Defense Unicorns, A Podcast

著者: Robert Slaughter Michaela Flatau Rebecca Lively and Luke Shabro
  • サマリー

  • Welcome to Defense Unicorns, A Podcast for mission focused innovators. We educate, inform, and provide mission heroes with DevSecOps, cybersecurity, and organizational transformation stories from the world's leading problem solvers. Join our hosts Rob Slaughter, Michaela Flatau, Rebecca Lively and Luke Shabro on this journey building connections across the the defense community.
    Robert Slaughter, Michaela Flatau, Rebecca Lively and Luke Shabro
    続きを読む 一部表示

あらすじ・解説

Welcome to Defense Unicorns, A Podcast for mission focused innovators. We educate, inform, and provide mission heroes with DevSecOps, cybersecurity, and organizational transformation stories from the world's leading problem solvers. Join our hosts Rob Slaughter, Michaela Flatau, Rebecca Lively and Luke Shabro on this journey building connections across the the defense community.
Robert Slaughter, Michaela Flatau, Rebecca Lively and Luke Shabro
エピソード
  • Inside Cyber Defense: Col. Sean Kern on Building Agile, Secure Teams
    2025/01/09

    In this episode, Defense Unicorns welcomes Col. Sean Kern, the Director of Cyberspace Operations Strategy at SAIC, who brings experience in military and cybersecurity strategy. Kern shares his journey from military service to civilian leadership, sharing the unique challenges and adjustments required in the transition. He discusses how his military background shaped his understanding of systems and software engineering and how essential it is to cultivate a resilient and adaptable culture in any DevSecOps team. Kern emphasizes that trust, humility, and continuous learning are cornerstones for building high-performing cybersecurity operations, both in the military and private sectors.

    The conversation dives deep into automation and the role of human judgment in high-stakes cybersecurity decisions. Kern puts a focus on a balanced approach, where automation speeds up processes without sacrificing the critical oversight humans provide. His thoughts on combating biases within AI and ensuring ethical applications of automation highlight the importance of strategic human involvement. His perspective illustrates how both tech innovation and human expertise are essential to adapting cybersecurity practices for dynamic challenges.

    Kern also addresses the structural complexities of coordinating cybersecurity operations across military branches. He explores the need for a more unified organizational framework that could enhance operational readiness and efficiency in cyber operations. Drawing from his experience, Kern advocates for a strategic, flexible, and consistent approach to cybersecurity management, emphasizing that speed and adaptability are key to staying ahead of potential threats in today's world.

    Key Quote:

    “Culture is going to happen whether you do it or not. Like that's the scary part. It's going to exist. You know, if it's left to its own devices, then if you get anything good out of it, that's pure chance. That's pure luck and we don't need to fight China on pure chance or pure luck. So we need to be deliberate about the culture we put in place.”

    • Col. Sean Kern

    Time Stamps:

    (00:32) Sean Kern's Military Background

    (06:42) Transitioning from the Military to the Private Sector

    (11:47) Building Effective Teams and Organizations

    (19:59) The Importance of Culture

    (28:24) Automation vs. Human Accuracy

    (34:50) Organizational Design for Cyber Operations

    (49:14) Lightning Round

    Links:

    Connect with Col. Sean Kern

    Learn More About SAIC

    Connect with Rebecca Lively

    Learn More About Defense Unicorns

    続きを読む 一部表示
    52 分
  • From Code to Combat: The Tech Transforming the DoD
    2024/10/17

    In this episode of The Defense Unicorns Podcast, we’re joined by Collen Roller, Founder of Dark Saber, as he shares his journey of innovation within the U.S. Air Force. From his work in Natural Language Processing (NLP) to mentoring airmen on developing applications using outdated systems, Collen’s story highlights perseverance and creativity. Discover how Dark Saber has empowered airmen to build production-ready software, transforming their operational efficiency.

    We explore the transformative potential of generative AI in defense, including its ability to automate tasks like paperwork and coding, enhancing productivity. Collen also introduces Nipper GPT, an AI tool tailored for DoD networks that bridges information gaps through conversational interfaces, pushing the boundaries of data access within military environments.

