Tech Transforms – Details, episodes & analysis

Podcast details

Technical and general information from the podcast's RSS feed.

Tech Transforms

Tech Transforms

Carolyn Ford

News
Government
Technology

Frequency: 1 episode/12d. Total Eps: 84

Captivate
Global technology is changing the way we live. Critical government decisions affect the intersection of technology advancement and human needs. This podcast talks to some of the most prominent influencers shaping the landscape to understand how they are leveraging technology to solve complex challenges while also meeting the needs of today's modern world.
Site
RSS
Apple

Recent rankings

Latest chart positions across Apple Podcasts and Spotify rankings.

Apple Podcasts

  • 🇬🇧 Great Britain - techNews

    19/11/2024
    #100
  • 🇬🇧 Great Britain - techNews

    18/11/2024
    #80
  • 🇬🇧 Great Britain - techNews

    17/11/2024
    #60
  • 🇬🇧 Great Britain - techNews

    16/11/2024
    #50

Spotify

    No recent rankings available



RSS feed quality and score

Technical evaluation of the podcast's RSS feed quality and structure.

See all
RSS feed quality
To improve

Score global : 63%


Publication history

Monthly episode publishing history over the past years.

Episodes published by month in

Latest published episodes

Recent episodes with titles, durations, and descriptions.

See all

Exploring AI Trends and Cybersecurity Evolution in the Federal Tech Landscape with Jason Miller

Episode 84

mercredi 10 avril 2024Duration 46:04

Jason Miller is the Executive Editor of Federal News Network and has covered the federal technology space over the course of five Presidential administrations. He brings his wealth of knowledge as he joins Tech Transforms to talk about AI, the top things government agencies are working towards this year and his predictions around FedRAMP changes. Jason also pulls on his decades of experience as he discusses events that changed the nation's approach to cybersecurity and the longstanding need to have data that is better, faster and easier to use.

Key Topics
  • 00:00 AI's impact on texting and cloud's significance.
  • 04:17 Federal Enterprise Risk Management in government tech.
  • 07:20 AI trends shifting toward real-time application.
  • 11:22 2025 and 2027 deadlines for zero trust.
  • 13:31 CISOs and CIOs adapting to modern technology.
  • 16:45 Frustration with FedRAMP leads to reform efforts.
  • 21:39 Applying similar model to expand decision-making.
  • 23:37 GSA discussed OSCAL at private industry day.
  • 27:55 CISA's role has grown within DHS.
  • 30:33 Increased transparency in cybersecurity changed approach significantly.
  • 34:17 Reflecting on the 2006 significance of data.
  • 39:19 AFCEA events bring together good people.
  • 42:53 Fascination with government architecture and dedicated government workers.
  • 44:35 Promoting positivity and accountability in government industry.

Cybersecurity Evolution: Examining Technology's Political Neutrality and AI Commitment Through Administrative ChangesConsistent Focus on Cybersecurity Evolution Across Political Administrations

Jason expressed a clear conviction that technology issues are largely immune to political fluctuation and are a continuity in government agendas. Reflecting on his experience across five administrations, he noted that the foundational technological discussions, such as cloud adoption, cybersecurity enhancement and overall IT improvement are fundamentally preserved through transitions in political leadership. He highlighted that the drive to enhance government IT is typically powered by the resilience and dedication of public servants, who generally carry on valuable reforms and initiatives regardless of the sitting administration's politics. These individuals are essential to sustaining progress and ensuring that technology remains a key priority for effective governance.

Federal IT Policies Consistency: "No one comes in and says, I'm against AI, or cloud is bad, move back on premise, or cybersecurity, defund cybersecurity. I think those are the issues that stay the same." — Jason MillerExecutive Orders and AI Adoption

Addressing the specifics of executive orders, particularly those influencing the implementation and development of artificial intelligence (AI), Jason examined their historical persistence and their potential to shape operational practices in the government sector. He and Mark discussed how the stability of AI-related orders through various administrations is indicative of a broader governmental consensus on the integral role AI holds in modernizing federal operations. Despite changes in leadership, the incoming officials frequently uphold the momentum established by their predecessors when it comes to leveraging AI. Indicating a shared, bipartisan recognition of its strategic importance to the government's future capabilities and efficiencies.

