About Rich Mogull

Rich has twenty years experience in information security, physical security, and risk management. He specializes in cloud, application and data security, emerging security technologies, and security management.

Prior to founding Securosis, Rich was a Research Vice President at Gartner on the security team where he also served as research co-chair for the Gartner Security Summit. Prior to his seven years at Gartner, Rich worked as an independent consultant, web application developer, software development manager at the University of Colorado, and systems and network administrator.

Rich is the Security Editor of TidBITS, a columnist for Dark Reading, and a frequent contributor to publications ranging from Information Security Magazine to Macworld. He is a frequent industry speaker at events including the RSA Security Conference and DefCon, and has spoken on every continent except Antarctica (where he's happy to speak for free-- assuming travel is covered).

Rich Mogull is a member of the TechTarget Speaker Bureau

Speaker Bureau

Check out other experts that are Speaker Bureau members.

Events with Rich Mogull

The IBM Security Roadshow Series: Outthink Threats
Rich Mogull

 

2015 was a remarkable year for cybercrime but with a new year comes new attacks that will only continue to increase in volume and sophistication. With a new threat landscape and more enterprises expanding to cloud and mobile environments, many IT security pros are forced to ask: How can I gain control over the future of security protection?

To uncover this crucial answer, join us for a complimentary seminar. Complete our brief registration form or contact Jeremy Caci at (617) 431-9701.

 

Dates and Locations

New York, NY

Free Registration

More resources from Rich Mogull

Inside the four main elements of DLP tools

Data loss prevention, or DLP, can be a critical tool to have in your enterprise's security toolbox. It is critical to understand the technical components of DLP products to ensure your company's data loss prevention needs are properly met.

Is it time for a DLP system in your enterprise?

It’s been a relatively quiet few months in data loss prevention. Not as commonly deployed as firewalls and malware protection, DLP has proven itself as a worthy security control, and its role may continue to grow. The environment DLP seeks to protect has been in a process of radical remaking, as mobile and cloud technology steamroll through the enterprise.

Figuring out the definition of data loss prevention

The poorly kept secret of the information security field is that -- despite the name -- since we've practiced our profession, we have focused on defending infrastructure instead of the data itself. This is a natural outcome of the challenges we've historically faced; it is hard to focus on information-centric security controls when you're battling viruses, spam and port scanners on a daily basis.

Learn how to solve your toughest challenges

Now more than ever, IT professionals can’t afford to waste time or money on anything that doesn’t produce results. For precisely this reason, TechTarget Events have been designed to provide complimentary, practical advice that you’ll put to use immediately.

TechTarget hosts a variety of IT focused seminars and large scale conferences globally that are designed to help you understand and solve the current technology-specific problems you face on a daily basis. You will benefit from industry analysts, top independent IT experts, peer to peer interaction and more. TechTarget’s face-to-face events are invaluable to technical and business decision makers because they deliver strategic, technical, vendor-neutral content that addresses the hard issues which help you solve current technology challenges. Apply to attend the conference that meets your specific IT needs today. For event related questions please contact Jenny Labelle, Director of Online Marketing at jlabelle@techtarget.com.

.

What your peers say about TechTarget events

“Very informational regarding some of the best practices used in the industry today”

“Everyone involved in IT should see this. Cuts through marketing and myths.”

“Good opportunity for a little education, awareness, and networking”

“Provides overview and more in depth analysis and candid views to solutions”

Learn from the top independent technology analysts

Shawn Bass Picture Shawn Bass
Independent Consultant, ShawnBass.com
Brian Madden Picture Brian Madden
Independent Industry Analyst, Blogger & Author, BrianMadden.com
Jon Toigo Picture George Crump
President and Founder, Storage Switzerland
Howard Marks Picture Howard Marks
Founder and Chief Scientist, DeepStorage.net
Gabe Knuth Picture Gabe Knuth
Independent Industry Analyst & Blogger, BrianMadden.com
Jon Toigo Picture

Jon Toigo

CEO & Managing Principal, Toigo Partners International
Jack Madden Headshot Jack Madden
Blogger, BrianMadden.com
Jon Toigo Picture Michael Coté
Research Director, 451 Research
Robert Green
Principal, Enfinitum Consulting
Scott D. Lowe
Founder & Managing Consultant, The 1610 Group

Dedicated to the education of the IT community

John Halamka HeadshotJohn Halamka, MD
CIO, Beth Israel Deaconess Medical Center & CIO, Harvard

In addition to the roles above, Dr. Halamka serves as Chairman of the New England Health Electronic Data Interchange Network (NEHEN), CEO of MA-SHARE (the Regional Health Information Organization), Chair of the US Healthcare Information Technology Standards Panel (HITSP), and a practicing Emergency Physician.

Dr. Halamka authored three books on technology related issues and formed a software development firm, Ibis Research Labs, Inc. Additionally, he served as a columnist for Infoworld, technical editor of Computer Language Magazine and technology consultant to several startup companies.

Meet with the world's foremost technology vendors

Commvault Logo Accelera Solutions logo Oracle Logo Aerohive logo Quantum Logo
EMC Logo HP Logo IBM Logo AMD logo Avere logo
Avnet logo Axcient logo Browsium logo Ceedo logo CloudVelox logo
Comport Logo Data gravity logo Devolutions logo Dimension Data logo Druva logo
Eaton logo ExtraHop logo NEC Logo Nimble Storage Logo Pure Storage Logo
Tegile Logo Fiberlink logo FSLogix logo Coho Logo Tricerat logo
Global Knowledge logo Infinio logo Nasuni Logo Insight logo Isilon logo
Nvidia logo OneCloud logo PernixData logo Pivot3 logo PowWow logo
Veeam Logo DataCore Logo Quroum logo Code 42 logo Derive logo
Samsung loho Simplivity logo SilverPeak logo Sphere 3D logo
Lakeside Software logo Strategic Hardware logo Storiant logo Toshiba logo TSRI logo
Maxta logo NaviSite logo Unitrends Logo Cisco Logo NetServe 365 logo
Violin Memory logo VMTurbo logo Workspot logo Zerto logo Dell logo
AppSense logo Arrow logo Blackberry logo CA Technologies logo Citrix logo
Exagrid logo Intel logo Moka5 logo Nutanix logo SAP logo
Tintri logo VCE logo VMware logo Atlantis computing logo IGEL logo
     

TechTarget global network of technology-specific websites