For our Halloween finale, Carolyn Ford invites two favorite “AI conjurers”, Dave Egts “Mr. X,” public-sector field CTO at Mulesoft, and Laura Klebanow, founder & chief storyteller at Show & Tell, into the Tech Transforms cauldron. Each brings a “secret AI ingredient”: Carolyn composes whimsical Suno-generated theme music (after a prompt-crafting detour through ChatGPT), Laura pushes image creation and Gemini’s career-planner for playful, practical use, and Dave reimagines Gemini’s children’s-storybook gem to craft customer-hero narratives, plus a Scooby-Doo-style Tech Transforms tale.
Then we stir in the shadows: misinformation at scale, AI “rights,” bioethics (organoids/bodyoids), job disruption vs. reskilling, and how creativity can demystify AI without sugarcoating risks. The trio closes with rapid-fire “treats & tricks,” classroom-to-boardroom starter tips (talk with AI, don’t just query it; red-team your ideas), and a reminder to “find your beautiful” use the tools to clear the junk so humans can do what only humans do.
Brewed takeaways
**Show Notes:
Dave Egts - LinkedIn: https://www.linkedin.com/in/davidegts/
Laura Klebanow - Email: laura@showtell.io - LinkedIn: https://www.linkedin.com/in/lauraklebanow/
Suno - https://suno.com/
My storybook: https://g.co/gemini/share/56bbf0498a84
Dave & Gunner Show: www.dgshow.org
In the “Thrills” side of our Halloween series, host Carolyn Ford and futurist Joseph Bradley shift from fear to possibility, exploring how AI can amplify human potential and unlock joy at scale.
Bradley introduces the “happiness paradigm,” the idea that AI’s true value isn’t just about productivity, but about helping people find more meaning, connection, and time for what matters most. From digital “twins” that make leaders more effective, to AI tools that give disabled creators new ways to express themselves, to cognitive cities designed around citizens rather than assets, this is AI as an amplifier of identity and humanity.
Instead of focusing on what we might lose, Bradley shows how leaders and organizations can build trust, align AI with values, and use it to create more satisfying workplaces, communities, and lives. If the “Chills” episode raised the hard questions, this one paints the vision of what’s possible when we get it right.
Mentioned in this episode:
Joseph Bradley - www.josephmbradley.com
Joseph Bradley’s book You to the Power of 2 (Pre-order: josephmbradley.com | https://shop.u-x2.ai/)
The Happiness Paradigm- https://www.linkedin.com/posts/josephmbradley_happiness-successmindset-activity-7284796402122072065-Gl68/
The Curious Case of AI - A Two-Part Special (“The Chills”)
In this Tech Transforms Halloween “Chills” episode, host Carolyn Ford and futurist Joseph Bradley explore the eerie, but essential, questions AI raises. Using Star Trek as their guide, they look at how “identic AI”, technology that mirrors identity, preferences, and even purpose can feel both thrilling and unsettling.
Bradley, a strong believer in AI’s potential, points out that every powerful tool comes with risks if it’s misused. Together, he and Carolyn discuss what happens when efficiency is valued over happiness, how bias can creep in if we aren’t intentional, and why cognitive cities must be built with trust and ethics at the core. Think less “the end is near” and more “what safeguards do we need to make sure this future works for people?”
This episode sets the stage for leaders, innovators, and everyday users to think critically about how AI shapes identity, relationships, and society, while remembering that the choices we make now will decide whether the future feels like The Borg… or The Federation.
