Start your day with intelligence. Get The OODA Daily Pulse.

Home > Example Query Loops


Analysis

  • Cyber Threat Analysis Report Volume 1, Edition 4

    NIST’s Ron Ross on the state of cyber: ’We literally are hemorrhaging critical information’ After Chinese hackers infiltrated a Navy subcontractor’s computer network and stole a trove of highly sensitive data on submarine warfare, it spurred the government to revise the standards that contractors must follow to ensure government data is properly protected data. What…

  • Cyber Threat Analysis Report Volume 1, Edition 3

    Can you trust NSA tools? This and more as OODA Network Expert Michael Tanji provides insightful analysis of the most recent and significant cyber news.

  • Global security spending to top $103 billion in 2019, says IDC

    New IDC data confirms the global trend toward increased cybersecurity spending. The IDC projects spending to reach $103 billion this year, which would represent a 9.4% increase, the bulk of which is due to expanded security budgets at companies with over 500 employees. Between 2018 to 2022, spending is expected to increase by 9.2% each…

  • Email – The Often Overlooked Cybersecurity Risk

    Are silly email mistakes putting your sensitive data and customer PII at risk or in violation of GDPR. Matt Devost breaks down four real life examples that highlight inadvertent email risks.

  • The State of the Cybersecurity Community: An update following RSA 2019

    OODA Experts provide their perspective on the RSA 2019 conference including a list of 30+ companies to watch.

  • The Cyber Threat Analysis Report Volume 1 Edition 2

    Fresh off of RSA – OODA Network Expert Michael Tanji provides insightful analysis of the most recent and significant cyber news.

  • The Russian Threat – An OODA Network Webinar

    OODA Network Members are invited to participate in our webinar on the Russian Threat scheduled for Tuesday February 19, 2019 at 2:00 p.m. EST.

  • Here’s What the New U.S. Intelligence Strategy Says About Cyber Threats

    The United States intelligence strategy for 2019 has been released, covering seven specific themes.  Here’s how the United States Intelligence Community will deal with cyber threats: “Despite growing awareness of cyber threats and improving cyber defenses, nearly all information, communication networks, and systems will be at risk for years to come. Our adversaries are becoming…

  • Manage Insider Risk and Prevent ‘Big Brother’ Perception, Part 4 

    This is the final article in a four-part series focused on proactively managing corporate security culture and workforce expectations as your organization prepares to prevent, detect, and respond to insider risk incidents. In Part 3 of this series, I provided four actionable steps for explaining the benefits of insider risk management to your workforce, read more…

  • The Five Modes of HACKthink

    How can you use HACKthinking to solve complex problems or evolve or develop a disruptive solution.


OODAcasts

OODAcons

  • OODAcon 2025

    OODAcon 2025

    We are in the planning stages of OODAcon 2025, which will be held 29 October 2025 at the Hyatt Regency Reston. For an overview of last year’s OODAcon see: OODAcon 2024 Welcome to OODAcon 2025

  • OODAcon 2023

    OODAcon 2023

    OODAcon 2023 October 25th – Reston, VA The anticipation of disruptive technologies has allure for those of us trying to develop informed strategies about the future, but what if those disruptive technologies already exist today? Our theme for this year’s OODAcon is FUTURE NOW as we focus on the technologies, ideas, and risks that exist right now…

  • OODAcon 2024

    OODAcon 2024

    The conference will feature an impressive lineup of speakers—pioneers who are steering the direction of their respective fields towards a unified vision of the future. OODAcon 2024 is your arena to witness, participate, and contribute to the dialogue that drives innovation forward. Join us in hacking the future, together, as we navigate the complexities of…