Start your day with intelligence. Get The OODA Daily Pulse.

Home > Example Query Loops


Analysis

  • Securing Space: The Next Frontier for Cybersecurity Education and Workforce Development

    As the United States moves to establish space as an operational domain and seeks to support a space economy, there are corresponding challenges to addressing cybersecurity vulnerabilities and threats to the sector. While many existing cybersecurity principles and practices remain applicable to space as an emerging commercial critical infrastructure sector, there are many nuances and…

  • Netherlands-based ASML Holding Remains the Central Player in the Global Chip Supply Chain

    A very specific insight from our OODA Network Stratigame – Scenario Planning for Global Computer Chip Supply Chain Disruption – was the role the foreign production of Specialized Manufacturing Equipment (SME) built for the manufacturing of computer chips would play in the health of the computer chip supply chain for the U.S.  Netherlands -based ASML Holding…

  • The Continued Expansion of Cyber Incidents by Non-State Actors in the War in Europe

    Last week, a new hacking group took responsibility for the taking down of a Russian telecom satellite, which we interpreted as an expansion of the tactical activity (brought on by the instability in Russia) by Advanced Persistent Threats (APTs) and non-state cyber actors on all sides of the multi-sided hybrid conflict in Europe.  The following…

  • Forget a Cyber Force, CYBERCOM is Doing Just Fine

    According to recent reporting, the Senate Armed Services Committee has requested a third-party assessment on the potential establishment of an independent military Cyber Force for the Department of Defense (DoD).  The six-month assessment would address such areas as the number of commands across the DoD cyber enterprise; the command-and-control relationships of each of these commands; budget and…

  • The Future of Copyright Law, Fair Use and Generative AI

    While the societal and business impact of AI continues to consume the headlines, the reality is the future of AI, to a large extent, will be formally litigated in the legal system. Following is an overview of the recently filed lawsuits with claims related to AI – followed by further resources and recent analyses of…

  • Growing Risk to International Corporations: PRC Laws Expand CCP Oversight and Surveillance Requirements

    This update captures the latest on PRC laws with a special focus on factors relevant to business decision-makers. The content here is tailored to what we recommend every corporate director/board member of international corporations know about these new surveillance laws. These laws post a risk to any company doing business in China, not only including…

  • For the First Time, DEFCON 2023 “Hack-A-Sat” Includes a Real-time Cubesat Orbiting Space

    At DEFCON 2023, “the U.S. military will stage a contest in which competing teams of white-hat hackers will, for the first time ever, try to penetrate and take over computer systems on a satellite actually in orbit.  It took four years, but “this year, we are in space for real,” said Steve Colenzo, Technology Transfer…

  • The OODA Network on the IC, OSINT, the ODNI and Commercially Available Information (CAI)

    This is an extension of the initial post from the June 2023 OODA Network Member meeting, with a discussion from the meeting of open-source Intelligence and commercially available Information (CAI).  

  • New Hacking Group Takes Down Russian Telecom Satellite in Support of Prigozhin’s Wagner Group

    Last weekend, the primary risk awareness variable we encouraged our readership to track based on the recent events in Russia was the following: “The information threat vectors and cyber attack surface have been expanded:  Be on the lookout for how recent events have ginned up the tactical and strategic activity of Advanced Persistent Threats (APTs)…

  • CISO receives Wells Notice From The SEC: What corporate directors should know and do

    SolarWinds, the enterprise technology company made famous after suffering a nation state directed cyber attack in 2020, has been served notice by the SEC that further action is coming. Not only did they receive their own Wells Notice in October, but now two individuals, their CFO and CISO, have as well. This is the first…


OODAcasts

  • Expert Practitioner of Analysis Carmen Medina on Mental Models and Cognitive Bias

    Expert Practitioner of Analysis Carmen Medina on Mental Models and Cognitive Bias

    Carmen Medina served 32 years in senior positions at the Central Intelligence Agency, most of which focused on one of the hardest tasks in the community, that of analysis. Carmen rose to lead the strategic assessments group for the agency, then was deputy director of intelligence, the most senior leadership position for analysis at the…

