Operational Technology (OT) Cybersecurity Speaking.
OT Cybersecurity Keynote Speaker
Most cybersecurity keynote speakers stop at IT. Mark Lynd does not. As a 5x CIO/CISO who advises operators of energy, water, manufacturing, transportation, and defense facilities, he treats Operational Technology security as the cyber-physical decision it actually is — Purdue level integrity, IT-OT convergence governance, ICS detection that respects safety constraints, and incident response that does not panic-shutdown the plant. Mark is the author of "Cyber War: One Scenario," a 72-hour book built around coordinated OT-targeting attacks against US critical infrastructure, and facilitates the executive tabletop exercises that walk leadership through the failure modes most plants only discover during a real incident.
Live on stage · International keynote
Quick Answer
Most cybersecurity keynote speakers stop at IT.
Last updated: April 2026 · Verified by Mark Lynd, 5x CIO/CISO with 25+ years of experience
Keynote Topics
OT/ICS Security: What Boards Actually Need to Know
The four OT cyber decisions every board owns: IT-OT convergence governance, OT identity, ICS detection, and shutdown authority. Plain language, plant-floor reality.
Best for: Boards of operators, utility commissions, infrastructure investors
Duration: 30-60 minutes
IT-OT Convergence Without Catastrophe
How IT-OT convergence creates the very pivot paths attackers exploit. The architecture decisions that close them — and the ones that quietly make them worse.
Best for: CIO/CISO audiences, plant operations leadership
Duration: 45-90 minutes
OT Tabletop: A Coordinated Attack on the Plant
A live walk-through of a coordinated OT intrusion based on patterns from 150+ exercises and the scenario in "Cyber War: One Scenario." Audiences leave with their own playbook gaps mapped.
Best for: Executive offsites, ISAC events, plant-leadership retreats
Duration: 60-90 minutes
OT cybersecurity is not an IT problem in a different building. It's a cyber-physical decision and the C-Suite owns it.
— Mark Lynd, 5x CIO/CISO, Head of Executive Advisory & Strategy at Netsync
Why Organizations Choose Mark for OT Cybersecurity Keynote Speaker
Author of "Cyber War: One Scenario." A 72-hour scenario book built around coordinated OT-targeting attacks on US critical infrastructure.
5x CIO/CISO. Real operational responsibility for IT-OT environments across multiple verticals.
150+ tabletop exercises facilitated. A meaningful share of them in OT-heavy environments — utilities, manufacturing, oil-and-gas, water, transportation.
US Army veteran. 3rd Ranger Battalion and 82nd Airborne Division — a national-security lens on industrial control system risk.
Daily practitioner at Netsync. Head of Executive Advisory & Strategy. Not retired. Not theoretical. Current.
Speaker Reel
Watch Mark on Stage
A sampling of keynotes, panels, and live broadcast appearances — RSA, Oracle CloudWorld, Dell Technologies World, ESPN College Football Awards, and the Technology Ball.
What Audiences Say
Feedback From Event Hosts and C-Suites
Mark stands apart. His credibility isn’t rooted in a title from years ago — it’s built through the work he’s doing every day in the field. When he speaks about our technology, enterprise buyers pay attention because they know his perspective is grounded in real-world experience.
Shira Rubinoff
CEO, The Cybersphere Group
Mark delivers more than a presentation — he delivers operational insight from the front lines. Instead of theory, he shares what is actually working in real environments. Our audience of CISOs and security leaders left with practical strategies they could begin implementing immediately.
Jo Peterson
CIO, Clarify360
Where Has Mark Spoken?
According to venue records, Mark has delivered keynotes at: RSA Conference · Oracle CloudWorld · Cisco Partner Summit · Dell Technologies World · IBM Think · T-Mobile Events · Gartner Security & Risk · InfoSecurity · ISACA Conferences · ISSA Events · Cloud Security Alliance · CyberSecurity Summit · BSides · FLGISA · MISAC · SMU Cox School of Business · and 100+ more.
How Do You Book Mark Lynd for Your Event?
The booking process is straightforward and typically completes within 3 business days. Mark customizes every keynote to the audience, industry, and event objectives.
- Submit an inquiry. Fill out the contact form with your event date, audience, and objectives. Response within 48 hours.
- 15-minute discovery call. Discuss your event in detail, including audience makeup, key messages, and desired outcomes.
- Proposal & contract. Receive a tailored proposal with format options (keynote, workshop, panel), fee, and travel terms.
- Customization. Mark customizes content to your audience, industry examples, and desired takeaways.
- Expert delivery. Mark brings 25+ years of real-world executive experience to every stage.
Frequently Asked Questions
What makes Mark Lynd different as an OT cybersecurity speaker?
Which OT frameworks does Mark cover?
Which OT verticals does Mark address?
How much does it cost to book Mark for this engagement?
What events has Mark Lynd keynoted?
Ready to Book Mark?
Mark customizes every keynote to the audience, industry, and event objectives. Contact the booking team to check availability.
100+ keynotes · audiences from 50 to 5,000+
Formats: In-person, virtual, hybrid · international available
Duration: 30–120 minutes depending on format
Custom by event · educational pricing available
Cluster
More under Operational Technology (OT/ICS)
All keynote angles in the operational technology (ot/ics) cluster. See the cluster hub.
- Operational Technology Keynote Speaker
- OT Security Keynote Speaker
- ICS Cybersecurity Keynote Speaker
- SCADA Cybersecurity Keynote Speaker
- Industrial Cybersecurity Keynote Speaker
- OT Cybersecurity Thought Leader
- Top OT Cybersecurity Speaker
- Best OT Cybersecurity Speaker
- Hire OT Cybersecurity Speaker
- Water Cybersecurity Keynote Speaker
- Water Utility Cybersecurity Speaker
- Electric Utility Cybersecurity Speaker