Start your day with intelligence. Get The OODA Daily Pulse.

Home > Example Query Loops


Analysis

  • Enhancing the Effectiveness of International Criminal Justice

    Domain experts have called into question the effectiveness of the International Criminal Court.

  • Embracing a Future of Technical and Political Churn

    Two things happened last week that will ultimately have a huge impact on almost every American consumer alive today.

  • 10 Rules For Cybersecurity Salespeople

    The cybersecurity market is so congested, it can be difficult to establish a dialogue with overwhelmed CISOs.

  • Information – The Final Frontier of Cybersecurity

    Cyber trust is not just about securing information technology systems. You must also secure business processes.

  • Putin’s Cyber OODA Loop is Tighter Than Yours

    While hosting a delegation from France, Putin advised that to prevent cyber attacks, nations will have to establish international norms prohibiting such behavior. “This is what I can say about cyberattacks or war of words in the press and other issues. Action always causes reaction. Always. If one does not want to get a reaction…

  • Three Critical Factors Increasing Cyber Risk for 2019

    What cyber threat do China, Russia, and Iran present for the remainder of 2018 and 2019? Matt Devost provides some insight into the geopolitical elements influencing that answer.

  • Cliff Stoll Keynote

    Dr. Clifford Stoll, astronomer, professor, IT security pioneer and author of “The Cuckoo’s Egg,” discusses his ground-breaking work in IT security while at Berkeley, where he stumbled on an intrusion by hackers working on behalf of the KGB. Learn how cybersecurity began from the trailblazing researcher who invented some of the capabilities security professionals still…

  • Commanding the Trend: Social Media as Information Warfare

    This article demonstrates how social media is a tool for modern information-age warfare. It builds on analysis of three distinct topics: social networking, propaganda, and news and information sharing. Two case studies are used to show how state and non-state actors use social media to employ time-tested propaganda techniques to yield far-reaching results. The spread…

  • What did Cybersecurity and Cyberwar look like in 1999?

    Think all these news stories you are reading about cybersecurity, cyberwar, and cyberconflict are breaking new ground? It is worth taking a read through the several hundred entries meticulously compiled in Mich Kabay’s 1999 Infosec Year in Review which I recently found on an old drive while searching for other content. Some old new topics…

  • Trump: Accidental Nuclear Genius?

    Love him or hate him, when it comes to North Korea, Trump just may be frustratingly suited for nuclear negotiations. Unpredictability, emotional outbursts, irrationality, and other descriptors that have been applied to the sitting president are likely qualities a president should not have in general. According to Cold War-era nuclear deterrence theories, however, they may…


OODAcasts

  • Bob Zukis and the Digital Directors Network: Helping corporate boards mitigate systemic risk

    Bob Zukis and the Digital Directors Network: Helping corporate boards mitigate systemic risk

    Bob Zukis is a man on a mission to improve the ability of corporate America to succeed in a complex digital world, even when under constant cyber attack. Bob is the CEO and founder of the Digital Directors Network, the global pioneer in helping corporate directors advance their understanding of systemic risk. We consider Bob…

  • Adam Shostack on Cybersecurity and What Every Engineer Should Learn From Star Wars

    Adam Shostack on Cybersecurity and What Every Engineer Should Learn From Star Wars

    Adam Shostack is widely known in the cybersecurity world for his pioneering work on disclosing and discussing computer vulnerabilities (the CVE  (common vulnerabilities and exposures) list). He also helped formalize and train leading approaches to threat modeling and wrote the foundational book on the subject (Threat Modeling: Designing for Security). In this OODAcast we seek…

  • Sebastian Mallaby on How Venture Capitalists and Hedge Funds Achieve Success

    Sebastian Mallaby on How Venture Capitalists and Hedge Funds Achieve Success

    Sebastian Mallaby joined the OODAcast for a discussion about the Power Law in venture capital and the rise of the global hedge fund and private equity industries.

  • Former Head of National Intelligence Council Neil Wiley on Intelligence Analysis

    Former Head of National Intelligence Council Neil Wiley on Intelligence Analysis

    Neil Wiley has lead some of the US Intelligence Community’s most important analytical functions. His career in intelligence began as a Naval Intelligence Officer in an operational intelligence center focused on support to critical operational naval missions. He would later serve joint intelligence missions in Europe, would rise to lead all analytical activities at the…

  • Michael Gibson Wants to Light the Paper Belt on Fire

    Michael Gibson Wants to Light the Paper Belt on Fire

    This OODAcast features a fascinating conversation with Michael Gibson, the author of the book “Paper Belt on Fire” who is also the co-founder of the Thiel Fellowship program and the 1517 Fund, both of which focus on identifying unconventional ideas and individuals that can drive disruptive innovation in technology, arts, and science.

  • Jimmy Soni on Why PayPal Was Successful
    ,

    Jimmy Soni on Why PayPal Was Successful

    In this OODAcast, we talk with Jimmy Soni, the author of the book “The Founders: The Story of PayPal and the Entrepreneurs Who Shaped Silicon Valley”. Jimmy takes a deep, historical look at the founding story of PayPal with detailed analysis, interviews, and access that you won’t find in any other telling of the PayPal…

  • Jen Hoar on Corporate Intelligence and Investigations

    Jen Hoar on Corporate Intelligence and Investigations

    In this OODAcast we interview one of our close friends and OODA network members, Jen Hoar. Jen is a former journalist-turned-corporate investigator who has leveraged the potent act of asking, and listening, to turn strangers into sources and contacts into clients. Her expertise, which is clearly also her passion, is identifying and interviewing smart people…

  • Joseph Menn on Observations From Tech Journalism
    ,

    Joseph Menn on Observations From Tech Journalism

    Covering technology issues, and specifically cybersecurity as a journalist is a tough endeavor. Some of these technologies are complex as are the security vulnerabilities often inherent in their deployment and making these topics broadly accessible can be a challenge. Many of the underlying issues touch upon national security and civil liberties creating an interesting nexus…

  • Lawrence Gasman on Assessing the Business Impact of Quantum Technologies

    Lawrence Gasman on Assessing the Business Impact of Quantum Technologies

    Lawrence Gasman has researched and reported on quantum technologies from the beginning of the discipline of quantum computing. He is now the President of Inside Quantum Technology (IQT), which provides in-depth business intelligence for the quantum technology industry. IQT also runs several major quantum technology conferences as well as a quantum industry news service. On…

  • 100 Episodes of OODAcast: Providing actionable insights for future risks and opportunities.

    100 Episodes of OODAcast: Providing actionable insights for future risks and opportunities.

    In 2020, we launched the OODAcast video and podcast series designed to provide insightful analysis and actionable intelligence to decision makers. In this 100th episode, co-hosts Matt Devost and Bob Gourley review some of the key insights from the series. Matt and Bob also discuss a OODA’s recent assessment of risks and opportunities given the…

OODAcons