Cybercrime and crypto-enabled financial crime have become deeply interwoven with global geopolitical dynamics, regulatory responses, and the professionalization of illicit actors. From North Korea’s increasingly sophisticated heists to the European Union’s regulatory push via the ...
Analysis
What emerged from the The August 2025 OODA Network discussion this was not just a survey of technical innovation, but a deeper reflection on how societies, governments, and enterprises will re-organize to thrive in an ...
Analysis
Recent OODA Loop research underscores one central theme: human capital is the decisive factor in cybersecurity and national tech competition. From board-level governance of human risk to the race for emerging tech talent, a “Talent ...
Analysis
With Black Hat and Def Con over, it is time to register for OODAcon! We have a great agenda and group of speakers already confirmed for this year, with a few surprises yet to be ...
Analysis
Recent OODA Network attendance at seminal, annual cybersecurity conferences (and subsequent “hot wash” discussions amongst the network membership) reinforced one vital takeaway: the “Human Factor” in all its forms will be a part of the ...
Analysis
The Indo-Pacific is at a digital inflection point where cyber cooperation could either enhance regional stability or become a new arena for geopolitical conflict. The Quadrilateral Security Dialogue (Quad) is being pushed into a pivotal ...
Analysis
The Arctic and space are deeply interwoven, through geography, strategy, environmental science, and geopolitics, making the High North both a launchpad and a lens for understanding Earth and beyond.
Analysis
Startups entering the U.S. national security arena face both extraordinary opportunity and systemic complexity—this primer maps where to focus and how to engage.
Analysis
The U.S. is witnessing a dramatic shift in its cryptocurrency policy landscape with accelerated efforts to cement a regulatory foundation for stablecoins and digital commodities.
Analysis
This playbook explains how cybersecurity, AI/ML, LLMs, adversarial AI, AI sovereignty, red‑teaming, and agentic AI intersect and what it means for startup teams who are attending Black Hat USA 2025 and DEF CON 33.
Analysis