Thinkers360
Interested in getting your own thought leader profile? Get Started Today.

Mark Lynd

Head of Executive Advisory & Corporate Strategy at Netsync

Dallas, United States

** Top Ranked GlobalThought Leader, Author, and Keynote Speaker for Cybersecurity, Cloud, and AI **

Mark Lynd is an accomplished executive with over 2 decades of experience, and 4x CIO & CISO for global companies including a global financial services organization operating in 27 countries. He is the Head of Executive Advisory & Corporate Strategy at Netsync, a global technology reseller, and part of the executive leadership team, helping public and private sector clients worldwide.

Mark is a sought-after thought leader and speaker, frequently presenting on topics such as cybersecurity, artificial intelligence, cloud computing, STEM, and veteran affairs for organizations like Oracle, IBM Watson, Cisco, HP, Dell, AT&T, Intel, and other leading organizations.

Mark's achievements include being a finalist for Ernst & Young's "Entrepreneur of the Year - Southwest Region, presenting the Doak Walker Award on ESPN and being consistently ranked in the top 5 for thought leaders for cybersecurity, security, cloud, and Artificial intelligence for several years.

He's contributed his expertise to several academic and technology boards, including SMU's Cox School of Business.

Mark holds a Bachelor of Science degree from the University of Tulsa and attended The Wharton School. Mark is a proud military veteran who served honorably in the US Army's 3rd Ranger Battalion & 82nd Airborne.

Specialties: CyberSecurity, IoT, Artificial Intelligence, Higher Ed, K12, EdTech, Cloud, Big Data, Mobile, Social, CIO, Governance, Due-diligence, Data Center, Military, Veteran, AI

Available For: Authoring, Consulting, Influencing, Speaking
Travels From: Dallas, Texas
Speaking Topics: Cybersecurity, Cloud, K12, Higher Education, Data Center & Artificial Intelligence

Speaking Fee $3,500 (In-Person)

Personal Speaking Website: www.marklynd.com
Mark Lynd Points
Academic 5
Author 375
Influencer 753
Speaker 242
Entrepreneur 520
Total 1895

Points based upon Thinkers360 patent-pending algorithm.

Thought Leader Profile

Portfolio Mix

Featured Videos

Dell Tech World: Innovate with confidence: How security can be your differentiator
August 05, 2023
Hosting a Ransomware Roundtable for Pure Storage and Netsync
August 05, 2023
My Interview with SailPoint's Senior Identity Strategist Paul Degraff about identity security in today's challenging environment.
August 05, 2023

Featured Topics

Cybersecurity: Vision And Leadership Required

- Key Items That They Need To Know About Being Secure In Our Digital World
- Discover Cybersecurity Frameworks Like Zero Trust And The Value They Create.
- 7 Cybersecurity Steps That Will Take Teams and Businesses To the Next Level
- How Strong Cybersecurity Can Cause Disruption In An Industry
- How To Build An Achievable Cybersecurity Roadmap and Communicate It To Leadership
- Using Transparency and Collaboration To Foster An Internal Culture of Success
- The Top Ten Barriers To True And Successful Cybersecurity State
- 5 Important Markers Of Cybersecurity Success

A Proactive Strategy For Ransomware That Reduces Risk

- Discuss Is It Best To Assume You Will Be Hit With Ransomware
- What Steps To Take In The First 24 Hours After A Ransomware Attack
- To Pay Or Not To Pay? Understand How To Make The Best Decision For Your Organization
- Utilizing Artificial Intelligence To Reduce Ransomware Exposure
- 7 key steps to protecting your organization from malicious ransomware attacks
- How To Formulate and Execute A Strong Anti-Ransomware State
- 3 Important Markers Of a Strong Response Strategy

Successful Cybersecurity In Today's Chaotic World

- Key Items That They Need To Know About Being Relevant In Our Digital World
- 15 Enterprise Security Myths Exposed From Mark's e-Book
- How To Discover And Quantify Your Cyber-Risks
- The Top Ten Items To Be Aware Of During A Cyber-risk Assessment
- How To Develop And Employ A Best Practices Cyber-risk Action And Management Plan
- The Top Ten Barriers To True And Successful Digital Transformation
- Successful Use Of Cybersecurity Policies, Procedures and Guidelines To Minimize Risk
- Top CyberSecurity Tips For Tracking Your Results, Fine-tuning Your Approach And Reporting.

