In this thought-provoking episode of Tech Transforms, host Carolyn Ford welcomes Janet Kang, a Silicon Valley entrepreneur turned nonprofit leader whose work sits at the intersection of AI innovation, ethics, and long-term societal impact. After building companies since age 13, launching multiple ed-tech ventures, and incubating AI-powered products in a corporate venture studio, Janet experienced firsthand the exhilarating speed and unsettling risks of deploying AI in real-world environments. Those experiences ultimately led her to join Just Horizons Alliance, a nonprofit committed to developing open protocols, ethical frameworks, and real-time auditing tools that help organizations build and deploy AI responsibly.
Janet shares candid stories from the early days of AI adoption, where models behaved inconsistently, guardrails lagged behind product timelines, and the pressure to scale fast often overshadowed deeper questions of safety and accountability. She explains why today’s biggest risk isn’t far-off superintelligence; it's the immediate, under-regulated integration of AI into education, healthcare, hiring systems, and public services. For younger users especially, she warns, AI already shapes communication, decision-making, confidence, and even identity and most tech leaders lack the tools to properly assess or mitigate those risks.
Carolyn and Janet explore why ethical AI requires more than thought leadership and policy statements. It requires action: adversarial testing, real-world simulations, contextual frameworks, and independent audits that account for messy human behavior, not just ideal use cases. They also discuss the structural barriers women face in tech, the mentors who “give up their seat” to make space, and the mindset shift that comes with parenthood thinking in decades, not quarters.
Looking ahead, Janet envisions a future where AI becomes “infrastructure, not the main character” as invisible and reliable as flipping a light switch because circuit breakers, safety layers, and accountability systems are finally in place. Until then, she calls on builders, executives, educators, and policymakers to take practical steps now: test relentlessly, understand failure modes, prioritize vulnerable users, and choose impact over speed.
This is an episode for leaders who want to innovate boldly and responsibly, those wrestling with how to balance progress with protection, and how to shape an AI-powered future worthy of the next generation.
Show Notes:
www.justhorizons.org
https://www.linkedin.com/in/kangjanet/
Pause superintelligence petition - https://www.axios.com/2025/10/22/superintelligence-ai-pause-yoshua-bengio
Books Mentioned
Empire of AI — Karen Hao
The Alignment Problem — Brian Christian
The Broken Earth Trilogy — N.K. Jemisin (recommended by Carolyn)
In this episode of Tech Transforms, host Carolyn Ford welcomes Connor Morley, Head of Security Research at Glasswall, for a deep dive into the spy-thriller world of modern file security. From malware hidden in images and PDFs to “polyglot” files that can appear as multiple formats at once, Morley exposes how attackers are redefining what a “safe file” really means.
They explore how artificial intelligence is supercharging phishing and social-engineering campaigns, making malicious messages nearly indistinguishable from legitimate ones. Morley explains the evolution of steganography—the art of concealing code inside digital images and why emerging threats like QR-code hijacking (“quishing”) have become one of the easiest ways to breach both corporate and personal devices.
But this isn’t a doom-and-gloom story. Morley shows how zero-trust file filtering and Content Disarm & Reconstruction (CDR) can neutralize hidden payloads without disrupting everyday workflows. He also reveals how these proactive defenses reduce “SOC noise,” giving security teams back valuable focus time and keeping threats from ever reaching end users.
From AI-powered deception to invisible payloads hidden in plain sight, this conversation uncovers the unseen layer of cyber defense and reminds leaders that innovation, not fear, is the best shield against tomorrow’s threats.
