13 Dec 2021

A Call to Action from CISA’s Jen Easterly and Def Con’s Jeff Moss at Inaugural CISA Advisory Committee Mtg.

In the first meeting of the Cybersecurity and Infrastructure Security Agency’s (CISA) new Cybersecurity Advisory Committee, CISA Director Jen Easterly made clear to the committee members their working model would be action-based, not the usual passive mode assumed by an advisory body, telling the group:  “I welcome this group creating action. This is really just not about being a talking club. This is about leveraging your expertise, your perspective, to make the nation safer.” Advisory Committee Member, Def Con Founder Jeff Moss, also offered his perspective on how best to engage the hacker community.

Read More
30 Aug 2021

August 2021 OODA Loop Monthly Meeting Generates Actionable Insights Into A Chaotic World

OODA Network members are invited to participate in a monthly video call to discuss items of common interest to our membership. These highly collaborative sessions are always a great way for our members to meet and interact with each other while talking about topics like global risks, emerging technologies, cybersecurity, and current or future events impacting their organizations. We also use these sessions to help better focus our research and reporting on member needs.

The August monthly meeting focused on issues around Afghanistan and the many geopolitical and business related elements of these chaotic events. Members also discussed topics in the OODA C-Suite Report.

This post was generated from the OODA Network Member monthly meeting and access is restricted accordingly. If you are an OODA Subscriber, but not a member of our expert network, you will not be able to access this content.

Read More
18 Aug 2021

Black Hat and Def Con 2021 – Observations and Trends

The Black Hat and Def Con cybersecurity events are the most highly anticipated of the year.  Each event had an in-person component this year and OODA CEO Matt Devost provides his observations from each event.

Read More
06 Aug 2021

Researchers Find Significant Vulnerabilities in macOS Privacy Protections

Researchers have uncovered significant vulnerabilities in macOS privacy protection. According to researchers Csaba Fitzl and Wojciech Regula with Offensive Security and SecuRing respectively, applications that are allowed to run on Apple’s operating system can exceed the permissions granted to them by the user. This allows for potential privacy attacks, such

Read More
29 Apr 2021

Matt Devost on Entrepreneurship, Innovation, and Succeeding in Competitive Environments

OODA CEO Matt Devost has a track record of executing on innovation via entrepreneurship. You may also know him as the Co-Host of the OODAcast or perhaps through his role as a technologist and international security expert. He has extensive past performance in cybersecurity, counterterrorism, critical infrastructure protection, intelligence, and risk management issues.

Read More
07 Aug 2020

Chinese Hackers Have Pillaged Taiwan’s Semiconductor Industry

Yesterday at the Black Hat security conferences, CyCraft researchers presented details of a previously unknown hacking campaign that compromised Taiwanese chip firms. CyCraft is a Taiwanese cybersecurity firm that has been investigating the campaign, which allegedly compromised at least seven firms over a two year period. The operation has been

Read More
07 Aug 2020

Satellite Comms Globally Open to $300 Eavesdropping Hack

At the virtual Black Hat 2020 conference, academic researcher and Oxford University doctoral candidate James Pavur spoke about the risk of satellite hacking. Pavur stated that attackers can use basic home television gear to listen in on internet traffic occurring across the globe, including high-value targets such as shipping fleets

Read More
25 Jun 2020

Black Hat Survey: Breach Concerns Hit Record Levels Due to COVID-19

A new survey released by Black Hat USA concludes that there is unprecedented concern over data breaches due to COVID-19. Security professionals expressed worries over possible compromises of enterprise networks and critical infrastructure. The survey’s respondents consist of 273 top security professionals. 94% of these respondents stated that they believe

Read More
17 Sep 2019

The Executive’s Guide to Cyber Insurance

This special report provides an overview of the dynamic trends underway in the cyber insurance market, including actionable information that executives can put to use right now in determining the right approach to using cyber insurance to transfer risk. The report also provides insights which can be of use to any tech firm seeking to partner with insurance companies to enhance services to the market. 

Read More
16 Aug 2019

Def Con is the Most Valuable Security Conference of the Year.  Here’s Why.

There are literally hundreds of cybersecurity conferences hosted around the world each year and as a result it can be difficult to determine which conferences provided the highest value in the domain. 

While each of these events bring community value in their own unique way, Def Con is the most valuable event of the year for the community. Here’s why.

Read More