OT Security Speaking.
OT Security Keynote Speaker
OT security is where cyber risk turns physical. Mark Lynd briefs executives, boards, and operations leadership on the OT security decisions that decide whether an intrusion stays in the IT layer or jumps the boundary into Levels 0–2 of the Purdue model. He is the author of "Cyber War: One Scenario" and treats OT security as a cyber-physical accountability question — not as a compliance exercise.
Live on stage · International keynote
Quick Answer
OT security is where cyber risk turns physical.
Last updated: April 2026 · Verified by Mark Lynd, 5x CIO/CISO with 25+ years of experience
Keynote Topics
The OT Security Threat Model You Can Actually Brief
A clean adversary-and-pivot view of OT security threats — IT-pivot, supply-chain, vendor-remote-access, physical-access, and insider — with the architecture decision each one forces.
Best for: Senior leadership, sector working groups
Duration: 45 minutes
OT Security Spending That Survives the Next Budget Cycle
Where OT security budget actually moves the risk needle, the four categories that almost always underperform, and how to defend the spend in front of a board.
Best for: CIO/CISO audiences, infrastructure investor briefings
Duration: 30-45 minutes
OT Security Incident Response: The First Six Hours
Detection-to-decision compression in OT environments where shutdown is itself a risk event. Drawn from facilitated incidents in real plants.
Best for: Incident response audiences, sector ISACs
Duration: 60 minutes
I don't give speeches. I share what I've learned running security programs, building AI systems, and advising boards — so your audience leaves with something real.
— Mark Lynd, 5x CIO/CISO, Head of Executive Advisory & Strategy at Netsync
Why Organizations Choose Mark for OT Security Keynote Speaker
Author of "Cyber War: One Scenario." A 72-hour scenario book built around coordinated OT-targeting attacks on US critical infrastructure.
5x CIO/CISO. Real operational responsibility for IT-OT environments across multiple verticals.
150+ tabletop exercises facilitated. A meaningful share of them in OT-heavy environments — utilities, manufacturing, oil-and-gas, water, transportation.
US Army veteran. 3rd Ranger Battalion and 82nd Airborne Division — a national-security lens on industrial control system risk.
Daily practitioner at Netsync. Head of Executive Advisory & Strategy. Not retired. Not theoretical. Current.
Speaker Reel
Watch Mark on Stage
A sampling of keynotes, panels, and live broadcast appearances — RSA, Oracle CloudWorld, Dell Technologies World, ESPN College Football Awards, and the Technology Ball.
What Audiences Say
Feedback From Event Hosts and C-Suites
Mark stands apart. His credibility isn’t rooted in a title from years ago — it’s built through the work he’s doing every day in the field. When he speaks about our technology, enterprise buyers pay attention because they know his perspective is grounded in real-world experience.
Shira Rubinoff
CEO, The Cybersphere Group
Mark delivers more than a presentation — he delivers operational insight from the front lines. Instead of theory, he shares what is actually working in real environments. Our audience of CISOs and security leaders left with practical strategies they could begin implementing immediately.
Jo Peterson
CIO, Clarify360
Where Has Mark Spoken?
According to venue records, Mark has delivered keynotes at: RSA Conference · Oracle CloudWorld · Cisco Partner Summit · Dell Technologies World · IBM Think · T-Mobile Events · Gartner Security & Risk · InfoSecurity · ISACA Conferences · ISSA Events · Cloud Security Alliance · CyberSecurity Summit · BSides · FLGISA · MISAC · SMU Cox School of Business · and 100+ more.
How Do You Book Mark Lynd for Your Event?
The booking process is straightforward and typically completes within 3 business days. Mark customizes every keynote to the audience, industry, and event objectives.
- Submit an inquiry. Fill out the contact form with your event date, audience, and objectives. Response within 48 hours.
- 15-minute discovery call. Discuss your event in detail, including audience makeup, key messages, and desired outcomes.
- Proposal & contract. Receive a tailored proposal with format options (keynote, workshop, panel), fee, and travel terms.
- Customization. Mark customizes content to your audience, industry examples, and desired takeaways.
- Expert delivery. Mark brings 25+ years of real-world executive experience to every stage.
Frequently Asked Questions
Is OT security really different from IT security?
How much does it cost to book Mark for this engagement?
What events has Mark Lynd keynoted?
Ready to Book Mark?
Mark customizes every keynote to the audience, industry, and event objectives. Contact the booking team to check availability.
100+ keynotes · audiences from 50 to 5,000+
Formats: In-person, virtual, hybrid · international available
Duration: 30–120 minutes depending on format
Custom by event · educational pricing available
Cluster
More under Operational Technology (OT/ICS)
All keynote angles in the operational technology (ot/ics) cluster. See the cluster hub.
- OT Cybersecurity Keynote Speaker
- Operational Technology Keynote Speaker
- ICS Cybersecurity Keynote Speaker
- SCADA Cybersecurity Keynote Speaker
- Industrial Cybersecurity Keynote Speaker
- OT Cybersecurity Thought Leader
- Top OT Cybersecurity Speaker
- Best OT Cybersecurity Speaker
- Hire OT Cybersecurity Speaker
- Water Cybersecurity Keynote Speaker
- Water Utility Cybersecurity Speaker
- Electric Utility Cybersecurity Speaker