Start your day with intelligence. Get The OODA Daily Pulse.

Home > Example Query Loops


Analysis

  • An Overview of the NIST Cybersecurity Framework 2.0

    The NIST Cybersecurity Framework (CSF) 2.0, an evolution of its predecessor, is a comprehensive guide designed to assist organizations across various sectors in managing and mitigating cybersecurity risks effectively. This framework, while not prescribing specific actions, offers a taxonomy of high-level cybersecurity outcomes, enabling organizations, regardless of their size, sector, or maturity, to better understand,…

  • The February 2024 OODA Network Member Meeting Discussion of the Current Geopolitical Terrain

    After the annual OODA CEO Matt Devost and OODA Network Members Review the OODA Almanac 2024 – Reorientation  at the February 2024 OODA Network Member Meeting – which was held on Friday, February 16, 2024 –  the network ended the monthly meeting with a discussion of the current geopolitical “free for all” and potential geopolitical…

  • How To Properly Cut Your Cybersecurity Budget

    Cybersecurity is one of those areas where cost cutting must be done with forethought. Cut the wrong things and it can lead to catastrophic results including government fines, criminal penalties and loss of customer confidence. Cut the right things and key risks can still be mitigated and they can be mitigated more efficiently.

  • Implementation Plan 2.0 Faces a Crucial Test

    According to recent reporting, the Office of the National Cyber Director (ONCD) intends to issue an update to the national cybersecurity strategy implementation plan in the coming months. 

  • The Defense Intelligence Agency on the Iranian-backed Drone Power of Russia and the Houthis

    Two recently declassified Defense Intelligence Agency (DIA) reports extensively detail the Iranian-backed drone capabilities fueling the reconfiguration of global warfare into a drone swarm architecture – fueling what John Robb has framed as the future:  asymmetric, non-nation-state kinetic capabilities organized into drone swarms enhancing the ability for warfighting capabilities “networked tribes” and “global guerrillas” usurping…

  • By 2026, Online Content Generated by Non-humans Will Vastly Outnumber Human Generated Content

    As an OODAcon 2023 panelist noted:  We are fast approaching a “tipping point” – when non-human generated content will vastly outnumber the amount of human generated content. A general quantitative validation has also been floating around: “90% of Online Content will be AI-generated by 2026”. We took the time to validate this quant and flesh…

  • Reorient Your Organization: Scenarios Exploring a Quantum Attack on Critical U.S. Power Grid Infrastructure

    The Hudson Institute report on “Risking Apocalypse? Quantum Computers and the US Power Grid” highlights the significant threat posed by potential quantum computer attacks on the US power grid. It emphasizes the vulnerability of the grid to such attacks, which could decrypt existing encryption systems and cause catastrophic outcomes. As we navigate the complexities of…

  • OODA CEO Matt Devost and OODA Network Members Review the OODA Almanac 2024 – Reorientation

    Every year, we also use one of our monthly meetings for a discussion of the annual OODA Almanac with the OODA Network.  This conversation took place at the February 2024 OODA Network Member Meeting – which was held on Friday 16, 2024.    

  • i-SOON Data Leak Is Interesting but Mostly Unsurprising

    The i-SOON leak tells us nothing new perhaps as much as solidify points that have long been suspected and acknowledged of Chinese cyber operations.  Beijing tasks out orders on areas of interest to a variety of collection means, much like any other government.  In this case, one company has been identified, and there are likely other companies…

  • Two Emergent and Sophisticated Approaches to LLM Implementation in Cybersecurity

    Google Security Engineering and The Carnegie Mellon University Software Engineering Institute in collaboration with OpenAI have sorted through the hype – and done some serious thinking and formal research on developing “better approaches for evaluating LLM cybersecurity” and AI-powered patching: the future of automated vulnerability fixes. This is some great formative framing of the challenges…


OODAcasts

  • Michael Kanaan, Author of T-Minus AI Discusses Artificial Intelligence and Global Power
    ,

    Michael Kanaan, Author of T-Minus AI Discusses Artificial Intelligence and Global Power

    Michael Kanaan has helped a wide swath of decision-makers better grasp the nature of AI. He has a knack for expressing complex topics in clear, accurate and succinct ways and many of us in the national security community have already had the pleasure of hearing from him in person or in conferences. His book, T-Minus…