Cybersecurity Evolution: Zero Trust Principles and Network Security Challenges in Federal AgenciesZero Trust and Cybersecurity Budgeting

During the podcast, Carolyn and Jason delve into the current trends and expectations for federal cybersecurity advancements, with a particular focus on zero trust architecture. Their discussion acknowledged that agencies are on a tight schedule to meet the...

So What?: Understanding Disinformation and Election Integrity with Hillary Coover

Episode 83

mercredi 27 mars 2024Duration 40:42

Can you spot a deepfake? Will AI impact the election? What can we do individually to improve election security? Hillary Coover, one of the hosts of the It’s 5:05! Podcast, and Tracy Bannon join for another So What? episode of Tech Transforms to talk about all things election security. Listen in as the trio discusses cybersecurity stress tests, social engineering, combatting disinformation and much more.

Key Topics
  • 04:21 Preconceived notions make it harder to fake.
  • 06:25 AI exacerbates spread of misinformation in elections.
  • 11:01 Be cautious and verify information from sources.
  • 14:35 Receiving suspicious text messages on multiple phones.
  • 18:14 Simulation exercises help plan for potential scenarios.
  • 19:39 Various types of tests and simulations explained.
  • 23:21 Deliberate disinformation aims to falsify; consider motivation.
  • 27:44 India election, deepfakes, many parties, discerning reality.
  • 32:04 Seeking out info, voting in person important.
  • 34:18 Honest cybersecurity news from trusted source.
  • 38:33 Addressing bias in AI models, historic nuance overlooked.
  • 39:24 Consider understanding biased election information from generative AI.

Navigating the Disinformation QuagmireDissecting Misinformation and Disinformation

Hillary Coover brings attention to the pivotal distinction between misinformation and disinformation. Misinformation is the spread of false information without ill intent, often stemming from misunderstandings or mistakes. On the other hand, disinformation is a more insidious tactic involving the intentional fabrication and propagation of false information, aimed at deceiving the public. Hillary emphasizes that recognizing these differences is vital in order to effectively identify and combat these issues. She also warns about the role of external national entities that try to amplify societal divisions by manipulating online conversations to serve their own geopolitical aims.

Understanding Disinformation and Misinformation: "Disinformation is is a deliberate attempt to falsify information, whereas misinformation is a little different." — Hillary CooverThe Challenges of Policing Social Media Content

The episode dives into the complexities of managing content on social media platforms, where Tracy Bannon and Hillary discuss the delicate balance required to combat harmful content without infringing on freedom of speech or accidentally suppressing valuable discourse. As part of this discussion, they mention their intention to revisit and discuss the book "Ministry of the Future," which explores related themes. Suggesting that this novel offers insights that could prove valuable in understanding the intricate challenges of regulating social media. There is a shared concern about the potential for an overly robust censorship approach to hinder the dissemination of truth as much as it limits the spread of falsehoods.

The Erosion of Face-to-Face Political Dialogue

The conversation transitions to the broader societal implications of digital dependency. Specifically addressing how the diminishment of community engagement has led individuals to increasingly source news and discourse from digital platforms. This shift towards isolationistic tendencies, amplified by the creation of digital echo chambers, results in a decline of in-person political discussions. As a result, there is growing apprehension about the future of political discourse and community bonds, with Hillary and Tracy reflecting on the contemporary rarity of open, face-to-face political conversations that generations past traditionally engaged in.

The Shadow of Foreign Influence and Election IntegrityChallenges in India’s Multiparty Electoral System

In the course of the discussion, the complexity of India's...

Patrick Johnson on Unlocking the Potential: Enhancing Cyber Workforce and Technology in the Department of Defense

Episode 74

mercredi 29 novembre 2023Duration 47:01

Have no fear, your new wingman is here! AI is by your side and ready to help you multiply your abilities. Patrick Johnson, Director of the Workforce Innovation Directorate at the DoD CIO discusses how his team is working to further implement AI ethically and safely in areas such as human capital to expedite finding talent. Patrick also shares his passion for building cyclical pipelines to ensure that talent, and ideas, flow seamlessly between the government and private sector. Join us as we dive further into AI’s benefits and how government and industry can be cyber workforce innovation partners.

