Use Offensive Engagements to Improve Your InfoSec Program in 2020
Warfighters have used offensive engagements to improve their planning and execution for centuries. Military planners “red team” battle plans with dedicated teams designed to emulate the adversary’s capabilities and behaviors.
Read the Article
Stay up-to-date on the latest in Cybersecurity & Analytics
When you sign up for the Columbus Collaboratory Newsletter, we'll regularly send the latest industry news, need-to-know information, and expert insights straight to your inbox.
Sign Me Up
Vulnerability Management Solutions: How to Tame the Vulnerability Beast
Learn how your organization can adopt best practices for vulnerability management, threat intelligence and cyber risk management that previously had been beyond your means.
View the Webinar
Our Vulnerability Management Solution Now Offers More Ways to Continuously Assess Risk
A recent press release highlights the advancements that can eliminate security blind spots without major customization.Enterprise IT leaders must continuously monitor threats and review
Columbus Collaboratory’s SOC 2® Type 2 Examination Confirms Its Commitment to Transparency
Independent auditing firm GBQ Partners completed the report, which verified Columbus Collaboratory’s controls for ensuring accessibility while protecting and securing data.
2020: The Year to Get Serious About Analytics and Cybersecurity
Analytics and threat intelligence are two sides of the same coin when it comes to preparing your enterprise for the future. That’s why we encourage our clients to take part in annual workshops and programs that help ensure they are proactively addressing both.
Sharing Cyber Threat Information: Why, When and How?
It’s been 20+ years since the US government first issued a directive mandating that critical infrastructure providers in the public and private sectors share information about cyber threats. This directive, PDD63, recognized that, in the face of increasing threats, organizations that band together to share information and coordinate responses stand a better chance of protecting themselves.
Why Join an ISAO? The Network Effects of Threat Intelligence Sharing
Join us for this webinar presenting the benefits of networking with your industry peers to share intelligence about threats and vulnerabilities.
Managing Your Organization's Cyber Risk as a Service
Join us for this webinar that will demonstrate how your organization can adopt best practices for vulnerability management, threat intelligence and cyber risk management that previously had been beyond your means.
The State of Cyber Resiliency in the Age of Attacks
Cyber threats are at the top of mind for security professionals everywhere. With high-profile breaches on the rise and valuable customer information at stake, organizations worldwide are looking for ways to train their workforce to be cyber safe and better secure an ever-growing perimeter.
Distinguish Signal from Noise: Find Threats in Your Security Sensor Data
Join us for this webinar that will recommend how to deal with your “big data” problem when dealing with the massive volume of raw, unprocessed data points from your network security sensors.
useR! 2019 - Columbus Collaboratory
useR! is the main meeting for R enthusiasts, users (useRs) and developers in the world. This year the conference was hosted in the beautiful city of Toulouse in France.
Best Practices in Threat Hunting: Optimizing the Anomalous Activity Search
Join us for this webinar that will present an advanced data science approach to detecting anomalous behavior in complex systems like the typical corporate network that your IT Security team is trying to defend.
Using Artificial Intelligence (AI) to Drive Enterprise Decision-Making
In a recent Forbes article, contributor Gary Drenik spoke with Columbus Collaboratory’s VP and Chief Analytics Officer, Brian Sampsel, about how companies are responding to AI as a tool for business
Cybersecurity and the Riemann Hypothesis
I was taken with an article I read recently, on a seminal construct in mathematics called the Riemann Hypothesis. The article talked about how researchers at Emory University had made progress toward proving that a central concept – one that has existed in mathematics for 160 years and upon which so many other mathematical principles are based – is in fact true.
Tapping Into the Value of Analytics Through Use Case Discovery Workshops
We’ve all heard promising statistics about how investing in data analytics can drive powerful returns, yet in a recent Bain survey of companies that are heavily invested in big data, a full third said they lack a clear strategy for embedding data and analytics into their companies.
4 Key Takeaways from Verizon’s 2019 Data Breach Investigations Report
If there’s one thing that the very opinionated and often fractious IT and cybersecurity field can agree on, it’s this: Verizon’s annual Data Breach Investigations Report (DBIR) is the one security report you should read every year. Not skim; read.
