Start your day with intelligence. Get The OODA Daily Pulse.

Home > Example Query Loops


Analysis

  • Brian Jenkins on Domestic Political Extremism at the November 2022 OODA Network Member Meeting

    OODA hosts a monthly video call to help members optimize opportunities and reduce risk to discuss items of common interest to our membership. These highly collaborative sessions are always a great way for our members to meet and interact with each other while talking about topics like global risks, emerging technologies, cybersecurity, and current or…

  • Top 10 Security, Technology, and Business Books of 2022

    Welcome to the 2022 edition of my top 10 books of the year list. This year, I’ve decided to split the fiction books into an additional category and given you two bonus books for your consideration written by close friends of mine.  With the launch of the Hack Factory this year, I’ve been very focused…

  • The Second Global Ransomware Meeting Much of the Same Thing

    The United States hosted a group of 37 nations and 13 global companies to discuss the problem of ransomware, as well as other cybercrime.  The meeting was a follow up to last year’s Counter-Ransomware Initiative (CRI), an informal gathering where nations reaffirmed their commitment to collaborating on the escalation of ransomware operations and voice common…

  • Strategic Plan for 2023-2025 Announced at 4th Meeting of the CISA Cybersecurity Advisory Committee

    The fourth meeting of the Cybersecurity and Infrastructure Security Agency (CISA) Cybersecurity Advisory Committee (CSAC) was held in September 2022. Opening remarks were addressed to the committee by Ms. Megan Tsuyi, CISA CSAC Designated Federal Officer, The Honorable Jen Easterly, Director, CISA, Mr. Tom Fanning, CSAC Chair, and Mr. Ron Green, CSAC Vice Chair. -…

  • Another Seminal Call to Action: Strengthening Innovation and Protecting the U.S. Technological Advantage

    Recent announcements by Razor’s Edge Ventures, America’s Frontier Fund, and the Quad Investor Network signal that the venture capital community is focusing its efforts on national security investment and American competitiveness – which has been formatively dubbed the “defense-related technologies” or “defense capabilities” sector. Others are calling it “Hacking for Defense”. On one level, the…

  • Breaking the Building Blocks of Hate: A Case Study of Minecraft Servers

    In yet another example of a successful public/private policy research collaboration and in a continuation of the topic discussed by Brian Jenkins at the OODA Network November Monthly Meeting – domestic political extremism – we turn to a report released in July of this year:  Breaking the Building Blocks of Hate: A Case Study of…

  • China Publishes Its Vision for Internet Harmony

    Recently, China published a white paper entitled “Jointly Build a Community with a Shared Future in Cyberspace”presenting its vision of creating an international community with a shared future in cyberspace. The document highlighted the successes of China’s Internet development and government practices over the past several years, and focused on key issues such as Internet…

  • CISA Releases Voluntary Cross-Sector Cybersecurity Performance Goals

    In July 2021, President Biden signed a National Security Memorandum on Improving Cybersecurity for Critical Infrastructure Control Systems. This memorandum required CISA, in coordination with the National Institute of Standards and Technology (NIST) and the interagency community, to develop baseline cybersecurity performance goals that are consistent across all critical infrastructure sectors. These voluntary cross-sector Cybersecurity Performance Goals…

  • The Rate of Learning in Threat Detection

    Historically, threat detection (e.g., rule-based intrusion detection, anti-virus systems, and threat intelligence feeds) has been reactive and involves flagging digital requests containing known signatures. These signatures are formalized post hoc, emanating from a compromise that has already happened and was then shared with others. Organizations have relied heavily on these tools—to their disadvantage. The figures…

  • Speculative Design: Welcome to Kaspersky’s Earth 2050

    As the 27th Conference of the Parties to the United Nations Framework Convention on Climate Change (COP27) meets in Sharm el-Sheikh, Egypt, we dedicate this installment of the Speculative Design Series to the future of the planet. Take a step into the future of the planet @ Kapersky’s Earth 2050.


