At Black Hat 2021, CISA Director Jen Easterly launches CISA JCDC (Joint Cyber Defense Collaborative)
The Cybersecurity and Infrastructure Security Agency (CISA) has launched a new agency effort, the Joint Cyber Defense Collaborative (JCDC), to develop cyber defense operations strategies and to implement those plans in collaboration with partners to mitigate risk prior to incidents happening and to coordinate unified defensive actions in the event of a cyber-attack.
What the C-Suite needs to know about a Return to “Great Power Competition” and DoD Capabilities (per the Congressional Research Service)
This post provides insights into what the C-Suite needs to know about the rise of great power competition, based largely on a recently released report by the policy and legal research agency of the United States Congress, the Congressional Research Service (CRS), titled Renewed Great Power Competition: Implications for Defense—Issues for Congress.
Great Power Competition: U.S. DoD and Strategic Transformation. The report sees a “new or renewed emphasis on the following, all of which relate to China and/or Russia”:
-Defense issues need to focus on a “grand strategy and the geopolitics of great power competition,” including DoD changes in organizational structure.
-Nuclear weapons, nuclear deterrence, and nuclear arms control need to once again be center stage.
-Military force deployments and their global allocation new to be looked at anew, especially U.S. and allied military capabilities in the Indo-Pacific region.
-The continued commitment to Europe in the form of U.S. and NATO military capabilities; and
-The maintenance of superiority by the U.S. in conventional weapon technologies.
Stark Vulnerabilities and Strong Recommendations continue in 2021 update to “Federal Cybersecurity: America’s Data at Risk” Report (2019)
In a follow-up to a 2019 report that found major cybersecurity vulnerabilities at eight government agencies, the U.S. Senate Committee on Homeland Security and Governmental Affairs has released a 2021 updated report. Entitled Federal Cybersecurity: America’s Data Still at Risk, the update does not mince words: “This report revisits those same eight agencies two years later. What this report finds is stark.”
In the early 1990’s SciFi fans were introduced to a concept called the Metaverse in Neal Stephenson’s book SnowCrash. In the book this described a future virtual reality beyond the universe that was populated by user-controlled avatars as well as AI and bots.
Now decades later the age of the Metaverse is upon us. This post captures insights into this new world in ways meant to help leaders understand what is most relevant to your strategic planning. We provide an operational definition of the Metaverse, a description of the current market of metaverse players, and a list of recommendations for how this information should inform your business strategy.
Jessica Gulick is widely known for her leadership of the successful growth strategy and marketing firm Katzcy. She is also the Commissioner of the US Cyber Games, a multi-phased cybersecurity program recruiting a US Cyber Team for international competition. She is also the founder of PlayCyber, a new business line promoting cyber games and tournaments. Jessica is also the president of the board at the Woman’s Society of Cyberjutsu and a driving force behind their Wicked6 cyber games.
In a late July 2020 speech at the Office of the Director of National Intelligence (DNI), President Biden stated that “if we end up in a war, a real shooting war with a major power, it’s going to be as a consequence of a cyber breach.” This definitive pronouncement comes at a time when the United States has suffered a series of cyber-attacks at the hands of Russian cyber criminals suspected of operating under the tacit approval of the Russian government.
Scenario planning is an often overlooked aspect of corporate decision-making. But it is needed now more than ever.
Scenario planning is a methodology for helping leaders think through alternative futures in a way that enables identification of issues. It raises potential outcomes and impacts and helps conceptualize potential risks and opportunities so organizations can be better prepared.
This post captures some insights that can help accelerate the use of scenario planning in your organization.
Fine Tuning Your Falsehood Detector: Time to update the models you use to screen for deception, dishonesty, corruption, fraud and falsity
The best business leaders are good at spotting falsehoods. Some joke and say they have a “bullshit detector”, but that humorous description does not do service to the way great leaders detect falsehoods. Bullshit is easy to detect. You see it and smell it and if you step in it it is your own fault. In the modern world falsehoods are far more nuanced.
Now more than ever, business and government leaders need to ensure their mental models for detecting falsehood are operating in peak condition.
Lance Mortlock is a Senior EY Strategy Partner. He is author of the book Disaster Proof: Scenario Planning for Post Pandemic Future, which explores ways scenario planning can help organizations be more resilient. This is a must-read book for anyone in the Risk Management field. It provides practical advice for strategists, planners, executives and board members on how to ask better questions related to the future, uncertainty, risk and strategy.
“We are liable to see a very changed humanity as we look to the future. And so I’m very interested in a humanity that is, if you will, that is good for humans, not just one in which we sort of become the subjects of our technologies.” – Dan Gerstein
Over the course of the summer and fall, we are revisiting the OODAcast archive to generate transcripts from the podcast conversations, related links and a reading list curated from the discussion – all in an effort to identify long term subject matter areas and follow-on topics which inform the future of the OODALoop.com core thematic research agenda.
We start at the beginning: OODAcast Episode #1. An overview of the podcast, related links, reading list and transcript of the podcast can be found below.