Start your day with intelligence. Get The OODA Daily Pulse.

Home > Example Query Loops


Analysis

  • Open-Source Intelligence Resources: UN-SPIDER, Carbon Mapper, and MapAction

    Leverage these open source tools to provide your organization with the best in class information to inform business strategy, operations, and risk awareness levels around the world. Firms that understand the strengths and weaknesses of their own Cognitive Infrastructure will have an advantage over those that do not attend to this crucial function within an…

  • China Again Targets India’s Energy Sector – Another Threat or a Promise?

    The frequent targeting of India’s energy stakeholders is a disconcerting turn of events and underscores the increasing interest of nation states’ willingness to target critical infrastructure for their own advantage. The ability to initiate a series of strategic power outages and energy disruptions to bring a China-favorable resolution to the forefront is an equally enticing…

  • Four Urgent Actions For The C-Suite To Prepare For High End Cyberattacks

    What should leaders do when operating in an environment like today’s, where serious threats of Russian cyber attacks against US infrastructure make a very high end attack a very real possibility? We recommend leaders consider the following four strategic actions: – Understand what is new about the threat – Contextualize the threat for your business…

  • Industroyer2 and Pipedream ICS/SCADA Malware: DOE, CISA, NSA, and the FBI Release Joint Cybersecurity Advisory

    Industrial control systems (ICS) and supervisory control and data acquisition (SCADA) device vulnerabilities are, arguably, the threat surfaces that are of the utmost concern to cyber and homeland security professionals.  If ICS/SCADA devices are mission-critical to your organization, the Joint Cybersecurity Advisory (CSA) released this week by multiple U.S. agencies is a must-read. A unique…

  • Web3 Cyber Incident Database: Tracking over $62 Billion Dollars worth of cyptocurrency related incidents

    Over the past several years, there has been a rapid emergence of companies, projects, and initiatives in what is broadly categorized as Web3.  While monitoring that rapid innovation, the OODA research team has noticed a disproportionately high number of cybersecurity incidents that have the potential to negatively impact the Web3 innovation ecosystem, disrupt customer adoption…

  • Global Computer Chip Supply Chain Disruptions – An Update

    Based on the insights garnered from our November 2021 Stratigame on the Global Computer Chip Supply Chain Disruption, the following are some of the recent developments up and down the global semiconductor manufacturing supply chain and value chain.

  • An Executive’s Guide To Cognitive Bias in Decision Making: A Career Intelligence Officer Provides Context on Fighting Bias in Judgement

    Cognitive Bias and the errors in judgement they produce are seen in every aspect of human decision-making, including in the business world. Companies that have a better understanding of these cognitive biases can optimize decision making at all levels of the organization, leading to better performance in the market. Companies that ignore the impact these…

  • Opportunity Lost? FBI enters corporate networks as if they are their own

    The United States said on Wednesday that it had secretly removed malware from computer networks around the world in recent weeks, a step to pre-empt Russian cyberattacks and send a message to President Vladimir V. Putin of Russia. When you advocate for cooperation and then act unilaterally, does that make future overtures more or less…

  • The Defense Intelligence Agency Updates Challenges to Security in Space

    In 2019, the Defense Intelligence Agency (DIA) published the first Challenges to Security in Space “to address the main threats to the array of U.S. space capabilities, and examine space and counterspace strategies and systems pursued primarily by China and Russia and, to a lesser extent, by North Korea and Iran.” DIA has followed up…

  • Agenda For Monthly OODA Member Meeting Friday 15 April 2022

    OODA Network members are invited to participate in a monthly video call to discuss items of common interest to our membership. These highly collaborative sessions are always a great way for our members to meet and interact with each other while talking about topics like global risks, emerging technologies, cybersecurity, and current or future events…


OODAcasts

  • Michael Kanaan, Author of T-Minus AI Discusses Artificial Intelligence and Global Power
    ,

    Michael Kanaan, Author of T-Minus AI Discusses Artificial Intelligence and Global Power

    Michael Kanaan has helped a wide swath of decision-makers better grasp the nature of AI. He has a knack for expressing complex topics in clear, accurate and succinct ways and many of us in the national security community have already had the pleasure of hearing from him in person or in conferences. His book, T-Minus…

