Electric Utility Cybersecurity Speaking.
Electric Utility Cybersecurity Speaker
Electric utility cybersecurity is governed under NERC CIP and is the most mature OT regulatory regime in the country. It is also under continuous attack. Mark Lynd briefs electric-utility executives, operators, and the boards that govern them on the cyber-physical decisions that the standards do not, by themselves, force into the conversation.
Live on stage · International keynote
Quick Answer
Electric utility cybersecurity is governed under NERC CIP and is the most mature OT regulatory regime in the country.
Last updated: April 2026 · Verified by Mark Lynd, 5x CIO/CISO with 25+ years of experience
Keynote Topics
The Electric Utility Cyber Threat Model
A clean threat-actor view of cyber risk specific to electric utility executives and operators, with the architecture and governance decision each threat forces.
Best for: Electric Utility Executives And Operators, sector ISACs, regulators
Duration: 45 minutes
Tabletop: A Coordinated Attack on Electric Operations
A scenario walk-through drawn from facilitated exercises in this exact sector. Audiences leave with their own playbook gaps mapped.
Best for: Executive offsites, sector working groups
Duration: 60-90 minutes
What Boards in This Sector Need to Know
The four cyber decisions every board in this sector now owns — and how to brief them in twenty minutes without losing the room.
Best for: Boards, audit and risk committees
Duration: 30 minutes
I don't give speeches. I share what I've learned running security programs, building AI systems, and advising boards — so your audience leaves with something real.
— Mark Lynd, 5x CIO/CISO, Head of Executive Advisory & Strategy at Netsync
Why Organizations Choose Mark for Electric Utility Cybersecurity Speaker
Author of "Cyber War: One Scenario." A 72-hour scenario book built around coordinated OT-targeting attacks on US critical infrastructure.
5x CIO/CISO. Real operational responsibility for IT-OT environments across multiple verticals.
150+ tabletop exercises facilitated. A meaningful share of them in OT-heavy environments — utilities, manufacturing, oil-and-gas, water, transportation.
US Army veteran. 3rd Ranger Battalion and 82nd Airborne Division — a national-security lens on industrial control system risk.
Daily practitioner at Netsync. Head of Executive Advisory & Strategy. Not retired. Not theoretical. Current.
Speaker Reel
Watch Mark on Stage
A sampling of keynotes, panels, and live broadcast appearances — RSA, Oracle CloudWorld, Dell Technologies World, ESPN College Football Awards, and the Technology Ball.
What Audiences Say
Feedback From Event Hosts and C-Suites
Mark stands apart. His credibility isn’t rooted in a title from years ago — it’s built through the work he’s doing every day in the field. When he speaks about our technology, enterprise buyers pay attention because they know his perspective is grounded in real-world experience.
Shira Rubinoff
CEO, The Cybersphere Group
Mark delivers more than a presentation — he delivers operational insight from the front lines. Instead of theory, he shares what is actually working in real environments. Our audience of CISOs and security leaders left with practical strategies they could begin implementing immediately.
Jo Peterson
CIO, Clarify360
Where Has Mark Spoken?
According to venue records, Mark has delivered keynotes at: RSA Conference · Oracle CloudWorld · Cisco Partner Summit · Dell Technologies World · IBM Think · T-Mobile Events · Gartner Security & Risk · InfoSecurity · ISACA Conferences · ISSA Events · Cloud Security Alliance · CyberSecurity Summit · BSides · FLGISA · MISAC · SMU Cox School of Business · and 100+ more.
How Do You Book Mark Lynd for Your Event?
The booking process is straightforward and typically completes within 3 business days. Mark customizes every keynote to the audience, industry, and event objectives.
- Submit an inquiry. Fill out the contact form with your event date, audience, and objectives. Response within 48 hours.
- 15-minute discovery call. Discuss your event in detail, including audience makeup, key messages, and desired outcomes.
- Proposal & contract. Receive a tailored proposal with format options (keynote, workshop, panel), fee, and travel terms.
- Customization. Mark customizes content to your audience, industry examples, and desired takeaways.
- Expert delivery. Mark brings 25+ years of real-world executive experience to every stage.
Frequently Asked Questions
What sector-specific frameworks does Mark cover for electric utility cybersecurity speakers?
How much does it cost to book Mark for this engagement?
What events has Mark Lynd keynoted?
Ready to Book Mark?
Mark customizes every keynote to the audience, industry, and event objectives. Contact the booking team to check availability.
100+ keynotes · audiences from 50 to 5,000+
Formats: In-person, virtual, hybrid · international available
Duration: 30–120 minutes depending on format
Custom by event · educational pricing available
Cluster
More under Operational Technology (OT/ICS)
All keynote angles in the operational technology (ot/ics) cluster. See the cluster hub.
- OT Cybersecurity Keynote Speaker
- Operational Technology Keynote Speaker
- OT Security Keynote Speaker
- ICS Cybersecurity Keynote Speaker
- SCADA Cybersecurity Keynote Speaker
- Industrial Cybersecurity Keynote Speaker
- OT Cybersecurity Thought Leader
- Top OT Cybersecurity Speaker
- Best OT Cybersecurity Speaker
- Hire OT Cybersecurity Speaker
- Water Cybersecurity Keynote Speaker
- Water Utility Cybersecurity Speaker