Company Information

Company Type: Service Provider
Theatre: Global
Minimum Project Size: N/A
Average Hourly Rate: N/A
Number of Employees: 501-1,000
Company Founded Date: 2023
Media Experience: 20 years
Last Media Training: 04/10/2018
Last Media Interview: 09/18/2019

Areas of Expertise

5G 30.11
AI 40.37
Analytics 31.03
Big Data 30.52
Business Continuity 30.56
Business Strategy 30.04
Cloud 51.63
Cybersecurity 71.31
Data Center 39.84
Digital Transformation 31.16
EdTech 30.91
Emerging Technology 34.28
Entrepreneurship
Future of Work 30.15
HealthTech 30.03
IoT 32.84
Leadership 30.25
Management 30.05
National Security 31.64
Predictive Analytics 30.01
Privacy 34.69
Risk Management
Security 59.49
Smart Cities
Social 30.47

Industry Experience

Aerospace & Defense
Consumer Products
Federal & Public Sector
Financial Services & Banking
Healthcare
High Tech & Electronics
Higher Education & Research
Hospitality
Insurance
Media
Oil & Gas
Pharmaceuticals
Professional Services
Retail
Telecommunications
Wholesale Distribution

Publications

10 Advisory Board Memberships
Customer Advisory Board Member for Centrify
Centrify
December 10, 2020
Customer Advisory Board Member for Centrify

See publication

Tags: AI, Cloud, Cybersecurity

OPT, Inc.
OPT
November 16, 2020
Advisory board member for OPT, Inc. for cybersecurity and digital transformation

See publication

Tags: AI, Cloud, Cybersecurity

2019Elevate IT Advisory Board
ElevateIT
January 01, 2020
Advisory board member for The ElevateIT: DFW Technology Summit which is designed to connect you with local experts and resources to assist with your IT & Security needs. The 2nd Annual ElevateIT: DFW Technology Summit will be hosted at the Irving Convention Center on March 18th, 2020.

See publication

Tags: AI, Cybersecurity, Data Center

2020 ElevateIT Advisory Board Member - Houston
ElevateIT
January 01, 2020
Advisory Board Member for the 2nd Annual ElevateIT: Houston Technology Summit and learn why South Texas has long been a hot bed for innovation and disruption. Fueled by the oil and gas, medical, and manufacturing industries, Houston has become home to a vast numbers of IT & Security firms, who have successfully transformed the landscape into a Technology Mecca.

See publication

Tags: AI, Cloud, Cybersecurity

2020 ElevateIT Advisory Board Member - San Antonio
ElevateIT
January 01, 2020
Advisory Board Member for the 1st Annual ElevateIT: San Antonio Technology Summit and learn why South Texas has long been a hot bed for cybersecurity and disruption. Fueled by the oil and gas, medical, and manufacturing industries.

See publication

Tags: AI, Cloud, Cybersecurity

2019 Elevate IT Advisory Board - Houston
ElevateIT
October 16, 2019
Advisory board member for The 2019 ElevateIT: Houston Technology Summit which is designed to connect you with local experts and resources to assist with your IT & Security needs.

See publication

Tags: AI, Cybersecurity, Data Center

2019 Elevate IT Advisory Board - DFW
ElevateIT
July 10, 2019
Advisory board member for The 2019 ElevateIT: DFW Technology Summit which is designed to connect you with local experts and resources to assist with your IT & Security needs. The 2nd Annual ElevateIT: DFW Technology Summit will be hosted at the Irving Convention Center on March 18th, 2020.

See publication

Tags: AI, Cybersecurity, Data Center

SMU Advisory Board - Digital Accelerator Program
SMU
June 05, 2017
Advise and discuss the curricula of SMU’s Big Data program as a board member and mentor students enrolled in the program regarding Big data and its value.

