Gartner Expert

Mike Huskey

Director Analyst

Mike Huskey is a Director Analyst with Gartner for Technical Professionals (GTP) on the Security Technology and Infrastructure team. He covers data loss prevention, data classification, data discovery, data access governance, and email DLP.

Mike also covers insider threat management topics such as insider threat detection strategies, insider threat prevention best practices, technical and non-technical indicators of an internal threat actor, insider risk management, insider threat mitigation frameworks, and insider threat program design.

Previous experience

Served as Data Security and Insider Threat team lead for Santander U.S. Responsible for defining and implementing data security policies, procedures and governance for data security domains such as data loss prevention, data classification (AIP), data discovery, and email security. Managed multiple DLP platforms including McAfee DLP suite (McAfee Endpoint DLP, McAfee Prevent, and McAfee Native Encryption), GTB Endpoint Protector, Microsoft Cloud App Security, and Microsoft Purview.

Oversaw insider threat investigations across Santander U.S., defined and implemented standard investigation procedures, and lead an Insider Threat Working group to support an enterprise risk reduction model for insider threat mitigation. Designed and reported on various key risk indicators and key performance indicators of both data security and insider threat operations.

Professional background

Santander Consumer USA

Associate Director, Cybersecurity Operations

The University of Texas at Dallas

Visiting Professor

The University of North Texas

Visiting Lecturer

Areas of coverage

Security Technology and Infrastructure for Technical Professionals


PhD in Criminology from the University of Texas Dallas

M.S. in Criminal Justice from the University of North Texas

B.A. in Psychology from the University of North Texas

Read More Read Less

Top Issues That I Help Clients Address

1Data loss prevention (DLP) - design, deployment and configuration on-prem, cloud or hybrid.

2Data discovery, data access governance (DAG) and data classification

3Email DLP - design, deployment, and configuration

4Insider Risk and Insider Threat Management - Detection, prevention, technical and non-technical indicators of an insider threat actor, program design frameworks and implementation.

5The use of SOAR, SIEM, DLP, and UBEA technologies to prevent, detect, and react to a potential insider threat

Latest research and insights