Key Topics
  • 02:06 Lag in civilian workforce training upscaling needed.
  • 03:19 Balancing talent, training and automation for better security.
  • 08:22 Leaders understand AI as a force multiplier.
  • 12:15 Our motivations are different; utilizing AI for advancement.
  • 15:25 AI used for maintenance, scheduling, monitoring issues. Embracing technology.
  • 18:35 Questioning impact of technology on workforce integration.
  • 21:45 Knowledge, skills, ability, competency. Task-focused performance. Workforce coding. Qualification program ensures necessary skill sets. Tracking mechanism being developed. Vast department with skill spread.
  • 25:26 Real-time data for proactive leadership and action.
  • 27:05 Retention strategy includes talent competition and permeability.
  • 30:36 Improving marketing for civilian DoD jobs.
  • 33:49 It works for all sectors, find talent.
  • 40:19 Government employees and veterans bring valuable skills.
  • 41:27 Promote supply, train, partner for innovation.
  • 45:33 Virtual reality: future of government services and museums.

The DoD's Cyber WorkforceCyber Workforce Improvement Is Crucial

Patrick states that the Department of Defense's (DoD's) total cyber workforce, comprising military, civilian and industry partner contractors, is around 225,000 people. He notes that the DoD has the biggest gap in the civilian cyber workforce, which makes up about 75,000 people. According to Patrick, one of the key problems when bringing new cybersecurity technologies online is failing to adequately train the existing workforce on how to use and get value from those technologies.

Training and Upscaling the Current Cyber Workforce

Rather than pursuing full re-skilling of employees which can set them back, Patrick advocates for upskilling the current DoD cyber workforce. This involves assessing talent and capability gaps. Then providing the workforce with the necessary training to perform new technologies appropriately. Patrick states that partnering workforce members with automated processes like AI can help them become more effective by highlighting key info and threats.

The Importance of Training and Upscaling in the Cyber Workforce: "Well, it's great to put new technology on the table. But if you don't take the time to train the workforce you have in the programs or the systems you're bringing online, you lose that effectiveness and you don't really gain the efficiencies or the objectives that you need to be."— Patrick JohnsonAutomation and AIAI Is Seen as a Partnership With the Human Cyber Workforce

Patrick views AI as a partnership with the human workforce rather than a threat. He emphasizes that AI should be seen as a "wingman or wingperson" that boosts productivity and acts as a force multiplier. Patrick explains that AI excels at rote, tedious tasks allowing the human workforce to focus more on creativity.

AI Helps With Rote and Tedious Tasks

According to Patrick, AI is adept at attention-to-detail tasks that would be tedious for a human to manually perform. He provides the example of a cybersecurity analyst or defender whose productivity can be enhanced by AI highlighting anomalies in data...

Unraveling SBOM Challenges: AI, Transparency and Policy Perspectives in Software Security

Episode 73

mercredi 15 novembre 2023Duration 46:45

Meet the man on a mission to make software bill of materials (SBOMs) boring. In this So What? episode, Tracy Bannon and Carolyn Ford sit down with Allan Friedman the Senior Advisor and Strategist at the Cybersecurity and Infrastructure Security Agency (CISA). Allan tells us about how he is working to change how all software on the planet is made and sold, no big deal right? Join us as we dive into the world of SBOMs, xBoMs, and Secure by Design.

Key Topics
  • 03:59 Track open source licenses, establish shared vision.
  • 08:47 Discussing US government requirements, diversity in software.
  • 12:07 Framework helps organizations with secure software development.
  • 13:49 Organizations unaffected, prepare for impending software changes.
  • 17:40 Concerns about sharing software with potential security risks.
  • 20:59 Concerns about network security and regulatory pushback.
  • 24:14 Enhanced security measures save thousands of hours.
  • 27:53 Applying AI and data bombs in conversation.
  • 32:38 Discusses the importance of SBOM in cybersecurity.
  • 36:29 Rewriting global code is a complex task.
  • 39:39 At RSA, little focus on secure design.
  • 41:53 Organization's need for SBOM, call to action.
  • 43:55 Cooking for diverse family, diverse food requirements.

