Start your day with intelligence. Get The OODA Daily Pulse.

Home > Example Query Loops


Analysis

  • China’s Defense Minister Being Removed From Post, U.S. Officials Say

    Chinese Defense Minister Li Shangfu was taken away last week by authorities for questioning, according to a person close to decision making in Beijing, while U.S. officials say he is being removed from his post. Li hasn’t made a public appearance since late August. One U.S. official said the trouble surrounding Li pointed to deep-seated…

  • Is Deep Learning the Future of Financial Stability (or Volatility and Crisis)?

    Financial network complexity, biased algorithms, regulatory considerations, and predictive analytics (based on faulty foundational models) are only a few of the risk variables that will determine the future of AI in the finance sector.  Securities and Exchange Commission Chair Gary Gensler, in his previous life as an MIT Sloan School of Management Professor, wrote a…

  • The Future Will be Built with “Clean Steel”

    The decarbonization of heavy industry figures prominently into the “all of the above” solutions which will need to be deployed to combat the climate crisis.  “Clean steel” is showing real promise.  Details here. 

  • “AI for Enterprise”: Lessons Learned from Healthcare, Hugging Face and Clinical Language Models

    Healthcare is already in the midst of an AI revolution – with an applied technology market maturity which outpaces most other industry sectors which are in a reactive mode to the AI hype cycle.  Explore these AI healthcare use cases and apply them to your organization using design and systems thinking.  

  • While Texas Declared a Grid Emergency, EU Fossil Generation is at Record Low

    Two climate crisis related developments are worth tracking as an indicator of what may be the new reality in this age of polycrisis.  We do not provide solutions but do mention mental frameworks important for leaders to master in finding solutions. 

  • The ICC Will Now Investigate Cyber War Crimes

    In this report we capture context on the shift in ICC intentions regarding investigating and prosecuting cyber war crimes. Recent reporting reveals that the International Criminal Court (ICC) will now investigate and prosecute cyber war crimes in the same way it does kinetic and physical war crimes.  The ICC’s lead prosecutor Karim Khan authored an article that though acknowledged that…

  • The OODAcast on 9/11/01: Firsthand insights from intelligence leadership

    This post captures some key content from the OODAcast including observations from OODA Network Members who were in positions to know what the national security situation was before, during and after the attacks.

  • Artificial Intelligence and the Future of Human Diplomacy

    This post examines AI and Human diplomacy and building trust, cooperation, deception, and strategic reasoning into natural language AI systems.

  • Without Consensus on Key Cyber Issues, the Global Cyber Weapons Market Flourishes

    This post seeks to inform your understanding of the cyber landscape from the perspective of the realities of the world as it is vice as we would like it to be. International efforts to grapple with the complexities of hostile cyber activities continue to languish in the United Nations.  Whether it be trying to codify  cyber norms of…

  • Tracking Global AI Legislation, Policies and Strategies

    “Tracking, unpacking and governing the complex field of global AI governance law and policy has quickly become a top tier strategic issue for organizations.” The IAPP and OECD provide tracking resources for your organization to leverage into your AI strategy.  


OODAcasts

  • Leading Cyber Change: Allan Friedman on the Revolution of SBOM & Future Cybersecurity Initiatives

    Leading Cyber Change: Allan Friedman on the Revolution of SBOM & Future Cybersecurity Initiatives

    Allan Friedman is a senior strategist at CISA (the Cyber Security and Infrastructure Security Agency) where he coordinates all of their cross-sector activities on the topic of SBOM: The Software Bill of Materials.

  • Joe Sullivan on Managing Complex Security Challenges

    Joe Sullivan on Managing Complex Security Challenges

    Joe Sullivan has been at the forefront of managing security risk in rapidly growing high tech companies over the past 20 years serving as the Chief Security Officer at Facebook from early start-up through the IPO, CSO of Uber and CloudFlare, and as a security leader at eBay/PayPal. Learn what motivates him and some of…

  • Joe Tranquillo on the Revolution in Biological Science
    ,

    Joe Tranquillo on the Revolution in Biological Science

    Joe Tranquillo is a Professor of Biomedical Engineering at Bucknell University and a provost at the school. He is also and author and speaker with a knack for helping make new and at times complex subjects understandable. In this OODAcast we discuss many aspects of the revolution in biological sciences with Joe including topics like:…

  • MITRE Futurist Charles Clancy on our Quantum Enabled Future

    MITRE Futurist Charles Clancy on our Quantum Enabled Future

    Charles Clancy has successfully led technology efforts in government, industry, academia and continues to lead and innovate in his current position as Senior Vice President and GM of MITRE Labs. He is MITRE’s Chief Futurist. His role in technology leadership and his tracking of tech across multiple domains made for an incredibly insightful OODAcast. We…

  • Mark McGrath: John Boyd Is Far More Than The OODA Loop

    Mark McGrath: John Boyd Is Far More Than The OODA Loop

    Mark McGrath has applied the teachings of John Boyd to a career that began in the Marine Corps, included leadership positions in financial services firms and consulting with businesses with a need to learn to thrive in volatile, uncertain, complex and ambiguous (VUCA) environments. He co-founded the consultancy AGLX and serves as its Chief Learning…

  • Serene – The Hacker Pianist Saving Cyberspace

    Serene – The Hacker Pianist Saving Cyberspace

    Serene is a hacker in the truest sense of the word. She’s applied a hacker mindset to learn coding, piano, and blend art and engineering in fascinating ways. You’ll find her collaborating on-stage with Grimes one night and coding censorship resistant technologies the next day. As a self-taught coder she was the first engineer hired…

  • Andy Bochman on Countering Cyber Sabotage

    Andy Bochman on Countering Cyber Sabotage

    Andy Bochman is the Senior Grid Strategist-Defender for Idaho National Laboratory’s National and Homeland Security directorate. In this role, Andy provides strategic guidance on topics at the intersection of grid security and climate resilience to INL leadership as well as senior U.S. and international government and industry leaders. Andy is a frequent speaker, writer, and trainer…

  • Spencer Ante on Creative Capital and Disruptive Innovation

    Spencer Ante on Creative Capital and Disruptive Innovation

    Spencer Ante is the author or “Creative Capital: Georges Doriot and the Birth of Venture Capital”, which was on my Top 10 book list for 2022. In fact, I found Doriot’s story so compelling that a portrait of him hangs on the wall at the Hack Factory start-up studio in Reston, VA. Doriot is a…

  • Bob Zukis and the Digital Directors Network: Helping corporate boards mitigate systemic risk

    Bob Zukis and the Digital Directors Network: Helping corporate boards mitigate systemic risk

    Bob Zukis is a man on a mission to improve the ability of corporate America to succeed in a complex digital world, even when under constant cyber attack. Bob is the CEO and founder of the Digital Directors Network, the global pioneer in helping corporate directors advance their understanding of systemic risk. We consider Bob…

  • Adam Shostack on Cybersecurity and What Every Engineer Should Learn From Star Wars

    Adam Shostack on Cybersecurity and What Every Engineer Should Learn From Star Wars

    Adam Shostack is widely known in the cybersecurity world for his pioneering work on disclosing and discussing computer vulnerabilities (the CVE  (common vulnerabilities and exposures) list). He also helped formalize and train leading approaches to threat modeling and wrote the foundational book on the subject (Threat Modeling: Designing for Security). In this OODAcast we seek…

OODAcons