Start your day with intelligence. Get The OODA Daily Pulse.

Home > Example Query Loops

Category: Business

Exponential innovation is causing exponential disruption

Author: OODA Analyst

Exponential innovation is causing exponential disruption


Analysis

  • GPT-3, Neural Language Models and The Risks of Radicalization

    In a report released in 2020 and made possible by the OpenAI API Academic Access Program, The Middlebury Institute of International Studies – Center on Terrorism, Extremism, and Counterterrorism (CTEC) evaluated the revolutionary improvements of GPT-3 for the risk of weaponization by extremists who may attempt to use GPT-3 or hypothetical unregulated models to amplify…

  • Brian Jenkins on Domestic Political Extremism at the November 2022 OODA Network Member Meeting

    OODA hosts a monthly video call to help members optimize opportunities and reduce risk to discuss items of common interest to our membership. These highly collaborative sessions are always a great way for our members to meet and interact with each other while talking about topics like global risks, emerging technologies, cybersecurity, and current or…

  • Top 10 Security, Technology, and Business Books of 2022

    Welcome to the 2022 edition of my top 10 books of the year list. This year, I’ve decided to split the fiction books into an additional category and given you two bonus books for your consideration written by close friends of mine.  With the launch of the Hack Factory this year, I’ve been very focused…

  • The Second Global Ransomware Meeting Much of the Same Thing

    The United States hosted a group of 37 nations and 13 global companies to discuss the problem of ransomware, as well as other cybercrime.  The meeting was a follow up to last year’s Counter-Ransomware Initiative (CRI), an informal gathering where nations reaffirmed their commitment to collaborating on the escalation of ransomware operations and voice common…

  • Strategic Plan for 2023-2025 Announced at 4th Meeting of the CISA Cybersecurity Advisory Committee

    The fourth meeting of the Cybersecurity and Infrastructure Security Agency (CISA) Cybersecurity Advisory Committee (CSAC) was held in September 2022. Opening remarks were addressed to the committee by Ms. Megan Tsuyi, CISA CSAC Designated Federal Officer, The Honorable Jen Easterly, Director, CISA, Mr. Tom Fanning, CSAC Chair, and Mr. Ron Green, CSAC Vice Chair. -…

  • Another Seminal Call to Action: Strengthening Innovation and Protecting the U.S. Technological Advantage

    Recent announcements by Razor’s Edge Ventures, America’s Frontier Fund, and the Quad Investor Network signal that the venture capital community is focusing its efforts on national security investment and American competitiveness – which has been formatively dubbed the “defense-related technologies” or “defense capabilities” sector. Others are calling it “Hacking for Defense”. On one level, the…

  • Breaking the Building Blocks of Hate: A Case Study of Minecraft Servers

    In yet another example of a successful public/private policy research collaboration and in a continuation of the topic discussed by Brian Jenkins at the OODA Network November Monthly Meeting – domestic political extremism – we turn to a report released in July of this year:  Breaking the Building Blocks of Hate: A Case Study of…

  • China Publishes Its Vision for Internet Harmony

    Recently, China published a white paper entitled “Jointly Build a Community with a Shared Future in Cyberspace”presenting its vision of creating an international community with a shared future in cyberspace. The document highlighted the successes of China’s Internet development and government practices over the past several years, and focused on key issues such as Internet…

  • CISA Releases Voluntary Cross-Sector Cybersecurity Performance Goals

    In July 2021, President Biden signed a National Security Memorandum on Improving Cybersecurity for Critical Infrastructure Control Systems. This memorandum required CISA, in coordination with the National Institute of Standards and Technology (NIST) and the interagency community, to develop baseline cybersecurity performance goals that are consistent across all critical infrastructure sectors. These voluntary cross-sector Cybersecurity Performance Goals…

  • The Rate of Learning in Threat Detection

    Historically, threat detection (e.g., rule-based intrusion detection, anti-virus systems, and threat intelligence feeds) has been reactive and involves flagging digital requests containing known signatures. These signatures are formalized post hoc, emanating from a compromise that has already happened and was then shared with others. Organizations have relied heavily on these tools—to their disadvantage. The figures…


OODAcasts

  • Amr Awadallah On The Biggest Challenges And Opportunities in Enterprise IT Today