Show Notes:
• Whitepapers:
Polyglot Files: Unmasking Images & PDFs
Steganography: Smudging the Invisible Ink
QR Codes: Neutralizing Threats with CDR
• Webinar: File Analysis & CDR: Forging A Formidable Defense
• Website: https://www.glasswall.com/
• Connor Morley - https://www.linkedin.com/in/connormorley/
For our Halloween finale, Carolyn Ford invites two favorite “AI conjurers”, Dave Egts “Mr. X,” public-sector field CTO at Mulesoft, and Laura Klebanow, founder & chief storyteller at Show & Tell, into the Tech Transforms cauldron. Each brings a “secret AI ingredient”: Carolyn composes whimsical Suno-generated theme music (after a prompt-crafting detour through ChatGPT), Laura pushes image creation and Gemini’s career-planner for playful, practical use, and Dave reimagines Gemini’s children’s-storybook gem to craft customer-hero narratives, plus a Scooby-Doo-style Tech Transforms tale.
Then we stir in the shadows: misinformation at scale, AI “rights,” bioethics (organoids/bodyoids), job disruption vs. reskilling, and how creativity can demystify AI without sugarcoating risks. The trio closes with rapid-fire “treats & tricks,” classroom-to-boardroom starter tips (talk with AI, don’t just query it; red-team your ideas), and a reminder to “find your beautiful” use the tools to clear the junk so humans can do what only humans do.
Brewed takeaways
**Show Notes:
Dave Egts - LinkedIn: https://www.linkedin.com/in/davidegts/
Laura Klebanow - Email: laura@showtell.io - LinkedIn: https://www.linkedin.com/in/lauraklebanow/
Suno - https://suno.com/
My storybook: https://g.co/gemini/share/56bbf0498a84
Dave & Gunner Show: www.dgshow.org
In the “Thrills” side of our Halloween series, host Carolyn Ford and futurist Joseph Bradley shift from fear to possibility, exploring how AI can amplify human potential and unlock joy at scale.
Bradley introduces the “happiness paradigm,” the idea that AI’s true value isn’t just about productivity, but about helping people find more meaning, connection, and time for what matters most. From digital “twins” that make leaders more effective, to AI tools that give disabled creators new ways to express themselves, to cognitive cities designed around citizens rather than assets, this is AI as an amplifier of identity and humanity.
Instead of focusing on what we might lose, Bradley shows how leaders and organizations can build trust, align AI with values, and use it to create more satisfying workplaces, communities, and lives. If the “Chills” episode raised the hard questions, this one paints the vision of what’s possible when we get it right.
Mentioned in this episode:
Joseph Bradley - www.josephmbradley.com
Joseph Bradley’s book You to the Power of 2 (Pre-order: josephmbradley.com | https://shop.u-x2.ai/)
The Happiness Paradigm- https://www.linkedin.com/posts/josephmbradley_happiness-successmindset-activity-7284796402122072065-Gl68/
The Curious Case of AI - A Two-Part Special (“The Chills”)
In this Tech Transforms Halloween “Chills” episode, host Carolyn Ford and futurist Joseph Bradley explore the eerie, but essential, questions AI raises. Using Star Trek as their guide, they look at how “identic AI”, technology that mirrors identity, preferences, and even purpose can feel both thrilling and unsettling.
Bradley, a strong believer in AI’s potential, points out that every powerful tool comes with risks if it’s misused. Together, he and Carolyn discuss what happens when efficiency is valued over happiness, how bias can creep in if we aren’t intentional, and why cognitive cities must be built with trust and ethics at the core. Think less “the end is near” and more “what safeguards do we need to make sure this future works for people?”
This episode sets the stage for leaders, innovators, and everyday users to think critically about how AI shapes identity, relationships, and society, while remembering that the choices we make now will decide whether the future feels like The Borg… or The Federation.
Mentioned in this episode:
Joseph Bradley’s book U to the Power of 2 (Pre-order: josephmbradley.com | https://shop.u-x2.ai/)
Paperclip dilemma thought experiment - https://nickbostrom.com/ethics/ai
Smart vs. Cognitive Cities https://www.pwc.com/m1/en/publications/documents/cognitive-cities-a-journey-to-intelligent-urbanism.pdf
Questioneering: The New Model for Innovative Leaders in the Digital Age
In this episode, host Carolyn Ford sits down with Julie Laurin, a cyber threat intelligence consultant with the Mining and Metals ISAC. Julie brings two decades of expertise in software, a sharp eye for overlooked risks, and a deep curiosity about the intersection of humans and technology. Together, they explore the evolving landscape of cyber threats, from social engineering tactics like the Clickfix malware to the critical role of human behavior in cybersecurity.
