Mike Huskey is a Director Analyst with Gartner for Technical Professionals (GTP) on the Security Technology and Infrastructure team. He covers data loss prevention, data classification, data discovery, data access governance, and email DLP.
Mike also covers insider threat management topics such as insider threat detection strategies, insider threat prevention best practices, technical and non-technical indicators of an internal threat actor, insider risk management, insider threat mitigation frameworks, and insider threat program design.
Served as Data Security and Insider Threat team lead for Santander U.S. Responsible for defining and implementing data security policies, procedures and governance for data security domains such as data loss prevention, data classification (AIP), data discovery, and email security. Managed multiple DLP platforms including McAfee DLP suite (McAfee Endpoint DLP, McAfee Prevent, and McAfee Native Encryption), GTB Endpoint Protector, Microsoft Cloud App Security, and Microsoft Purview.
Oversaw insider threat investigations across Santander U.S., defined and implemented standard investigation procedures, and lead an Insider Threat Working group to support an enterprise risk reduction model for insider threat mitigation. Designed and reported on various key risk indicators and key performance indicators of both data security and insider threat operations.
Santander Consumer USA
Associate Director, Cybersecurity Operations
The University of Texas at Dallas
Visiting Professor
The University of North Texas
Visiting Lecturer
Security Technology and Infrastructure for Technical Professionals
PhD in Criminology from the University of Texas Dallas
M.S. in Criminal Justice from the University of North Texas
B.A. in Psychology from the University of North Texas
1Data loss prevention (DLP) - design, deployment and configuration on-prem, cloud or hybrid.
2Data discovery, data access governance (DAG) and data classification
3Email DLP - design, deployment, and configuration
4Insider Risk and Insider Threat Management - Detection, prevention, technical and non-technical indicators of an insider threat actor, program design frameworks and implementation.
5The use of SOAR, SIEM, DLP, and UBEA technologies to prevent, detect, and react to a potential insider threat