02 Jul 2021

Cofer Black on Leadership Lessons Learned and Speaking Truth to Power

In this OODAcast, we talk with renowned counter-terrorism expert and career clandestine services professional Cofer Black. Cofer is best known for having been the Director of the CIA’s Counterterrorism Center on 9/11 and having been part of the intelligence community warning about the near-term threat of terrorism in the United States prior to the attacks. However, his pedigree in counterterrorism issues was well established with a distinguished career in the field in high-risk areas and operations.

Read More
29 Jun 2021

OODA Special Report: How Drought In The US Should Impact Your Mid To Long Range Strategic Planning

Much of the Western US is now officially in a drought. This post provides information business and government leaders should know about this including insights into how drought impacts key sectors of the economy. It also provides four scenarios that can be used for organizational strategic planning. It concludes with recommendations for business and government leader consideration. 

Read More
25 Jun 2021

Gaurav Banga On Mitigating Cyber Threats Through Deep Insight Into Things That Matter Most

Gaurav Banga is the Founder and CEO of Balbix, and serves on the boards of several companies. Before Balbix, Gaurav was the Co-founder & CEO of Bromium and led the company from inception for over 5 years. Earlier in his career, he served in various executive roles at Phoenix Technologies and Intellisync Corporation, and was Co-founder and CEO of PDAapps, acquired by Intellisync in 2005. Dr. Banga started his industry career at NetApp. Gaurav has a PhD in CS from Rice University, and a B.Tech. in CS from IIT Delhi. He is a prolific inventor with over 70 patents.

Read More
25 Jun 2021

Biden Threw the Cyber Gauntlet – Be Careful What You Wish For

In his first meeting with Russian President Vladimir Putin, U.S. President Joe Biden claimed to have presented his counterpart with a list of 16 red-line targets, ostensibly the critical infrastructure sectors that are listed on the Department of Homeland Security’s webpage.  Such sectors are considered vital to the United States, and any potential incapacitation or destruction of them can gravely impact the “security, national economic security, and national public health or safety.” 

Read More
23 Jun 2021

Potential Future Opportunities, Risks and Mitigation Strategies in the Age of Continuous Crisis

Now more than ever, organizations need to apply rigorous thought to business risks and opportunities. In doing so it is useful to understand the concepts embodied in the terms Black Swan and Gray Rhino. This post examines both and leads to recommended action plans for any organization in government or business who seeks to mitigate risk while focusing on opportunity.

Read More
18 Jun 2021

Kim Zetter on Understanding the Realities of Cyberthreats and How Code Has a Story to Tell

This week’s OODAcast is with Kim Zetter, an incredibly well respected journalist who has been covering cybersecurity related issues for two decades.  Matt Devost talks with Kim about a wide variety of cyber-related issues including a deep dive into Stuxnet and the implications for today’s security environment. Kim also shares details as to how she got into the field and how she developed relationships with the hacker community via her longstanding attendance at Def Con.

Read More
14 Jun 2021

Chinese Trolls Show That Information Can’t Be Stopped, Nor Should It Be

Beijing has been engaged in a battle for public opinion for several years, aggressively promoting a positive vision of China to counter criticisms for its involvement in human rights violations, intellectual property theft, currency manipulation, its engagement with Taiwan and the South China Sea disputes, and its suspected involvement in the COVID-19 outbreak.  In 2017, senior Party leaders acknowledged that “the main battlefield for public opinion” occurs on the extensive borderless Internet where people receive their news, express their thoughts, and promote and argue their political and ideological viewpoints.  Beijing understands how the Internet is essential in disseminating China-friendly narratives, while at the same time deflecting criticisms and reassigning blame.  In essence, it is how Beijing seeks to preserve its image while tarnishing those of others.

Read More
14 Jun 2021

Cybersecurity, like Espionage, Is an Infinite Game

Game theory, the study of competition and conflict, tells us there are two types of games: Finite Games and Infinite Games. Understanding that cybersecurity, like espionage, is an infinite game, should inform our all our actions in cyberspace. This post provides suggested considerations for businesses, individuals and governments seeking advantage in this infinite game.

Read More
07 Jun 2021

The New Enterprise Architecture Is Zero Trust

Enterprise technologists use the term “Zero Trust” to describe an evolving set of cybersecurity approaches that move defenses from static attempts to block adversaries to more comprehensive measures that improve enterprise performance while improving security. When the approaches of Zero Trust are applied to an enterprise infrastructure and workflows, the cost of security can be better managed and the delivery of functionality to end users increased. Security resources are matched to risk. Functionality, security and productivity all go up.

Read More
04 Jun 2021

Junaid Islam on Zero Trust Architecture

In this OODAcast we provide insights into Zero Trust architectures from an experienced practitioner, Junaid Islam. Junaid is a senior partner at OODA. He has over 30 years of experience in secure communications and the design and operations of highly functional enterprise architectures. He founded Bivio Networks, maker of the first gigabyte speed general purpose networking device in history, and Vidder, a pioneer in the concept of Software Defined Networking. Vidder was acquired by Verizon to provide Zero Trust capability for their 5G network. Junaid has supported many US national security missions from Operation Desert Shield to investigating state-sponsored cyberattacks. He has also led the development of many network protocols including Multi-Level Precedence and Preemption (MLPP), MPLS priority queuing, Mobile IPv6 for Network Centric Warfare and Software Defined Perimeter for Zero Trust. Recently Junaid developed the first interference-aware routing algorithm for NASA’s upcoming Lunar mission.

Read More