See publication

Tags: Analytics, Cloud, Data Center

AirTight Networks
Arista
April 01, 2005
Served as advisory board member for AirTight Networks for 3 years. Assisted with GTM strategy, met with prospective customers and attended conferences on their behalf. Turned into Mojo Networks and then sold to Arista.

See publication

Tags: AI, Cybersecurity, IoT

SMU Meadows School of Arts Advisory Board
Southern Methodist University
September 01, 1998
Advise and discuss the curricula of SMU’s Meadows School of Arts as a advisory board member for technology.

See publication

Tags: Cybersecurity, Data Center, Emerging Technology

1 Analyst Report
Part of the Dell Innovation Index Research Group
Dell
March 10, 2023
The Innovation Index, Dell’s latest research based on responses from 6,600 business and IT leaders across the globe, assesses organizations’ innovation maturity. It is a point-in-time snapshot of how organizations are innovating despite unprecedented uncertainty, after a global pandemic and amidst rampant inflation.

See publication

Tags: AI, Cybersecurity, Security

37 Article/Blogs
95% of You Won’t Take Advantage of the Opportunity AI Provides, but 5% Will and Thrive
Mark Lynd
January 01, 2024
However, many won’t take advantage of the assistive power of AI and it is eerily reminiscent of past scenarios where the skeptics were hesitant and 95% missed out on the significant benefits of other transformative technologies like the Internet, Smartphones, and the Cloud. History has shown that those who failed to seize those opportunities are now considered laggards, while the 1% who did are hailed as market leaders.

See publication

Tags: AI, Cloud, Cybersecurity

Rightsizing Generative AI with Dell's AI Strategist Matt Baker
LinkedIn
November 15, 2023
Generative AI represents an enormous leap forward, offering unprecedented capabilities to automate tasks, gain insights, and create new innovations. However, while the potential is vast, implementing generative AI requires careful planning and strategic alignment.

See publication

Tags: AI, Cloud, Cybersecurity

Managing a Fleet of PCs with Ease: Experience the Simplicity and Performance of Intel vPro for Accelerated Time to Value
LinkedIn
September 26, 2023
As a 4-time CIO and CISO for large organizations and a ranked global cybersecurity advisor and thought leader, I've encountered a common challenge many organizations face: effectively managing and safeguarding their fleet of devices. Keeping systems updated, detecting threats, and resolving issues can often become overwhelming, particularly for organizations with constrained IT or overworked resources.

See publication

Tags: Cybersecurity, Leadership

Building a Robust Cybersecurity Incident Response Plan
Mark Lynd
August 21, 2023
Today, in an era characterized by the ever-evolving digital threat landscape, a well-structured Cybersecurity Incident Response Plan (CIRP) is no longer a luxury but an absolute necessity for every forward-thinking organization. Given the unpredictable nature of cyber threats, preparation, and rapid response can make all the difference between swift recovery and irreparable damage.

See publication

Tags: Cybersecurity

4 practical steps toward Zero Trust
Dell
June 14, 2023
An article on Dell's site with two tech experts explains how to strengthen perimeter defenses against cyberattacks.

See publication

Tags: AI, Cybersecurity, Security

Leader’s Guide: Reducing Risk with Incident Response
Import from medium.com
June 13, 2023
An Incident Response Team should be across disciplines to ensure complete coverage. Image: StoryblocksAs we continue to leap forward into the digital era, businesses face an intimidating reality as the growing menace of cyber threats continues to expand and endanger their data, networks, and busines

See publication

Tags: AI, Cybersecurity, Leadership

How Intel vPro Multilayer Security Protects Your Business
LinkedIn
June 13, 2023
Did you know that according to a report by VentureBeat, the frequency of internet attacks grew from 32,500,000 globally in the analyzed period of 2021 to almost 35,400,000 in 2022? From malware to firmware tampering, from data theft to network compromise, these attacks can cause serious damage to your business’s reputation, productivity, and profitability. That’s why you need Intel vPro, a platform that offers unique out-of-the-box hardware-based multilayer security measures up and down the stack that can actively monitor and protect your business’s resources and data. In this article, we will dive into some of the capabilities of Intel vPro's multilayer security and how it can help CIOs and CISOs protect their organizations.

