Program-Level InfoSec Perspective for Serious Audiences
Information Security Speaker
The best information security talks are given by the people who have had to defend a program to a skeptical board, then rebuild it after an incident, then defend it again at the next audit. That's the lens for these sessions: maturity models, control frameworks, and enterprise risk, discussed the way practitioners actually talk about them when the slides are off.
Live on stage · International keynote
Quick Answer
The best information security talks are given by the people who have had to defend a program to a skeptical board, then rebuild it after an incident, then defend it again at the next audit.
Last updated: April 2026 · Verified by Mark Lynd, 5x CIO/CISO with 25+ years of experience
Keynote Topics
Enterprise InfoSec Program Maturity
A working session on moving programs from ad hoc to measured. Covers NIST CSF 2.0 as a governance lens, ISO 27001 as a management system, and the integration points most organizations mishandle. Practical capability models replace generic maturity charts.
Best for: CISO forums, InfoSec leadership summits, industry associations
Duration: 45-90 minutes
Risk Management for the Modern Enterprise
Enterprise risk discussions have been dominated by heat maps for too long. This topic introduces quantitative risk methods (FAIR-aligned), treatment of third-party and AI-supply-chain risk, and how to make risk register items actually drive budget decisions.
Best for: Risk officers, audit committees, InfoSec programs
Duration: 60 minutes
InfoSec for the Board
Directors do not need a controls lecture. They need a framework for asking the right six questions of management each quarter. This session translates program posture into oversight language that holds up under SEC disclosure scrutiny.
Best for: Board retreats, director education programs
Duration: 45-60 minutes
I don't give speeches. I share what I've learned running security programs, building AI systems, and advising boards — so your audience leaves with something real.
— Mark Lynd, 5x CIO/CISO, Head of Executive Advisory & Strategy at Netsync
Why This Speaker Lands with InfoSec Audiences
Program builder, not outside commentator. Multiple enterprise InfoSec programs built or rebuilt from the chair.
Framework fluency. NIST CSF 2.0, ISO 27001, SOC 2, CIS Controls v8, and how they actually fit together.
Quantitative risk grounding. FAIR-aligned methods, not just qualitative heat maps.
SEC cyber disclosure literacy. Current with 8-K materiality determination and the Form 10-K governance asks.
Advisor voice. Runs executive advisory at Netsync, so sessions reflect what is coming up in active client conversations.
Speaker Reel
Watch Mark on Stage
A sampling of keynotes, panels, and live broadcast appearances — RSA, Oracle CloudWorld, Dell Technologies World, ESPN College Football Awards, and the Technology Ball.
What Audiences Say
Feedback From Event Hosts and C-Suites
Mark stands apart. His credibility isn’t rooted in a title from years ago — it’s built through the work he’s doing every day in the field. When he speaks about our technology, enterprise buyers pay attention because they know his perspective is grounded in real-world experience.
Shira Rubinoff
CEO, The Cybersphere Group
Mark delivers more than a presentation — he delivers operational insight from the front lines. Instead of theory, he shares what is actually working in real environments. Our audience of CISOs and security leaders left with practical strategies they could begin implementing immediately.
Jo Peterson
CIO, Clarify360
Where Has Mark Spoken?
According to venue records, Mark has delivered keynotes at: RSA Conference · Oracle CloudWorld · Cisco Partner Summit · Dell Technologies World · IBM Think · T-Mobile Events · Gartner Security & Risk · InfoSecurity · ISACA Conferences · ISSA Events · Cloud Security Alliance · CyberSecurity Summit · BSides · FLGISA · MISAC · SMU Cox School of Business · and 100+ more.
How Do You Book Mark Lynd for Your Event?
The booking process is straightforward and typically completes within 3 business days. Mark customizes every keynote to the audience, industry, and event objectives.
- Submit an inquiry. Fill out the contact form with your event date, audience, and objectives. Response within 48 hours.
- 15-minute discovery call. Discuss your event in detail, including audience makeup, key messages, and desired outcomes.
- Proposal & contract. Receive a tailored proposal with format options (keynote, workshop, panel), fee, and travel terms.
- Customization. Mark customizes content to your audience, industry examples, and desired takeaways.
- Expert delivery. Mark brings 25+ years of real-world executive experience to every stage.
Frequently Asked Questions
Is this different from a cybersecurity keynote?
Which frameworks are referenced?
Can the session include the organization's own maturity assessment?
What does the prep process look like?
Ready to Book Mark?
Mark customizes every keynote to the audience, industry, and event objectives. Contact the booking team to check availability.
100+ keynotes · audiences from 50 to 5,000+
Formats: In-person, virtual, hybrid · international available
Duration: 30–120 minutes depending on format
Custom by event · educational pricing available