Mentioned in this episode:
Joseph Bradley’s book U to the Power of 2 (Pre-order: josephmbradley.com | https://shop.u-x2.ai/)
Paperclip dilemma thought experiment - https://nickbostrom.com/ethics/ai
Smart vs. Cognitive Cities https://www.pwc.com/m1/en/publications/documents/cognitive-cities-a-journey-to-intelligent-urbanism.pdf
Questioneering: The New Model for Innovative Leaders in the Digital Age
In this episode, host Carolyn Ford sits down with Julie Laurin, a cyber threat intelligence consultant with the Mining and Metals ISAC. Julie brings two decades of expertise in software, a sharp eye for overlooked risks, and a deep curiosity about the intersection of humans and technology. Together, they explore the evolving landscape of cyber threats, from social engineering tactics like the Clickfix malware to the critical role of human behavior in cybersecurity.
Julie shares fascinating insights into the vulnerabilities of critical infrastructure, the geopolitical implications of mining and minerals, and the challenges of navigating leadership as a woman in tech. They also dive into the neurodiverse superpowers that thrive in the fast-paced world of cybersecurity and the importance of empathy in the digital age.
With humor, candor, and thought-provoking anecdotes, this episode will leave you rethinking the way we approach technology, security, and the human element. Tune in for a conversation that’s equal parts enlightening and entertaining. Stay curious and keep imagining the future!
Summary Notes
Julie’s LinkedIn Profile: https://www.linkedin.com/in/jlaurin/
Mining and Metals ISAC - https://mmisac.org/
ClickFix Analysis - https://www.microsoft.com/en-us/security/blog/2025/08/21/think-before-you-clickfix-analyzing-the-clickfix-social-engineering-technique/
ISO/IEC 27001 - https://www.iso.org/standard/27001
On this episode of Tech Transforms, host Carolyn Ford welcomes Antoine Harden, Regional VP of Federal at Sonatype, to unpack one of the most urgent challenges in federal cybersecurity: securing the software supply chain. With more than 25 years of experience at Oracle, Google, and now Sonatype, Antoine shares why software supply chain risks from SolarWinds to Log4j have pushed SBOMs (Software Bills of Materials) and continuous monitoring into the spotlight.
Together, they break down what SBOMs are (think nutrition labels for software), how mandates like Executive Order 14028 and frameworks like NIST’s Secure Software Development Framework (SSDF) and DoD’s SWFT are changing the compliance landscape, and why automation is essential to get from static ATOs to continuous authorization.
Antoine also explains how Sonatype uses AI and software composition analysis tools to close critical gaps in open source and AI-heavy environments, helping agencies shift left, reduce vulnerabilities, and accelerate secure delivery of mission-critical systems. Along the way, the conversation covers everything from JFK delays caused by vulnerabilities, to the risks of “ludicrous speed” AI adoption, to the surprising history of Project Pigeon in WWII.
For federal leaders ready to take action, Antoine offers one concrete step: start with a single mission-critical application, mandate an SBOM, and see what hidden risks you uncover.
Show Notes:
Connect with Antoine https://www.linkedin.com/in/antoine-harden-mba-035a441/
Executive Order 14028NIST Secure Software Development Framework (SSDF)
CISA Zero Trust Maturity Model
DoD’s SWFT (Software Fast Track Initiative)
Sonatype Resource Center
In this episode of TechTransforms, host Carolyn Ford sits down with Martin Stanley, Senior Advisor at NIST, to explore how AI is reshaping federal cybersecurity. They dive into NIST’s AI Risk Management Framework, the growing need for secure and resilient AI systems, and what it takes to build a “risk-aware” culture in government. Stanley shares insights on guarding against threats like model theft and prompt injection, how agencies are adapting zero trust principles for AI, and why explainability is essential in machine learning models. Whether you're new to AI governance or advancing your cybersecurity strategy, this episode offers practical guidance for navigating the evolving AI risk landscape.