See publication

Tags: Cybersecurity

The Cybersecurity Secret in K12 that Nobody Talks About. Hint: It’s Incident Response
Import from medium.com
January 20, 2023
Too Many K12s Have No Incident ResponseEffective incident response is essential for K-12 schools in order to improve their cybersecurity posture and prepare for cyber threats. These threats can range from simple phishing attacks to more sophisticated breaches of networks, applications and systems,

See publication

Tags: AI, Cybersecurity, Leadership

5 Astounding Reasons Why AI is Improving Cybersecurity
Import from medium.com
January 12, 2023
AI in cybersecurity improves security postureAs more organizations engage in it to safeguard themselves against online attacks, artificial intelligence (AI) is quickly emerging as a critical cybersecurity tool. This is due to the fact that AI may dramatically improve an organization’s capacity to

See publication

Tags: AI, Cybersecurity, Leadership

5 Reasons Zero Trust is Increasingly Important for Protecting Public Sector Organizations
Import from medium.com
January 12, 2023
In recent years, the adoption of zero-trust security framework has become increasingly important for public sector organizations, which face an increasing number of cyber threats, a trend toward remote work, and the need to comply with a variety of regulations.Government agencies, educational instit

See publication

Tags: AI, Cybersecurity, Leadership

Cybersecurity Leadership Is Key For Public Sector Organizations
Import from medium.com
January 06, 2023
Rhode Island State Capitol in the EveningIn order to ensure that cybersecurity is given the proper level of attention and resources inside a public sector organization, strong leadership is first and foremost required. To properly manage cybersecurity, which is a complicated and ever-evolving topic

See publication

Tags: AI, Cybersecurity, Leadership

23 Cybersecurity Predictions for 2023
Import from medium.com
December 31, 2022
The Road Ahead Will Be ChallengingAs we head into 2023, cybersecurity is even more important heading into 2023 for a number of reasons. First, the cost of cyber attacks is increasing. According to a recent study, the average cost of a data breach is over $3 million. This can be financially devastati

See publication

Tags: AI, Cybersecurity, Leadership

5 Reasons You Should Use Cyber Risk Quantification in 2023
Import from medium.com
December 27, 2022
Does your organization have too much money for cybersecurity? Are you over-flowing with cybersecurity resources? Literally, you don’t need anything else? Well congratulations you are in the .001% of businesses out there. For the other 99.99+ % of us, you should consider employing cyber risk quant

See publication

Tags: AI, Cybersecurity, Leadership

5 Top Benefits of Threat Intelligence in 2023
Import from medium.com
December 26, 2022
It is concerning to see how many businesses out here are not making use of threat intelligence or threat hunting to ensure they have identified and understand the truly relevant threats they need to plan, protect and be ready to respond too. It is literally the best way to ensure your cybersecurity

See publication

Tags: AI, Cybersecurity, Leadership

9 Tips For a Stronger Zero Trust Posture
Import from medium.com
December 23, 2022
Zero trust is a term that is being thrown around a lot in the security industry and has gained a great deal of traction in recent years. The framework is based on the idea that organizations should not automatically trust anything or anyone inside or outside of their networks. Instead, they should u

See publication

Tags: AI, Cybersecurity, Leadership

Incident Response Planning Is An Effective Way To Reduce Risk
Import from medium.com
December 23, 2022
No organization is safe from cybersecurity incidents. Cyber incidents can cause a huge amount of damage to your company, and it’s important to have a plan in place to respond to such events. Having an effective incident response plan (IRP) is crucial to mitigating the damages of an attack and gett

See publication

Tags: AI, Cybersecurity, Leadership

Thought Leader Article, Video & Amplification Engagement
SkyBox Security
August 23, 2022
Thought Leader with SkyBox Security for Article, Video & Amplification Engagement.

