AI Security Keynotes
AI Security Keynote Speaker
Mark Lynd is the AI security keynote speaker for the question every security leader is now being asked twice a week: how do we secure the AI we are building, and how do we use AI to harden the defense we already run. Most stage talks pick one side. Mark works both sides every week. He is a 5x CIO/CISO and one of a small number of practitioners ranked Top 10 globally in 5 Thinkers360 disciplines simultaneously: #3 Data Center, #4 Cloud, #4 Security, #5 Cybersecurity, and #7 Artificial Intelligence (and #1 globally in Cybersecurity in 2023). The dual standing in AI and Cybersecurity is the direct signal audiences need when the question is AI security, not adjacent commentary on it. Mark is currently Head of Executive Advisory and Strategy at Netsync, advising enterprise C-Suites, CISOs, and Chief AI Officers on AI strategy, AI governance, and the AI plus cybersecurity intersection every week. The AI security conversations he is in this quarter are not theoretical. They are CISOs being asked to absorb AI risk into the security program, Chief AI Officers being asked to prove model and weight protection, GCs and audit chairs being asked to sign off on agentic AI with standing authority, and CEOs being asked to give the board one credible answer on AI exposure. Mark has facilitated 200+ combined AI, cybersecurity, and incident-response exercises and workshops. A growing share are AI-inflected: shadow AI exposure, AI-enabled phishing and deepfake-driven fraud, prompt-injection-driven incidents, agentic-AI-in-the-SOC scenarios, model and weight theft, and training-data poisoning. He has delivered 100+ keynotes at venues including RSA Conference, Oracle CloudWorld, Dell Technologies World, IBM Think, Cisco Partner Summit, and Gartner Security and Risk Summit. AI security audiences at a Mark Lynd keynote leave with named frameworks they can take to the security program on Monday: The Enterprise AI Trust Score (a five-dimension score covering Data Lineage, Model Provenance, Output Governance, Identity and Access for AI Agents, and Adversarial Resilience), The Agentic AI Security Framework (the governance pattern for AI agents with standing authority), The AI Board Briefing Triangle (Strategic Bets, Risk Surface, Adoption Velocity, the one-page board view), and The 72-Hour IR Executive Playbook (the executive incident response cadence). The content is carrier-friendly, industry-respectful, vendor-neutral, and concrete. AI security is treated as the operating discipline it has become, not a futurism demo and not a fear pitch. Mark covers the two sides of the conversation explicitly. The first is securing AI systems: identity-for-AI workloads, model and weight protection, training-data supply chain, prompt injection and indirect prompt injection, RAG poisoning, agent-tool-abuse patterns, and the security perimeter around the AI compute estate. The second is using AI to strengthen defense: agentic AI in the SOC, AI-assisted triage and response, AI-driven detection engineering, AI for fraud and identity defense, and what works on the defender side versus what is still a vendor narrative. He writes weekly on this exact intersection in the Cybervizer newsletter and ships current-quarter content in AI Bursts. He is the author of three published books: Cyber War: One Scenario (a 72-hour critical-infrastructure scenario where AI-enabled attacker tradecraft is part of the picture), A Leader's Playbook for Cyber Insurance (Second Edition), and Cybersecurity Life Skills for Teens. Before the C-Suite, Mark served in the US Army with the 3rd Ranger Battalion and the 82nd Airborne Division. Industries Mark currently advises and speaks to on AI security include financial services and banking, healthcare and life sciences, manufacturing and industrials, energy and utilities, technology and software, retail and consumer, professional services, public sector and government, higher education and K-12, transportation and logistics, and the insurance and reinsurance ecosystem. The questions are the same in every room: where is the AI program already a security exposure, what does the security operating model look like when AI agents have standing authority, where is the carrier and the regulator going on AI security, and what does the board need to see. Mark answers those questions on stage the same way he answers them in advisory work.
Live on stage · International keynote
Quick Answer
Mark Lynd is an AI security keynote speaker, 5x CIO/CISO, and Thinkers360 Top 10 globally in 5 disciplines (Cybersecurity, AI, Cloud, Security, Data Center). He covers securing AI systems from attack and using AI to strengthen the defender side, from the practitioner chair as Head of Executive Advisory and Strategy at Netsync.
