Start your day with intelligence. Get The OODA Daily Pulse.

Home > Example Query Loops


Analysis

  • Navy’s New Unmanned Campaign Framework

    The Navy and Marine Corps recently released their long-awaited Unmanned Campaign Framework.  This is a continuation of the drop-down documents spawned by the National Defense Strategy and meant to bolster the Naval Service’s commitment to shift their attention to “near-peer competitors”.

  • This is How They Tell Me Cyber Peace is Achieved

    The well-worn martial cliché says that no matter how elegant your plans, it is important to remember that the enemy gets a vote in how successful they are. The transition of military and intelligence activities to cyberspace didn’t change that, but it got more complicated because the traditional calculus rarely incorporated non-state actors and their…

  • NIST on a CHIP – Driving A Revolution In Measurement Science With Quantum Solutions

    A new NIST program makes creative use of quantum technologies to deliver advanced measurement solutions to users in commerce, medicine, defense and academia. This delivery of measurement standards in a chip format is known as NIST on a CHIP (NOAC).  The time for leaders to think of how this may change your business model is…

  • OODA Monthly Meeting: Members gather online for trust based networking

    OODA Network members are invited to participate in a monthly video call to discuss items of common concern to our membership. These highly collaborative sessions are great ways for our members to meet and interact with each other while talking about items of common interest. We also use these sessions to help better focus our…

  • Updated Executive’s Guide To Quantum Safe Security: Take these steps to make your enterprise quantum proof

    This is an update to our Executive’s Guide to Quantum Safe Security, based on a new round of research that has included interviews of OODA Network experts, technology providers and senior executives in enterprises. Quantum Computers will bring new power to adversaries. But when? And what can you do now to mitigate that threat? This…

  • Updating Defense Intelligence Agency’s Data Base

    The Defense Intelligence Agency (DIA) currently uses an old system called the Modernized Intelligence Database (MIDB) to store and retrieve information on foreign intelligence – everything from Country order-of-battles (tanks, airplanes, etc.), infrastructures (runways, ports, etc.) to general foreign military capabilities. They will replace it with a system called the Machine-Assisted Analytic Rapid-Repository System (MARS).…

  • China’s Plan for Countering Weaponized Interdependence

    In an article entitled “The international environment and countermeasures of network governance during the “14th Five-Year Plan” period” by Xu Xiujun (徐秀军) in the February 27, 2021 edition of China Information Security, we see the continuation of China’s concerns over Weaponized Interdependence and China’s desire to shape a global technology and economic environment that is…

  • Executive Level Action In Response to Ongoing Massive Attacks Leveraging Microsoft Vulnerabilities

    This post provides executive level context and some recommendations regarding a large attack exploiting Microsoft Exchange, a system many enterprises use for mail, contact management, calendar/scheduling and some basic identity management functions. This attack is so large and damaging it is almost pushing the recent Solar Winds attacks off the headlines. Keep in mind that…

  • National Cyber Ranges: Virtual environments that enable government organizations to test their cyber capability

    National cyber ranges are virtual environments that enable government organizations to test their cyber capability.  It’s important to rehearse military operational plans and develop new tactics, techniques, and procedures (TTP’s) that can work in a contested cyber landscape. These ranges are distributed computing environments with technical experts that can support exercises and operational planning.

  • Robert Wallace on a Career in Intelligence and The Spy Sites Series and Spy Craft

    Robert Wallace spent a 33 year career with the Central Intelligence Agency and is widely known for the very well done books he and co-author Keith Melton have produced on the history, culture and tradecraft of intelligence (including the SpyCraft book which was turned into a Netflix series and the Spy Sites series of books…


OODAcasts

  • Ric Prado on Intelligence Operations and a Legendary Career in the CIA

    Ric Prado on Intelligence Operations and a Legendary Career in the CIA

    Ric Prado has been described by CIA leadership as the closest thing to 007 that the United States has ever had. Ric’s life is packed with more adventure and operations than your favorite spy novel series. Coming out of the shadows, this is Ric’s first video interview and covers his career, operational decision-making lessons learned,…