Me and My Shadow Hit InfoSec 2019: Here’s What We Heard
I recently attended the 12th annual Central Ohio InfoSec Summit—my fourth InfoSec event since returning home to Ohio from DC and shifting from the public sector to commercial sector practice. It was a unique event for me as a speaker and mentor representing the Columbus Collaboratory.
How to Stop Fighting Ghosts and Get Real About Cybersecurity
All too often, security leaders find themselves investing in cybersecurity tools aimed at stopping invisible enemies—adversaries with the inhuman capability to attack from all directions with what appear to be unpredictable tactics.
On Offense Informed Defense
Ask any experienced offensive tester about the latest whiz-bang infosec tool, and you’ll get a predictably skeptical response. Sometimes skeptical would be putting it mildly. You’ll hear impassioned arguments like “You shouldn’t worry about Advanced Super Fuzzy Panda APT # 4,172 hand-writing zero days when you have SMB and RDP exposed to the Internet!”
Fighting Cybercrime with Collaboration
Concerns about remaining competitive often limit organizations from innovating and learning together; however, for cybersecurity, those boundaries must be minimized or eliminated. By capitalizing on the collective know-how possessed by its member organizations and partners, Columbus Collaboratory creates cybersecurity products and services while also supporting tech talent in the Columbus Region.
Seven huge companies, working together, formed the Columbus Collaboratory!
This week, Scot is on the road in Columbus and talks to Matt Wald, President and CEO of the Columbus Collaboratory. Matt has a few surprises up his sleeves, like when he lists the giant organizations that have co-invested in the Collaboratory, or how difficult it can be for any organization to pivot to compete with digital-native firms.
Listen to the Podcast
Information Security: What to Expect in 2019
The start of a new year is always a good time to assess what your team achieved over the past twelve months and prioritize those activities that you believe will make a difference to your company this year. In order to assess your IT security team’s goals and objectives, it helps to review what the experts believe will happen in the broader security market; what your leadership team has set for objectives for the organization; and how your team will do their jobs.
Data Scientists: You Can’t Have Just One
In late 2010, Thomas Davenport and DJ Patil published an article titled “Data Scientist: The Sexiest Job of the 21st Century.” They didn’t coin the phrase, but since their article two things have happened: the phrase “data scientist” has been used with increased frequency, and my wife has become truly tired of me reminding her about the sexiness of my career choice.
What Ohio’s Legal Safe Harbor Laws Means for You
In my years at IBM and now at Columbus Collaboratory, I have been asked to build internal programs, software products, marketing organizations and many other forms of business capabilities.
Conquering Columbus Featuring Matt Wald
Matt Wald is a lifelong information technology enthusiast specializing in business growth and in placing collaboration at the center of innovation, leadership, and accelerated learning.
My Experience at useR! 2018 Conference
Two tutorials, 6 amazing keynotes, one trip to Australia, and tons of incredible talks, posters, and conversations later my second useR conference is a wrap. #useR2018 did not disappoint.
Ohio is Gaining a Reputation as a High-Tech Hub
In a recent interview with Ted Griffith, managing director of information technology at JobsOhio, Adam Burroughs of SmartBusiness discussed the growth of technology companies in Ohio.
Is Your Organization Vulnerable to Password Spraying?
Attackers abuse poor passwords. In any given environment with more than a few hundred end users, it is almost guaranteed that someone has chosen a poor password.
Matt Wald, President and CEO of Columbus Collaboratory Makes Ohio Smart 50 List for 2018
The Columbus Collaboratory is innovative and distinct, beginning with its business model, member companies and proven leadership.
Area Analytics Initiative Columbus Collaboratory Gets New Financing
Columbus Collaboratory has secured $14 million in renewed financial support from its founding member companies, helping it continuing its work in performing advanced analytics and improving cybersecurity.
Columbus Collaboratory Raises $14Mn Funds for Innovation in Analytics & Cybersecurity
Columbus Collaboratory recently announced it has secured approximately $14 million in the second round of funding from its founding member companies, namely, American Electric Power, L Brands, Cardinal Health, Nationwide, OhioHealth and Huntington National Bank. The new capital will enable the company to grow its ecosystem of collaborating companies.
Struggling to Keep Up with an Evolving Cyber Threat Landscape? You’re Not Alone
According to our 2017 Forrester survey, firms are struggling to keep up with an ever-evolving threat landscape. Here’s how to stay ahead of the wave.
