Start your day with intelligence. Get The OODA Daily Pulse.

Home > Example Query Loops


Analysis

  • The Second Global Ransomware Meeting Much of the Same Thing

    The United States hosted a group of 37 nations and 13 global companies to discuss the problem of ransomware, as well as other cybercrime.  The meeting was a follow up to last year’s Counter-Ransomware Initiative (CRI), an informal gathering where nations reaffirmed their commitment to collaborating on the escalation of ransomware operations and voice common…

  • Strategic Plan for 2023-2025 Announced at 4th Meeting of the CISA Cybersecurity Advisory Committee

    The fourth meeting of the Cybersecurity and Infrastructure Security Agency (CISA) Cybersecurity Advisory Committee (CSAC) was held in September 2022. Opening remarks were addressed to the committee by Ms. Megan Tsuyi, CISA CSAC Designated Federal Officer, The Honorable Jen Easterly, Director, CISA, Mr. Tom Fanning, CSAC Chair, and Mr. Ron Green, CSAC Vice Chair. -…

  • Another Seminal Call to Action: Strengthening Innovation and Protecting the U.S. Technological Advantage

    Recent announcements by Razor’s Edge Ventures, America’s Frontier Fund, and the Quad Investor Network signal that the venture capital community is focusing its efforts on national security investment and American competitiveness – which has been formatively dubbed the “defense-related technologies” or “defense capabilities” sector. Others are calling it “Hacking for Defense”. On one level, the…

  • Breaking the Building Blocks of Hate: A Case Study of Minecraft Servers

    In yet another example of a successful public/private policy research collaboration and in a continuation of the topic discussed by Brian Jenkins at the OODA Network November Monthly Meeting – domestic political extremism – we turn to a report released in July of this year:  Breaking the Building Blocks of Hate: A Case Study of…

  • China Publishes Its Vision for Internet Harmony

    Recently, China published a white paper entitled “Jointly Build a Community with a Shared Future in Cyberspace”presenting its vision of creating an international community with a shared future in cyberspace. The document highlighted the successes of China’s Internet development and government practices over the past several years, and focused on key issues such as Internet…

  • CISA Releases Voluntary Cross-Sector Cybersecurity Performance Goals

    In July 2021, President Biden signed a National Security Memorandum on Improving Cybersecurity for Critical Infrastructure Control Systems. This memorandum required CISA, in coordination with the National Institute of Standards and Technology (NIST) and the interagency community, to develop baseline cybersecurity performance goals that are consistent across all critical infrastructure sectors. These voluntary cross-sector Cybersecurity Performance Goals…

  • The Rate of Learning in Threat Detection

    Historically, threat detection (e.g., rule-based intrusion detection, anti-virus systems, and threat intelligence feeds) has been reactive and involves flagging digital requests containing known signatures. These signatures are formalized post hoc, emanating from a compromise that has already happened and was then shared with others. Organizations have relied heavily on these tools—to their disadvantage. The figures…

  • Speculative Design: Welcome to Kaspersky’s Earth 2050

    As the 27th Conference of the Parties to the United Nations Framework Convention on Climate Change (COP27) meets in Sharm el-Sheikh, Egypt, we dedicate this installment of the Speculative Design Series to the future of the planet. Take a step into the future of the planet @ Kapersky’s Earth 2050.

  • Exponential Disruption and The Cyber Criminal Adoption of the InterPlanetary File System

    The InterPlanetary File System (IPFS) is an emerging Web3 technology that is currently seeing widespread abuse by threat actors. Cisco Talos has observed multiple ongoing campaigns that leverage the IPFS network to host their malware payloads and phishing kit infrastructure while facilitating other attacks. IPFS is often used for legitimate purposes, which makes it more…

  • November OODA Network Member Meeting Features Brian Michael Jenkins In A Discussion Of A Grave Threat to Democracy

