Start your day with intelligence. Get The OODA Daily Pulse.

Home > Example Query Loops


Analysis

  • OODA Video: Your Data Strategy in a Hybrid Cloud Environment

    The agility and improved mission support associated with the widespread move to cloud computing has made this megatrend one of the most positive forces in IT today. Some of the greatest benefits to enterprises come with the ability to smartly mix public and private clouds in hybrid cloud environments.  However, optimizing the use of multiple…

  • What is our China Cyber Indictment Endgame?

    In February 2020, the U.S. Department of Justice (DoJ) issued indictments against four Chinese individuals suspected in conducting the 2017 intrusion into Equifax, a global information solutions company that organizes, assimilates, and analyzes data on consumers and businesses worldwide.  The personal data of approximately 145 million U.S. citizens was stolen in the breach.  The four…

  • OODA Video: When Artificial Intelligence Goes Wrong

    For many organizations, the pacing factor in the deployment of Artificial Intelligence solutions is not the functionality of the AI, but problems in mitigating the issues caused when AI goes wrong.  In this video for OODA members we provide a succinct introduction to key issues of AI in a way that will help you optimize…

  • OODA Network Interview: Dr. Christopher Ahlberg, CEO of Recorded Future

    This post is based on an interview with Dr. Christopher Ahlberg, CEO and Co-Founder of Recorded Future. It is part of our series of interviews of OODA Network members. Our objective with these interviews is to provide actionable information of interest to the community, including insights that can help with your own career progression. We…

  • The Future of Enterprise IoT

    The phrase Internet of Things (IoT) is a useful way to force thoughts on the new architecture emerging around embedded computing and ubiquitous communications. IoT devices are with us now and are proliferating at home, in our cars, on trains, planes, cities, buildings are factories. There are many design choices we all need to make…

  • Quick Hits from the 2020 Verizon Data Breach Report

    The annual Verizon Data Breach Report has become a reliable and consistent source of cybersecurity attack trends over the past several years. Verizon has just released this year’s report with the largest number of contributing organizations ever.  Here is OODA’s hot take.

  • Cyberwar Was Coming: A Reflection on the 25 Year Old Thesis that Predicted a Generation of Cyberconflict

    “You’ve got to read what this kid is writing out of his basement at the University of Vermont…”  – recently retired CIA officer to intelligence and military colleagues in 1994. A candid 25 year retrospective on a thesis that launched a tremendous amount of dialogue and action on the issues of information warfare, cyberterrorism, and…

  • CISA and FBI Release List of Top 10 Routinely Exploited Vulnerabilities

    A list of the top 10 routinely exploited vulnerabilities has been provided in a new joint alert distributed via the U.S. CERT website.  This alert was issued by the Cybersecurity and Infrastructure Security Agency (CISA), the Federal Bureau of Investigation (FBI), and the broader US Government to provide technical guidance for security professionals in both…

  • The Intelligence Workstation of the Future

    The Intelligence Workstation of the Future will empower analysts in new ways, combining the most modern analytical and visualization tools with enterprise security and governance technologies. This post explores this workstation, leading to actionable recommendations that organizations can put in place now to bring this concept to reality sooner vice later.

  • The Future of Enterprise Mobile Computing

    Smartphones ushered in a wave of mobile computing that has swept over every industry and just about every business in the economy. And with smartphone market penetration among individual users in the US reaching 90% it is clearly a platform that will endure for years. But where will this trend take us next? This special…


OODAcasts

  • Masha Sedova, Co-Founder Elevate Security on Human Risk Management

    Masha Sedova, Co-Founder Elevate Security on Human Risk Management

    Masha Sedova is an award-winning people-security expert, speaker, and entrepreneur focused on helping companies transform employees from a risk into a key element of defense. She has been a part of our OODA Network for years, including speaking at our legacy FedCyber event, where she introduced the behavior-based and gamified cybersecurity training and awareness she…