See publication

Tags: Cloud, Cybersecurity, Security

Implementing Zero Trust from a CISO’s Perspective: Full Cost-Benefit Analysis
Perimeter81
July 27, 2022
Wrote sponsored article for Perimeter81 called: "Implementing Zero Trust from a CISO’s Perspective: Full Cost-Benefit Analysis".

See publication

Tags: Cloud, Cybersecurity, Security

Comprehensive Threat Protection and Remediation Using the Intel vPro Platform and its Many Security and Management Capabilities
Mark Lynd
May 12, 2022
Wrote a sponsored article for Intel for their vPro Platform. The article was titled:
Comprehensive Threat Protection and Remediation Using the Intel vPro Platform and its Many Security and Management Capabilities

See publication

Tags: AI, Cybersecurity, Security

Zero Trust Rising
Cybervizer
February 28, 2021
Zero Trust is being counted on more than ever for cybersecurity and now the NSA has issued Zero Trust guidance for Department of Defense (“DOD”) to protect their critical networks and data. However, it is not only for highly secretive environments like NSA and DOD, but also a great idea for any organization in both private and public sector with cybersecurity concerns as Zero Trust can be transformative for their security posture and more than meet any due-care or fiduciary responsibilities.

See publication

Tags: Cybersecurity, Privacy

More Than 50% of Organizations Can’t Fully Utilize Cloud Security Solutions Due To Understaffing
Cybertvizer
January 14, 2021
The cybersecurity talent shortage is impacting so many businesses globally. More than 50% of IT & #Cybersecurity teams can’t fully utilize cloud security solutions due to understaffing. As this excerpt from a recent HelpNet Security Article highlights:

See publication

Tags: Cloud, Cybersecurity

A Security-first Mindset In Your Organization Is Critical
Cybertvizer
January 11, 2021
It is so critical to create a security-first mindset in your organization. Too many organizations treat security as something they must tolerate or work around. Out in the field, For example, I have heard several executives say that they can’t implement a simple and standard security policy because the business believes it doesn’t support growth, no budget or they fear it might hinder salespeople. That is until the inevitable breach happens and then there is budget and a bunch of executives pointing fingers. That may sound cynical, except I have seen it several times in the last two months and many times before that.

See publication

Tags: Cybersecurity, Business Strategy

Ransomware Gangs Are Targeting Executives
Cybervizer
January 09, 2021
In the field, we are seeing a great deal of extortion, as a backup to the ransom not being paid by organizations hit by ransomware. Once they have the proper access internally, they are often able to pipe out some of the data before encrypting, thereby giving them a backup should the organization choose not to pay.

See publication

Tags: Cybersecurity, Data Center

Cybersecurity in a Rapidly Evolving Threat Landscape
LinkedIn
October 26, 2020
It’s hard to imagine modern life (particularly with the recent emphasis on remote work) without the level of connectivity we currently enjoy. Businesses are hard at work increasing the capability of that connectivity: We’re connecting more and more devices through the Internet of Things (IoT), and making a leap forward in speed, bandwidth and reduced latency with 5G. This trend of exponential growth of devices is expected to continue for the foreseeable future and it will bring a larger attack surface and many new threat vectors to the security equation.

See publication

Tags: Cybersecurity, Leadership, 5G

5 Keys to Successfully Implementing a Productive Remote Workplace
Oracle
March 30, 2020
Wrote article for Oracle Security. The title of the article was "5 Keys to Successfully Implementing a Productive Remote Workplace".

See publication

Tags: Cybersecurity, Emerging Technology, Privacy

5 Author Newsletters
The Critical Intersection
Linkedin
November 21, 2023
Welcome to the newly renamed The Critical Intersection newsletter delivered to you every Tuesday and Friday! As artificial intelligence and cybersecurity, along with other technologies increasingly converge, understanding these critical intersections will be vital for organizations seeking to navigate a complex threat environment.

