Taming the Vulnerability Management Beast
Join security experts from Columbus Collaboratory to learn how to elevate your network’s cybersecurity defenses by identifying and remediating the most critical vulnerabilities. We will discuss best practices for vulnerability scanning, managing the seemingly overwhelming volume of scan data, data visualization techniques, and how combining vulnerability data, threat data and asset classification is critical to prioritizing your remediation efforts when resources are scarce and time is of the essence.
View the Webinar
What Ohio’s Legal Safe Harbor Laws Means for You
In my years at IBM and now at Columbus Collaboratory, I have been asked to build internal programs, software products, marketing organizations and many other forms of business capabilities.
Read the Article
Conquering Columbus Featuring Matt Wald
Matt Wald is a lifelong information technology enthusiast specializing in business growth and in placing collaboration at the center of innovation, leadership, and accelerated learning.
Listen to the Podcast
My Experience at useR! 2018 Conference
Two tutorials, 6 amazing keynotes, one trip to Australia, and tons of incredible talks, posters, and conversations later my second useR conference is a wrap. #useR2018 did not disappoint.
Enterprise Leaders: Building a Roadmap to Innovation
Confidence: Why It’s Missing From Most New Tech Adoption (And How To Gain It)
Columbus Collaboratory Joins New York Cyber Task Force In Urging Security Collaboration
R-CISC and Columbus Collaboratory To Discuss Threat Intelligence Exchange Best Practices at Inaugural International Information Sharing Conference
In the Buckeye State, An Innovative Cybersecurity Collaboration Experiment Takes Root
In The Wake of the Global Ransomware Attack, Here's How Collaboration can Strengthen Cybersecurity
Ohio Companies Unite to Share Threat Intelligence