Start your day with intelligence. Get The OODA Daily Pulse.

Home > Example Query Loops


Analysis

  • Biden Threw the Cyber Gauntlet – Be Careful What You Wish For

    In his first meeting with Russian President Vladimir Putin, U.S. President Joe Biden claimed to have presented his counterpart with a list of 16 red-line targets, ostensibly the critical infrastructure sectors that are listed on the Department of Homeland Security’s webpage.  Such sectors are considered vital to the United States, and any potential incapacitation or…

  • Potential Future Opportunities, Risks and Mitigation Strategies in the Age of Continuous Crisis

    Now more than ever, organizations need to apply rigorous thought to business risks and opportunities. In doing so it is useful to understand the concepts embodied in the terms Black Swan and Gray Rhino. This post examines both and leads to recommended action plans for any organization in government or business who seeks to mitigate…

  • Chinese Trolls Show That Information Can’t Be Stopped, Nor Should It Be

    Beijing has been engaged in a battle for public opinion for several years, aggressively promoting a positive vision of China to counter criticisms for its involvement in human rights violations, intellectual property theft, currency manipulation, its engagement with Taiwan and the South China Sea disputes, and its suspected involvement in the COVID-19 outbreak.  In 2017,…

  • The New Enterprise Architecture Is Zero Trust

    Enterprise technologists use the term “Zero Trust” to describe an evolving set of cybersecurity approaches that move defenses from static attempts to block adversaries to more comprehensive measures that improve enterprise performance while improving security. When the approaches of Zero Trust are applied to an enterprise infrastructure and workflows, the cost of security can be…

  • Sophisticated Cyber Espionage Exploits Russia and No One Says a Word

    In mid-May 2021, Russia’s Federal Security Service (FSB)’s National Coordination Center for Computer Incidentspublished a joint report with Rostelecom-Solar, the cybersecurity arm of Russian telecom company Rostelecom, about a 2020 cyber espionage campaign that targeted Russian government agencies.  The publicly-available portion of the report disclosed stealthy cyber operations that targeted key individuals associated with “the…

  • The Executive’s Guide To Mitigating The Ransomware Threat

    This is the second part of our special series on Ransomware. The first provided an update on the nature of the threat, including an anatomy of a modern attack. This post, produced with inputs from real world cybersecurity practitioners Matt Devost, Bob Flores, Junaid Islam and Bob Gourley, provides information for Corporate Board of Directors and…

  • Ransomware: The Present we Deserve?

    The scourge of ransomware is the inevitable result of decades of schizophrenia about our relationship with information technology and security. Treating this problem in the same fashion as we have those that came before it will only prolong our suffering. Clarity, creativity, and will are required if we are to have any hope of a…

  • Recent Iranian Cyber Attacks Show How Geopolitics Drive Cyber Activity

    A recent report has revealed that an Iranian threat actor group dubbed “Agrius” has been operating in Israel since 2020.  The group has been linked to cyber espionage activity and has quickly evolved into conducting destructive wiper malware attacks against Israeli targets.  What’ more, these attacks have been posing as ransomware attacks in order to…

  • Ransomware: An update on the nature of the threat

    The technology of ransomware has evolved in sophistication and the business models of the criminal groups behind it have as well. The result: The threat from ransomware has reached pandemic proportions. This post provides an executive level overview of the nature of this threat. This post is part of the OODA Cybersecurity Sensemaking series and…

  • FTC Expectations For Corporate Board Level Oversight of Cybersecurity

    The Federal Trade Commission (FTC) has published expectations for corporate board level oversight of cybersecurity. They advise every member of every board: “Don’t underestimate your role in data security oversight”. This post provides insights for OODA members on what this new guidance may mean for the future of board operations.


OODAcasts

  • Sebastian Mallaby on How Venture Capitalists and Hedge Funds Achieve Success

    Sebastian Mallaby on How Venture Capitalists and Hedge Funds Achieve Success

    Sebastian Mallaby joined the OODAcast for a discussion about the Power Law in venture capital and the rise of the global hedge fund and private equity industries.