  • Lou Manousos, CEO of RiskIQ, On Reducing Adversary Attack Paths

    Lou Manousos, CEO of RiskIQ, On Reducing Adversary Attack Paths

    Elias (Lou) Manousos is a recognized expert in Internet security and fraud prevention. He has been developing and delivering enterprise protection technologies for more than 15 years. As CEO of RiskIQ, he has spearheaded a new approach that helps Internet, financial services, healthcare, media and consumer packaged goods companies protect their brands from online fraud.…

  • Operational Cybersecurity Leader Cameron Over

    Operational Cybersecurity Leader Cameron Over

    Cameron Over leads the Cyber & Privacy service line at CrossCountry Consulting. Cameron has extensive past performance in cybersecurity, including experience advising organizations with transforming their cybersecurity and privacy programs. Cameron has been in the field of information security since the late 90’s. From mid-high school, she was exposed to early network discovery techniques while…

  • Cybersecurity Icon Phil Reitinger, CEO of the Global Cyber Alliance

    Cybersecurity Icon Phil Reitinger, CEO of the Global Cyber Alliance

    Phil Reitinger has been been a pioneer in cutting edge concepts for reducing risks in cyberspace for years. He was a special assistant US Attorney in the late 1990’s, a time when high end nation state attacks were on the rise and the application of US law to help counter threats was in a nascent…

  • Serial Entrepreneur Henry Harrison, CTO of Garrison, On Disrupting Adversary Attack Paths

    Serial Entrepreneur Henry Harrison, CTO of Garrison, On Disrupting Adversary Attack Paths

    In this episode of the OODAcast, Bob discusses the creative process and technology management approaches of Henry Harrison, CTO of Garrison Computing. Henry is a seasoned technology industry executive and serial entrepreneur who has spent the last ten years focused on cyber security both as an independent consultant and as Technical Director for Cyber Security at…

  • Quantum Security Practitioner Jane Melia of QuintessenceLabs

    Quantum Security Practitioner Jane Melia of QuintessenceLabs

    In this OODAcast we dive deep into topics of Quantum Computing, Quantum Security and best practices for ensuring your data remains safe even after quantum computers can break current asymmetric encryption methods. Our guest, Dr. Jane Melia of QuintessenceLabs, is a practitioner who has spent years helping create and bring to market advanced enterprise technologies.…

  • Former CIA CTO Bob Flores on Accelerating Technology Disruption

    Former CIA CTO Bob Flores on Accelerating Technology Disruption

    OODA CTO Bob Gourley was joined by former CTO of the CIA Bob Flores in a discussion on the state of enterprise technology, resulting in this next in our series designed to provide actionable insights to leaders in business and government. Bob is a member of the OODA Network and was one of the scheduled…

  • Tony Cole On Deception In Cyber Operations

    Tony Cole On Deception In Cyber Operations

    OODA CTO Bob Gourley was joined by Tony Cole of Attivo Networks in an interactive discussion on the state of cybersecurity, with a focus on how deception technologies can be leveraged by organizations of all sizes to mitigate risks. Tony is an icon in the cybersecurity community. He is known both as a practitioner and…

  • Lewis Shepherd on Government Mission Needs

    Lewis Shepherd on Government Mission Needs

    In this second of a two part OODAcast, OODA CTO Bob Gourley was joined by Lewis Shepherd, seasoned federal technology executive and a senior director of technology strategy at VMware for an interactive discussion on the actionable lessons we should all be learning from the current crisis but also how the events of today are…

  • David Bray On Today’s Global Risk Environment

    David Bray On Today’s Global Risk Environment

    This is part two of our series with Dr. David Bray of the Atlantic Council’s Geotech Center. This second of two parts covers questions businesses should be asking about today’s global risk environment and approach to knowing what comes next. The session is full of important advice on how to survive and thrive in and…

OODAcons