Challenges and Implementation of SBOMsSelf-Attestation for SBOMs

Allan Friedman explained that there is currently a self-attestation model for SBOMs, where companies can sign a form stating that they have implemented SBOMs, rather than providing the actual SBOM data. This allows flexibility for organizations that are not yet ready to fully comply. However, it means buyers have to trust the attestation rather than seeing the SBOM details directly.

Secure Software Development Model Compliance: "The challenge there is turning the framework back into a compliance model. Because, again, at the end of the day, everyone wants to think about things. Right? Understand your risk, but you still need to make that yes or no decision."— Allan Friedman

Tracy Bannon noted some companies have concerns about sharing their SBOM data with customers, worrying that the customer may not have secure enough practices to properly protect the SBOM. Allan Friedman explained SBOMs do not need to be public - they can be shared privately between supplier and customer. Known unknowns in the SBOM can also help address concerns about revealing proprietary information.

Debate About the Risk of Sharing SBOMs as a Road Map for Attackers

Allan Friedman argued that sophisticated attackers likely do not need the SBOM, as they have other ways to analyze and reverse engineer software. Automated attacks also do not leverage SBOMs. He noted defenders actually need the visibility an SBOM provides into components and dependencies. There may be some risk of exposing attack surface, but the benefits seem to outweigh that.

The Importance of SBOM for Product Security: "If we had this, we had SBOM across our products today, it would save us thousands of hours a year Because whenever the next Log4j comes out, if you have a centralized machine readable, scannable system, It's not that hard." — Allan Friedman

Allan Friedman noted there has been some lobbyist pushback against SBOM mandates, often coming from trade associations funded by companies already implementing SBOMs. He said while healthy debate is good, many of the lobbyist complaints seem misguided or overblown.

The Potential Role of AI in Creating SBOMs and Its Implications for Security

Carolyn Ford asked whether AI could help automate SBOM creation, especially for legacy systems. Tracy Bannon cautioned that AI is not yet at the point where it can reliably generate code or understand large complex...

It's Time To Bust the Ghosts in Our Cars with Eric Monterastelli Halloween Series Part III

Episode 72

mardi 31 octobre 2023Duration 39:22

In the final, crossover episode of our three-part Halloween series, Eric Monterastelli, Public Sector SE at Delinea, Founder, Crew Chief of Gran Touring Motorsports and Host of the Break/Fix Podcast, joins Carolyn Ford and Tracy Bannon to discuss the scary reality of car security. Is your car spying on you? Can a nefarious actor take over your car? Does your car know your deep personal data like your immigration status, race and more? Hint: It can and it does.

Key Topics
  • 00:02:05 Technology advances put vehicles at risk.
  • 00:06:25 Hijacked Jeep's wireless signal, turning it off.
  • 00:07:35 Chrysler systems hacked due to digital admission.
  • 00:10:47 New EV platforms streamline technology for efficiency.
  • 00:15:13 Disconnect, purge and be careful: data can be accessed.
  • 00:18:58 Using TrueCar, author obtained personal information illegally.
  • 00:21:54 Pre-OBD2 Mercedes is OBD1.
  • 00:25:12 Mozilla uncovers alarming auto data collection.
  • 00:28:29 Future vehicles will have integrated alcohol-detection systems.
  • 00:32:48 Routers, cars can be hacked, collect data.
  • 00:35:42 Read your vehicle's owner's manual for instructions.
  • 00:36:55 Speak to rental clerk about removing data.

The Intersection of Cybersecurity, Car Security and the Ghostbusters MissionGhostbusters Mission: Car Security & Car Hacking

Eric Monterastelli talks about how cars have evolved to include more computing technology, which opens them up to potential attacks. He gives the example of a Jeep that was hacked to shut off while driving, demonstrating the real dangers.

Tracy Bannon contrasts U.S. car manufacturers that use many third-party components versus Tesla's more integrated system. She argues Tesla's approach may lend itself to more car security. The hosts explore different potential attack vectors into vehicles, like Bluetooth connections.

Mozilla Participants Share Automotive InfoSec Insights

Eric Monterastelli shares findings from a Mozilla report about the wide range of deep personal data that can be collected from cars. Including things like facial expressions, weight, health information and more. The hosts are alarmed by the privacy implications.

