As summer approaches, we return to our OODA Special Report on the business impacts of drought conditions. Initiated by OODA CTO Bob Gourley is his June 2021 post – How Drought In The US Should Impact Your Mid To Long Range Strategic Planning – about the unprecedented heatwave in the Pacific Northwest driven by climate change, which focused on the major weather system known as a stationary Heat Dome…making existing drought conditions even worse than they were before.
In 2022, open our aperture globally, to assess how a concern for regional “megadroughts” has now morphed into what has been called “perpetual drought” conditions globally. We now apply a global filter to our research, analysis, and scenario planning. Specifically, Step 2 of the scenario planning process is an effort to explore the external environment for patterns and trends since our assessment last year.
We strongly encourage every company, large or small, to set aside dedicated time to focus on ways to improve your ability to understand the nature of the significantly changed risk environment we are all operating in today, and then assess how your organizational thinking should change.
As an aid to assessing your corporate sensemaking abilities, this post summarizes OODA’s research and analysis into optimizing corporate intelligence for the modern age.
In a famous line from Hemingway’s The Sun Also Rises, a character in the story is asked how he went bankrupt. His reply: “Two ways… gradually, then suddenly.”
This line is a catchy way to articulate the way compounding interest works in finance. It is also a good description for the S-Curve that is so frequently seen in adoption of technological innovations, where growth of a technology is usually slow and boring at first, then suddenly shoots up in exponential growth. Gradually then suddenly is also an apt description of many geopolitical trends. We have all been tracking a weakening economy of China, then suddenly their GDP is in decline. We gradually saw Russia posturing for invasion of Ukraine, then suddenly the invasion few anticipated occurs.
The result of all of this is a very turbulent business environment and a need for executives to seek out situational awareness to inform operational decisions. This post provides context from the OODA C-Suite report that will help drive awareness and decision making.
Fine Tuning Your Falsehood Detector: Time to update the models you use to screen for deception, dishonesty, corruption, fraud and falsity
This is part of a series providing insights aimed at corporate strategists seeking competitive advantage through better and more accurate decision-making. The full series is available at our special section on Decision Intelligence. Members are also invited to discuss this topic at the OODA Member Forum. The best business leaders are
We continue our effort to underscore certain patterns and themes found throughout the OODAcast library of over 80 conversations with leaders and decision-makers.
In May of 2020, OODA CTO Bob Gourley had a conversation with Boston Merdian’s co-founder and partner JC Raby. JC has more than 16 years of investment banking experience in mergers and acquisitions as well as private and public financings. JC’s clients include leading Fortune 500 acquirers and middle-market growth companies across a number of industries including media and Technology (software, business services, and communications equipment) manufacturing, and consumer products, together accounting for over $9 billion in transaction value.
In July of 2020, Bob spoke with Andrew (Andy) Lustig, a partner at the high tech law firm Cooley where he focuses on private equity investments, mergers and acquisitions, and the general corporate representation of high-growth technology companies in both the commercial and government marketplace. His practice includes a wide range of industry sectors including information technology, national security, cybersecurity, data analytics, software, and telecommunications. He also represents a number of leading venture capital and private equity firms.
The reality is 34% of all breaches in 2018 were caused by insiders, yet less than 20% of U.S. organizations possess effective security programs to combat it. The results range from information leakage and national security breaches to workplace violence and even reputational damage. Insiders’ unintentional actions can be equally damaging. How can a serious internal commitment to the design process, driven by innovation, give this often ignored sub-sector of risk management the priority it requires within your organization? Following are a few initiatives that are thinking differently about insider threat program implementation through innovative architectures, collective intelligence, advanced analytics, and the use of publicly available information (PAI). Community-based and partner collaborations up and down the supply chain are also a hallmark of these innovative efforts.
This is part of a series providing insights aimed at corporate strategists seeking competitive advantage through better and more accurate decision-making. The full series is available at our special section on Decision Intelligence. Members are also invited to discuss this topic at the OODA Member Forum. Broadly speaking, a weapon is anything
This post discusses standards in intelligence, a topic that can improve the quality of all corporate intelligence efforts and do so while reducing ambiguity in the information used to drive decisions and enhancing the ability of corporations to defend their most critical information.
Leverage these open source tools to provide your organization with the best in class information to inform business strategy, operations, and risk awareness levels around the world. Firms that understand the strengths and weaknesses of their own Cognitive Infrastructure will have an advantage over those that do not attend to this crucial function within an organization.
Industroyer2 and Pipedream ICS/SCADA Malware: DOE, CISA, NSA, and the FBI Release Joint Cybersecurity Advisory
Industrial control systems (ICS) and supervisory control and data acquisition (SCADA) device vulnerabilities are, arguably, the threat surfaces that are of the utmost concern to cyber and homeland security professionals. If ICS/SCADA devices are mission-critical to your organization, the Joint Cybersecurity Advisory (CSA) released this week by multiple U.S. agencies is a must-read. A unique element of this CSA is the direct contribution made by the private sector to the research included in the advisory: “This is the most expansive industrial control system attack tool that anyone has ever documented,” says Sergio Caltagirone, the vice president of threat intelligence at industrial-focused cybersecurity firm Dragos, which contributed research to the advisory.