Start your day with intelligence. Get The OODA Daily Pulse.

Home > Example Query Loops


Analysis

  • Information – The Final Frontier of Cybersecurity

    Cyber trust is not just about securing information technology systems. You must also secure business processes.

  • Putin’s Cyber OODA Loop is Tighter Than Yours

    While hosting a delegation from France, Putin advised that to prevent cyber attacks, nations will have to establish international norms prohibiting such behavior. “This is what I can say about cyberattacks or war of words in the press and other issues. Action always causes reaction. Always. If one does not want to get a reaction…

  • Three Critical Factors Increasing Cyber Risk for 2019

    What cyber threat do China, Russia, and Iran present for the remainder of 2018 and 2019? Matt Devost provides some insight into the geopolitical elements influencing that answer.

  • Cliff Stoll Keynote

    Dr. Clifford Stoll, astronomer, professor, IT security pioneer and author of “The Cuckoo’s Egg,” discusses his ground-breaking work in IT security while at Berkeley, where he stumbled on an intrusion by hackers working on behalf of the KGB. Learn how cybersecurity began from the trailblazing researcher who invented some of the capabilities security professionals still…

  • Commanding the Trend: Social Media as Information Warfare

    This article demonstrates how social media is a tool for modern information-age warfare. It builds on analysis of three distinct topics: social networking, propaganda, and news and information sharing. Two case studies are used to show how state and non-state actors use social media to employ time-tested propaganda techniques to yield far-reaching results. The spread…

  • What did Cybersecurity and Cyberwar look like in 1999?

    Think all these news stories you are reading about cybersecurity, cyberwar, and cyberconflict are breaking new ground? It is worth taking a read through the several hundred entries meticulously compiled in Mich Kabay’s 1999 Infosec Year in Review which I recently found on an old drive while searching for other content. Some old new topics…

  • Trump: Accidental Nuclear Genius?

    Love him or hate him, when it comes to North Korea, Trump just may be frustratingly suited for nuclear negotiations. Unpredictability, emotional outbursts, irrationality, and other descriptors that have been applied to the sitting president are likely qualities a president should not have in general. According to Cold War-era nuclear deterrence theories, however, they may…

  • Best Security, Business, and Technology Books of 2017

    In looking at advances in technology over the past year, I’m reminded of the Lenin quote “There are decades where nothing happens; and there are weeks where decades happen.” It seems that to make the most sense of the top security and business trends you need to have a keen eye for advancements in AI,…

  • The 2017 Red Teamer’s Bookshelf

    “It’s been a couple of months since we first announced that Red Team Journal, Redteams.net, and OODALoop would be compiling the latest ‘Red Teamer’s Bookshelf’ jointly. For those of you who’ve been waiting, the list is finally here. It’s larger than previous years, so we’ve organized the titles by category (and yes, some of these…

  • Our Science Fiction Cyber Future

    “The cybersecurity industry is currently enamored with concepts of autonomous defense, including elements of machine learning, behavioral analytics, and artificial intelligence—and rightly so. Programed to be able to study all vulnerabilities in the public domain, autonomous bots (autbots)—not to be confused with bots simply conducting repetitive tasks like guessing default passwords as programmed—could take what…


OODAcasts

  • Amr Awadallah On The Biggest Challenges And Opportunities in Enterprise IT Today

    Amr Awadallah On The Biggest Challenges And Opportunities in Enterprise IT Today

    In this OODAcast we examine lessons learned as a startup founder and insights into the future of technology with Amr Awadallah. Amr Awadallah is widely known as a founder of Cloudera. Prior to that he was working on extreme scale data solutions for Yahoo. Most recently he was VP for Developer Relations at Google Cloud.…

  • Sir David Omand on Leveraging How Spies Think In Our Business and Personal Lives
    ,

    Sir David Omand on Leveraging How Spies Think In Our Business and Personal Lives

    Sir David Omand is one of the most respected intelligence professionals in the world and author of the book How Spies Think: Ten lessons in intelligence. His career in intelligence began shortly after graduating from Cambridge in 1969 when he joined the UK’s GCHQ (Government Communications Headquarters). He would later become the director of GCHQ.…

  • Jessica Gulick: An accomplished cybersecurity practitioner turned CEO on future focused leadership

    Jessica Gulick: An accomplished cybersecurity practitioner turned CEO on future focused leadership

    Jessica Gulick is widely known for her leadership of the successful growth strategy and marketing firm Katzcy. She is also the Commissioner of the US Cyber Games, a multi-phased cybersecurity program recruiting a US Cyber Team for international competition. She is also the founder of PlayCyber, a new business line promoting cyber games and tournaments.…

  • Lance Mortlock On Scenario Planning to Drive Strategic Decisions

    Lance Mortlock On Scenario Planning to Drive Strategic Decisions

    Lance Mortlock is a Senior EY Strategy Partner. He is author of the book Disaster Proof: Scenario Planning for Post Pandemic Future, which explores ways scenario planning can help organizations be more resilient. This is a must-read book for anyone in the Risk Management field. It provides practical advice for strategists, planners, executives and board…

  • Jer Thorp on Living in Data and Creating Better Futures

    Jer Thorp on Living in Data and Creating Better Futures

    Each year, there are one or two books that deeply resonate with me and become sticky in that I’m thinking about the book often, bringing it up in conversations, and sending out unsolicited recommendations for executives and researchers in my network to check it out. Jer Thorp’s “Living in Data: A Citizen’s Guide to a…

  • Tony Tether On Technology Leadership and Lessons Learned From DARPA

    Tony Tether On Technology Leadership and Lessons Learned From DARPA

    Dr. Tony Tether was the director of the Defense Advanced Research Projects Agency, DARPA, from 2001 till his retirement in 2009. In this OODAcast we examine some of Dr. Tether’s formative experiences, including a very unique job he held while awaiting entry to Stanford. He was a door to door salesman and while doing that…

  • Cofer Black on Leadership Lessons Learned and Speaking Truth to Power

    Cofer Black on Leadership Lessons Learned and Speaking Truth to Power

    In this OODAcast, we talk with renowned counter-terrorism expert and career clandestine services professional Cofer Black. Cofer is best known for having been the Director of the CIA’s Counterterrorism Center on 9/11 and having been part of the intelligence community warning about the near-term threat of terrorism in the United States prior to the attacks.…

  • Gaurav Banga On Mitigating Cyber Threats Through Deep Insight Into Things That Matter Most

    Gaurav Banga On Mitigating Cyber Threats Through Deep Insight Into Things That Matter Most

    Gaurav Banga is the Founder and CEO of Balbix, and serves on the boards of several companies. Before Balbix, Gaurav was the Co-founder & CEO of Bromium and led the company from inception for over 5 years. Earlier in his career, he served in various executive roles at Phoenix Technologies and Intellisync Corporation, and was…

  • ,

    Kim Zetter on Understanding the Realities of Cyberthreats and How Code Has a Story to Tell

    This week’s OODAcast is with Kim Zetter, an incredibly well respected journalist who has been covering cybersecurity related issues for two decades.  Matt Devost talks with Kim about a wide variety of cyber-related issues including a deep dive into Stuxnet and the implications for today’s security environment. Kim also shares details as to how she…

  • Junaid Islam on Zero Trust Architecture

    Junaid Islam on Zero Trust Architecture

    In this OODAcast we provide insights into Zero Trust architectures from an experienced practitioner, Junaid Islam. Junaid is a senior partner at OODA. He has over 30 years of experience in secure communications and the design and operations of highly functional enterprise architectures. He founded Bivio Networks, maker of the first gigabyte speed general purpose…

OODAcons