OODAcasts

  • Jim Miller on Managing Policy in an Age of Constant Disruption and Dynamic Threats
    ,

    Jim Miller on Managing Policy in an Age of Constant Disruption and Dynamic Threats

    Jim Miller has worked for four decades on a combination of private and public sector initiatives focused on addressing a wide variety of national security threats.  He has held numerous positions within the Department of Defense including serving as Under Secretary of Defense for Policy and has been awarded the DoD’s highest civilian award four…

  • Chet Richards on John Boyd and applying OODA principles to the business world

    Chet Richards on John Boyd and applying OODA principles to the business world

    Chet Richards was a close associate of the late US Air Force Colonel John Boyd. He was there as the concept of the OODA Loop was being developed and constructed the first graphics of the OODA Loop from sketches Boyd drew. Chet is the author of the widely read business book “Certain to Win” which…

  • Courtney Bowman, Privacy and Civil Liberties Engineer, Palantir Technologies

    Courtney Bowman, Privacy and Civil Liberties Engineer, Palantir Technologies

    Courtney Bowman leads Palantir’s Privacy and Civil Liberties Engineering Team. In this capacity he works extensively with local, state and international governments and philanthropic partners to develop technology-driven solutions to information sharing needs that respect applicable privacy, security and data integrity requirements. He does so in a way that is informed by experience and well…

  • Kevin DeSanto On Due Diligence and M&A Transactions and Trust Based Networking

    Kevin DeSanto On Due Diligence and M&A Transactions and Trust Based Networking

    Kevin DeSanto is an investment banker delivering advice and execution assistance to high growth businesses preparing for M&A and financial transactions. His company, KippsDeSanto, has developed a reputation for trusted execution support for companies in government contracting, aerospace, defense and cybersecurity. He leads teams that advise senior management, boards of directors and shareholders. The art…

  • Bradley Rotter On The Future Of Work, CryptoCurrencies, Quantum Computing and Leadership

    Bradley Rotter On The Future Of Work, CryptoCurrencies, Quantum Computing and Leadership

    Bradley Rotter is a visionary investor who has pioneered investments in many new alternative investments classes including having been an early backer of hedge funds in 1982 while speculating on the Chicago Mercantile Exchange. He was also an early investor in Bitcoin and other cryptocurrency ecosystems and at a dinner with OODA CEO Matt Devost…

  • Andy Lustig On Legal and Due Diligence Support In The High Tech Era

    Andy Lustig On Legal and Due Diligence Support In The High Tech Era

    Andrew (Andy) Lustig is a partner at the high tech law firm Cooley, where he focuses on private equity investments, mergers and acquisitions and the general corporate representation of high-growth technology companies in both the commercial and government marketplace. His practice includes a wide range of industry sectors including information technology, national security, cybersecurity, data…

  • Paul Pagnato, CEO and Founder at PagnatoKarp  and Author of The Transparency Wave
    ,

    Paul Pagnato, CEO and Founder at PagnatoKarp and Author of The Transparency Wave

    Paul Pagnato migrated from a career as a scientist looking for life in outer space to one of the top financial advisors in the U.S. with a keen eye for tracking innovation, exponential change, and other emerging global issues. He is also the author of the recent book, The Transparency Wave, which highlights the essential…

  • Alsop-Louie Partner and Famed Tech Executive Bill Crowell on Technology Due Diligence
    ,

    Alsop-Louie Partner and Famed Tech Executive Bill Crowell on Technology Due Diligence

    Bill Crowell is a senior executive with extensive experience in government (rose to the level of Deputy Director of the National Security Agency) and in industry. He has been a CEO of leading companies like Cylink, taking them through growth to acquisition. He has been a director of multiple public and private companies with a…

  • Brad Meltzer, Bestselling Novelist With Insights To Inform Your Business Strategy

    Brad Meltzer, Bestselling Novelist With Insights To Inform Your Business Strategy

    Brad Meltzer is the #1 New York Times bestselling author of The Cupler Ring Trilogy (The Inner Circle, The Fifth Assassin, The President’s Shadow), The Escape Artist, The Book of Lies and many other thrillers loved by millions for their realism and well researched fact based themes and drama filled plots. He is also widely…

  • OODA Expert John Robb on Global Guerrillas and Frameworks to Drive Decision Making

    OODA Expert John Robb on Global Guerrillas and Frameworks to Drive Decision Making

    There is hardly a person more suited to speak with the OODA team on OODA Loops that former Air Force pilot John Robb. John has worked successfully in a variety of domains to include the special operations community, as an industry analyst, successful start-up founder, and national security expert. John Robb has distinguished himself with…

OODAcons