Start your day with intelligence. Get The OODA Daily Pulse.

Home > Example Query Loops

Category: Business

Exponential innovation is causing exponential disruption

Author: OODA Analyst

Exponential innovation is causing exponential disruption


Analysis

  • The Russian Threat – An OODA Network Webinar

    OODA Network Members are invited to participate in our webinar on the Russian Threat scheduled for Tuesday February 19, 2019 at 2:00 p.m. EST.

  • Here’s What the New U.S. Intelligence Strategy Says About Cyber Threats

    The United States intelligence strategy for 2019 has been released, covering seven specific themes.  Here’s how the United States Intelligence Community will deal with cyber threats: “Despite growing awareness of cyber threats and improving cyber defenses, nearly all information, communication networks, and systems will be at risk for years to come. Our adversaries are becoming…

  • Manage Insider Risk and Prevent ‘Big Brother’ Perception, Part 4 

    This is the final article in a four-part series focused on proactively managing corporate security culture and workforce expectations as your organization prepares to prevent, detect, and respond to insider risk incidents. In Part 3 of this series, I provided four actionable steps for explaining the benefits of insider risk management to your workforce, read more…

  • The Five Modes of HACKthink

    How can you use HACKthinking to solve complex problems or evolve or develop a disruptive solution.

  • Manage Insider Risk and Prevent ‘Big Brother’ Perception, Part 3 

    This is the third article in a four-part series focused on proactively managing corporate security culture and workforce expectations as your organization prepares to prevent, detect, and respond to insider risk incidents.  In Part 2 of this series, I provided four actionable steps for being straightforward with your workforce about how you plan to establish…

  • Best Security, Business, and Technology Books of 2018

    The top ten books of the year as curated by OODA Loop founder Matt Devost.

  • Manage Insider Threat Risk and Prevent ‘Big Brother’ Perception, Part 2 

    This is the second article in a four-part series focused on proactively managing corporate security culture and workforce expectations as your organization prepares to prevent, detect, and respond to insider risk incidents.  In Part 1 of this series, GPSG’s insider threat risk team introduced its workforce investment strategy and provided actionable steps for explaining to your…

  • LikeWar: The Weaponization of Social Media – An OODA Loop interview with P.W. Singer

    An OODA Loop interview with author P.W. Singer on his new book about information operations on social networks.

  • Manage Insider Threat Risk and Prevent ‘Big Brother’ Perception 

    This is the first article in a series focused on proactively managing corporate security culture and workforce expectations as your organization prepares to prevent, detect, and respond to insider risk incidents.Your organization faces insider risk every day. The average cost of an incident over a 12-month period is $8.76 million, according to a recent Ponemon…

  • Software Has Become A National Security Vulnerability

    Software and our internetworked computer systems are more complex than ever. Which means to develop countermeasures to these new types of cyberattacks we have to work harder than ever.


OODAcasts

OODAcons