Keynote Topics
Securing AI Systems: The Practitioner View of the AI Attack Surface
AI systems have an attack surface most security programs have not yet mapped. Mark walks audiences through the surface as it actually shows up in production: prompt injection and indirect prompt injection, RAG poisoning, agent-tool-abuse, model and weight theft, training-data supply chain compromise, and the security perimeter around the AI compute estate. Built on advisory work and tabletop exercises this quarter.
Best for: CISO summits, application-security forums, AI engineering events
Duration: 45-75 minutes
AI on the Defender Side: What Actually Works in 2026
Attackers are running AI now. The defender story is more mixed. Mark covers what is working on the defender side (AI-assisted triage, detection engineering, fraud and identity defense), what is still vendor narrative, and the AI-on-AI dynamic security leaders should plan for through the next 24 months. No hype, no fear pitch, no breach theater.
Best for: CISO summits, security conferences, MSSP partner events, government forums
Duration: 45-60 minutes
Prompt Injection Is the New Injection Class
SQL injection took twenty years to fully internalize. Prompt injection is the same shape of problem, faster. Mark walks technical and executive audiences through prompt injection, indirect prompt injection, RAG poisoning, and the agent-tool-abuse pattern, with the executive moves and the engineering moves that contain the class.
Best for: Security conferences, application-security forums, AI engineering events
Duration: 45-60 minutes
Agentic AI Security: When the Agent Has Standing Authority
Agentic AI is moving from triage assistant to active responder. Mark covers what works, what breaks, and what governance looks like when an AI agent has standing authority to disable an account, isolate a host, or block a vendor flow. Built around The Agentic AI Security Framework and current advisory engagements.
Best for: Security operations leadership forums, CISO councils, Chief AI Officer audiences
Duration: 45-60 minutes
Identity for AI: The Most Under-Built Control Plane
Every AI agent is a non-human identity with privileges. Most security programs are still treating those identities the way they treated service accounts in 2010. Mark covers identity-for-AI workloads, the privilege model for agents, the audit trail you actually need, and the operating cadence between identity, security, and the AI platform team.
Best for: Identity and access management forums, CISO summits, AI platform leadership
Duration: 45-60 minutes
Model and Weight Protection: Treating Your Model Like an Asset
Your fine-tuned model is intellectual property. Your weight files are intellectual property. Mark covers what model and weight protection actually looks like in production: storage security, deployment security, the supply chain for pretrained models, watermarking, and the legal posture when a model walks out the door.
Best for: AI security forums, CISO summits, GC and legal audiences
Duration: 45-60 minutes
Shadow AI Through the Security Lens
Employees are using AI in the workflow whether security has approved it or not. Mark covers what shadow AI looks like in production today through the security lens: data exposure, IP leakage, vendor concentration, identity sprawl, compliance exposure, and the executive moves that bring shadow AI back into the program without killing the productivity gains.
Best for: Enterprise security events, CIO and CISO councils, regulated-industry forums
Duration: 45-60 minutes
The AI Security Briefing the Board Will Use
Boards are asking AI security questions and getting fragmented answers. Mark walks directors through The AI Board Briefing Triangle and the AI security briefing structure that lands: Strategic Bets, Risk Surface (the Trust Score), Adoption Velocity. Director-ready language, audit-committee tested.
Best for: Board retreats, audit committee briefings, director education programs
Duration: 30-60 minutes
Every AI program is also a security program now. The model is a target, the training data is a target, the inference endpoint is a target, and the agent with standing authority is a target. The teams that build AI security in from day one keep their program. The ones that bolt it on lose audit, lose the carrier, and eventually lose the program.
, Mark Lynd, 5x CIO/CISO, Head of Executive Advisory & Strategy at Netsync
Why Organizations Choose Mark as Their AI Security Keynote Speaker
Thinkers360 Top 10 globally in 5 disciplines simultaneously. #3 Data Center, #4 Cloud, #4 Security, #5 Cybersecurity, #7 AI, and #1 globally in Cybersecurity in 2023. The dual standing in AI and Cybersecurity is the direct signal that Mark works both sides of AI security, not just one.
5x CIO/CISO with operating responsibility at $56B financial-services scale. Real budget, real outages, real audit committee, real regulatory examinations.