    Looking to the future, Collen discusses exciting advancements like Retrieval Augmented Generation (RAG) and multi-agent AI architectures, poised to revolutionize military data interactions. As he reflects on the importance of passion and community in driving change, this episode showcases Collen’s commitment to modernizing defense technology through innovation.

    Key Quote:

    “I think that people need to realize that these tools are for their benefits and they need to get involved in using them today to enhance their performance and workflow because if you're not using them, you're being slow.”

    -Collen Roller, Founder of Dark Saber

    Time Stamps:

    (00:00) DoD Software and Conversational Systems

    (11:28) Future of AI in Military Operations

    (17:05) Future Developments in Artificial Intelligence

    (34:38) Revolutionizing Software Development in DoD

    (44:21) Driving Change in DoD Through Passion

    Links:

    Learn more about Dark Saber

    Connect with Collen

    Connect with Luke

    続きを読む 一部表示
    45 分
  • Keeping Open Source Software Secure with Eddie Zaneski
    2024/10/02

    This week on, Defense Unicorns Podcast we welcome Eddie Zaneski, the tech lead for open source here at Defense Unicorns, who takes us through his fascinating career journey from aspiring math teacher to a key player in the tech industry. Eddie shares his experiences transitioning into computer science, his passion for developer relations, and his significant contributions to the Kubernetes project. We dive into the evolution of software deployment, from bare metal servers to virtual machines and containers, and how Kubernetes has become essential in managing large-scale containerized applications. Eddie also reflects on his time at DigitalOcean, Amazon, and ChainGuard, highlighting his work on software supply chain security projects like Protobomb and Sigstore.

    Our conversation then turns to the security of open-source communities, challenging the misconception that open-source software is less secure than its closed-source counterparts. Eddie discusses the advantages of transparency in open source, using the XZ library's recent security breach as a case study to emphasize the importance of trust and identity verification. We also explore the potential for similar vulnerabilities in closed-source projects and the growing importance of supply chain security measures, including building integrity and software bills of materials (SBOM). The episode concludes with a thought-provoking discussion on the benefits of transparency in open source and whether proprietary software incidents would be as openly shared or understood.

    Eddie shares his enthusiasm for leveraging government funding to support open-source projects. He expresses his excitement about engaging with soldiers, airmen, and guardians to understand their challenges and explore open-source solutions. We also touch on innovative tools for air-gapped environments, like Zarf, and their applications across various industries. Listen in as Eddie recounts his experiences at Bravo hackathons, the unique challenges faced by developers in constrained environments, and offers valuable career advice for those passionate about open source and software development.

    Key Quote

    “There's lots of misconceptions and I'm sure you and I can talk about all of them. One of the big ones is, just. It's less secure, right? that's a massive myth. Open source security is less secure because all the code is in the open and everyone can go find the holes and generally quite the opposite actually, because the code is in the open, everyone can do their own audits and everyone can see what's happening under the covers of the magic box that you usually can't peer into with proprietary software. We have entire teams of like security. So the Kubernetes project is divided up into special interest groups or SIGs. So we have SIGs for security, we have a product security council and committee that is the incident response people for when there is a new CVE or a bug found, and all sorts of different types of things that are just tailored around security.”

    -Eddie Zaneski

    Time Stamps:

    (00:02) Kubernetes and Open Source Evolution

    (08:17) Security in Open Source Communities

    (20:43) Software Bill of Materials for Cybersecurity

    (24:04) Exploring Defense Unicorns and Open Source

    (31:43) Navigating Careers in Open Source

    (42:25) Breaking Barriers in Defense Innovation

    (46:42) Collaborating for Defense Open Source

    Links

    Connect with Eddie

    続きを読む 一部表示
    48 分
activate_buybox_copy_target_t1

Defense Unicorns, A Podcastに寄せられたリスナーの声

カスタマーレビュー:以下のタブを選択することで、他のサイトのレビューをご覧になれます。