  • Jim Miller on Managing Policy in an Age of Constant Disruption and Dynamic Threats
    ,

    Jim Miller on Managing Policy in an Age of Constant Disruption and Dynamic Threats

    Jim Miller has worked for four decades on a combination of private and public sector initiatives focused on addressing a wide variety of national security threats.  He has held numerous positions within the Department of Defense including serving as Under Secretary of Defense for Policy and has been awarded the DoD’s highest civilian award four…

  • Chet Richards on John Boyd and applying OODA principles to the business world

    Chet Richards on John Boyd and applying OODA principles to the business world

    Chet Richards was a close associate of the late US Air Force Colonel John Boyd. He was there as the concept of the OODA Loop was being developed and constructed the first graphics of the OODA Loop from sketches Boyd drew. Chet is the author of the widely read business book “Certain to Win” which…

  • Courtney Bowman, Privacy and Civil Liberties Engineer, Palantir Technologies

    Courtney Bowman, Privacy and Civil Liberties Engineer, Palantir Technologies

    Courtney Bowman leads Palantir’s Privacy and Civil Liberties Engineering Team. In this capacity he works extensively with local, state and international governments and philanthropic partners to develop technology-driven solutions to information sharing needs that respect applicable privacy, security and data integrity requirements. He does so in a way that is informed by experience and well…

  • Kevin DeSanto On Due Diligence and M&A Transactions and Trust Based Networking

    Kevin DeSanto On Due Diligence and M&A Transactions and Trust Based Networking

    Kevin DeSanto is an investment banker delivering advice and execution assistance to high growth businesses preparing for M&A and financial transactions. His company, KippsDeSanto, has developed a reputation for trusted execution support for companies in government contracting, aerospace, defense and cybersecurity. He leads teams that advise senior management, boards of directors and shareholders. The art…

  • Bradley Rotter On The Future Of Work, CryptoCurrencies, Quantum Computing and Leadership

    Bradley Rotter On The Future Of Work, CryptoCurrencies, Quantum Computing and Leadership

    Bradley Rotter is a visionary investor who has pioneered investments in many new alternative investments classes including having been an early backer of hedge funds in 1982 while speculating on the Chicago Mercantile Exchange. He was also an early investor in Bitcoin and other cryptocurrency ecosystems and at a dinner with OODA CEO Matt Devost…

  • Andy Lustig On Legal and Due Diligence Support In The High Tech Era

    Andy Lustig On Legal and Due Diligence Support In The High Tech Era

    Andrew (Andy) Lustig is a partner at the high tech law firm Cooley, where he focuses on private equity investments, mergers and acquisitions and the general corporate representation of high-growth technology companies in both the commercial and government marketplace. His practice includes a wide range of industry sectors including information technology, national security, cybersecurity, data…

  • Paul Pagnato, CEO and Founder at PagnatoKarp  and Author of The Transparency Wave
    ,

    Paul Pagnato, CEO and Founder at PagnatoKarp and Author of The Transparency Wave

    Paul Pagnato migrated from a career as a scientist looking for life in outer space to one of the top financial advisors in the U.S. with a keen eye for tracking innovation, exponential change, and other emerging global issues. He is also the author of the recent book, The Transparency Wave, which highlights the essential…

  • Alsop-Louie Partner and Famed Tech Executive Bill Crowell on Technology Due Diligence
    ,

    Alsop-Louie Partner and Famed Tech Executive Bill Crowell on Technology Due Diligence

    Bill Crowell is a senior executive with extensive experience in government (rose to the level of Deputy Director of the National Security Agency) and in industry. He has been a CEO of leading companies like Cylink, taking them through growth to acquisition. He has been a director of multiple public and private companies with a…

  • Brad Meltzer, Bestselling Novelist With Insights To Inform Your Business Strategy

    Brad Meltzer, Bestselling Novelist With Insights To Inform Your Business Strategy

    Brad Meltzer is the #1 New York Times bestselling author of The Cupler Ring Trilogy (The Inner Circle, The Fifth Assassin, The President’s Shadow), The Escape Artist, The Book of Lies and many other thrillers loved by millions for their realism and well researched fact based themes and drama filled plots. He is also widely…

OODAcons