Show Notes:
NIST AI resources: https://www.nist.gov/artificial-intelligence/ai-resources
AI Risk Management Framework https://www.nist.gov/itl/ai-risk-management-framework
NIST-AI-600-1: AI RMF Generative AI Profile https://airc.nist.gov/docs/NIST.AI.600-1.GenAI-Profile.ipd.pdf
Secure Software Development Practices for Generative AI and Dual-Use Foundation Models: An SSDF Community Profile https://doi.org/10.6028/NIST.SP.800-218A
Email: martin.stanley@nist.gov
LinkedIn: https://www.linkedin.com/in/mcs729/
*COTS vs. GOTS: What the Federal Mandate Really Means with Dom Perez
*
In this episode of Tech Transforms, host Carolyn Ford is joined by Dominic Perez, CTO of Curtiss-Wright Defense Solutions, to break down one of the hottest topics in defense tech: the federal government’s new COTS-first mandate.
What happens when agencies must justify government-off-the-shelf (GOTS) solutions in 60 days or lose funding? Dom shares what this means for acquisition teams, why the policy might create more confusion than clarity, and how commercial solutions for classified (CSfC) are transforming secure communications in the field.
From rugged mesh networks to “MacGyvered” mission-ready tech, Dom takes us behind the scenes of CSFC innovation, explaining how rapid deployment, lifecycle savings, and mission flexibility are driving real change.
If you’ve ever wondered how defense innovation happens at the speed of relevance or what’s really in that “Rubbermaid tote” this one’s for you.
Topics include:
Follow Dom Perez on LinkedIn for more insights and check out Curtiss-Wright’s whitepapers on modular open systems, CSFC, and edge AI.
In this episode of Tech Transforms, Daryl Haegley, Technical Director for Control Systems Cyber Resilience at the Department of the Air Force, shares insights from his nearly four decades of federal service, discussing the evolving landscape of cybersecurity for operational technology and control systems. He talks about the importance of creating a culture of security across government and industry, the challenges of modernizing legacy systems, and the urgent need to address cybersecurity gaps before adversaries exploit them. From developing a first-ever scorecard for facility cybersecurity to his mission of aligning cyber practices with national defense priorities, Haegley underscores the critical role of leadership, collaboration, and continuous innovation in securing the nation’s most vulnerable systems.
For an even deeper dive, here are additional resources for your convenience:
· Annual Threat Assessment Report: 2024 DNI ATA and 2025 DNI ATA
· Cyber Resilience Office for Control Systems (CROCS): Watch
· “OT: Lock It Down” Music Video: Listen here
· Articles Referenced:
Wired for Risk – SC World
Cyber Skills Gap – Federal News Network
Cyber OT training: [Article]
What happens when bureaucratic red tape meets bold collaboration? In this episode of Tech Transforms, Carolyn Ford is joined by Mat Cantagallo, Defense Director at Austrade, to explore how OWL, GME, and Austrade became the first to successfully leverage the AUKUS exemption, cutting through years of export restrictions to enable real-time defense collaboration between the U.S. and Australia.
From simplifying tech transfer to accelerating mission-critical training, this conversation offers a powerful look at how smart policy and strategic partnerships are setting a new benchmark for global security innovation.
If you’re in defense, cybersecurity, international trade, or just love a good story about making the impossible possible, this one’s for you.
What does it take to trust AI in the highest-stakes environments and how do we make sure people stay at the center of every innovation?
In our milestone 100th episode, Lt. General Susan Lawrence, President & CEO of AFCEA International and former CIO of the U.S. Army, joins host Carolyn Ford for a compelling conversation about the future of national defense in an AI-powered world. Together, they unpack:
Whether you're in the public sector, tech, or defense, this episode is packed with powerful insights on innovation, leadership, and national resilience.
Why do phishing scams still work, even on the savviest among us? In this episode, host Carolyn Ford welcomes Bart McDonough, Founder of Agio and author of Cyber Smart and Cyber Guardians to break down the human side of cybersecurity. Bart shares practical tips to protect yourself and your organization from today’s most common threats, explains why a resilient cyber culture matters more than ever, and reveals how AI is shaping both the future of cyber defense and cybercrime. Packed with relatable stories and expert advice, this conversation is a must-listen for anyone who thinks they’re too smart to get hacked.
