Mac Howell is a Director Analyst within the Gartner for Technical Professionals (GTP) Security Technology & Infrastructure department of the Research and Advisory's practice. Mr. Howell's area of research and expertise centers around Data Protection and Vulnerability Management disciplines. Within these disciplines, he covers such topics as Data Loss Prevention (DLP), including Cloud Access Security Brokers (CASB) integrations with a concentration on data discovery, Data Access Governance (DAG) with a concentration on data classification, and Vulnerability Management (VM).
Mr. Howell is a current doctoral student with more than 26 years of experience in the information technology space and over 17 years as a cybersecurity professional. He brings extensive experience in providing the leadership and support needed to achieve key organizational technical business goals and objectives. Mr. Howell can develop and implement a strategy based on best practices and technical business intelligence designed to ensure system availability while maintaining productivity. He has demonstrated strength in building and maintaining professional relationships with strategic business partners and technical stakeholders based on the solutions' effectiveness. He has been recognized for his ability to deliver impactful results while leading managed security service provider (MSSP) teams in fast-paced, dynamic technical business environments.
Deloitte & Touche, LLC
Specialist Senior, Cyber Risk
Manager of Deployment Engineering
Information Security Specialist
IT Operations and Cloud Management for Technical Professionals
Cloud Computing for Technical Professionals
Security Operations for Technical Professionals
Security Technology and Infrastructure for Technical Professionals
Doctorate Student (DCS) - Cybersecurity & Information Assurance: Colorado Technical University
Master's (MSM) - Information Systems Security: Colorado Technical University
Phi Theta Kappa (PTK): International College Honor Society
1How do we evaluate data discovery products?
2How are organizations maximizing their use of classification with data protection tools?
3What are best practices to implement Data Access Governance and classification?
4How do we protect the enterprise from unsanctioned applications (Shadow IT)?
5How do we integrate email security on-premise, in the cloud or in a hybrid format?