Start your day with intelligence. Get The OODA Daily Pulse.

Home > Example Query Loops


Analysis

  • Russian “Technological Sovereignty”: Just How Crippled is the Russian IT Supply Chain?

    There is nothing like that one data point, needle in the haystack, kernel of research that sits – and sits – and just does not track (in this case, for well over a calendar year.  A post  from March 2021 is just such a piece of intelligence – and we have not reviewed or received…

  • Wednesday, August 9th: Join Us at the Blackhat USA 2023 “Stuck in the 90’s” Party

    Join us at our totally rad 90’s party, hosted by QuintessenceLabs  Hosted by QuintessenceLabs and co-sponsored by OODA LLC and co-the Information Systems Security Association (ISSA)®️️.  Enabled by the incredible team at KATZCY and PlayCyber.

  • Ransomware Attacks in U.S. and Cyberattacks in Pacific Islands are Battlefields in Global Cyber War

    “Once is happenstance. Twice is coincidence. Three times is enemy action.” – James Bond More pattern recognition and sensemaking efforts here – following up our recent spotlight on The City of Dallas, Over a Month After A Ransomware Attack, Still not at Full Functionality and the U.S. Turning its Strategic Focus Towards Cyber Threat Vectors…

  • Cyber Attacks by Non-State Actors Continue Astride in Europe

    In an update to our recent analysis of the continued expansion of cyber incidents by non-state actors in the war in Europe, the following are just a sampling of the most recent major cyber incidents and non-state actor activity (mainly centered around the conflict in Ukraine).

  • Organizational, Educational & Cultural Aspects of Digital Risk Governance

    Boardrooms face seemingly unending governance, disclosure, regulatory and legal challenges related to digital systems risk (see, for example, the latest SEC requirements for board cybersecurity).  This is exacerbated by the rapid adoption of AI; a digital technology that society is just beginning to grapple with and understand. AI is a powerful capability being added to the digital tool arsenal which businesses must employ to compete and win. These tools have evolved…

  • August 1-4, 2023 – USA Hosting the International Cybersecurity Championship & Conference in San Diego, CA

    Connect with top cybersecurity experts from around the world while experiencing the excitement of cybersecurity-oriented esports. Eight teams of cyber athletes ages 18-25 will represent over 65 nations in a final championship. In addition to the 600-700 expected attendees, the games will be live-streamed on Twitch to thousands of fans.

  • Dr. Bilyana Lilly Briefs the July 2023 OODA Network Member Meeting on CyCon (The International Conference on Cyber Conflict)

    OODA hosts a monthly video call to help members optimize opportunities and reduce risk to discuss items of common interest to our membership. To encourage openness of discussion, these sessions take place with Chatham House rules, where participants are free to use the information in the meeting but are asked not to directly quote or…

  • INDUS-X: The Recently Launched India-U.S. Defense Acceleration Ecosystem

    “The U.S. Department of Defense and the Indian Ministry of Defense launched the India-U.S. Defense Acceleration Ecosystem (INDUS-X)…against the backdrop of Prime Minister Modi’s [June 2023] State Visit to the White House, [with India poised to take over China and the world’s most populous nation], and at a time of historic momentum for the relationship…

  • The GAO on the Future of Blockchain in Finance

    We continue our series on the Future of Blockchain with the adrenaline rush that is a U.S. Government Accountability Office (GAO) report on Blockchain in Finance:Legislative and Regulatory Actions Are Needed to Ensure Comprehensive Oversight of Crypto Assets. Joking aside, while GAO reports are in fact some of the drier fare that crosses our desk…

  • Xi’s Long Game in Cyberspace is Not Just About Power

    A Chinese press has recently published Excerpts of Xi Jinping’s Discourse on Cyberspace Superpower, a book on Xi Jinping’s views on making China into an Internet powerhouse, and how such an endeavor is a necessary component to bolstering the country’s industries, economy, and ideological security.  The book is a comprehensive deep dive into Xi’s thinking about cyberspace and…


OODAcasts

  • Ric Prado on Intelligence Operations and a Legendary Career in the CIA

    Ric Prado on Intelligence Operations and a Legendary Career in the CIA

    Ric Prado has been described by CIA leadership as the closest thing to 007 that the United States has ever had. Ric’s life is packed with more adventure and operations than your favorite spy novel series. Coming out of the shadows, this is Ric’s first video interview and covers his career, operational decision-making lessons learned,…

