Exponential Disruption and The Cyber Criminal Adoption of the InterPlanetary File System
Organizational Change: Praxis and Intervention
Once a concrete case study or new threat vector (i.e, troubling, novel web3 cybersecurity vulnerabilities at scale) emerges from a larger idea we have been exploring at the level of a technology framework or business strategy – i.e. exponential disruption – what is the best way to make recommendations for organizational change? Or how best do we think about decision intelligence and risk awareness?
We offer the following frameworks.
“Praxis is defined as an accepted practice or custom, or an idea translated into action, or something in reality rather than something in theory. Fasting as a result of your Christian faith and to atone for your sins is an example of praxis. Living the principles of communism instead of just theoretically discussing those principles and strategizing about whether they will work is an example of praxis.” (5)
Questions of Praxis include:
- Is the challenge before the cybersecurity community one of incremental change by way of a new generation of innovation that remains tethered to legacy systems architectures, practices, and customs?
- Conversely, how do we spring into action, communicating new practices or customs to internal and external stakeholders once a new threat vector and cybersecurity vulnerability has been birthed by emerging technology?
- How do we communicate that this specific threat vector is only one example of a persistent, ongoing exponential disruption of cybersecurity at lethal speed, scale, and volume which requires strategic, coordinated action?
- We also continue to explore a question we positioned in our 2021 Cybersecurity Year-End Review: “2021 also marks the year that a lack of innovation and a dearth of new solutions-driven platforms raised concerns that we may be in a “Cyber Winter” in terms of business model generation and value proposition design. What are the novel architectures, design metaphors, and design processes for innovation in cybersecurity moving forward? And will security need to go back to the drawing board in a really transformative way in 2022?”
We continue to formulate our final research conclusions on how these questions have been answered over the course of 2022.
Government Intervention, Market Intervention, and Military Intervention. Like adult content, you know an intervention when you see it.
We position “intervention” here in the manner academia uses the term – which is the strategic positioning of research insights and thought leadership in partnership with the private sector, inside a specific organization and/or an intervention directed at an entire industry sector, which is designed to enact change and/or communicate a strategic vision for restructuring (or market survival), identifying opportunities for advantage and enhancing strategic risk awareness.
For example, this website is a strategic intervention. OODAcon is also a strategic intervention.
Questions of Intervention include:
- How best do you position an intervention within your organization?
- Is an intervention optimized for success by partnering with a third-party organization that provides external validation and subject matter expertise, enhancing the credibility of the intervention?
Further OODA Loop Resources
In recent OODA Loop interviews, OODA Network Members Junaid Islam and Florian Wolf offer practitioners insights on everything from zero trust to the real-world challenges of developing machine learning systems, emerging AI-based Zero Trust cybersecurity, small data, and the challenges of security automation.
It should go without saying that tracking threats are critical to inform your actions. This includes reading our OODA Daily Pulse, which will give you insights into the nature of the threat and risks to business operations.
Explore OODA Research and Analysis
Use OODA Loop to improve your decision-making in any competitive endeavor. Explore OODA Loop
The greatest determinant of your success will be the quality of your decisions. We examine frameworks for understanding and reducing risk while enabling opportunities. Topics include Black Swans, Gray Rhinos, Foresight, Strategy, Strategies, Business Intelligence, and Intelligent Enterprises. Leadership in the modern age is also a key topic in this domain. Explore Decision Intelligence
We track the rapidly changing world of technology with a focus on what leaders need to know to improve decision-making. The future of tech is being created now and we provide insights that enable optimized action based on the future of tech. We provide deep insights into Artificial Intelligence, Machine Learning, Cloud Computing, Quantum Computing, Security Technology, and Space Technology. Explore Disruptive/Exponential Tech
Security and Resiliency
Security and resiliency topics include geopolitical and cyber risk, cyber conflict, cyber diplomacy, cybersecurity, nation-state conflict, non-nation-state conflict, global health, international crime, supply chain, and terrorism. Explore Security and Resiliency
The OODA community includes a broad group of decision-makers, analysts, entrepreneurs, government leaders, and tech creators. Interact with and learn from your peers via online monthly meetings, OODA Salons, the OODAcast, in-person conferences, and an online forum. For the most sensitive discussions interact with executive leaders via a closed Wickr channel. The community also has access to a member-only video library. Explore The OODA Community.