  • Jim Miller on Managing Policy in an Age of Constant Disruption and Dynamic Threats
    ,

    Jim Miller on Managing Policy in an Age of Constant Disruption and Dynamic Threats

    Jim Miller has worked for four decades on a combination of private and public sector initiatives focused on addressing a wide variety of national security threats.  He has held numerous positions within the Department of Defense including serving as Under Secretary of Defense for Policy and has been awarded the DoD’s highest civilian award four…

  • Chet Richards on John Boyd and applying OODA principles to the business world

    Chet Richards on John Boyd and applying OODA principles to the business world

    Chet Richards was a close associate of the late US Air Force Colonel John Boyd. He was there as the concept of the OODA Loop was being developed and constructed the first graphics of the OODA Loop from sketches Boyd drew. Chet is the author of the widely read business book “Certain to Win” which…

  • Courtney Bowman, Privacy and Civil Liberties Engineer, Palantir Technologies

    Courtney Bowman, Privacy and Civil Liberties Engineer, Palantir Technologies

    Courtney Bowman leads Palantir’s Privacy and Civil Liberties Engineering Team. In this capacity he works extensively with local, state and international governments and philanthropic partners to develop technology-driven solutions to information sharing needs that respect applicable privacy, security and data integrity requirements. He does so in a way that is informed by experience and well…

  • Kevin DeSanto On Due Diligence and M&A Transactions and Trust Based Networking

    Kevin DeSanto On Due Diligence and M&A Transactions and Trust Based Networking

    Kevin DeSanto is an investment banker delivering advice and execution assistance to high growth businesses preparing for M&A and financial transactions. His company, KippsDeSanto, has developed a reputation for trusted execution support for companies in government contracting, aerospace, defense and cybersecurity. He leads teams that advise senior management, boards of directors and shareholders. The art…

  • Bradley Rotter On The Future Of Work, CryptoCurrencies, Quantum Computing and Leadership

    Bradley Rotter On The Future Of Work, CryptoCurrencies, Quantum Computing and Leadership

    Bradley Rotter is a visionary investor who has pioneered investments in many new alternative investments classes including having been an early backer of hedge funds in 1982 while speculating on the Chicago Mercantile Exchange. He was also an early investor in Bitcoin and other cryptocurrency ecosystems and at a dinner with OODA CEO Matt Devost…

  • Andy Lustig On Legal and Due Diligence Support In The High Tech Era

    Andy Lustig On Legal and Due Diligence Support In The High Tech Era

    Andrew (Andy) Lustig is a partner at the high tech law firm Cooley, where he focuses on private equity investments, mergers and acquisitions and the general corporate representation of high-growth technology companies in both the commercial and government marketplace. His practice includes a wide range of industry sectors including information technology, national security, cybersecurity, data…

  • Paul Pagnato, CEO and Founder at PagnatoKarp  and Author of The Transparency Wave
    ,

    Paul Pagnato, CEO and Founder at PagnatoKarp and Author of The Transparency Wave

    Paul Pagnato migrated from a career as a scientist looking for life in outer space to one of the top financial advisors in the U.S. with a keen eye for tracking innovation, exponential change, and other emerging global issues. He is also the author of the recent book, The Transparency Wave, which highlights the essential…

  • Alsop-Louie Partner and Famed Tech Executive Bill Crowell on Technology Due Diligence
    ,

    Alsop-Louie Partner and Famed Tech Executive Bill Crowell on Technology Due Diligence

    Bill Crowell is a senior executive with extensive experience in government (rose to the level of Deputy Director of the National Security Agency) and in industry. He has been a CEO of leading companies like Cylink, taking them through growth to acquisition. He has been a director of multiple public and private companies with a…

  • Brad Meltzer, Bestselling Novelist With Insights To Inform Your Business Strategy

    Brad Meltzer, Bestselling Novelist With Insights To Inform Your Business Strategy

    Brad Meltzer is the #1 New York Times bestselling author of The Cupler Ring Trilogy (The Inner Circle, The Fifth Assassin, The President’s Shadow), The Escape Artist, The Book of Lies and many other thrillers loved by millions for their realism and well researched fact based themes and drama filled plots. He is also widely…

OODAcons