Start your day with intelligence. Get The OODA Daily Pulse.

Home > Example Query Loops


Analysis

  • This is How They Tell Me Cyber Peace is Achieved

    The well-worn martial cliché says that no matter how elegant your plans, it is important to remember that the enemy gets a vote in how successful they are. The transition of military and intelligence activities to cyberspace didn’t change that, but it got more complicated because the traditional calculus rarely incorporated non-state actors and their…

  • NIST on a CHIP – Driving A Revolution In Measurement Science With Quantum Solutions

    A new NIST program makes creative use of quantum technologies to deliver advanced measurement solutions to users in commerce, medicine, defense and academia. This delivery of measurement standards in a chip format is known as NIST on a CHIP (NOAC).  The time for leaders to think of how this may change your business model is…

  • OODA Monthly Meeting: Members gather online for trust based networking

    OODA Network members are invited to participate in a monthly video call to discuss items of common concern to our membership. These highly collaborative sessions are great ways for our members to meet and interact with each other while talking about items of common interest. We also use these sessions to help better focus our…

  • Updated Executive’s Guide To Quantum Safe Security: Take these steps to make your enterprise quantum proof

    This is an update to our Executive’s Guide to Quantum Safe Security, based on a new round of research that has included interviews of OODA Network experts, technology providers and senior executives in enterprises. Quantum Computers will bring new power to adversaries. But when? And what can you do now to mitigate that threat? This…

  • Updating Defense Intelligence Agency’s Data Base

    The Defense Intelligence Agency (DIA) currently uses an old system called the Modernized Intelligence Database (MIDB) to store and retrieve information on foreign intelligence – everything from Country order-of-battles (tanks, airplanes, etc.), infrastructures (runways, ports, etc.) to general foreign military capabilities. They will replace it with a system called the Machine-Assisted Analytic Rapid-Repository System (MARS).…

  • China’s Plan for Countering Weaponized Interdependence

    In an article entitled “The international environment and countermeasures of network governance during the “14th Five-Year Plan” period” by Xu Xiujun (徐秀军) in the February 27, 2021 edition of China Information Security, we see the continuation of China’s concerns over Weaponized Interdependence and China’s desire to shape a global technology and economic environment that is…

  • Executive Level Action In Response to Ongoing Massive Attacks Leveraging Microsoft Vulnerabilities

    This post provides executive level context and some recommendations regarding a large attack exploiting Microsoft Exchange, a system many enterprises use for mail, contact management, calendar/scheduling and some basic identity management functions. This attack is so large and damaging it is almost pushing the recent Solar Winds attacks off the headlines. Keep in mind that…

  • National Cyber Ranges: Virtual environments that enable government organizations to test their cyber capability

    National cyber ranges are virtual environments that enable government organizations to test their cyber capability.  It’s important to rehearse military operational plans and develop new tactics, techniques, and procedures (TTP’s) that can work in a contested cyber landscape. These ranges are distributed computing environments with technical experts that can support exercises and operational planning.

  • Robert Wallace on a Career in Intelligence and The Spy Sites Series and Spy Craft

    Robert Wallace spent a 33 year career with the Central Intelligence Agency and is widely known for the very well done books he and co-author Keith Melton have produced on the history, culture and tradecraft of intelligence (including the SpyCraft book which was turned into a Netflix series and the Spy Sites series of books…

  • From Solar Sunrise to Solar Winds: The Questionable Value of Two Decades of Cybersecurity Advice

    While the Ware Report of 1970 codified the foundations of the computer security discipline, it was the President’s Commission on Critical Infrastructure Protection report of 1997 that expanded those requirements into recommendations for both discrete entities as well as the nascent communities that were growing in and around the Internet. Subsequent events that were the…


OODAcasts

  • Leading Cyber Change: Allan Friedman on the Revolution of SBOM & Future Cybersecurity Initiatives

    Leading Cyber Change: Allan Friedman on the Revolution of SBOM & Future Cybersecurity Initiatives

    Allan Friedman is a senior strategist at CISA (the Cyber Security and Infrastructure Security Agency) where he coordinates all of their cross-sector activities on the topic of SBOM: The Software Bill of Materials.

