The COVID-19 market disruption presents an attractive opportunity for Russia to have a disproportionate impact on U.S. economic strength by engaging in policies that amply existing conditions to further drive panic and algorithmic disfunction.
I don’t consider myself a futurist, but thinking about the future has been an essential component of my career and supports a broad range of strategic thinking in the domains of cyber and geopolitical risk, threat intelligence, and business planning. I’ve taken to calling these future brainstorming mental models “living in the future” and the approach has been adapted into our HACKthink methodology as well to help organizations derive the essential actions needed to arrive at a future outcome.
The focus for our conference this year is “Future Proof”, so I thought it would be interesting to take a retrospective look at a blog post I wrote over 10 years ago called “We all live in the future now” to see how well the analysis stood the test of time.
The top stories on OODA Loop provide good insight into what issues will be top of mind for executives and experts going into 2020. Here are the 20 most popular posts of the year.
What does it take to be a highly effective CISO? Over the past 25 years, I’ve consulted for hundreds of executives on cybersecurity issues including direct support to dozens of CISOs working to effectively manage cyber risk in a wide variety of organizations. With this post, I’ve attempted to capture some of the best practices from the most effective CISOs I know. In future articles, we’ll look at each of the 10 habits in greater detail, including direct input from the CISO community.
OODA CEO Matt Devost provides his top 10 security, technology, and business books for 2019. Matt reads over 100 books per year and this top 10 compilation is typically one of our most popular posts of the year. A trusted curation of essential books that can inform your decision loop and enable intelligent actions.
OODA is pleased to announce that our Future Proof conference will be held on March 19, 2020 in Tysons Corner, Virginia.
The Future Proof conference brings together the hackers, thinkers, strategists, disruptors, leaders, technologists, and creators with one foot in the future to discuss the most pressing issues of the day and provide insight into the ways technology is evolving. Future Proof is not just about understanding the future, but developing the resiliency to thrive and survive in an age of exponential disruption.
Managing the nexus between physical and cyber security is possible with a deliberate mindset and full cooperation and integration between the two teams. Physical security practitioners should view cyber defense experts as a vital component of their risk management strategy.
In the cyber defense community, we talk about a wide-range of risk mitigating technologies, strategies, and activities. We talk about attacker deterrence and increasing costs for the attacker. We invest in endpoint agents, threat intelligence, DLM, and other mitigating technologies on a daily basis.
Here’s why one of the most compelling emerging use cases for increasing attacker costs is through the use of deception.
Edward Snowden’s new book is out next Tuesday, but OODA Loop got an advance copy. In the book, Snowden identifies two major catalysts that not only pushed him over the edge, but also informed his strategy for how he leaked the highly classified material. One of them was a complete surprise.
An FBI bulletin provides an overview and detailed recommendations on how cyberattackers are targeting audio/visual systems to compromise corporate networks along with recommendations on how to prevent such attacks.