Taming the Vulnerability Management Beast
Join security experts from Columbus Collaboratory to learn how to elevate your network’s cybersecurity defenses by identifying and remediating the most critical vulnerabilities. We will discuss best practices for vulnerability scanning, managing the seemingly overwhelming volume of scan data, data visualization techniques, and how combining vulnerability data, threat data and asset classification is critical to prioritizing your remediation efforts when resources are scarce and time is of the essence.
View the Webinar
Data Scientists: You Can’t Have Just One
In late 2010, Thomas Davenport and DJ Patil published an article titled “Data Scientist: The Sexiest Job of the 21st Century.” They didn’t coin the phrase, but since their article two things have happened: the phrase “data scientist” has been used with increased frequency, and my wife has become truly tired of me reminding her about the sexiness of my career choice.
Read the Article
What Ohio’s Legal Safe Harbor Laws Means for You
In my years at IBM and now at Columbus Collaboratory, I have been asked to build internal programs, software products, marketing organizations and many other forms of business capabilities.
Conquering Columbus Featuring Matt Wald
My Experience at useR! 2018 Conference
Ohio is Gaining a Reputation as a High-Tech Hub
Is Your Organization Vulnerable to Password Spraying?
Matt Wald, President and CEO of Columbus Collaboratory Makes Ohio Smart 50 List for 2018
Area Analytics Initiative Columbus Collaboratory Gets New Financing
Columbus Collaboratory Raises $14Mn Funds for Innovation in Analytics & Cybersecurity
Struggling to Keep Up with an Evolving Cyber Threat Landscape? You’re Not Alone
Inside the Columbus Collaboratory with Jeff Schmidt
Need Guidance on New Technology? Get By With a Little Help From Your Peers
Webinar: Innovate Faster with Security Collaboration
Webinar: The Best Defense is an Offense-Informed Defense
Too many companies lack confidence in adopting new technology – here's how to gain it
Welcome Brandon Gale, Cyber Threat Engineer
Welcome Marianne Lease, Business Development Leader
To Speed New Technology Adoption, First Address These Security Concerns
Enterprise Leaders: Building a Roadmap to Innovation