Julie shares fascinating insights into the vulnerabilities of critical infrastructure, the geopolitical implications of mining and minerals, and the challenges of navigating leadership as a woman in tech. They also dive into the neurodiverse superpowers that thrive in the fast-paced world of cybersecurity and the importance of empathy in the digital age.
With humor, candor, and thought-provoking anecdotes, this episode will leave you rethinking the way we approach technology, security, and the human element. Tune in for a conversation that’s equal parts enlightening and entertaining. Stay curious and keep imagining the future!
Summary Notes
Julie’s LinkedIn Profile: https://www.linkedin.com/in/jlaurin/
Mining and Metals ISAC - https://mmisac.org/
ClickFix Analysis - https://www.microsoft.com/en-us/security/blog/2025/08/21/think-before-you-clickfix-analyzing-the-clickfix-social-engineering-technique/
ISO/IEC 27001 - https://www.iso.org/standard/27001
On this episode of Tech Transforms, host Carolyn Ford welcomes Antoine Harden, Regional VP of Federal at Sonatype, to unpack one of the most urgent challenges in federal cybersecurity: securing the software supply chain. With more than 25 years of experience at Oracle, Google, and now Sonatype, Antoine shares why software supply chain risks from SolarWinds to Log4j have pushed SBOMs (Software Bills of Materials) and continuous monitoring into the spotlight.
Together, they break down what SBOMs are (think nutrition labels for software), how mandates like Executive Order 14028 and frameworks like NIST’s Secure Software Development Framework (SSDF) and DoD’s SWFT are changing the compliance landscape, and why automation is essential to get from static ATOs to continuous authorization.
Antoine also explains how Sonatype uses AI and software composition analysis tools to close critical gaps in open source and AI-heavy environments, helping agencies shift left, reduce vulnerabilities, and accelerate secure delivery of mission-critical systems. Along the way, the conversation covers everything from JFK delays caused by vulnerabilities, to the risks of “ludicrous speed” AI adoption, to the surprising history of Project Pigeon in WWII.
For federal leaders ready to take action, Antoine offers one concrete step: start with a single mission-critical application, mandate an SBOM, and see what hidden risks you uncover.
Show Notes:
Connect with Antoine https://www.linkedin.com/in/antoine-harden-mba-035a441/
Executive Order 14028NIST Secure Software Development Framework (SSDF)
CISA Zero Trust Maturity Model
DoD’s SWFT (Software Fast Track Initiative)
Sonatype Resource Center
In this episode of TechTransforms, host Carolyn Ford sits down with Martin Stanley, Senior Advisor at NIST, to explore how AI is reshaping federal cybersecurity. They dive into NIST’s AI Risk Management Framework, the growing need for secure and resilient AI systems, and what it takes to build a “risk-aware” culture in government. Stanley shares insights on guarding against threats like model theft and prompt injection, how agencies are adapting zero trust principles for AI, and why explainability is essential in machine learning models. Whether you're new to AI governance or advancing your cybersecurity strategy, this episode offers practical guidance for navigating the evolving AI risk landscape.
Show Notes:
NIST AI resources: https://www.nist.gov/artificial-intelligence/ai-resources
AI Risk Management Framework https://www.nist.gov/itl/ai-risk-management-framework
NIST-AI-600-1: AI RMF Generative AI Profile https://airc.nist.gov/docs/NIST.AI.600-1.GenAI-Profile.ipd.pdf
Secure Software Development Practices for Generative AI and Dual-Use Foundation Models: An SSDF Community Profile https://doi.org/10.6028/NIST.SP.800-218A
Email: martin.stanley@nist.gov
LinkedIn: https://www.linkedin.com/in/mcs729/
*COTS vs. GOTS: What the Federal Mandate Really Means with Dom Perez
*
In this episode of Tech Transforms, host Carolyn Ford is joined by Dominic Perez, CTO of Curtiss-Wright Defense Solutions, to break down one of the hottest topics in defense tech: the federal government’s new COTS-first mandate.