  • Former Head of National Intelligence Council Neil Wiley on Intelligence Analysis

    Former Head of National Intelligence Council Neil Wiley on Intelligence Analysis

    Neil Wiley has lead some of the US Intelligence Community’s most important analytical functions. His career in intelligence began as a Naval Intelligence Officer in an operational intelligence center focused on support to critical operational naval missions. He would later serve joint intelligence missions in Europe, would rise to lead all analytical activities at the…

  • Michael Gibson Wants to Light the Paper Belt on Fire

    Michael Gibson Wants to Light the Paper Belt on Fire

    This OODAcast features a fascinating conversation with Michael Gibson, the author of the book “Paper Belt on Fire” who is also the co-founder of the Thiel Fellowship program and the 1517 Fund, both of which focus on identifying unconventional ideas and individuals that can drive disruptive innovation in technology, arts, and science.

  • Jimmy Soni on Why PayPal Was Successful
    ,

    Jimmy Soni on Why PayPal Was Successful

    In this OODAcast, we talk with Jimmy Soni, the author of the book “The Founders: The Story of PayPal and the Entrepreneurs Who Shaped Silicon Valley”. Jimmy takes a deep, historical look at the founding story of PayPal with detailed analysis, interviews, and access that you won’t find in any other telling of the PayPal…

  • Jen Hoar on Corporate Intelligence and Investigations

    Jen Hoar on Corporate Intelligence and Investigations

    In this OODAcast we interview one of our close friends and OODA network members, Jen Hoar. Jen is a former journalist-turned-corporate investigator who has leveraged the potent act of asking, and listening, to turn strangers into sources and contacts into clients. Her expertise, which is clearly also her passion, is identifying and interviewing smart people…

  • Joseph Menn on Observations From Tech Journalism
    ,

    Joseph Menn on Observations From Tech Journalism

    Covering technology issues, and specifically cybersecurity as a journalist is a tough endeavor. Some of these technologies are complex as are the security vulnerabilities often inherent in their deployment and making these topics broadly accessible can be a challenge. Many of the underlying issues touch upon national security and civil liberties creating an interesting nexus…

  • Lawrence Gasman on Assessing the Business Impact of Quantum Technologies

    Lawrence Gasman on Assessing the Business Impact of Quantum Technologies

    Lawrence Gasman has researched and reported on quantum technologies from the beginning of the discipline of quantum computing. He is now the President of Inside Quantum Technology (IQT), which provides in-depth business intelligence for the quantum technology industry. IQT also runs several major quantum technology conferences as well as a quantum industry news service. On…

  • 100 Episodes of OODAcast: Providing actionable insights for future risks and opportunities.

    100 Episodes of OODAcast: Providing actionable insights for future risks and opportunities.

    In 2020, we launched the OODAcast video and podcast series designed to provide insightful analysis and actionable intelligence to decision makers. In this 100th episode, co-hosts Matt Devost and Bob Gourley review some of the key insights from the series. Matt and Bob also discuss a OODA’s recent assessment of risks and opportunities given the…

  • David Greenberg on Decision-making in Volatile Markets

    While the OODA Loop was been heralded in the domain of conflict, we often find the concept in business and there is no greater business analogy to dogfighting that David Greenberg’s experience as a trader on the floor of the world’s largest physical commodities exchange. David’s job required rapid decision making based on constantly changing…

  • Katharina McFarland on Winning in the Age of Artificial Intelligence
    ,

    Katharina McFarland on Winning in the Age of Artificial Intelligence

    Katharina McFarland has led change in a wide array of national security domains including Space, Missile Defense, Acquisition and Nuclear Posture. She is a former Assistant Secretary of Defense for Acquisition (ASD(A) and a former Assistant Secretary of the Army for Acquisition, Logistics and Technology (ASAALT).  She currently serves on several corporate boards and as…

OODAcons