Tracy Bannon advocates that car manufacturers need to make cybersecurity a priority alongside traditional safety. She indicates cars are data centers on wheels, collecting information that gets sent back to big cloud data centers. They emphasize the need for vigilance from car owners about what information they allow their vehicles to collect.

Concerns About Data Collection in Modern VehiclesModern Car Security: Braking, Speed and Steering Patterns

Eric discusses the extensive data that is now collected by modern vehicles, especially EVs. He notes that information is gathered on things like stopping distances, brake pressure applied, vehicle speed and overall driving habits. This data is no different than the type of driver performance analysis done in race cars. Automakers are collecting real-world usage data from customer vehicles to analyze driving patterns and vehicle responses. Tracy adds that the average new vehicle contains over 100 different computers and millions of lines of code that are all networked together. This networked data covers areas like powertrain functions, safety features and infotainment systems. All of this interconnected data presents opportunities for tracking very detailed driving behaviors.

Privacy Risks in Driving: Collecting Personal Data and Concerns

Eric cites a concerning report that modern vehicles can potentially collect extremely sensitive personal data simply through normal driving. Including information on immigration status, race, facial expressions, weight,...

Insider Threats, Critical Infrastructure and Evolving AI, Oh My! with Grant Schneider Halloween Series Part II

Episode 71

mercredi 18 octobre 2023Duration 44:49

In the second episode of our 3-part Halloween series, Grant Schneider, Senior Director of Cybersecurity Services at Venable and former federal CISO, discusses the frightening implications of insider threats, how we are protecting critical infrastructure, and what it was like working on cybersecurity in the White House under both President Obama and President Trump.

Key Topics
  • 00:03:59 Increased consequences led to rise of cybersecurity
  • 00:08:47 Insider threat, screening, hiring, malicious actor, Manning, Snowden
  • 00:09:53 Snowden challenges legality of government surveillance
  • 00:15:00 Adversary gains access, steals information, demands ransom
  • 00:19:19 Different levels of readiness present challenges
  • 00:23:15 Helping clients & coalitions for cybersecurity policy
  • 00:24:58 Consistency in technology and cybersecurity under past presidents
  • 00:27:47 Cybersecurity is like warfare or terrorism
  • 00:32:30 AI tools and data drive persuasive information
  • 00:34:50 National Cybersecurity Awareness Month raises awareness on cybersecurity and encourages action to protect businesses
  • 00:42:40 Diversity of experiences leads to career growth
  • 00:44:01 Adaptive, willing, and able to learn

Introduction to National Cybersecurity Awareness MonthPurpose of Raising Awareness About Cybersecurity

Grant explained that one of the great things about National Cybersecurity Awareness Month is exactly raising awareness and providing an opportunity to hopefully spend time thinking about and discussing cybersecurity. He noted that for organizations already focused on cybersecurity daily, the awareness month may not raise their awareness much more. However, many organizations don't constantly think about cybersecurity, so for business leaders and executives who may now recognize the existential threat a cyber incident poses, the awareness month offers a chance to have important conversations they may have previously avoided due to lack of understanding.

National Cybersecurity Awareness Month: "You're only one bad kind of cyber incident away from your organization not existing anymore."— Grant SchneiderOpportunities for Organizations to Have Conversations About Cybersecurity

According to Grant, leaders who don't grasp cybersecurity risks may personally fear initiating conversations to ask what the organization needs to do to address risks. National Cybersecurity Awareness Month provides an opportunity for these leaders to have the necessary conversations and gain education. Grant said the awareness month is a chance to discuss basics, like implementing multifactor authentication, patching and updates. He observed that much of the content produced for the awareness month focuses on cybersecurity fundamentals, so it allows organizations to dedicate time to shoring up basic defenses. Overall, Grant emphasized National Cybersecurity Awareness Month facilitates essential cybersecurity conversations for organizations and leaders who otherwise may not prioritize it consistently.

Evolution of Insider Threat in the Intelligence CommunityScreening Out Bad Actors During the Hiring Process

Grant explains that in the early days of his career at the Defense Intelligence Agency (DIA), insider threat mitigation focused on screening out bad actors during the hiring process. The belief was that malicious insiders were either people with concerning backgrounds trying to get hired, or nation-state actors attempting to plant individuals within the intelligence community. The screening process aimed to identify and reject potentially problematic candidates.