What happens when agencies must justify government-off-the-shelf (GOTS) solutions in 60 days or lose funding? Dom shares what this means for acquisition teams, why the policy might create more confusion than clarity, and how commercial solutions for classified (CSfC) are transforming secure communications in the field.
From rugged mesh networks to “MacGyvered” mission-ready tech, Dom takes us behind the scenes of CSFC innovation, explaining how rapid deployment, lifecycle savings, and mission flexibility are driving real change.
If you’ve ever wondered how defense innovation happens at the speed of relevance or what’s really in that “Rubbermaid tote” this one’s for you.
Topics include:
Follow Dom Perez on LinkedIn for more insights and check out Curtiss-Wright’s whitepapers on modular open systems, CSFC, and edge AI.
In this episode of Tech Transforms, Daryl Haegley, Technical Director for Control Systems Cyber Resilience at the Department of the Air Force, shares insights from his nearly four decades of federal service, discussing the evolving landscape of cybersecurity for operational technology and control systems. He talks about the importance of creating a culture of security across government and industry, the challenges of modernizing legacy systems, and the urgent need to address cybersecurity gaps before adversaries exploit them. From developing a first-ever scorecard for facility cybersecurity to his mission of aligning cyber practices with national defense priorities, Haegley underscores the critical role of leadership, collaboration, and continuous innovation in securing the nation’s most vulnerable systems.
For an even deeper dive, here are additional resources for your convenience:
· Annual Threat Assessment Report: 2024 DNI ATA and 2025 DNI ATA
· Cyber Resilience Office for Control Systems (CROCS): Watch
· “OT: Lock It Down” Music Video: Listen here
· Articles Referenced:
Wired for Risk – SC World
Cyber Skills Gap – Federal News Network
Cyber OT training: [Article]
What happens when bureaucratic red tape meets bold collaboration? In this episode of Tech Transforms, Carolyn Ford is joined by Mat Cantagallo, Defense Director at Austrade, to explore how OWL, GME, and Austrade became the first to successfully leverage the AUKUS exemption, cutting through years of export restrictions to enable real-time defense collaboration between the U.S. and Australia.
From simplifying tech transfer to accelerating mission-critical training, this conversation offers a powerful look at how smart policy and strategic partnerships are setting a new benchmark for global security innovation.
If you’re in defense, cybersecurity, international trade, or just love a good story about making the impossible possible, this one’s for you.
What does it take to trust AI in the highest-stakes environments and how do we make sure people stay at the center of every innovation?
In our milestone 100th episode, Lt. General Susan Lawrence, President & CEO of AFCEA International and former CIO of the U.S. Army, joins host Carolyn Ford for a compelling conversation about the future of national defense in an AI-powered world. Together, they unpack:
Whether you're in the public sector, tech, or defense, this episode is packed with powerful insights on innovation, leadership, and national resilience.
Why do phishing scams still work, even on the savviest among us? In this episode, host Carolyn Ford welcomes Bart McDonough, Founder of Agio and author of Cyber Smart and Cyber Guardians to break down the human side of cybersecurity. Bart shares practical tips to protect yourself and your organization from today’s most common threats, explains why a resilient cyber culture matters more than ever, and reveals how AI is shaping both the future of cyber defense and cybercrime. Packed with relatable stories and expert advice, this conversation is a must-listen for anyone who thinks they’re too smart to get hacked.
