Start your day with intelligence. Get The OODA Daily Pulse.

Home > Example Query Loops


Analysis

  • Do Cybersecurity Bilateral Agreements Do Anything?

    There is so much about these cybersecurity bilateral agreements that are not known, as few of the agreements have been fully made public with most known about them coming from public statements. At best, coverage on these agreements is vague at best thereby making it difficult to track and evaluate.  Therefore, there needs to be…

  • Global Crypto and Digital Currency Initiatives: Colombia

    We continue with our brief survey of crypto and digital currency initiatives from around the globe, all of which are officially sanctioned to enhance national competitive advantage (in the event crypto overtakes the US dollar as the global reserve currency).  It is the cumulative adoption rate of state-sanctioned crypto and digital currency legalization and regulation…

  • The Quantum List Updated: Companies leveraging quantum effects for real world functionality and security

    OODA is tracking almost 1300 firms that leverage quantum effects to provide real world functionality. Of these we have selected 23 to bring to our network’s attention because of our judgment of the importance these firms are already playing in domains of Quantum Computing, Quantum Security, Quantum Communications and Quantum Sensing. 

  • The August 2022 OODA Network Member Meeting: Highlights and Observations from the Cyber Community Events in Vegas

    To help members optimize opportunities and reduce risk, OODA hosts a monthly video call to discuss items of common interest to our membership. These highly collaborative sessions are always a great way for our members to meet and interact with each other while talking about topics like global risks, emerging technologies, cybersecurity, and current or…

  • The OODA Loop 2022 Research Primer on Digital Self-Sovereignty, Digital Rights and Digital Identity

    Digital Self-Sovereignty, Digital Rights, and Digital Identity is an area of research concerned with the security of personal data and the individual’s right to ownership of their personal data. Our fundamental strategic insight is that “personal data ownership” will be the crucial design element of a future systems architecture designed to solve issues like misinformation…

  • America’s Frontier Fund and the Quad Investor Network

    In July, Cyberscoop.com reported on the launch of America’s Frontier Fund (AFF), which is an extraordinary public/private partnership and non-profit organization dedicated to America’s Great Power competitive advantage through global technology leadership in what some call “deep tech” or “frontier tech.” The initial Cyberscoop coverage suggested that the fund was dedicated to cybersecurity, but upon…

  • Would a Splinternet Be That Bad?

    The term “splinternet” refers to the increasingly balkanization of the Internet, where the cyber domain is dividing due to a variety of reasons to include but not limited to technology, commerce, nationalism, politics, among others.  This segmentation has increased over time as some governments recognized the harm they could suffer as a result of citizens’…

  • Part III: Dr. Tether and Dr. Porter on Cybersecurity

    We continue our effort to underscore certain patterns and themes found throughout the OODAcast library of close to 100 conversations with leaders and decision-makers, on topics such as leadership, empowering a team, clear decision-making while operating in a low information environment, the qualities and best practices of a true leader, the future of intelligence, the…

  • Speculative Design: The Los Angeles-based Urban Air Mobility Partnership

    As we shared with the OODA Loop membership in July, the Nuclear-Powered Sky Hotel is the intersection of speculative design and a creative belief in the future of nuclear energy (directly at odds with nuclear’s decades of bad press and over-regulation of the market).  The Nuclear-Powered Sky Hotel, through speculative design, asks “What if?” Personal…

  • China Can Walk and Chew Gum at the Same Time in Cyberspace

    The true expanse of China’s cyber power is visible in the current geopolitical climate that has China at odds with the United States, and the world consumed by an ongoing conflict in Ukraine, as well as increased tensions with Taiwan.  In the former, China plays a supporting role, publicly backing its ally Russia; in the…


OODAcasts

  • Ric Prado on Intelligence Operations and a Legendary Career in the CIA

    Ric Prado on Intelligence Operations and a Legendary Career in the CIA

    Ric Prado has been described by CIA leadership as the closest thing to 007 that the United States has ever had. Ric’s life is packed with more adventure and operations than your favorite spy novel series. Coming out of the shadows, this is Ric’s first video interview and covers his career, operational decision-making lessons learned,…