  • Mischel Kwon, Founder and CEO of W@tchTower

    Mischel Kwon, Founder and CEO of W@tchTower

    In this OODAcast we interview Michel Kwon, the founder and CEO of W@tchTower. She is a leader who has proven herself through an ability to success in three different career fields, first as a developer and programmer creating enterprise grade solutions, then as a government executive who would eventually lead the United States Computer Emergency Readiness…

  • Masha Sedova, Co-Founder Elevate Security on Human Risk Management

    Masha Sedova, Co-Founder Elevate Security on Human Risk Management

    Masha Sedova is an award-winning people-security expert, speaker, and entrepreneur focused on helping companies transform employees from a risk into a key element of defense. She has been a part of our OODA Network for years, including speaking at our legacy FedCyber event, where she introduced the behavior-based and gamified cybersecurity training and awareness she…

  • Bob Gourley on Operational Intelligence for Strategic Decision-making

    Bob Gourley on Operational Intelligence for Strategic Decision-making

    In this OODAcast, OODA Network Expert Jen Hoar interviews noted cybersecurity and intelligence professional Bob Gourley, CTO of OODA LLC, diving deep into what makes him tick. Jen asks Bob about his career, including the constants and dynamics in his professional life, starting with a deep background in operational intelligence as a naval intelligence officer.…

  • CEO of Women’s Society of Cyberjutsu and Cybersecurity Leader Mari Galloway

    CEO of Women’s Society of Cyberjutsu and Cybersecurity Leader Mari Galloway

    Like many others we have observed first hand the positive changes in the cybersecurity community being enabled by Mari Galloway. In this OODAcast we look beyond those changes to find out what makes her tick, revealing lessons applicable to professionals in any stage of their career. Mari is the CEO and a founding board member…

  • Paul Kurtz, Iconic Cybersecurity Leader and Founder of TruSTAR

    Paul Kurtz, Iconic Cybersecurity Leader and Founder of TruSTAR

    Paul Kurtz is an internationally recognized expert on cybersecurity and the Co-Founder and Chairman of TruSTAR. In this OODAcast we dive into Paul’s views on the cybersecurity landscape today and learn more about his approach to decision-making. We discuss a new concept he has been shepherding in the community regarding how cyber intelligence can be…

  • Rear Admiral Paul Becker, USN (ret) on leadership in the modern age

    Rear Admiral Paul Becker, USN (ret) on leadership in the modern age

    Rear Admiral Paul Becker, USN (Retired), is an author, speaker and board member with extensive experience in intelligence operations.  During his 30 year career as a naval intelligence officer he lead major operational intelligence efforts, rising to the position of Director of Intelligence (J2) for the Joint Chiefs of Staff. Upon retirement from the Navy…

  • Dr. Melissa Flagg of the Center for Security and Emerging Technology

    Dr. Melissa Flagg of the Center for Security and Emerging Technology

    Dr. Melissa Flagg is a Senior Fellow at the Center for Security and Emerging Technology (CSET) at Georgetown University. Previously she served as the Deputy Assistant Secretary of Defense for Research, responsible for policy and oversight Defense Department science and technology programs including basic research through advanced technology development and the DoD laboratory enterprise. She…

  • Mark Weatherford On Leading Change As a CISO

    Mark Weatherford On Leading Change As a CISO

    Mark Weatherford is an icon in the cybersecurity field. He is widely known as a mission focused leader who builds teams and gets hard things done. His career included success in the US Navy as a cryptologist, leadership and management in a major defense integrator, CISO for two states (Colorado and California), CISO of the…

  • Matt Devost on Hacking Entrepreneurship and Identifying Threats and Opportunities

    Matt Devost on Hacking Entrepreneurship and Identifying Threats and Opportunities

    In this OODAcast, the tables are turned as OODA Network Expert Jen Hoar interviews CEO Matt Devost and they discuss how Matt consistently identified new threats and opportunities by blending eccentric interests into a career as a serial entrepreneur and become an established expert on cybersecurity, counterterrorism, and technology issues.

OODAcons