    Amr Awadallah On The Biggest Challenges And Opportunities in Enterprise IT Today

    In this OODAcast we examine lessons learned as a startup founder and insights into the future of technology with Amr Awadallah. Amr Awadallah is widely known as a founder of Cloudera. Prior to that he was working on extreme scale data solutions for Yahoo. Most recently he was VP for Developer Relations at Google Cloud.…

  • Sir David Omand on Leveraging How Spies Think In Our Business and Personal Lives
    ,

    Sir David Omand on Leveraging How Spies Think In Our Business and Personal Lives

    Sir David Omand is one of the most respected intelligence professionals in the world and author of the book How Spies Think: Ten lessons in intelligence. His career in intelligence began shortly after graduating from Cambridge in 1969 when he joined the UK’s GCHQ (Government Communications Headquarters). He would later become the director of GCHQ.…

  • Jessica Gulick: An accomplished cybersecurity practitioner turned CEO on future focused leadership

    Jessica Gulick: An accomplished cybersecurity practitioner turned CEO on future focused leadership

    Jessica Gulick is widely known for her leadership of the successful growth strategy and marketing firm Katzcy. She is also the Commissioner of the US Cyber Games, a multi-phased cybersecurity program recruiting a US Cyber Team for international competition. She is also the founder of PlayCyber, a new business line promoting cyber games and tournaments.…

  • Lance Mortlock On Scenario Planning to Drive Strategic Decisions

    Lance Mortlock On Scenario Planning to Drive Strategic Decisions

    Lance Mortlock is a Senior EY Strategy Partner. He is author of the book Disaster Proof: Scenario Planning for Post Pandemic Future, which explores ways scenario planning can help organizations be more resilient. This is a must-read book for anyone in the Risk Management field. It provides practical advice for strategists, planners, executives and board…

  • Jer Thorp on Living in Data and Creating Better Futures

    Jer Thorp on Living in Data and Creating Better Futures

    Each year, there are one or two books that deeply resonate with me and become sticky in that I’m thinking about the book often, bringing it up in conversations, and sending out unsolicited recommendations for executives and researchers in my network to check it out. Jer Thorp’s “Living in Data: A Citizen’s Guide to a…

  • Tony Tether On Technology Leadership and Lessons Learned From DARPA

    Tony Tether On Technology Leadership and Lessons Learned From DARPA

    Dr. Tony Tether was the director of the Defense Advanced Research Projects Agency, DARPA, from 2001 till his retirement in 2009. In this OODAcast we examine some of Dr. Tether’s formative experiences, including a very unique job he held while awaiting entry to Stanford. He was a door to door salesman and while doing that…

  • Cofer Black on Leadership Lessons Learned and Speaking Truth to Power

    Cofer Black on Leadership Lessons Learned and Speaking Truth to Power

    In this OODAcast, we talk with renowned counter-terrorism expert and career clandestine services professional Cofer Black. Cofer is best known for having been the Director of the CIA’s Counterterrorism Center on 9/11 and having been part of the intelligence community warning about the near-term threat of terrorism in the United States prior to the attacks.…

  • Gaurav Banga On Mitigating Cyber Threats Through Deep Insight Into Things That Matter Most

    Gaurav Banga On Mitigating Cyber Threats Through Deep Insight Into Things That Matter Most

    Gaurav Banga is the Founder and CEO of Balbix, and serves on the boards of several companies. Before Balbix, Gaurav was the Co-founder & CEO of Bromium and led the company from inception for over 5 years. Earlier in his career, he served in various executive roles at Phoenix Technologies and Intellisync Corporation, and was…

  • ,

    Kim Zetter on Understanding the Realities of Cyberthreats and How Code Has a Story to Tell

    This week’s OODAcast is with Kim Zetter, an incredibly well respected journalist who has been covering cybersecurity related issues for two decades.  Matt Devost talks with Kim about a wide variety of cyber-related issues including a deep dive into Stuxnet and the implications for today’s security environment. Kim also shares details as to how she…

  • Junaid Islam on Zero Trust Architecture

    Junaid Islam on Zero Trust Architecture

    In this OODAcast we provide insights into Zero Trust architectures from an experienced practitioner, Junaid Islam. Junaid is a senior partner at OODA. He has over 30 years of experience in secure communications and the design and operations of highly functional enterprise architectures. He founded Bivio Networks, maker of the first gigabyte speed general purpose…

OODAcons