  • Joe Sullivan on Managing Complex Security Challenges

    Joe Sullivan on Managing Complex Security Challenges

    Joe Sullivan has been at the forefront of managing security risk in rapidly growing high tech companies over the past 20 years serving as the Chief Security Officer at Facebook from early start-up through the IPO, CSO of Uber and CloudFlare, and as a security leader at eBay/PayPal. Learn what motivates him and some of…

  • Joe Tranquillo on the Revolution in Biological Science
    ,

    Joe Tranquillo on the Revolution in Biological Science

    Joe Tranquillo is a Professor of Biomedical Engineering at Bucknell University and a provost at the school. He is also and author and speaker with a knack for helping make new and at times complex subjects understandable. In this OODAcast we discuss many aspects of the revolution in biological sciences with Joe including topics like:…

  • MITRE Futurist Charles Clancy on our Quantum Enabled Future

    MITRE Futurist Charles Clancy on our Quantum Enabled Future

    Charles Clancy has successfully led technology efforts in government, industry, academia and continues to lead and innovate in his current position as Senior Vice President and GM of MITRE Labs. He is MITRE’s Chief Futurist. His role in technology leadership and his tracking of tech across multiple domains made for an incredibly insightful OODAcast. We…

  • Mark McGrath: John Boyd Is Far More Than The OODA Loop

    Mark McGrath: John Boyd Is Far More Than The OODA Loop

    Mark McGrath has applied the teachings of John Boyd to a career that began in the Marine Corps, included leadership positions in financial services firms and consulting with businesses with a need to learn to thrive in volatile, uncertain, complex and ambiguous (VUCA) environments. He co-founded the consultancy AGLX and serves as its Chief Learning…

  • Serene – The Hacker Pianist Saving Cyberspace

    Serene – The Hacker Pianist Saving Cyberspace

    Serene is a hacker in the truest sense of the word. She’s applied a hacker mindset to learn coding, piano, and blend art and engineering in fascinating ways. You’ll find her collaborating on-stage with Grimes one night and coding censorship resistant technologies the next day. As a self-taught coder she was the first engineer hired…

  • Andy Bochman on Countering Cyber Sabotage

    Andy Bochman on Countering Cyber Sabotage

    Andy Bochman is the Senior Grid Strategist-Defender for Idaho National Laboratory’s National and Homeland Security directorate. In this role, Andy provides strategic guidance on topics at the intersection of grid security and climate resilience to INL leadership as well as senior U.S. and international government and industry leaders. Andy is a frequent speaker, writer, and trainer…

  • Spencer Ante on Creative Capital and Disruptive Innovation

    Spencer Ante on Creative Capital and Disruptive Innovation

    Spencer Ante is the author or “Creative Capital: Georges Doriot and the Birth of Venture Capital”, which was on my Top 10 book list for 2022. In fact, I found Doriot’s story so compelling that a portrait of him hangs on the wall at the Hack Factory start-up studio in Reston, VA. Doriot is a…

  • Bob Zukis and the Digital Directors Network: Helping corporate boards mitigate systemic risk

    Bob Zukis and the Digital Directors Network: Helping corporate boards mitigate systemic risk

    Bob Zukis is a man on a mission to improve the ability of corporate America to succeed in a complex digital world, even when under constant cyber attack. Bob is the CEO and founder of the Digital Directors Network, the global pioneer in helping corporate directors advance their understanding of systemic risk. We consider Bob…

  • Adam Shostack on Cybersecurity and What Every Engineer Should Learn From Star Wars

    Adam Shostack on Cybersecurity and What Every Engineer Should Learn From Star Wars

    Adam Shostack is widely known in the cybersecurity world for his pioneering work on disclosing and discussing computer vulnerabilities (the CVE  (common vulnerabilities and exposures) list). He also helped formalize and train leading approaches to threat modeling and wrote the foundational book on the subject (Threat Modeling: Designing for Security). In this OODAcast we seek…

OODAcons