Key topics:
Why social engineering remains the top attack vector
How to build defense-in-depth at work and at home
Practical habits for better passwords and safer devices
The evolving role of AI in cyber threats and defense
Why a strong cyber culture starts with open, blame-free communication
Tune in and level up your cyber smarts today!
What do Dune’s spice trade, HAL 9000, and federal supply chains have in common? They all reveal how deeply our systems rely on trust—and how dangerous things get when that trust breaks down. I’m joined by Timothy Amerson, CEO of CASMO Consulting, former Chief Information Security Officer at the Social Security Administration, and Army veteran, to explore why Supply Chain Risk Management is no longer just a CISO concern. From insider threats to shifting geopolitical pressures, Tim brings sharp, actionable insight for leaders navigating today’s complex cyber landscape. If you’re serious about moving from compliance to real resilience, this episode is for you.
When military leaders say, “Get me some of that AI,” what are they really asking for? In this episode of Tech Transforms, host Carolyn Ford is joined by Capt. M. Scott Austin, a Fellow at the Carnegie Mellon Institute for Strategy and Technology and a U.S. Coast Guard veteran. Together, they unpack what “prompt engineering” really means—not just for AI users, but for mission-driven leaders.
Capt. Austin challenges the hype, emphasizing the need for clear problem definition, strategic alignment, and human-centered design when applying AI in defense and beyond. They explore how AI can “buy back time,” why empathy is a critical leadership skill in tech adoption, and whether C-3PO or R2-D2 is the better model for agentic warfare.
You’ll hear:
Whether you're building policy, coding tools, or just trying to avoid another expense report, this episode will expand your thinking about AI’s role in high-stakes environments.
Show Notes:
In this special Tech Transforms + ATARC crossover episode, Carolyn Ford talks with Frank Indiviglio, Chief Technology Officer at NOAA, about how AI, data science, and high-performance computing are transforming weather forecasting, climate modeling, and ocean research. Frank shares how NOAA uses tools like REMUS underwater vehicles, balances open data with cybersecurity, and drives innovation through cross-sector collaboration.
Resources & Links:
🌐 Learn more about NOAA’s AI initiatives: noaa.gov/ai
🔗 Connect with Frank Indiviglio on LinkedIn: Frank Indiviglio
Tune in for insights on the future of AI, oceans, and innovation!
What if we could trust the data flying out of streetlights, drones, and smart thermostats — right from the source? In this episode of Tech Transforms, Randy Clark breaks down the principles of zero trust data and its transformative power for smart cities, IoT, and AI at the edge. Randy shares why protecting data packets (not just networks) is critical for security and innovation—and how it opens up new opportunities for collaboration, compliance, and even battlefield awareness. Tune in for a fascinating conversation on the future of digital trust.
In this special crossover from the Federal Tech Podcast hosted by John Gilroy, I’m excited to share a powerful conversation featuring Tim Fahl, CTO at Owl Cyber Defense. Tim dives into how cross-domain solutions are playing a crucial role in boosting cyber resilience across federal agencies—enabling secure information sharing in even the most sensitive environments.
We explore how Owl Cyber Defense is bridging security gaps, ensuring that mission-critical data can flow safely and efficiently between networks of differing classifications.
If you’re passionate about securing federal systems and fascinated by the intersection of innovation and infrastructure, this episode is a must-listen.
Originally aired on the Federal Tech Podcast. Huge thanks to John Gilroy for the opportunity to bring this conversation to the Tech Transforms audience.
Guest: Award Winning Author Steve Stratton, Retired Green Beret, Former Secret Service Agent, Cybersecurity Expert, Author of Operation Skipjack
Summary:
In this special episode of Tech Transforms, part of our ongoing Skipjack Series, host Carolyn Ford reconnects with Steve Stratton to discuss his latest story: Operation White Heron. Building on the world of Operation Skipjack, this installment dives into the often-invisible frontlines of modern warfare—where shaping operations, secure communications, and real-time intelligence determine outcomes before the first shot is ever fired.
