
Sign up to save your podcasts
Or


In this follow-up episode of Tech Transforms, Carolyn Ford continues her conversation with Michael Blake of Owl Cyber Defense, shifting from the theory of Zero Trust to the realities of implementing it. The discussion explores the first practical step, network discovery and why organizations are often surprised by shadow IT and legacy systems still operating inside their environments.
From there, Ford and Blake walk through the key stages of a Zero Trust journey, including microsegmentation, access management, and auditing privileges to prevent lateral movement and privilege creep. They also discuss the operational realities leaders face—budgeting, prioritizing critical assets or “crown jewels,” and ensuring organizations have the talent and resources needed to sustain a Zero Trust architecture.
The takeaway: Zero Trust isn’t a single deployment, it’s an ongoing journey that evolves alongside emerging threats and technologies.
Show Notes:
By Carolyn FordIn this follow-up episode of Tech Transforms, Carolyn Ford continues her conversation with Michael Blake of Owl Cyber Defense, shifting from the theory of Zero Trust to the realities of implementing it. The discussion explores the first practical step, network discovery and why organizations are often surprised by shadow IT and legacy systems still operating inside their environments.
From there, Ford and Blake walk through the key stages of a Zero Trust journey, including microsegmentation, access management, and auditing privileges to prevent lateral movement and privilege creep. They also discuss the operational realities leaders face—budgeting, prioritizing critical assets or “crown jewels,” and ensuring organizations have the talent and resources needed to sustain a Zero Trust architecture.
The takeaway: Zero Trust isn’t a single deployment, it’s an ongoing journey that evolves alongside emerging threats and technologies.
Show Notes: