Start your day with intelligence. Get The OODA Daily Pulse.

Home > Example Query Loops


Analysis

  • Will the United States Enact a National Data Privacy Law?

    Mandatory security requirements, information handling restrictions, and security accountability are standards all organizations should be able and willing to implement, and which can be supervised by an oversight body like the FTC. It might not be a complete fix, but it would be a necessary start, and one that is desperately needed given the complexity…

  • By Design, The Quantum List Companies are Strategically Structured for Exponential Speed and Scale

    At some point, like artificial intelligence, quantum will be “in the midst of a real-world paradigm shift: the final stages  of a decades-long transition from the scientific discipline known as quantum computing (and its various sub-disciplines) into an array of applied quantum computing technologies made more widely available through innovative enterprise architectures unique to the…

  • Large-scale Crypto Heists and Ransomware Attacks are not the only Cybercrime Trends and Statistics

    While cryptocurrency heists and ransomware attacks dominate the headlines (due to their sheer volume and scale), other types of cybercrime have grown in alarming ways as well.  AtlasVPN recently compiled a very compelling accounting and visualization of 2021 cybercrime trends and statistics.  Cybercrimes of note include skyrocketing rates of phishing sites, romance scams, general online-based…

  • The Cyber Threat Vector as Food and Agriculture Industry Sector Heads into Critical Seasons

    We continue with our research and analysis of the food and agriculture (FA) sector and the cyber threat vector as agriculture and food systems and cyber risk have become a central driving force and critical uncertainty – which we recommend all companies and organizations integrate into their foresight strategy, scenario planning, and strategic planning.

  • The Ronin DeFi Network Hack and Blockchain Analysis Techniques for Attribution

    In early April, we began our research and analysis of crypto and blockchain security initiatives by tracking down the best-in-class research efforts and subject matter experts to explore the formative core issues surrounding the topic.  In our initial post, we explored the recent blockchain bridge heists, growing national security concerns, and The Secure Blockchain Initiative…

  • PIPL, DSL, CSL – China Forges a Legal Path to Cyber Sovereignty

    On November 1, 2021, China’s “Personal Information Protection Law” (PIPL) went into effect.  The PIPL protects the personal privacy of Chinese citizens, and perhaps more importantly, mandates that both Chinese and foreign companies that conduct business in China to comply to the rules set forth in the new legislation.  PIPL defines what constitutes personal information,…

  • Reshoring U.S. Manufacturing, Security Researcher Protections, and Open Source Security Topics of May 2022 OODA Network Member Meeting

    To help members optimize opportunities and reduce risk, OODA hosts a monthly video call to discuss items of common interest to our membership. These highly collaborative sessions are always a great way for our members to meet and interact with each other while talking about topics like global risks, emerging technologies, cybersecurity, and current or…

  • CISA Provides Scenario Planning/Strategy Foresight “Secure Tomorrow” Toolkit

    The OODA team has participated in “wargame” and red team exercises for over 25 years ranging from traditional DoD Office of Net Assessment games to scenario planning for the Fortune 500.  We have personally witnessed these exercises’ impact on establishing appropriate frameworks for thinking about future risks and opportunities.  In November 2021, A report was…

  • U.S. Cyber Games: Season II

    Last year, OODA was proud to sponsor the first-ever U.S. Cyber Games.  The inaugural US Cyber Games™ was created through the support of the National Initiative for Cybersecurity Education (NICE) program at the National Institute of Standards and Technology (NIST). The Games brought together elite cyber athletes, coaches, and industry leaders to help scout, train, and recognize…

  • Seminconductor Manufacturing and Next-Gen Blockchain as a Service

    In a 2019 report by McKinsey, the authors characterized the status of blockchain innovation as “a transition point between Blockchain 1.0 and Blockchain 2.0. In the new era, blockchain-enabled cryptocurrency applications will likely cede their prominence to blockchain business applications that can potentially increase efficiency.” The semiconductor sub-vertical of the technology industry has largely been…


OODAcasts

  • Michael Kanaan, Author of T-Minus AI Discusses Artificial Intelligence and Global Power
    ,

    Michael Kanaan, Author of T-Minus AI Discusses Artificial Intelligence and Global Power

    Michael Kanaan has helped a wide swath of decision-makers better grasp the nature of AI. He has a knack for expressing complex topics in clear, accurate and succinct ways and many of us in the national security community have already had the pleasure of hearing from him in person or in conferences. His book, T-Minus…

  • Jim Miller on Managing Policy in an Age of Constant Disruption and Dynamic Threats
    ,

    Jim Miller on Managing Policy in an Age of Constant Disruption and Dynamic Threats

    Jim Miller has worked for four decades on a combination of private and public sector initiatives focused on addressing a wide variety of national security threats.  He has held numerous positions within the Department of Defense including serving as Under Secretary of Defense for Policy and has been awarded the DoD’s highest civilian award four…

  • Chet Richards on John Boyd and applying OODA principles to the business world

    Chet Richards on John Boyd and applying OODA principles to the business world

    Chet Richards was a close associate of the late US Air Force Colonel John Boyd. He was there as the concept of the OODA Loop was being developed and constructed the first graphics of the OODA Loop from sketches Boyd drew. Chet is the author of the widely read business book “Certain to Win” which…

  • Courtney Bowman, Privacy and Civil Liberties Engineer, Palantir Technologies

    Courtney Bowman, Privacy and Civil Liberties Engineer, Palantir Technologies

    Courtney Bowman leads Palantir’s Privacy and Civil Liberties Engineering Team. In this capacity he works extensively with local, state and international governments and philanthropic partners to develop technology-driven solutions to information sharing needs that respect applicable privacy, security and data integrity requirements. He does so in a way that is informed by experience and well…

  • Kevin DeSanto On Due Diligence and M&A Transactions and Trust Based Networking

    Kevin DeSanto On Due Diligence and M&A Transactions and Trust Based Networking

    Kevin DeSanto is an investment banker delivering advice and execution assistance to high growth businesses preparing for M&A and financial transactions. His company, KippsDeSanto, has developed a reputation for trusted execution support for companies in government contracting, aerospace, defense and cybersecurity. He leads teams that advise senior management, boards of directors and shareholders. The art…

  • Bradley Rotter On The Future Of Work, CryptoCurrencies, Quantum Computing and Leadership

    Bradley Rotter On The Future Of Work, CryptoCurrencies, Quantum Computing and Leadership

    Bradley Rotter is a visionary investor who has pioneered investments in many new alternative investments classes including having been an early backer of hedge funds in 1982 while speculating on the Chicago Mercantile Exchange. He was also an early investor in Bitcoin and other cryptocurrency ecosystems and at a dinner with OODA CEO Matt Devost…

  • Andy Lustig On Legal and Due Diligence Support In The High Tech Era

    Andy Lustig On Legal and Due Diligence Support In The High Tech Era

    Andrew (Andy) Lustig is a partner at the high tech law firm Cooley, where he focuses on private equity investments, mergers and acquisitions and the general corporate representation of high-growth technology companies in both the commercial and government marketplace. His practice includes a wide range of industry sectors including information technology, national security, cybersecurity, data…

  • Paul Pagnato, CEO and Founder at PagnatoKarp  and Author of The Transparency Wave
    ,

    Paul Pagnato, CEO and Founder at PagnatoKarp and Author of The Transparency Wave

    Paul Pagnato migrated from a career as a scientist looking for life in outer space to one of the top financial advisors in the U.S. with a keen eye for tracking innovation, exponential change, and other emerging global issues. He is also the author of the recent book, The Transparency Wave, which highlights the essential…

  • Alsop-Louie Partner and Famed Tech Executive Bill Crowell on Technology Due Diligence
    ,

    Alsop-Louie Partner and Famed Tech Executive Bill Crowell on Technology Due Diligence

    Bill Crowell is a senior executive with extensive experience in government (rose to the level of Deputy Director of the National Security Agency) and in industry. He has been a CEO of leading companies like Cylink, taking them through growth to acquisition. He has been a director of multiple public and private companies with a…

  • Brad Meltzer, Bestselling Novelist With Insights To Inform Your Business Strategy

    Brad Meltzer, Bestselling Novelist With Insights To Inform Your Business Strategy

    Brad Meltzer is the #1 New York Times bestselling author of The Cupler Ring Trilogy (The Inner Circle, The Fifth Assassin, The President’s Shadow), The Escape Artist, The Book of Lies and many other thrillers loved by millions for their realism and well researched fact based themes and drama filled plots. He is also widely…

OODAcons