See publication

Tags: AI, Cybersecurity

OpenAI CEO Says GPT-5 Could Be Superintelligent
The Critical Intersection newsletter
November 14, 2023
Welcome to the newly renamed The Critical Intersection newsletter! Previously known as The Morning Boot, have listened and refreshed this newsletter to better serve your interests in today's changing cybersecurity landscape. As artificial intelligence and cybersecurity, along with other technologies increasingly converge, understanding these critical intersections will be vital for organizations seeking to navigate a complex threat environment. The Critical Intersection aims to provide the most relevant insights to enhance your cyber resilience in today's complex threat landscape.

See publication

Tags: AI, Cybersecurity

Jan 11 2023 Edition of Morning Boot Cybersecurity Newsletter
Relevant Track, LLC.
January 11, 2023
January 11, 2023 edition of the Morning Boot Cybersecurity newsletter, as Mark shares actionable cybersecurity news, tips, original content, and practical advice.

Be part of a growing audience of more than 140,000+ tech and cybersecurity professionals who get insights from my content.

See publication

Tags: Cybersecurity, EdTech, Security

Jan 03 - Morning Boot Newsletter
Relevant Track, LLC.
January 03, 2023
January 3, 2023 edition of the Morning Boot Cybersecurity newsletter, as Mark shares actionable cybersecurity news, tips, original content, and practical advice.

Be part of a growing audience of more than 140,000+ tech and cybersecurity professionals who get insights from my content.

See publication

Tags: AI, EdTech, Security

Morning Boot Cybersecurity Newsletter
Relevant Track, LLC.
October 17, 2022
Sign up for my Morning Boot cybersecurity newsletter, as I share actionable cybersecurity news, tips, original content and practical advice.

Be part of a growing audience of more than 140,000+ tech and cybersecurity professionals who get insights from my content.

See publication

Tags: AI, Cybersecurity, Security

6 Board Memberships
Boost CoPilot
VerticalizeAI
August 01, 2023
Generative AI-based Personal AI-Powered Sales Multiplier application and company focused on salespersons, entrepreneurs, and small business owners.

As a salesperson, entrepreneur, or small business owner, have you ever wished you had an extra set of hands or two to increase productivity and sales?

Introducing Boost CoPilot, your AI-driven sales co-worker who automates tasks, improves productivity, and enhances communication. Stop wasting time on tedious tasks and focus on selling.

See publication

Tags: AI, Cybersecurity, Security

Board Member - Cybervizer
Cybervizer
November 02, 2020
Board Member at Cybervizer, which is focused on cybersecurity and cloud consulting and influencer activities for organizations like HP, AT&T, Oracle and others.

See publication

Tags: AI, Cloud, Cybersecurity

Board Member
WellAware
May 11, 2020
Board Member for WellAware, a top IIoT company that has raised over $160MM. Top-level customer list coupled with innovative technology and SaaS business model means incredible value.

See publication

Tags: Digital Transformation, IoT, Privacy

FireScope, Inc.
FireScope, Inc.
August 28, 2006
I was a board member for FireScope, Inc., Corporate Board for nine years.

See publication

Tags: AI, Cybersecurity, IoT

SMU Cox Business School Board
SMU
September 10, 1999
I was a board member for the Southern Methodist University’s Cox School of Business for three years.

See publication

Tags: AI, Cybersecurity, Emerging Technology

Vectrix Board Member
Vectrix, Inc
May 20, 1996
Mark was a board member of the Vectrix Corporate Board for 5 years.

See publication

Tags: AI, Cybersecurity, Digital Transformation

2 Books
Cybersecurity Life Skills for Teens
Relevant Track, LLC
April 21, 2023
In today’s digital age, it’s more important than ever for teens to be equipped with the knowledge and skills to navigate the online world safely and securely. “Cybersecurity Life Skills for Teens” is an essential guide to help teens protect their privacy, reputation, security, and themselves while online. This book covers everything from the basics of cybersecurity and social media savvy to careers in cybersecurity.

Many teens have questions about cybersecurity, given they spend so much time on their devices browsing, shopping, researching, and texting with friends, yet don’t know where to turn.

