Spoon&quot; Talk: <a href="https://www.youtube.com/watch?v=dEcPlqImjWc" rel="nofollow">https://www.youtube.com/watch?v=dEcPlqImjWc</a> <br>
Dr. Roper’s Paper:  There Is No Spoon - The New Digital Acquisition Reality <a href="https://www.af.mil/Portals/1/documents/2020SAF/There_Is_No_Spoon_Digital_Acquisition_7_Oct_2020_digital_version.pdf" rel="nofollow">https://www.af.mil/Portals/1/documents/2020SAF/There_Is_No_Spoon_Digital_Acquisition_7_Oct_2020_digital_version.pdf</a><br>
Official Bio: <a href="https://www.af.mil/About-Us/Biographies/Display/article/1467795/dr-will-roper/" rel="nofollow">https://www.af.mil/About-Us/Biographies/Display/article/1467795/dr-will-roper/</a></p>

<p>Istari<br>
<a href="https://www.istaridigital.com/" rel="nofollow">https://www.istaridigital.com/</a> <br>
Flyer One: <a href="https://www.executivebiz.com/articles/istari-digitals-flyer-one-x-plane-on-track-for-digital-certification-will-roper-quoted" rel="nofollow">https://www.executivebiz.com/articles/istari-digitals-flyer-one-x-plane-on-track-for-digital-certification-will-roper-quoted</a> </p>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>In this episode of Tech Transforms, Carolyn Ford sits down with Will Roper, one of the key architects of modern defense digital transformation, for a wide-ranging conversation that challenges a core assumption of today’s tech landscape: what if AI can’t scale because the Internet was never designed to support it?</p>

<p>Drawing on his experience leading Project Maven, overseeing the Air Force’s cloud adoption, and placing AI on a U-2 spy plane, Roper explains why the real barrier to AI adoption isn’t algorithms, it’s infrastructure. He explores how today’s Internet favors centralization, making it powerful for consumers but fundamentally misaligned with highly regulated, IP-sensitive industries like aerospace, defense, and critical infrastructure.</p>

<p>The conversation dives deep into sovereign data territories, zero-trust collaboration, and why data should never have to move in order to be useful. Using vivid analogies—from Formula One racing and digital twins to The Matrix, Roper outlines a new model for federated infrastructure that enables secure collaboration without sacrificing ownership, trust, or governance.</p>

<p>Carolyn and Will also explore digital certification, continuous airworthiness, and the idea of a “digital flight envelope,” where physical systems can validate and recertify themselves in real time, reshaping how safety, speed, and innovation coexist.</p>

<p>The episode wraps with rapid-fire Tech Talk questions, a philosophical discussion on simulations and trust, and a look ahead at what the next decade of technology may bring.</p>

<p>This is a must-listen episode for leaders rethinking infrastructure, AI readiness, and what it truly means to build systems that scale—securely, ethically, and intelligently.</p>

<p>Show Notes:<br>
Email: <a href="mailto:roper@istaridigital.com" rel="nofollow">roper@istaridigital.com</a><br>
LinkedIn: <a href="https://www.linkedin.com/in/williamroper/" rel="nofollow">https://www.linkedin.com/in/williamroper/</a><br>
Summary  &quot;There is No Spoon&quot; Talk: <a href="https://www.youtube.com/watch?v=dEcPlqImjWc" rel="nofollow">https://www.youtube.com/watch?v=dEcPlqImjWc</a> <br>
Dr. Roper’s Paper:  There Is No Spoon - The New Digital Acquisition Reality <a href="https://www.af.mil/Portals/1/documents/2020SAF/There_Is_No_Spoon_Digital_Acquisition_7_Oct_2020_digital_version.pdf" rel="nofollow">https://www.af.mil/Portals/1/documents/2020SAF/There_Is_No_Spoon_Digital_Acquisition_7_Oct_2020_digital_version.pdf</a><br>
Official Bio: <a href="https://www.af.mil/About-Us/Biographies/Display/article/1467795/dr-will-roper/" rel="nofollow">https://www.af.mil/About-Us/Biographies/Display/article/1467795/dr-will-roper/</a></p>

<p>Istari<br>
<a href="https://www.istaridigital.com/" rel="nofollow">https://www.istaridigital.com/</a> <br>
Flyer One: <a href="https://www.executivebiz.com/articles/istari-digitals-flyer-one-x-plane-on-track-for-digital-certification-will-roper-quoted" rel="nofollow">https://www.executivebiz.com/articles/istari-digitals-flyer-one-x-plane-on-track-for-digital-certification-will-roper-quoted</a> </p>]]>
  </itunes:summary>
</item>
<item>
  <title>Zero Trust at the Edge: Securing Data, Devices, and Decisions</title>
  <link>https://techtransforms.fireside.fm/95</link>
  <guid isPermaLink="false">7c0dc3cc-0072-464b-9128-02e00c6ed9e5</guid>
  <pubDate>Tue, 29 Apr 2025 16:00:00 -0400</pubDate>
  <author>Carolyn Ford</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/81d9d6b0-0045-48da-8495-fd87c4613d7f/7c0dc3cc-0072-464b-9128-02e00c6ed9e5.mp3" length="54360953" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>Carolyn Ford</itunes:author>
  <itunes:subtitle>Randy Clark, cybersecurity strategist and contributor to SIGNAL Magazine, joins Carolyn Ford to explain why the future of secure data lies at the edge. From smart cities to AI-driven infrastructure, Randy breaks down how zero trust data works — and why labeling, encrypting, and governing data from the moment it’s created can change everything. They talk edge AI, data sovereignty, and why trusting your thermostat might be harder than it looks. Plus: why the 1980s weren’t ready for this tech, and how protecting data—not just networks—could reshape public safety and defense.</itunes:subtitle>
  <itunes:duration>45:16</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/8/81d9d6b0-0045-48da-8495-fd87c4613d7f/episodes/7/7c0dc3cc-0072-464b-9128-02e00c6ed9e5/cover.jpg?v=1"/>
  <description>&lt;p&gt;What if we could trust the data flying out of streetlights, drones, and smart thermostats — right from the source? In this episode of &lt;em&gt;Tech Transforms&lt;/em&gt;, Randy Clark breaks down the principles of zero trust data and its transformative power for smart cities, IoT, and AI at the edge. Randy shares why protecting data packets (not just networks) is critical for security and innovation—and how it opens up new opportunities for collaboration, compliance, and even battlefield awareness. Tune in for a fascinating conversation on the future of digital trust. &lt;/p&gt;
</description>
  <itunes:keywords>zero trust, IoT, AI, data, cybersecurity</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>What if we could trust the data flying out of streetlights, drones, and smart thermostats — right from the source? In this episode of <em>Tech Transforms</em>, Randy Clark breaks down the principles of zero trust data and its transformative power for smart cities, IoT, and AI at the edge. Randy shares why protecting data packets (not just networks) is critical for security and innovation—and how it opens up new opportunities for collaboration, compliance, and even battlefield awareness. Tune in for a fascinating conversation on the future of digital trust.</p>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>What if we could trust the data flying out of streetlights, drones, and smart thermostats — right from the source? In this episode of <em>Tech Transforms</em>, Randy Clark breaks down the principles of zero trust data and its transformative power for smart cities, IoT, and AI at the edge. Randy shares why protecting data packets (not just networks) is critical for security and innovation—and how it opens up new opportunities for collaboration, compliance, and even battlefield awareness. Tune in for a fascinating conversation on the future of digital trust.</p>]]>
  </itunes:summary>
</item>
  </channel>
</rss>