Key topics:
Why social engineering remains the top attack vector
How to build defense-in-depth at work and at home
Practical habits for better passwords and safer devices
The evolving role of AI in cyber threats and defense
Why a strong cyber culture starts with open, blame-free communication
Tune in and level up your cyber smarts today!
What do Dune’s spice trade, HAL 9000, and federal supply chains have in common? They all reveal how deeply our systems rely on trust—and how dangerous things get when that trust breaks down. I’m joined by Timothy Amerson, CEO of CASMO Consulting, former Chief Information Security Officer at the Social Security Administration, and Army veteran, to explore why Supply Chain Risk Management is no longer just a CISO concern. From insider threats to shifting geopolitical pressures, Tim brings sharp, actionable insight for leaders navigating today’s complex cyber landscape. If you’re serious about moving from compliance to real resilience, this episode is for you.
When military leaders say, “Get me some of that AI,” what are they really asking for? In this episode of Tech Transforms, host Carolyn Ford is joined by Capt. M. Scott Austin, a Fellow at the Carnegie Mellon Institute for Strategy and Technology and a U.S. Coast Guard veteran. Together, they unpack what “prompt engineering” really means—not just for AI users, but for mission-driven leaders.
Capt. Austin challenges the hype, emphasizing the need for clear problem definition, strategic alignment, and human-centered design when applying AI in defense and beyond. They explore how AI can “buy back time,” why empathy is a critical leadership skill in tech adoption, and whether C-3PO or R2-D2 is the better model for agentic warfare.
You’ll hear:
Whether you're building policy, coding tools, or just trying to avoid another expense report, this episode will expand your thinking about AI’s role in high-stakes environments.
Show Notes:
In this special Tech Transforms + ATARC crossover episode, Carolyn Ford talks with Frank Indiviglio, Chief Technology Officer at NOAA, about how AI, data science, and high-performance computing are transforming weather forecasting, climate modeling, and ocean research. Frank shares how NOAA uses tools like REMUS underwater vehicles, balances open data with cybersecurity, and drives innovation through cross-sector collaboration.
Resources & Links:
🌐 Learn more about NOAA’s AI initiatives: noaa.gov/ai
🔗 Connect with Frank Indiviglio on LinkedIn: Frank Indiviglio
Tune in for insights on the future of AI, oceans, and innovation!
What if we could trust the data flying out of streetlights, drones, and smart thermostats — right from the source? In this episode of Tech Transforms, Randy Clark breaks down the principles of zero trust data and its transformative power for smart cities, IoT, and AI at the edge. Randy shares why protecting data packets (not just networks) is critical for security and innovation—and how it opens up new opportunities for collaboration, compliance, and even battlefield awareness. Tune in for a fascinating conversation on the future of digital trust.
In this special crossover from the Federal Tech Podcast hosted by John Gilroy, I’m excited to share a powerful conversation featuring Tim Fahl, CTO at Owl Cyber Defense. Tim dives into how cross-domain solutions are playing a crucial role in boosting cyber resilience across federal agencies—enabling secure information sharing in even the most sensitive environments.
We explore how Owl Cyber Defense is bridging security gaps, ensuring that mission-critical data can flow safely and efficiently between networks of differing classifications.
If you’re passionate about securing federal systems and fascinated by the intersection of innovation and infrastructure, this episode is a must-listen.
Originally aired on the Federal Tech Podcast. Huge thanks to John Gilroy for the opportunity to bring this conversation to the Tech Transforms audience.
Guest: Award Winning Author Steve Stratton, Retired Green Beret, Former Secret Service Agent, Cybersecurity Expert, Author of Operation Skipjack
Summary:
In this special episode of Tech Transforms, part of our ongoing Skipjack Series, host Carolyn Ford reconnects with Steve Stratton to discuss his latest story: Operation White Heron. Building on the world of Operation Skipjack, this installment dives into the often-invisible frontlines of modern warfare—where shaping operations, secure communications, and real-time intelligence determine outcomes before the first shot is ever fired.
