Background For obvious reasons, it is this section of the recent academic paper "Prediction and Judgment: Why Artificial Intelligence Increases the Importance of Humans in War" that was of keen …
Cybersecurity, Enterprise Intelligence, and Leading Change
We continue our effort to underscore certain patterns and themes found throughout the OODAcast library of close to 100 conversations with leaders and decision-makers, on topics such as leadership, …
Continue Reading about Cybersecurity, Enterprise Intelligence, and Leading Change
A Call for Athletes and The U.S. Cyber Games: Cyber Open 2022 Kick Off Event
Last year, OODA was proud to sponsor the first-ever U.S. Cyber Games. The inaugural US Cyber Games™ was created through the support of the National Initiative for Cybersecurity Education …
Continue Reading about A Call for Athletes and The U.S. Cyber Games: Cyber Open 2022 Kick Off Event
Inaugural U.S. Cyber Team Takes Bronze Medal at the 2022 International Cybersecurity Challenge (ICC)
The first-ever U.S. Cyber Team announced to compete in the inaugural International Cybersecurity Challenge (ICC) was in Athens, Greece earlier this month - and took the bronze medal in the …
OODAcon 2022 and Periods of Economic Downturn as a Climate for Innovation Discussed by the June 2022 OODA Network Member Meeting
To help members optimize opportunities and reduce risk, OODA hosts a monthly video call to discuss items of common interest to our membership. These highly collaborative sessions are always a great …
US Cyber Team Competes at 1st International Cybersecurity Challenge
https://youtu.be/V2ZUH2b5dZY In May, OODA announced our ongoing sponsorship of the US Cyber Games and the start of Season II (with the US Cyber Open Kick-Off Event on June 30, 2022). In the …
Continue Reading about US Cyber Team Competes at 1st International Cybersecurity Challenge
Blockchain-enabled Digital Self-Sovereignty – Patients will be Able to Sell Healthcare Data via Blockchain-based Exchange
While cryptocurrency and blockchain technologies are not official exponential technologies, they are exponential-adjacent. Why? As we shared in our recent post "By Design, The Quantum List Companies …
By Design, The Quantum List Companies are Strategically Structured for Exponential Speed and Scale
In 2015 and 2016, the technology sector was in a full-blown artificial intelligence "Arms Race." At that point, it was anyone's game, and the leading technology companies were in a merger and …
Recovering Ransom Payments: Is This the End of Ransomware?
What’s the best way to stop ransomware? Make it riskier and less lucrative for cyber criminals. Nearly all intruders prefer to collect a ransom in cryptocurrency. But it’s a double-edged sword since …
Continue Reading about Recovering Ransom Payments: Is This the End of Ransomware?
The Ronin DeFi Network Hack and Blockchain Analysis Techniques for Attribution
In early April, we began our research and analysis of crypto and blockchain security initiatives which, in the case of OODA Loop, begins with tracking down the best-in-class research efforts and …