Nation-State Actors Planting Individuals Within the Community

He mentions the...

Unmasking the Specter: Mr. Egts' Journey into the Impact of Generative AI on Government Transformation | Halloween Series Part I

Episode 70

mercredi 4 octobre 2023Duration 49:59

In the first episode of our 3-part Halloween series, Dave Egts, Mulesoft Public Sector Field CTO at Salesforce, details what's scaring the public sector most and how Salesforce is utilizing - and securing - AI to improve customer experience with their Einstein Trust Layer. Additionally, Carolyn and Dave dive into the spooky worlds of brain cell chips, mind-reading AI and more.

Key Topics
  • [02:17] Starting the Dave & Gunnar Show
  • [04:14] Dave's Role At Salesforce
  • [05:18] What's Scaring the Public Sector Most?
  • [10:22] Ways Agencies are Attracting Talent
  • [13:56] How Agencies Are Handling Legacy Systems
  • [15:45] What MuleSoft Does & Generative AI's Role
  • [22:44] Salesforce's Einstein Trust Layer
  • [29:21] PoisonGPT
  • [36:07] Brain Organoids & Other Spooky, Ethically Questionable Experiments
  • [42:15] Tech Talk Questions: Halloween Edition 

Quotable Quotes

Considerations for the Public Sector While Using AI: "As you're going on your AI journey, you've got to be looking at the EULA [End User License Agreement] and making sure that, okay, if I give you data, what are you going to do with it?"

On Bias & Disinformation in Generative AI: "There were some previous studies that show that people are more likely to go with the generative AI results if they trust the company and they trust the model. So it's like, 'Oh, it came from Google, so how can that be wrong?' Or 'I'm trusting the brand,' or 'I'm trusting the model.'"

About Our Guest

David Egts is MuleSoft’s first-ever Public Sector field CTO. Outside of MuleSoft, David is the founding co-chair of the WashingtonExec CTO Council, where he advises numerous companies on working with the public sector. David has received numerous industry-wide recognitions, including as an FCW Federal 100 winner, a FedScoop 50 Industry Leadership awardee and one of WashingtonExec’s Top Cloud Executives to Watch. He has won multiple employee honors from Red Hat, Silicon Graphics and Concurrent Technologies Corporation.

Episode Links

Dave & Gunnar Show Episodes


Additional Links


So What? China's Grip on Telecommunications with Jon Pelson, Author of "Wireless Wars"

Episode 69

mercredi 27 septembre 2023Duration 49:16

In this So What? episode, Jon Pelson, author of the best-selling book "Wireless Wars," discusses China’s impact on the telecommunications space. He also shares the frightening security concerns around Chinese components in 5G networks and discusses why the FCC's ban on these components may not be enough.

Key Topics
  • [01:30] China's Success in the Telecom Industry
  • [05:12] China's Grip on 5G
  • [08:29] Are Your Communications Ever Private?
  • [13:00] The Influence of Technology
  • [15:53] What Would Happen if China Got Control?
  • [19:20] FCC Ban on Chinese Components
  • [24:50] Huawei's Placement Strategy
  • [30:05] Is the FCC Ban a Good Start?
  • [38:42] How America Takes Back Control
  • [44:51] Tech Talk Questions

Quotable Quotes

On Huawei's Tower Placement: "Our nuclear missile bases, our special operations command at the nuclear sub base are all served by Huawei cell equipment." I said, 'That's impossible. They have like 0.1% market share. How could they have every nuclear missile site?' I started looking into it. The reason I called the book 'Wireless Wars' is because it's a war that's being fought through what appears to be business means. This is not business." -Jon Pelson

On Why We Should Protect Data: "People say, 'I have nothing to hide.' Especially the younger generation says, 'Look, my privacy, in that regard, is not that important.' I was asked at the end of an interview, 'What would happen if China got control over us the way they're trying to?' I said, 'You don't have to scratch your head and do scenario planning. Look at places where China has control over the population.' -Jon Pelson

About Our Guest

Jon Pelson spent nearly 30 years working as a technology executive, including serving as vice president at Lucent Technologies and chief of convergence strategy for British Telecom. His work with China’s telecom industry during this time led Pelson to write his best-selling book "Wireless Wars" China’s Dangerous Domination of 5G and How We’re Fighting Back."

