To help members optimize opportunities and reduce risk, OODA hosts a monthly video call to discuss items of common interest to our membership. These highly collaborative sessions are always a great way for our members to meet and interact with each other while talking about topics like global risks, emerging technologies, cybersecurity, and current or…
A Cambrian Explosion in innovation in cryptocurrency related products and services is underway. The uptake in cryptocurrency interest by institutions has been so large that it is probably prudent for all businesses to review their internal strategies regarding cryptocurrencies, not just as financial assets but as a way to improve internal innovation and positioning for…
As OODA CTO Bob Gourley recently pointed out: “We are so pleased with the quality of work and the professionalism in recent reporting from our government agencies on the nature of the cyber threat. In particular, the Joint Cybersecurity Advisory (CSA) released yesterday is one of the best.” The Joint CSA to which Bob refers…
According to the 2022 DIA Challenges to Security in Space report, “As China’s and Russia’s space and counterspace capabilities increase, both nations are integrating space scenarios into their military exercises…the expansion of Chinese and Russian space and counterspace weapons combined with the general rise of other foreign space capabilities is driving many nations to formalize…
This post discusses standards in intelligence, a topic that can improve the quality of all corporate intelligence efforts and do so while reducing ambiguity in the information used to drive decisions and enhancing the ability of corporations to defend their most critical information.
Our Artificial Intelligence tracking, research, and analysis fall into four categories: Surfacing business strategy insights based on current AI capabilities; Tracking Responsible and Ethical AI frameworks and projects; Exponential technologies, including AI, and Great Power competition; and tracking AI applied technology in various industry verticals (along with market drivers). Following are some general AI research…
Leverage these open source tools to provide your organization with the best in class information to inform business strategy, operations, and risk awareness levels around the world. Firms that understand the strengths and weaknesses of their own Cognitive Infrastructure will have an advantage over those that do not attend to this crucial function within an…
The frequent targeting of India’s energy stakeholders is a disconcerting turn of events and underscores the increasing interest of nation states’ willingness to target critical infrastructure for their own advantage. The ability to initiate a series of strategic power outages and energy disruptions to bring a China-favorable resolution to the forefront is an equally enticing…
What should leaders do when operating in an environment like today’s, where serious threats of Russian cyber attacks against US infrastructure make a very high end attack a very real possibility? We recommend leaders consider the following four strategic actions: – Understand what is new about the threat – Contextualize the threat for your business…
Industrial control systems (ICS) and supervisory control and data acquisition (SCADA) device vulnerabilities are, arguably, the threat surfaces that are of the utmost concern to cyber and homeland security professionals. If ICS/SCADA devices are mission-critical to your organization, the Joint Cybersecurity Advisory (CSA) released this week by multiple U.S. agencies is a must-read. A unique…
OODA CTO Bob Gourley is joined by technologist and national security expert Dan Gerstein from Rand Corporation. Dan is also the author of the recently released book entitled “The Story of Technology”.