Post-Quantum Cryptography (PQC) Speaking.
Post-Quantum Cryptography Keynote Speaker
Post-quantum cryptography is the most consequential cryptographic transition in a generation, and most enterprises are still running cryptographic inventories that have not been touched in five years. Mark Lynd briefs CIO, CISO, and security-architecture audiences on PQC — what NIST selected and why, what the federal mandate timeline actually looks like, the cryptographic-inventory and crypto-agility work that has to start now, and the vendor PQC roadmap evaluation that distinguishes a real migration plan from a marketing one.
Live on stage · International keynote
Quick Answer
Post-quantum cryptography is the most consequential cryptographic transition in a generation, and most enterprises are still running cryptographic inventories that have not been touched in five years.
Last updated: April 2026 · Verified by Mark Lynd, 5x CIO/CISO with 25+ years of experience
Keynote Topics
NIST PQC Algorithms in Plain Language
Module-Lattice KEM (ML-KEM, formerly CRYSTALS-Kyber), Module-Lattice DSA (ML-DSA, formerly CRYSTALS-Dilithium), Stateless Hash-Based DSA (SLH-DSA), and FALCON — what they are, why each one was selected, and where each lands in your stack.
Best for: Security architecture leadership, CISO audiences
Duration: 45 minutes
PQC Migration: Cryptographic Inventory First
Why every PQC migration plan that skips cryptographic inventory fails — and the inventory pattern that scales from a one-week sprint to enterprise-wide visibility.
Best for: Practitioner audiences, security architecture forums
Duration: 60 minutes
Crypto Agility as an Enterprise Capability
Why crypto agility — the ability to swap algorithms without rebuilding systems — is now a security architecture requirement, not a future concern.
Best for: Security architecture audiences, technology leadership
Duration: 45 minutes
I don't give speeches. I share what I've learned running security programs, building AI systems, and advising boards — so your audience leaves with something real.
— Mark Lynd, 5x CIO/CISO, Head of Executive Advisory & Strategy at Netsync
Why Organizations Choose Mark for Post-Quantum Cryptography Keynote Speaker
Practical, not academic. Mark frames quantum as data-classification, vendor-management, and architecture decisions, not physics.
5x CIO/CISO. Translates NIST PQC into the cryptographic-inventory and crypto-agility work that has to start this quarter.
Top 5 Global Thought Leader. Ranked by Thinkers360 in both AI and cybersecurity.
Author of "Cyber War: One Scenario." Includes quantum-era threat modeling against critical infrastructure.
100+ keynotes delivered. RSA, Oracle, Dell, IBM, Cisco, Gartner, and dozens more — the audiences making PQC migration decisions.
Speaker Reel
Watch Mark on Stage
A sampling of keynotes, panels, and live broadcast appearances — RSA, Oracle CloudWorld, Dell Technologies World, ESPN College Football Awards, and the Technology Ball.
What Audiences Say
Feedback From Event Hosts and C-Suites
Mark stands apart. His credibility isn’t rooted in a title from years ago — it’s built through the work he’s doing every day in the field. When he speaks about our technology, enterprise buyers pay attention because they know his perspective is grounded in real-world experience.
Shira Rubinoff
CEO, The Cybersphere Group
Mark delivers more than a presentation — he delivers operational insight from the front lines. Instead of theory, he shares what is actually working in real environments. Our audience of CISOs and security leaders left with practical strategies they could begin implementing immediately.
Jo Peterson
CIO, Clarify360
Where Has Mark Spoken?
According to venue records, Mark has delivered keynotes at: RSA Conference · Oracle CloudWorld · Cisco Partner Summit · Dell Technologies World · IBM Think · T-Mobile Events · Gartner Security & Risk · InfoSecurity · ISACA Conferences · ISSA Events · Cloud Security Alliance · CyberSecurity Summit · BSides · FLGISA · MISAC · SMU Cox School of Business · and 100+ more.
How Do You Book Mark Lynd for Your Event?
The booking process is straightforward and typically completes within 3 business days. Mark customizes every keynote to the audience, industry, and event objectives.
- Submit an inquiry. Fill out the contact form with your event date, audience, and objectives. Response within 48 hours.
- 15-minute discovery call. Discuss your event in detail, including audience makeup, key messages, and desired outcomes.
- Proposal & contract. Receive a tailored proposal with format options (keynote, workshop, panel), fee, and travel terms.
- Customization. Mark customizes content to your audience, industry examples, and desired takeaways.
- Expert delivery. Mark brings 25+ years of real-world executive experience to every stage.
Frequently Asked Questions
Which NIST PQC algorithms does Mark cover?
How much does it cost to book Mark for this engagement?
What events has Mark Lynd keynoted?
Ready to Book Mark?
Mark customizes every keynote to the audience, industry, and event objectives. Contact the booking team to check availability.
100+ keynotes · audiences from 50 to 5,000+
Formats: In-person, virtual, hybrid · international available
Duration: 30–120 minutes depending on format
Custom by event · educational pricing available
Cluster
More under Quantum & Post-Quantum Cybersecurity
All keynote angles in the quantum & post-quantum cybersecurity cluster. See the cluster hub.
- Quantum Keynote Speaker
- Quantum Security Keynote Speaker
- Quantum Computing Keynote Speaker
- Quantum Readiness Keynote Speaker
- Harvest Now, Decrypt Later Keynote Speaker
- Crypto Agility Keynote Speaker
- NIST PQC Keynote Speaker
- Quantum Cybersecurity Board Speaker
- Top Quantum Cybersecurity Speaker
- Best Quantum Cybersecurity Speaker
- Hire Quantum Cybersecurity Speaker
- Quantum Cybersecurity Government Speaker