Start your day with intelligence. Get The OODA Daily Pulse.
Home > Example Query Loops
Exponential innovation is causing exponential disruption
Exponential innovation is causing exponential disruption
Exponential innovation is causing exponential disruption
The Five Eyes intelligence allies – government agencies in the United States, United Kingdom, Australia, Canada, and New Zealand – issued a joint Cybersecurity advisory (CSA) days before the Christmas holiday, offering guidance for the Apache Log4j vulnerability worldwide. Nation-states and ransomware gangs are already starting to exploit the vulnerabilities, including Log4Shell (part of the…
The capabilities of Russia to conduct cyber espionage and cyber attack have been battle tested and are hard to thwart even during daily “peacetime” operations. They include well resourced capabilities of the military and intelligence services and also deep technical expertise in the Russian business ecosystem and in organized crime which operates as part of…
To help members optimize opportunities and reduce risk, OODA hosts a monthly video call to discuss items of common interest to our membership. These highly collaborative sessions are always a great way for our members to meet and interact with each other while talking about topics like global risks, emerging technologies, cybersecurity, and current or…
Whether you are just overwhelmed with data or just curious about what you will learn, you may be feeling the impulse to jump on the artificial intelligence (AI) bandwagon. Before you go too far down the road, please consider this Top 10 list of the most common mistakes managers make when building an AI project.…
This 20 Dec 2021 OODA Salon features a discussion with Jennifer Ewbank, Deputy Director of CIA for Digital Innovation. Her office is responsible for current and future activities associated with both technologies and business processes around digital innovation, a topic which touches every aspect of agency missions. This includes activities in domains like Cloud, IT,…
Part II of the Center for Security and Emerging Technologies (CSET) series is available which “examines how AI/ML technologies may shape future disinformation campaigns and offers recommendations for how to mitigate them.” We offered an analysis of Part I of the series (CSET Introduces a “Disinformation Kill Chain”) earlier this month. Disinformation is not new,…
Climate change and the insecurity it stimulates have the potential to amplify existing conflicts, trigger conflicts over scarce resources, and trigger forced migration (refugees and internally displaced persons or IDPs) now and in the future. Climate conflicts converge with transnational criminal activity (cartels and gangs) and exacerbate violence against persons in fragile communities. These convergences…
In December 2021, Iran’s Ambassador to the United Nations issued a formal statement rejecting Iran’s use of force in cyberspace. In the statement, the Ambassador acknowledged Iran’s victimization by cyber-attacks, underscoring the 2010 Stuxnet attack that directly impacted a key infrastructure by disrupting its nuclear enrichment process. A key component in this address was Iran’s…
In response to the SolarWinds Orion and Hafnium Microsoft Exchange breaches, the U.S. Senate Committee on Armed Services, Subcommittee on Cyber, held a hearing on April 14th. Entitled “Future Cybersecurity Architectures”. The specific breaches were actually only the context for a larger conversation about (and a general update on) DoD implementation of the recently approved…
Ukraine may be the Gray-zone in the headlines right now, but Taiwan is the more significant strategic hybrid warfare battlefield, in no small part due to its global leadership in semiconductor manufacturing. Considering the hype cycle around all things Quantum, you would think it would be positive, sound strategic news that Taiwanese leaders recently announced…
Bob Bigman spent a career in the intelligence community. He was the CISO of the CIA where he was tasked with leading efforts to protect the nation’s most sensitive secrets. Since 2012 he has provided direct consulting services to CISOs, CIOs, CTOs and CEOs seeking to reduce risk and improve security programs. Through it all…
In this OODAcast we glean lessons learned and insights into the future of the Metaverse and its implications from Randall Fort. Fort is a seasoned security, intelligence and technology leader known for his grasp of enterprise mission needs and his ability to track the rapid advancing capabilities of technology to meet those needs. His background…
In this OODAcast we examine lessons learned as a startup founder and insights into the future of technology with Amr Awadallah. Amr Awadallah is widely known as a founder of Cloudera. Prior to that he was working on extreme scale data solutions for Yahoo. Most recently he was VP for Developer Relations at Google Cloud.…
Sir David Omand is one of the most respected intelligence professionals in the world and author of the book How Spies Think: Ten lessons in intelligence. His career in intelligence began shortly after graduating from Cambridge in 1969 when he joined the UK’s GCHQ (Government Communications Headquarters). He would later become the director of GCHQ.…
Jessica Gulick is widely known for her leadership of the successful growth strategy and marketing firm Katzcy. She is also the Commissioner of the US Cyber Games, a multi-phased cybersecurity program recruiting a US Cyber Team for international competition. She is also the founder of PlayCyber, a new business line promoting cyber games and tournaments.…
Lance Mortlock is a Senior EY Strategy Partner. He is author of the book Disaster Proof: Scenario Planning for Post Pandemic Future, which explores ways scenario planning can help organizations be more resilient. This is a must-read book for anyone in the Risk Management field. It provides practical advice for strategists, planners, executives and board…
Each year, there are one or two books that deeply resonate with me and become sticky in that I’m thinking about the book often, bringing it up in conversations, and sending out unsolicited recommendations for executives and researchers in my network to check it out. Jer Thorp’s “Living in Data: A Citizen’s Guide to a…
Dr. Tony Tether was the director of the Defense Advanced Research Projects Agency, DARPA, from 2001 till his retirement in 2009. In this OODAcast we examine some of Dr. Tether’s formative experiences, including a very unique job he held while awaiting entry to Stanford. He was a door to door salesman and while doing that…
In this OODAcast, we talk with renowned counter-terrorism expert and career clandestine services professional Cofer Black. Cofer is best known for having been the Director of the CIA’s Counterterrorism Center on 9/11 and having been part of the intelligence community warning about the near-term threat of terrorism in the United States prior to the attacks.…
Gaurav Banga is the Founder and CEO of Balbix, and serves on the boards of several companies. Before Balbix, Gaurav was the Co-founder & CEO of Bromium and led the company from inception for over 5 years. Earlier in his career, he served in various executive roles at Phoenix Technologies and Intellisync Corporation, and was…
Copyright © 2025 — All Rights Reserved.
Notifications