OODA CEO Matt Devost provides his top 10 security, technology, and business books for 2019. Matt reads over 100 books per year and this top 10 compilation is typically one of our most popular posts of the year. A trusted curation of essential books that can inform your decision loop and enable intelligent actions.
OODA is pleased to announce that our Future Proof conference will be held on March 19, 2020 in Tysons Corner, Virginia.
The Future Proof conference brings together the hackers, thinkers, strategists, disruptors, leaders, technologists, and creators with one foot in the future to discuss the most pressing issues of the day and provide insight into the ways technology is evolving. Future Proof is not just about understanding the future, but developing the resiliency to thrive and survive in an age of exponential disruption.
Managing the nexus between physical and cyber security is possible with a deliberate mindset and full cooperation and integration between the two teams. Physical security practitioners should view cyber defense experts as a vital component of their risk management strategy.
In the cyber defense community, we talk about a wide-range of risk mitigating technologies, strategies, and activities. We talk about attacker deterrence and increasing costs for the attacker. We invest in endpoint agents, threat intelligence, DLM, and other mitigating technologies on a daily basis.
Here’s why one of the most compelling emerging use cases for increasing attacker costs is through the use of deception.
Edward Snowden’s new book is out next Tuesday, but OODA Loop got an advance copy. In the book, Snowden identifies two major catalysts that not only pushed him over the edge, but also informed his strategy for how he leaked the highly classified material. One of them was a complete surprise.
An FBI bulletin provides an overview and detailed recommendations on how cyberattackers are targeting audio/visual systems to compromise corporate networks along with recommendations on how to prevent such attacks.
The newly formed Cybersecurity and Infrastructure Security Agency (CISA)has released a strategic intent document outlining the agencies role in protecting U.S. critical infrastructure and cyberspace. It is important for OODA Network Members to track the emergent roles and responsibilities of this agency as it will be a critical component of cyber and infrastructure security moving forward.
There are literally hundreds of cybersecurity conferences hosted around the world each year and as a result it can be difficult to determine which conferences provided the highest value in the domain.
While each of these events bring community value in their own unique way, Def Con is the most valuable event of the year for the community. Here’s why.
In 1999 a book called “Unrestricted Warfare” emerged from China and over the past two decades it has served as a good guide for how China views conflict and in particular, cyber and economic conflicts. Businesses that understood Unrestricted Warfare were better enabled to defend their networks and market share.
Twenty years later, the U.S. Department of Defense has released a Joint Staff originated report highlighting the next generation of Chinese doctrine and their concepts of “system attack” and “destruction warfare”. Here is what you need to know about it.
In Part Two of this series on Cyber Sensemaking, OODA CEO Matt Devost steps through the top management lessons learned and actions that can be taking to drive your cyber risk management program.