Episode Links

Insights from the Billington Cybersecurity Summit with Willie Hicks, Federal CTO at Dynatrace

Episode 68

mercredi 20 septembre 2023Duration 22:32

On this special episode, Willie Hicks and Carolyn Ford discuss the Billington Cybersecurity Summit, as well as insights from panels, led by Willie, on workforce automation and zero trust.

Key Topics
  • [00:22] Willie's Workforce Automation Panel Highlights
  • [03:28] The Difference Between Training & Education
  • [11:11] Securing Data In A Zero Trust World Panel Highlights
  • [16:31] Willie's Experience with Constant Reverification While Working in Financial Data Protection
  • [20:44] Overarching Impressions from the Billington Cybersecurity Summit

Quotable Quotes

On the Human Factor: "I think this is always the case, that the human's usually going to be the weakest link. We're always the weakest link. But that's why that constant reverification is so critical."

On Generative AI: "We can't fear these things like generative AI. We've got to embrace it. We've got to use it. We've got to figure out how to use it and use it right and use it appropriately. But we have to figure out how to use it because you know who's using it? Our adversaries."

About Our Guest

Willie Hicks is the Public Sector Chief Technologist for Dynatrace. Willie has spent over a decade orchestrating solutions for some of the most complex network environments, from cloud to cloud native applications and microservices. He understands tracking and making sense of systems and data that has grown beyond human ability. Working across engineering and product management to ensure continued growth and speed innovation, he has implemented Artificial Intelligence and automation solutions over hundreds of environments to tame and secure their data.

Episode Links

Keeping Your Eyes Open For Opportunity with Sandi Larsen, Vice President of Global Security Solutions at Dynatrace

Episode 67

mercredi 6 septembre 2023Duration 33:13

Sandi Larsen, Vice President, Global Security Solutions at Dynatrace, joins our host Carolyn Ford to share her perspectives on the relationship between zero trust and defense in depth. She also discusses her storied career, leadership and what it's like to be a woman in technology (although she dislikes the term). Additionally, Sandi shares her advice on identifying mentors, finding your voice and battling imposter syndrome.

Key Topics
  • [00:00] Introduction
  • [01:10] Sandi's Role at Dynatrace
  • [03:11] Sandi's Take on Zero Trust & Defense in Depth
  • [09:21] Sandi’s Career Path
  • [19:01] People in Technology and the Gender Gap
  • [25:26] Sandi's Key Takeaway for Listeners
  • [27:37] Tech Talk Questions

Quotable Quotes

On Finding Inspiration: “You just can't sleep on these pivotal people in your career whether they're ahead of you or beside you or even behind you, I’ve been inspired by people that I am mentoring.”

On Having Mentors: “Find mentors, they are just invaluable and will be throughout your whole entire career, no matter what stage you're in. At the beginning, at the middle, later in your career, they will always be indispensable for you.”

On Using Your Voice: “Speak up. Just have a voice. And if that voice in your head is planting doubt, don't listen to it. If it's coaching you on what to say and what not to say, and being wise about that, listen to that. But if it's planting seeds of doubt, you've got to you have to push it aside. And you have to take that step. Because if you don't, you might be missing out on the next best thing.”

About Our Guest

Sandi Larsen currently serves as the Vice President of Global Security at Dynatrace. Prior to joining Dynatrace in November 2020, Sandi held various positions, including sales and systems engineering roles in cybersecurity and financial services organizations.

Episode Links

Related Shows Based on Content Similarities

Discover shows related to Tech Transforms, based on actual content similarities. Explore podcasts with similar topics, themes, and formats, backed by real data.
Creative Pep Talk
EntreArchitect Podcast with Mark R. LePage
The School of Greatness
Leap Academy with Ilana Golan
The Jordan B. Peterson Podcast
Young and Profiting with Hala Taha (Entrepreneurship, Sales, Marketing)
ChooseFI
Center for REALTOR® Development
It's a Good Life
Optimal Finance Daily - Financial Independence and Money Advice
© My Podcast Data