From special forces training with partners in the Pacific to disinformation campaigns and environmental sensors used for threat detection, Stratton breaks down how fiction rooted in reality can help decision-makers reframe the future of conflict. It’s a powerful conversation about leadership at the edge, data as a weapon, and the value of multi-domain coordination.
If you’re in national security, tech, or just curious how stories can shape strategy, this episode is for you.
Key Takeaways – Operation White Heron Episode
Conflict Doesn’t Start with Gunfire
Modern warfare is already happening—in cyberspace, in social media, and through economic and information pressure. Operation White Heron explores the reality of “pre-hostility” operations where shaping activities and influence campaigns define the battlespace before combat begins.
Operate at the Point of Information
Admiral Nikki Furry empowers her teams to make decisions where the data is collected—not after it's passed through layers of bureaucracy. This shift mirrors real-world changes in how the U.S. military and intelligence community are adapting to fast, decentralized decision-making.
Multi-Domain Awareness Requires Unconventional Sensors
From tidal sensors to AI-enhanced intel fusion, the story shows how unconventional data sources—when securely correlated—can detect threats others might miss. The key is recognizing that anything connected to the environment can become part of your sensor network.
Real-Time Data Sharing Is the New Tactical Advantage
Tactical data has a short shelf life. Whether stopping swimmers from landing on a hostile coast or responding to disinformation in real-time, secure and fast communications between allied forces is a game-changer.
Useful Fiction Makes the Tech and Stakes Real
By embedding real technology—like Owl’s PACSTAR kits and cross-domain guards—into a compelling narrative, Stratton helps readers understand the why behind secure communications, not just the how.
This Is a Continuum, Not a Moment
From pre-conflict shaping to full kinetic operations and post-conflict recovery, modern warfare requires continuous situational awareness, massive data ingestion, and the ability to act inside the adversary’s decision loop.
📘 Read the First Chapters Now — and Be the First to Read the Latest Installment: Operation White Heron
The Skipjack series continues. Start with the opening chapters already available—and be among the first to read Operation White Heron, launching May 5 at SOF Week.
👉 owlcyberdefense.com/operationskipjack
📬 Connect with Steve Stratton
📧 Email: stevenstratton@usa.com
🌐 Website: stevenstrattonusa.com
🔗 LinkedIn: Steve Stratton
📱 Instagram/X/Facebook: @StrattonBooks
In this episode, Carolyn welcomes back Dave Egts, Field CTO at MuleSoft, to explore the transformative power of AI in 2025. They dive into Dave’s top five AI predictions, with a special focus on the rise of agentic AI—AI that doesn’t just suggest, but acts. Dave explains the difference between generative AI and intelligent agents, why integration via APIs is the key to agent success, and how government agencies can prepare now.
Listeners will learn:
📌 Show Notes:
Guest: Dave Egts, Field CTO at MuleSoft, a Salesforce company
🔗 Follow Dave on LinkedIn
🎧 Listen to the Dave & Gunnar Show
Key Topics:
[00:00] Intro & Dave’s blog: “5 AI Predictions for 2025”
[03:00] What’s an AI agent? Why they’re different from GenAI
[07:30] Real-world examples from Salesforce: Agentforce in action
[14:00] The importance of APIs for agent success
[15:45] Government use cases & security considerations
[18:00] Internal AI agents that reduce toil (meeting schedulers, IT help, expense reports)
[22:00] Cylon references & the power of digital labor in public sector
[29:00] Small Language Models: Why smaller might be better
[36:00] LLM Routers explained
[38:00] Fun Tech Talk Q&A (Superpowers, overhyped trends, sci-fi names)
Resources Mentioned:
📖 Dave's Blog: 5 AI Predictions for 2025: Opportunities Tech Leaders Must Seize This Year
💡 Trailhead Learning Platform from Salesforce: Learn to build your own agent
🤖 Help.Salesforce.com – Try Agentforce
📺 Forbidden Planet (Robby the Robot)
🐒 Monkey’s Paw story reference