Start your day with intelligence. Get The OODA Daily Pulse.

Home > Example Query Loops


Analysis

  • Opportunities for Advantage: Maintaining a Strong “Stay Rate” in the U.S. for International STEM PhD Graduates

    A recent CSET Issue Brief takes a very quant-based approach to create a snapshot of the international Ph.D. graduate students trained in the U.S. For years, the conventional wisdom has been that a) Domestic U.S. universities are training a disproportionate amount of international Ph.D. graduate students, and b) The U.S. is impacting its strategic opportunity…

  • Promising Research and Analysis Topics and Projects Emerge from the April 2022 OODA Network Member Meeting

    To help members optimize opportunities and reduce risk, OODA hosts a monthly video call to discuss items of common interest to our membership. These highly collaborative sessions are always a great way for our members to meet and interact with each other while talking about topics like global risks, emerging technologies, cybersecurity, and current or…

  • Time For Every Company and Every Government Organization To Consider Running Both A Bitcoin and Ethereum Node

    A Cambrian Explosion in innovation in cryptocurrency related products and services is underway. The uptake in cryptocurrency interest by institutions has been so large that it is probably prudent for all businesses to review their internal strategies regarding cryptocurrencies, not just as financial assets but as a way to improve internal innovation and positioning for…

  • Five Eyes Release Joint Cybersecurity Advisory: Russian State-Sponsored and Criminal Cyber Threats to Critical Infrastructure

    As OODA CTO Bob Gourley recently pointed out:  “We are so pleased with the quality of work and the professionalism in recent reporting from our government agencies on the nature of the cyber threat.  In particular, the Joint Cybersecurity Advisory (CSA) released yesterday is one of the best.”  The Joint CSA to which Bob refers…

  • Space Security and Offensive and Defensive Counterspace Capabilities

    According to the 2022 DIA Challenges to Security in Space report, “As China’s and Russia’s space and counterspace capabilities increase, both nations are integrating space scenarios into their military exercises…the expansion of Chinese and Russian space and counterspace weapons combined with the general rise of other foreign space capabilities is driving many nations to formalize…

  • Useful Standards For Corporate Intelligence

    This post discusses standards in intelligence, a topic that can improve the quality of all corporate intelligence efforts and do so while reducing ambiguity in the information used to drive decisions and enhancing the ability of corporations to defend their most critical information.

  • Opportunities for Advantage: Measuring Trends in Artificial Intelligence

    Our Artificial Intelligence tracking, research, and analysis fall into four categories: Surfacing business strategy insights based on current AI capabilities; Tracking Responsible and Ethical AI frameworks and projects; Exponential technologies, including AI, and Great Power competition; and tracking AI applied technology in various industry verticals (along with market drivers). Following are some general AI research…

  • Open-Source Intelligence Resources: UN-SPIDER, Carbon Mapper, and MapAction

    Leverage these open source tools to provide your organization with the best in class information to inform business strategy, operations, and risk awareness levels around the world. Firms that understand the strengths and weaknesses of their own Cognitive Infrastructure will have an advantage over those that do not attend to this crucial function within an…

  • China Again Targets India’s Energy Sector – Another Threat or a Promise?

    The frequent targeting of India’s energy stakeholders is a disconcerting turn of events and underscores the increasing interest of nation states’ willingness to target critical infrastructure for their own advantage. The ability to initiate a series of strategic power outages and energy disruptions to bring a China-favorable resolution to the forefront is an equally enticing…

  • Four Urgent Actions For The C-Suite To Prepare For High End Cyberattacks

    What should leaders do when operating in an environment like today’s, where serious threats of Russian cyber attacks against US infrastructure make a very high end attack a very real possibility? We recommend leaders consider the following four strategic actions: – Understand what is new about the threat – Contextualize the threat for your business…


OODAcasts

  • The Man Who Protects Our Secrets: Bob Bigman on Mitigating Enterprise Risks
    ,

    The Man Who Protects Our Secrets: Bob Bigman on Mitigating Enterprise Risks

    Bob Bigman spent a career in the intelligence community. He was the CISO of the CIA where he was tasked with leading efforts to protect the nation’s most sensitive secrets. Since 2012 he has provided direct consulting services to CISOs, CIOs, CTOs and CEOs seeking to reduce risk and improve security programs. Through it all…

