Program-Level InfoSec Perspective for Serious Audiences
Information Security Speaker
The best information security talks are given by the people who have had to defend a program to a skeptical board, then rebuild it after an incident, then defend it again at the next audit. That's the lens for these sessions: maturity models, control frameworks, and enterprise risk, discussed the way practitioners actually talk about them when the slides are off.
Quick Answer
{{quickAnswer}}
Last updated: April 2026 · Verified by Mark Lynd, 5x CIO/CISO with 25+ years of experience
Keynote Topics
Enterprise InfoSec Program Maturity
A working session on moving programs from ad hoc to measured. Covers NIST CSF 2.0 as a governance lens, ISO 27001 as a management system, and the integration points most organizations mishandle. Practical capability models replace generic maturity charts.
Best for: CISO forums, InfoSec leadership summits, industry associations
Duration: 45-90 minutes
Risk Management for the Modern Enterprise
Enterprise risk discussions have been dominated by heat maps for too long. This topic introduces quantitative risk methods (FAIR-aligned), treatment of third-party and AI-supply-chain risk, and how to make risk register items actually drive budget decisions.
Best for: Risk officers, audit committees, InfoSec programs
Duration: 60 minutes
InfoSec for the Board
Directors do not need a controls lecture. They need a framework for asking the right six questions of management each quarter. This session translates program posture into oversight language that holds up under SEC disclosure scrutiny.
Best for: Board retreats, director education programs
Duration: 45-60 minutes
{{quotablePull}}
— Mark Lynd, 5x CIO/CISO, Head of Executive Advisory & Strategy at Netsync
Why This Speaker Lands with InfoSec Audiences
Program builder, not outside commentator. Multiple enterprise InfoSec programs built or rebuilt from the chair.
Framework fluency. NIST CSF 2.0, ISO 27001, SOC 2, CIS Controls v8, and how they actually fit together.
Quantitative risk grounding. FAIR-aligned methods, not just qualitative heat maps.
SEC cyber disclosure literacy. Current with 8-K materiality determination and the Form 10-K governance asks.
Advisor voice. Runs executive advisory at Netsync, so sessions reflect what is coming up in active client conversations.
Where Has Mark Spoken?
According to venue records, Mark has delivered keynotes at: RSA Conference · Oracle CloudWorld · Cisco Partner Summit · Dell Technologies World · IBM Think · T-Mobile Events · Gartner Security & Risk · InfoSecurity · ISACA Conferences · ISSA Events · Cloud Security Alliance · CyberSecurity Summit · BSides · FLGISA · MISAC · SMU Cox School of Business · and 100+ more.
How Do You Book Mark Lynd for Your Event?
The booking process is straightforward and typically completes within 3 business days. Mark customizes every keynote to the audience, industry, and event objectives.
- Submit an inquiry. Fill out the contact form with your event date, audience, and objectives. Response within 48 hours.
- 15-minute discovery call. Discuss your event in detail, including audience makeup, key messages, and desired outcomes.
- Proposal & contract. Receive a tailored proposal with format options (keynote, workshop, panel), fee, and travel terms.
- Customization. Mark customizes content to your audience, industry examples, and desired takeaways.
- Expert delivery. Mark brings 25+ years of real-world executive experience to every stage.
Frequently Asked Questions
Is this different from a cybersecurity keynote?
Which frameworks are referenced?
Can the session include the organization's own maturity assessment?
What does the prep process look like?
Ready to Book Mark?
Mark customizes every keynote to the audience, industry, and event objectives. Contact the booking team to check availability.
Fee range: $12,000 – $30,000+
Formats: In-person, virtual, hybrid
Duration: 30–120 minutes depending on format