SAS | The Power to Know
Person watching webcast on laptop
On-Demand Webinar

Stronger Cybersecurity Starts
With a Data and Analytics Strategy

Today’s cyberattackers are sophisticated and intrusions are inevitable. You can’t stop them all at the firewall front door. While a heightened awareness of the risks is driving companies to invest heavily in both prevention and countermeasures, much of that investment goes to waste.

Cybersecurity is a classic people-process-technology problem, and organizations often lack the data management and analytics strategies and processes for putting security data to work. In fact, they often fail to recognize that cybersecurity is largely – some would say predominantly – a big data analytics challenge.

In this webinar, experts review and discuss:

  • The analytics capabilities needed to quickly and efficiently fend off cyberattacks.

  • Data management challenges that can get in the way of an effective defense.

  • How your cybersecurity efforts can rise to the challenge and defeat threats as soon as they develop.

Featured speakers

Liz Goldberg, Principal Product Marketing Manager, SAS

Goldberg has spent nearly half of her 20-year career in information security. Prior to SAS, she worked in product marketing roles at Websense (now Forcepoint), Breach Security (now Trustwave), NSS Labs and a variety of information technology companies.

Evan Levy, Vice President, Business Consulting, Data Management, SAS

Levy is an acknowledged speaker, writer and consultant in the areas of enterprise data strategy and data management. He advises clients on strategies to address business challenges using data, technology and creative approaches that align IT with the business capability.



Have a SAS profile? To complete this form automatically Sign In

  Yes, I would like to receive occasional emails from SAS Institute Inc. and its affiliates about SAS products and services. I understand that I can withdraw my consent at any time by clicking the opt-out link in the emails.

All personal information will be handled in accordance with the SAS Privacy Statement.


Back to Top