  • Bob Gourley on Operational Intelligence for Strategic Decision-making

    Bob Gourley on Operational Intelligence for Strategic Decision-making

    In this OODAcast, OODA Network Expert Jen Hoar interviews noted cybersecurity and intelligence professional Bob Gourley, CTO of OODA LLC, diving deep into what makes him tick. Jen asks Bob about his career, including the constants and dynamics in his professional life, starting with a deep background in operational intelligence as a naval intelligence officer.…

  • CEO of Women’s Society of Cyberjutsu and Cybersecurity Leader Mari Galloway

    CEO of Women’s Society of Cyberjutsu and Cybersecurity Leader Mari Galloway

    Like many others we have observed first hand the positive changes in the cybersecurity community being enabled by Mari Galloway. In this OODAcast we look beyond those changes to find out what makes her tick, revealing lessons applicable to professionals in any stage of their career. Mari is the CEO and a founding board member…

  • Paul Kurtz, Iconic Cybersecurity Leader and Founder of TruSTAR

    Paul Kurtz, Iconic Cybersecurity Leader and Founder of TruSTAR

    Paul Kurtz is an internationally recognized expert on cybersecurity and the Co-Founder and Chairman of TruSTAR. In this OODAcast we dive into Paul’s views on the cybersecurity landscape today and learn more about his approach to decision-making. We discuss a new concept he has been shepherding in the community regarding how cyber intelligence can be…

  • Rear Admiral Paul Becker, USN (ret) on leadership in the modern age

    Rear Admiral Paul Becker, USN (ret) on leadership in the modern age

    Rear Admiral Paul Becker, USN (Retired), is an author, speaker and board member with extensive experience in intelligence operations.  During his 30 year career as a naval intelligence officer he lead major operational intelligence efforts, rising to the position of Director of Intelligence (J2) for the Joint Chiefs of Staff. Upon retirement from the Navy…

  • Dr. Melissa Flagg of the Center for Security and Emerging Technology

    Dr. Melissa Flagg of the Center for Security and Emerging Technology

    Dr. Melissa Flagg is a Senior Fellow at the Center for Security and Emerging Technology (CSET) at Georgetown University. Previously she served as the Deputy Assistant Secretary of Defense for Research, responsible for policy and oversight Defense Department science and technology programs including basic research through advanced technology development and the DoD laboratory enterprise. She…

  • Mark Weatherford On Leading Change As a CISO

    Mark Weatherford On Leading Change As a CISO

    Mark Weatherford is an icon in the cybersecurity field. He is widely known as a mission focused leader who builds teams and gets hard things done. His career included success in the US Navy as a cryptologist, leadership and management in a major defense integrator, CISO for two states (Colorado and California), CISO of the…

  • Matt Devost on Hacking Entrepreneurship and Identifying Threats and Opportunities

    Matt Devost on Hacking Entrepreneurship and Identifying Threats and Opportunities

    In this OODAcast, the tables are turned as OODA Network Expert Jen Hoar interviews CEO Matt Devost and they discuss how Matt consistently identified new threats and opportunities by blending eccentric interests into a career as a serial entrepreneur and become an established expert on cybersecurity, counterterrorism, and technology issues.

  • Kevin Roberts on Leadership, Decision-making, and Focused Action

    Kevin Roberts on Leadership, Decision-making, and Focused Action

    Kevin Roberts has had an illustrious career spanning many industries over numerous continents including serving as Chairman and CEO of Saatchi & Saatchi, one of the world’s leading creative organizations, where he had responsibility for the effectiveness of several of the world’s leading advertising budgets including for clients Toyota and Procter & Gamble. Today, his…

  • Michael Kanaan, Author of T-Minus AI Discusses Artificial Intelligence and Global Power
    ,

    Michael Kanaan, Author of T-Minus AI Discusses Artificial Intelligence and Global Power

    Michael Kanaan has helped a wide swath of decision-makers better grasp the nature of AI. He has a knack for expressing complex topics in clear, accurate and succinct ways and many of us in the national security community have already had the pleasure of hearing from him in person or in conferences. His book, T-Minus…

OODAcons