From special forces training with partners in the Pacific to disinformation campaigns and environmental sensors used for threat detection, Stratton breaks down how fiction rooted in reality can help decision-makers reframe the future of conflict. It’s a powerful conversation about leadership at the edge, data as a weapon, and the value of multi-domain coordination.
If you’re in national security, tech, or just curious how stories can shape strategy, this episode is for you.
Key Takeaways – Operation White Heron Episode
Conflict Doesn’t Start with Gunfire
Modern warfare is already happening—in cyberspace, in social media, and through economic and information pressure. Operation White Heron explores the reality of “pre-hostility” operations where shaping activities and influence campaigns define the battlespace before combat begins.
Operate at the Point of Information
Admiral Nikki Furry empowers her teams to make decisions where the data is collected—not after it's passed through layers of bureaucracy. This shift mirrors real-world changes in how the U.S. military and intelligence community are adapting to fast, decentralized decision-making.
Multi-Domain Awareness Requires Unconventional Sensors
From tidal sensors to AI-enhanced intel fusion, the story shows how unconventional data sources—when securely correlated—can detect threats others might miss. The key is recognizing that anything connected to the environment can become part of your sensor network.
Real-Time Data Sharing Is the New Tactical Advantage
Tactical data has a short shelf life. Whether stopping swimmers from landing on a hostile coast or responding to disinformation in real-time, secure and fast communications between allied forces is a game-changer.
Useful Fiction Makes the Tech and Stakes Real
By embedding real technology—like Owl’s PACSTAR kits and cross-domain guards—into a compelling narrative, Stratton helps readers understand the why behind secure communications, not just the how.
This Is a Continuum, Not a Moment
From pre-conflict shaping to full kinetic operations and post-conflict recovery, modern warfare requires continuous situational awareness, massive data ingestion, and the ability to act inside the adversary’s decision loop.
📘 Read the First Chapters Now — and Be the First to Read the Latest Installment: Operation White Heron
The Skipjack series continues. Start with the opening chapters already available—and be among the first to read Operation White Heron, launching May 5 at SOF Week.
👉 owlcyberdefense.com/operationskipjack
📬 Connect with Steve Stratton
📧 Email: stevenstratton@usa.com
🌐 Website: stevenstrattonusa.com
🔗 LinkedIn: Steve Stratton
📱 Instagram/X/Facebook: @StrattonBooks
In this episode, Carolyn welcomes back Dave Egts, Field CTO at MuleSoft, to explore the transformative power of AI in 2025. They dive into Dave’s top five AI predictions, with a special focus on the rise of agentic AI—AI that doesn’t just suggest, but acts. Dave explains the difference between generative AI and intelligent agents, why integration via APIs is the key to agent success, and how government agencies can prepare now.
Listeners will learn:
📌 Show Notes:
Guest: Dave Egts, Field CTO at MuleSoft, a Salesforce company
🔗 Follow Dave on LinkedIn
🎧 Listen to the Dave & Gunnar Show
Key Topics:
[00:00] Intro & Dave’s blog: “5 AI Predictions for 2025”
[03:00] What’s an AI agent? Why they’re different from GenAI
[07:30] Real-world examples from Salesforce: Agentforce in action
[14:00] The importance of APIs for agent success
[15:45] Government use cases & security considerations
[18:00] Internal AI agents that reduce toil (meeting schedulers, IT help, expense reports)
[22:00] Cylon references & the power of digital labor in public sector
[29:00] Small Language Models: Why smaller might be better
[36:00] LLM Routers explained
[38:00] Fun Tech Talk Q&A (Superpowers, overhyped trends, sci-fi names)
Resources Mentioned:
📖 Dave's Blog: 5 AI Predictions for 2025: Opportunities Tech Leaders Must Seize This Year
💡 Trailhead Learning Platform from Salesforce: Learn to build your own agent
🤖 Help.Salesforce.com – Try Agentforce
📺 Forbidden Planet (Robby the Robot)
🐒 Monkey’s Paw story reference
What if the next global conflict begins not on the battlefield, but in cyberspace?