Good news! They have a place now.

Cybersecurity Life Skills for Teens by Mark Lynd helps teens deal with the many cybersecurity challenges they face in their daily lives.

See publication

Tags: Cloud, Cybersecurity, Security

The CyberSecurity Intelligence Report - Bot Mitigation & Management
Oracle
February 04, 2019
Cybersecurity is like fighting a never-ending battle against a relentless foe. It’s not about wiping out the threat for good; it’s about staying one step ahead.

Bot Management is a crucial tactic in this ongoing battle. Right now, over 50% of internet traffic is bots. However, not all bot traffic is bad. For example, search engine and RSS bots help your site increase visibility and provide real-time content updates. The challenge is both telling human from bot and good bot from bad. We created this briefing to help organizations take control of their cybersecurity, starting with bot management and mitigation. We asked cybersecurity experts for their best tips on identifying bots, mitigating damage, and creating a culture of security in your organization.

See publication

Tags: AI, Cybersecurity, Security

1 Book Award
Cybersecurity Life Skills for Teens
Amazon
May 09, 2023
Achieved #1 New Release on Amazon in the Teen & Young Adult Nonfiction category

See publication

Tags: Security

7 Book Chapters
Dell's Innovation Accelerated eBook
Dell
July 18, 2023
Discover how to overcome today’s challenges and turn ideas into innovations faster with Dell Technologies.

See publication

Tags: AI, Cybersecurity, Security

Innovate with a Confidence Born in Security eBook
Dell
June 26, 2023
Discover how a modern security strategy empowers innovation with Dell Technologies

See publication

Tags: AI, Cybersecurity, Security

Work and Innovate Everywhere eBook eBook by Dell Technologies
Dell
June 26, 2023
Discover how to empower your people with the tools they need to innovate everywhere with Dell Technologies.

See publication

Tags: AI, Cybersecurity, Security

Can Artificial Intelligence (AI) be Trusted to Run Cybersecurity?
Packt
January 20, 2020
Shira Rubinoff's Cyber Minds brings together the top authorities in cybersecurity to discuss the emergent threats that face industries, societies, militaries, and governments today. With new technology threats, rising international tensions, and state-sponsored cyber attacks, cybersecurity is more important than ever. Cyber Minds serves as a strategic briefing on cybersecurity and data safety, collecting expert insights from sector security leaders, including: General Gregory Touhill, former Federal Chief Information Security Officer of the United States Kevin L. Jackson, CEO and Founder, GovCloud Mark Lynd, Digital Business Leader, NETSYNC Joseph Steinberg, Internet Security advisor and thought leader Jim Reavis, Co-Founder and CEO, Cloud Security Alliance Dr. Tom Kellerman, Chief Cybersecurity Officer for Carbon Black Inc and Vice Chair of Strategic Cyber Ventures Board Mary Ann Davidson, Chief Security Officer, Oracle Dr. Sally Eaves, Emergent Technology CTO, Global Strategy Advisor – Blockchain AI FinTech, Social Impact award winner, keynote speaker and author Dr. Guenther Dobrauz, Partner with PwC in Zurich and Leader of PwC Legal Switzerland Barmak Meftah, President, AT&T Cybersecurity Cleve Adams, CEO, Site 1001 (AI and big data based smart building company) Ann Johnson, Corporate Vice President – Cybersecurity Solutions Group, Microsoft Barbara Humpton, CEO, Siemens USA Businesses and states depend on effective cybersecurity.

See publication

Tags: AI, Cybersecurity, Security

Closing Vulnerabilities
Oracle Dyn
October 15, 2018
Security misconfiguration is the most common website vulnerability that most people are not aware
of. Many business leaders assume that after they have approved the purchase and installation of security products and services that they are fully protected.

See publication

Tags: Cloud, Cybersecurity

Closing Vulnerabilities
Oracle Dyn
October 15, 2018
Security misconfiguration is the most common website vulnerability that most people are not aware
of. Many business leaders assume that after they have approved the purchase and installation of security products and services that they are fully protected.