  • Mischel Kwon, Founder and CEO of W@tchTower

    Mischel Kwon, Founder and CEO of W@tchTower

    In this OODAcast we interview Michel Kwon, the founder and CEO of W@tchTower. She is a leader who has proven herself through an ability to success in three different career fields, first as a developer and programmer creating enterprise grade solutions, then as a government executive who would eventually lead the United States Computer Emergency Readiness…

  • Masha Sedova, Co-Founder Elevate Security on Human Risk Management

    Masha Sedova, Co-Founder Elevate Security on Human Risk Management

    Masha Sedova is an award-winning people-security expert, speaker, and entrepreneur focused on helping companies transform employees from a risk into a key element of defense. She has been a part of our OODA Network for years, including speaking at our legacy FedCyber event, where she introduced the behavior-based and gamified cybersecurity training and awareness she…

  • Bob Gourley on Operational Intelligence for Strategic Decision-making

    Bob Gourley on Operational Intelligence for Strategic Decision-making

    In this OODAcast, OODA Network Expert Jen Hoar interviews noted cybersecurity and intelligence professional Bob Gourley, CTO of OODA LLC, diving deep into what makes him tick. Jen asks Bob about his career, including the constants and dynamics in his professional life, starting with a deep background in operational intelligence as a naval intelligence officer.…

  • CEO of Women’s Society of Cyberjutsu and Cybersecurity Leader Mari Galloway

    CEO of Women’s Society of Cyberjutsu and Cybersecurity Leader Mari Galloway

    Like many others we have observed first hand the positive changes in the cybersecurity community being enabled by Mari Galloway. In this OODAcast we look beyond those changes to find out what makes her tick, revealing lessons applicable to professionals in any stage of their career. Mari is the CEO and a founding board member…

  • Paul Kurtz, Iconic Cybersecurity Leader and Founder of TruSTAR

    Paul Kurtz, Iconic Cybersecurity Leader and Founder of TruSTAR

    Paul Kurtz is an internationally recognized expert on cybersecurity and the Co-Founder and Chairman of TruSTAR. In this OODAcast we dive into Paul’s views on the cybersecurity landscape today and learn more about his approach to decision-making. We discuss a new concept he has been shepherding in the community regarding how cyber intelligence can be…

  • Rear Admiral Paul Becker, USN (ret) on leadership in the modern age

    Rear Admiral Paul Becker, USN (ret) on leadership in the modern age

    Rear Admiral Paul Becker, USN (Retired), is an author, speaker and board member with extensive experience in intelligence operations.  During his 30 year career as a naval intelligence officer he lead major operational intelligence efforts, rising to the position of Director of Intelligence (J2) for the Joint Chiefs of Staff. Upon retirement from the Navy…

  • Dr. Melissa Flagg of the Center for Security and Emerging Technology

    Dr. Melissa Flagg of the Center for Security and Emerging Technology

    Dr. Melissa Flagg is a Senior Fellow at the Center for Security and Emerging Technology (CSET) at Georgetown University. Previously she served as the Deputy Assistant Secretary of Defense for Research, responsible for policy and oversight Defense Department science and technology programs including basic research through advanced technology development and the DoD laboratory enterprise. She…

  • Mark Weatherford On Leading Change As a CISO

    Mark Weatherford On Leading Change As a CISO

    Mark Weatherford is an icon in the cybersecurity field. He is widely known as a mission focused leader who builds teams and gets hard things done. His career included success in the US Navy as a cryptologist, leadership and management in a major defense integrator, CISO for two states (Colorado and California), CISO of the…

  • Matt Devost on Hacking Entrepreneurship and Identifying Threats and Opportunities

    Matt Devost on Hacking Entrepreneurship and Identifying Threats and Opportunities

    In this OODAcast, the tables are turned as OODA Network Expert Jen Hoar interviews CEO Matt Devost and they discuss how Matt consistently identified new threats and opportunities by blending eccentric interests into a career as a serial entrepreneur and become an established expert on cybersecurity, counterterrorism, and technology issues.

OODAcons