    Brian Michael Jenkins is a long term OODA Network member and friend to the community. He is a researcher, thinker and writer known for producing books which have broad impact on decision-makers in government and industry. Brian was a Green Beret who initiated one of the first terrorism research programs in the nation.  We will…


OODAcasts

  • Operational Cybersecurity Leader Cameron Over

    Operational Cybersecurity Leader Cameron Over

    Cameron Over leads the Cyber & Privacy service line at CrossCountry Consulting. Cameron has extensive past performance in cybersecurity, including experience advising organizations with transforming their cybersecurity and privacy programs. Cameron has been in the field of information security since the late 90’s. From mid-high school, she was exposed to early network discovery techniques while…

  • Cybersecurity Icon Phil Reitinger, CEO of the Global Cyber Alliance

    Cybersecurity Icon Phil Reitinger, CEO of the Global Cyber Alliance

    Phil Reitinger has been been a pioneer in cutting edge concepts for reducing risks in cyberspace for years. He was a special assistant US Attorney in the late 1990’s, a time when high end nation state attacks were on the rise and the application of US law to help counter threats was in a nascent…

  • Serial Entrepreneur Henry Harrison, CTO of Garrison, On Disrupting Adversary Attack Paths

    Serial Entrepreneur Henry Harrison, CTO of Garrison, On Disrupting Adversary Attack Paths

    In this episode of the OODAcast, Bob discusses the creative process and technology management approaches of Henry Harrison, CTO of Garrison Computing. Henry is a seasoned technology industry executive and serial entrepreneur who has spent the last ten years focused on cyber security both as an independent consultant and as Technical Director for Cyber Security at…

  • Quantum Security Practitioner Jane Melia of QuintessenceLabs

    Quantum Security Practitioner Jane Melia of QuintessenceLabs

    In this OODAcast we dive deep into topics of Quantum Computing, Quantum Security and best practices for ensuring your data remains safe even after quantum computers can break current asymmetric encryption methods. Our guest, Dr. Jane Melia of QuintessenceLabs, is a practitioner who has spent years helping create and bring to market advanced enterprise technologies.…

  • Former CIA CTO Bob Flores on Accelerating Technology Disruption

    Former CIA CTO Bob Flores on Accelerating Technology Disruption

    OODA CTO Bob Gourley was joined by former CTO of the CIA Bob Flores in a discussion on the state of enterprise technology, resulting in this next in our series designed to provide actionable insights to leaders in business and government. Bob is a member of the OODA Network and was one of the scheduled…

  • Tony Cole On Deception In Cyber Operations

    Tony Cole On Deception In Cyber Operations

    OODA CTO Bob Gourley was joined by Tony Cole of Attivo Networks in an interactive discussion on the state of cybersecurity, with a focus on how deception technologies can be leveraged by organizations of all sizes to mitigate risks. Tony is an icon in the cybersecurity community. He is known both as a practitioner and…

  • Lewis Shepherd on Government Mission Needs

    Lewis Shepherd on Government Mission Needs

    In this second of a two part OODAcast, OODA CTO Bob Gourley was joined by Lewis Shepherd, seasoned federal technology executive and a senior director of technology strategy at VMware for an interactive discussion on the actionable lessons we should all be learning from the current crisis but also how the events of today are…

  • David Bray On Today’s Global Risk Environment

    David Bray On Today’s Global Risk Environment

    This is part two of our series with Dr. David Bray of the Atlantic Council’s Geotech Center. This second of two parts covers questions businesses should be asking about today’s global risk environment and approach to knowing what comes next. The session is full of important advice on how to survive and thrive in and…

  • Dan Gerstein of RAND Corporation on The Story of Technology
    ,

    Dan Gerstein of RAND Corporation on The Story of Technology

    OODA CTO Bob Gourley is joined by technologist and national security expert Dan Gerstein from Rand Corporation.  Dan is also the author of the recently released book entitled “The Story of Technology”.

OODAcons