Inside the Columbus Collaboratory with Jeff Schmidt
Jeff Schmidt runs the Columbus Collaboratory, a unique think tank dedicated to building security and system solutions for major clients. Jeff and I talked about the future of cybersecurity and where the group was headed.
Need Guidance on New Technology? Get By With a Little Help From Your Peers
According to our 2017 Forrester survey, more firms are looking to industry peers for new technology guidance. Here’s why.
Innovate Faster with Security Collaboration
This webinar will review collaboration amongst trusted security peers will enable your business to create a material advantage for your defenders, increase the speed of technology adoption in your security practice, and improve the economics of adopting those technologies.
The Best Defense is an Offense-Informed Defense
Learn how an offense-informed defense approach will enable your security team to cut through the noise, be more effective at both identifying the most likely and riskiest attacks and thwarting them faster at less cost.
Too many companies lack confidence in adopting new technology – here's how to gain it
Do we truly need all the cybersecurity products we buy, or are we making uninformed impulse purchases driven by fear?
Welcome Brandon Gale, Cyber Threat Engineer
Brandon joined the Columbus Collaboratory in February, 2018 and brings a strong cyber security skillset to our team.
Welcome Marianne Lease, Business Development Leader
Marianne joined Columbus Collaboratory in January, 2018 and brings extensive experience in sales, marketing and strategic business planning.
To Speed New Technology Adoption, First Address These Security Concerns
According to our 2017 Forrester survey, Security concerns can impede adoption of new technology. Here’s how to fix it.
Enterprise Leaders: Building a Roadmap to Innovation
According to our 2017 Forrester survey, enterprise leaders are supportive of innovation—they just need a roadmap.
Confidence: Why It’s Missing From Most New Tech Adoption (And How To Gain It)
A 2017 Forrester survey reveals a widening gap between the current knowledge base of enterprise teams and emerging and advanced threats in new technologies.
Columbus Collaboratory Joins New York Cyber Task Force In Urging Security Collaboration
An information security industry roundtable discussion led by Columbus Collaboratory, featuring a panel of regional business leaders and subject matter experts, concluded that secure collaboration is key to keeping ahead of attackers and advancing cybersecurity goals.
R-CISC and Columbus Collaboratory To Discuss Threat Intelligence Exchange Best Practices at Inaugural International Information Sharing Conference
TruSTAR, a threat intelligence platform built to facilitate information exchange, led a panel discussion at the inaugural International Information Sharing Conference in Washington, D.C. on November 1.
In the Buckeye State, An Innovative Cybersecurity Collaboration Experiment Takes Root
"Thanks to a thriving new experiment in corporate collaboration, the Buckeye State capital is now beginning to turn some heads in...the increasingly challenging area of information security. The Columbus Collaboratory was formed three years ago as a for-profit company aimed at developing advanced analytics and cybersecurity technologies and sharing cybercrime-battling best practices among its seven founding members...The innovative effort could provide a model for how to do cybersecurity better...all that could just put Columbus on the cybersecurity map."
In The Wake of the Global Ransomware Attack, Here's How Collaboration can Strengthen Cybersecurity
Chief Cybersecurity Innovator and Vice President at the Columbus Collaboratory, Jeff Schmidt, shares some actionable tips on how companies can strengthen their cybersecurity profiles through a collaborative approach, to prevent and mitigate costly and damaging ransomware attacks.
Ohio Companies Unite to Share Threat Intelligence
The attackers need to only succeed once; the defenders must succeed constantly. The attackers share weapons and methods continuously; the defenders are often isolated silos of private knowledge that comes only from the attacks against themselves. Threat intelligence sharing between the defenders is a primary method of reducing the attackers' inherent asymmetric advantage. But intelligence sharing is difficult, comprising both human and technology problems. The human element is largely around 'trust' -- with whom can you share potentially sensitive commercial information...these problems have been successfully tackled by seven Fortune 500 companies in Columbus Ohio...The Columbus Collaboratory...is an example to other regions where different companies can come together and share their threat intelligence, safely, securely, compliant with data protection regulations, and with no three-letter agency inhibitions." Read the full piece
See if you're a good fit for Collaborative Security. Contact us today for a free evaluation.
Start the Conversation
Download our fact sheet to learn how our solution can eliminate security blind spots and help you make more informed decisions about business risks.
Download Our Fact Sheet