  • Mischel Kwon, Founder and CEO of W@tchTower

    Mischel Kwon, Founder and CEO of W@tchTower

    In this OODAcast we interview Michel Kwon, the founder and CEO of W@tchTower. She is a leader who has proven herself through an ability to success in three different career fields, first as a developer and programmer creating enterprise grade solutions, then as a government executive who would eventually lead the United States Computer Emergency Readiness…

  • Masha Sedova, Co-Founder Elevate Security on Human Risk Management

    Masha Sedova, Co-Founder Elevate Security on Human Risk Management

    Masha Sedova is an award-winning people-security expert, speaker, and entrepreneur focused on helping companies transform employees from a risk into a key element of defense. She has been a part of our OODA Network for years, including speaking at our legacy FedCyber event, where she introduced the behavior-based and gamified cybersecurity training and awareness she…

  • Bob Gourley on Operational Intelligence for Strategic Decision-making

    Bob Gourley on Operational Intelligence for Strategic Decision-making

    In this OODAcast, OODA Network Expert Jen Hoar interviews noted cybersecurity and intelligence professional Bob Gourley, CTO of OODA LLC, diving deep into what makes him tick. Jen asks Bob about his career, including the constants and dynamics in his professional life, starting with a deep background in operational intelligence as a naval intelligence officer.…

  • CEO of Women’s Society of Cyberjutsu and Cybersecurity Leader Mari Galloway

    CEO of Women’s Society of Cyberjutsu and Cybersecurity Leader Mari Galloway

    Like many others we have observed first hand the positive changes in the cybersecurity community being enabled by Mari Galloway. In this OODAcast we look beyond those changes to find out what makes her tick, revealing lessons applicable to professionals in any stage of their career. Mari is the CEO and a founding board member…

  • Paul Kurtz, Iconic Cybersecurity Leader and Founder of TruSTAR

    Paul Kurtz, Iconic Cybersecurity Leader and Founder of TruSTAR

    Paul Kurtz is an internationally recognized expert on cybersecurity and the Co-Founder and Chairman of TruSTAR. In this OODAcast we dive into Paul’s views on the cybersecurity landscape today and learn more about his approach to decision-making. We discuss a new concept he has been shepherding in the community regarding how cyber intelligence can be…

  • Rear Admiral Paul Becker, USN (ret) on leadership in the modern age

    Rear Admiral Paul Becker, USN (ret) on leadership in the modern age

    Rear Admiral Paul Becker, USN (Retired), is an author, speaker and board member with extensive experience in intelligence operations.  During his 30 year career as a naval intelligence officer he lead major operational intelligence efforts, rising to the position of Director of Intelligence (J2) for the Joint Chiefs of Staff. Upon retirement from the Navy…

  • Dr. Melissa Flagg of the Center for Security and Emerging Technology

    Dr. Melissa Flagg of the Center for Security and Emerging Technology

    Dr. Melissa Flagg is a Senior Fellow at the Center for Security and Emerging Technology (CSET) at Georgetown University. Previously she served as the Deputy Assistant Secretary of Defense for Research, responsible for policy and oversight Defense Department science and technology programs including basic research through advanced technology development and the DoD laboratory enterprise. She…

  • Mark Weatherford On Leading Change As a CISO

    Mark Weatherford On Leading Change As a CISO

    Mark Weatherford is an icon in the cybersecurity field. He is widely known as a mission focused leader who builds teams and gets hard things done. His career included success in the US Navy as a cryptologist, leadership and management in a major defense integrator, CISO for two states (Colorado and California), CISO of the…

  • Matt Devost on Hacking Entrepreneurship and Identifying Threats and Opportunities

    Matt Devost on Hacking Entrepreneurship and Identifying Threats and Opportunities

    In this OODAcast, the tables are turned as OODA Network Expert Jen Hoar interviews CEO Matt Devost and they discuss how Matt consistently identified new threats and opportunities by blending eccentric interests into a career as a serial entrepreneur and become an established expert on cybersecurity, counterterrorism, and technology issues.

OODAcons