  • Randall Fort on The Future of the Metaverse And Its Cybersecurity and Intelligence Implications
    , ,

    Randall Fort on The Future of the Metaverse And Its Cybersecurity and Intelligence Implications

    In this OODAcast we glean lessons learned and insights into the future of the Metaverse and its implications from Randall Fort. Fort is a seasoned security, intelligence and technology leader known for his grasp of enterprise mission needs and his ability to track the rapid advancing capabilities of technology to meet those needs. His background…

  • Amr Awadallah On The Biggest Challenges And Opportunities in Enterprise IT Today

    Amr Awadallah On The Biggest Challenges And Opportunities in Enterprise IT Today

    In this OODAcast we examine lessons learned as a startup founder and insights into the future of technology with Amr Awadallah. Amr Awadallah is widely known as a founder of Cloudera. Prior to that he was working on extreme scale data solutions for Yahoo. Most recently he was VP for Developer Relations at Google Cloud.…

  • Sir David Omand on Leveraging How Spies Think In Our Business and Personal Lives
    ,

    Sir David Omand on Leveraging How Spies Think In Our Business and Personal Lives

    Sir David Omand is one of the most respected intelligence professionals in the world and author of the book How Spies Think: Ten lessons in intelligence. His career in intelligence began shortly after graduating from Cambridge in 1969 when he joined the UK’s GCHQ (Government Communications Headquarters). He would later become the director of GCHQ.…

  • Jessica Gulick: An accomplished cybersecurity practitioner turned CEO on future focused leadership

    Jessica Gulick: An accomplished cybersecurity practitioner turned CEO on future focused leadership

    Jessica Gulick is widely known for her leadership of the successful growth strategy and marketing firm Katzcy. She is also the Commissioner of the US Cyber Games, a multi-phased cybersecurity program recruiting a US Cyber Team for international competition. She is also the founder of PlayCyber, a new business line promoting cyber games and tournaments.…

  • Lance Mortlock On Scenario Planning to Drive Strategic Decisions

    Lance Mortlock On Scenario Planning to Drive Strategic Decisions

    Lance Mortlock is a Senior EY Strategy Partner. He is author of the book Disaster Proof: Scenario Planning for Post Pandemic Future, which explores ways scenario planning can help organizations be more resilient. This is a must-read book for anyone in the Risk Management field. It provides practical advice for strategists, planners, executives and board…

  • Jer Thorp on Living in Data and Creating Better Futures

    Jer Thorp on Living in Data and Creating Better Futures

    Each year, there are one or two books that deeply resonate with me and become sticky in that I’m thinking about the book often, bringing it up in conversations, and sending out unsolicited recommendations for executives and researchers in my network to check it out. Jer Thorp’s “Living in Data: A Citizen’s Guide to a…

  • Tony Tether On Technology Leadership and Lessons Learned From DARPA

    Tony Tether On Technology Leadership and Lessons Learned From DARPA

    Dr. Tony Tether was the director of the Defense Advanced Research Projects Agency, DARPA, from 2001 till his retirement in 2009. In this OODAcast we examine some of Dr. Tether’s formative experiences, including a very unique job he held while awaiting entry to Stanford. He was a door to door salesman and while doing that…

  • Cofer Black on Leadership Lessons Learned and Speaking Truth to Power

    Cofer Black on Leadership Lessons Learned and Speaking Truth to Power

    In this OODAcast, we talk with renowned counter-terrorism expert and career clandestine services professional Cofer Black. Cofer is best known for having been the Director of the CIA’s Counterterrorism Center on 9/11 and having been part of the intelligence community warning about the near-term threat of terrorism in the United States prior to the attacks.…

  • Gaurav Banga On Mitigating Cyber Threats Through Deep Insight Into Things That Matter Most

    Gaurav Banga On Mitigating Cyber Threats Through Deep Insight Into Things That Matter Most

    Gaurav Banga is the Founder and CEO of Balbix, and serves on the boards of several companies. Before Balbix, Gaurav was the Co-founder & CEO of Bromium and led the company from inception for over 5 years. Earlier in his career, he served in various executive roles at Phoenix Technologies and Intellisync Corporation, and was…

OODAcons