Frontline practitioner at Netsync. Head of Executive Advisory and Strategy, advising CISOs, Chief AI Officers, and audit chairs on AI security every week, the same week he steps on your stage.
200+ combined AI, cybersecurity, and incident-response exercises and workshops facilitated. A growing share AI-inflected: prompt-injection-driven incidents, agentic-AI-in-the-SOC scenarios, AI-enabled fraud, model and weight theft, training-data poisoning.
Original frameworks audiences take home and use. The Enterprise AI Trust Score, The Agentic AI Security Framework, The AI Board Briefing Triangle, and The 72-Hour IR Executive Playbook.
Speaks the full picture of AI security. Securing the AI you are building and using AI to strengthen the defense you already run. Not a one-sided talk.
Cybervizer newsletter and AI Bursts. A weekly public read on the AI plus cybersecurity intersection plus a shorter-format current-quarter feed. A datable body of work, not a one-time talk.
Carrier-friendly, industry-respectful, vendor-neutral. No carrier-hostile framing, no vendor pitch from the stage, no breach theater. The carrier relationship is treated as partnership.
US Army veteran. 3rd Ranger Battalion and 82nd Airborne Division. A mission-discipline lens on the high-consequence decisions AI security leaders are now being asked to make.
100+ keynotes delivered. RSA Conference, Oracle CloudWorld, Dell Technologies World, IBM Think, Cisco Partner Summit, Gartner Security and Risk Summit, and dozens more.
Speaker Reel
Watch Mark on Stage
A sampling of keynotes, panels, and live broadcast appearances , RSA, Oracle CloudWorld, Dell Technologies World, ESPN College Football Awards, and the Technology Ball.
What Audiences Say
Feedback From Event Hosts and C-Suites
Mark stands apart. His credibility isn’t rooted in a title from years ago , it’s built through the work he’s doing every day in the field. When he speaks about our technology, enterprise buyers pay attention because they know his perspective is grounded in real-world experience.
Shira Rubinoff
CEO, The Cybersphere Group
Mark delivers more than a presentation , he delivers operational insight from the front lines. Instead of theory, he shares what is actually working in real environments. Our audience of CISOs and security leaders left with practical strategies they could begin implementing immediately.
Jo Peterson
CIO, Clarify360
Where Has Mark Spoken?
According to venue records, Mark has delivered keynotes at: RSA Conference · Oracle CloudWorld · Cisco Partner Summit · Dell Technologies World · IBM Think · T-Mobile Events · Gartner Security & Risk · InfoSecurity · ISACA Conferences · ISSA Events · Cloud Security Alliance · CyberSecurity Summit · BSides · FLGISA · MISAC · SMU Cox School of Business · and 100+ more.
How Do You Book Mark Lynd for Your Event?
The booking process is straightforward and typically completes within 3 business days. Mark customizes every keynote to the audience, industry, and event objectives.
- Submit an inquiry. Fill out the contact form with your event date, audience, and objectives. Response within 48 hours.
- 15-minute discovery call. Discuss your event in detail, including audience makeup, key messages, and desired outcomes.
- Proposal & contract. Receive a tailored proposal with format options (keynote, workshop, panel), fee, and travel terms.
- Customization. Mark customizes content to your audience, industry examples, and desired takeaways.
- Expert delivery. Mark brings 25+ years of real-world executive experience to every stage.
Frequently Asked Questions
What makes Mark Lynd uniquely qualified as an AI security keynote speaker?
What does Mark cover at an AI security keynote?
Who is the right audience for this keynote?
How is Mark different from an AI-only speaker covering AI security?
How is Mark different from an analyst-firm speaker on AI security?
Can Mark customize the keynote for our specific industry?
What size audiences does Mark speak to?
Does Mark deliver virtual and hybrid AI security keynotes?
Does Mark cover AI security regulation and disclosure?
Can Mark extend the keynote with a tabletop or workshop the next morning?
How much does it cost to book Mark Lynd?
What is the booking and prep process?
Ready to Book Mark?
Mark customizes every keynote to the audience, industry, and event objectives. Contact the booking team to check availability.
100+ keynotes · audiences from 50 to 5,000+
Formats: In-person, virtual, hybrid · international available
Duration: 30–120 minutes depending on format
Custom by event · educational pricing available