In this thrilling episode of Tech Transforms, host Carolyn Ford welcomes author, former Special Forces operator, and intelligence professional Steve Stratton to discuss Operation Skipjack—a useful fiction thriller that feels ripped straight from today’s headlines. This isn’t just a story; it’s a wake-up call.
Set in one of the world's most volatile geopolitical hotspots, Operation Skipjack explores a high-stakes cyber warfare scenario where adversaries leverage stealth technology, artificial intelligence, and quantum computing to disrupt global military operations. While the narrative is fictional, the threats, technologies, and strategic maneuvers are real—many of them already in development or active use.
What You’ll Learn in This Episode:
🚀 The Real-World Tech Behind the Fiction: Every piece of technology in Operation Skipjack—from quantum radar to cross-domain security solutions—is either operational, in prototype, or on the near horizon. Learn how emerging innovations are shaping modern defense strategies.
🕵️ Why “Useful Fiction” Is More Than Just a Story: Unlike traditional fiction, useful fiction blends real-world intelligence, defense strategies, and cutting-edge tech into an engaging narrative. Find out how military leaders and decision-makers use fictionalized scenarios to prepare for real threats.
🌍 The Cyber War That’s Already Happening: Steve Stratton reveals why cyber warfare isn’t a future possibility—it’s a daily battle being fought in the shadows. From state-sponsored hacking to AI-powered cyber attacks, the game has changed, and national security is on the line.
🔒 The Role of Cross-Domain Solutions in Defense: Discover how Owl Cyber Defense’s technology is ensuring secure, real-time data transfers in high-risk military environments—and why this matters in a world of increasing cyber threats.
🎥 If Operation Skipjack Became a Movie: Who would play Admiral Nikki Fury? Steve and Carolyn share their dream cast picks for a blockbuster adaptation of this intense cyber thriller.
Exclusive Access to Operation Skipjack
Operation Skipjack will be officially unveiled at Distributech on March 24, 2025, but you don’t have to wait.
🔗 Get exclusive early access to the full chapter! Sign up at owlcyberdefense.com/operationskipjack/ to receive your copy as soon as it’s released.
📢 Stay Connected:
Follow Owl Cyber Defense on LinkedIn for updates.
Connect with Steve Stratton at [stevenstrattonusa.com](stevestrattonusa.com)
Final Thought:
This episode isn’t just about a book—it’s about the future of warfare, technology, and national security. Are we ready for what’s coming?
🎧 Listen now and stay ahead of the cyber threats shaping tomorrow’s battles.
🔒 How do we secure software in an era of open-source dominance and AI-driven threats?
On this episode of Tech Transforms, Scott Orton and Mike Mehlberg join Carolyn Ford to explore the future of secure software development. They tackle:
✅ The Power of SBOMs – Why software transparency is a game-changer (and why some companies still resist it)
✅ Open-Source Risks – How attackers exploit vulnerabilities in widely used packages and what to do about it
✅ Rust Programming Language – The case for transitioning to a more secure, memory-safe coding environment
✅ AI in Software Development – How AI is transforming cybersecurity, from automated vulnerability detection to mitigating risks before they happen
✅ Cross-Domain Solutions – The push toward hygienic networks and a proactive approach to security in classified environments
They also discuss real-world security threats, including a recent open-source software attack that nearly went undetected. Plus, Scott shares his vision for AI inspired by non-human intelligence (think squids and insects! 🦑).
🔹 If you're in software development, cybersecurity, or tech leadership, this episode is a must-listen!
📲 Connect with Scott and Mike on LinkedIn for more insights.
🎧 Listen now and stay ahead in the world of secure software and cyber defense!