See publication

Tags: Cloud, Cybersecurity

Emerging Trends
Oracle Dyn
October 15, 2018
Some of the most important current trends in bot traffic and site exploitatiOn

See publication

Tags: Cloud, Cybersecurity, Emerging Technology

2 eBooks
9 Valuable Things Leaders Should Know About Cyber Insurance
Relevant Track, LLC.
November 14, 2022
Understand How to Obtain Proper Coverage, Reduce Premiums, Eliminate Gaps and More

Knowledge is always the best weapon in a Leader’s arsenal, and cyber insurance is no exception. Remote work and sophisticated cyber threats have more than doubled your attack surface in the last two years increasing cyber insurance premiums 74%.

Join hosts Netsync and Arctic Wolf, for an information packed session featuring one of the nation’s top cybersecurity experts, Mark Lynd, Head of Digital Business at Netsync..

As a recognized global thought-leader, Mark will untangle the most pressing issues surrounding Cyber Insurance, including getting insured, meeting audit requirements and avoiding cyber insurance claim issues that every business needs to know.

See publication

Tags: AI, Cybersecurity, Security

15 Enterprise Security Myths Exposed
Relevant Track
November 07, 2016
***eBook by Mark Lynd *** Unfortunately, there are still too many enterprise security myths being perpetuated and this can negatively impact many enterprises through a false sense of security. This interactive eBook seeks to expose and combat those myths.

See publication

Tags: Big Data, Cybersecurity, Security

5 Founders
Relevant Track
Relevant Track
September 17, 2013
Founded in 2013 and focused on delivering high quality AI, cybersecurity and Data Center solutions, thought leadership and engagements. Customers include FedEx, Intel, IBM Watson and many others.

See publication

Tags: AI, Cybersecurity, Data Center

Relevant Track, LLC
Relevant Track, LLC
April 15, 2013
Founded Relevant Track, LLC in April, 2013 to provide cybersecurity, AI and cloud consulting.

See publication

Tags: AI, Cloud, Cybersecurity

FireScope, Inc.
FireScope, Inc.
August 28, 2006
Co-founded FireScope on August 28, 2006 - During my tenure Mark served as CMO, CIO, Chief Product Officer, CISO , EVP Partners supporting offices in North America, EMEA and APAC, until December 2014.

Provides technology and go to market leadership for the global FireScope organization. An innovative SaaS Service Management company dedicated to simplifying IT operations and determining the business impact that technology has on a business. Mark architected and provided the technology and marketing vision for the FireScope Stratis solutions. Under Mark’s leadership FireScope developed and deployed Stratis, the only commercial multi-tenant elastic (3 tiers) management cloud with big data back-end product in the world, while working closely with the customers to make sure it met their needs.

See publication

Tags: AI, Cloud, Cybersecurity

Co-Founded Vectrix
Vectrix
April 01, 1996
Led a team of 400+ creative and highly motivated professionals that help our clients put digital capabilities at the core of their ability to improve, enable and transform, their businesses and the way they engage their customers. We did this by offering digital branding, technology advisory, development, digital marketing, digital analytics in an integrated fashion. We did this for customers like P&G, American Airlines, M&M Mars, Coors, Time Warner, Victoria Secrets, Anheuser Busch, etc...

• Doubled company’s size to $32M in twenty-seven months.
• Led and worked closely with sales and creative teams to drive top-line revenues.
• Developed GTM strategy and operating plan, identified and acquired management team, and led
due diligence for four acquisitions.
• Built lasting collaborative relationships and alliances with iconic customers and partners
• Led delivery of numerous marketing, information technology and e-commerce
solutions to large client base including VISA, Chase, Motorola, M&M/Mars, Nabisco& Fandango

See publication

Tags: AI, Cybersecurity, Data Center

Innovative Business Technologies, Inc. (“IBT”)
IBT, Inc.
May 14, 1993
IBT was a technology com-any based in Tulsa, Oklahoma focused on Artificial Intelligence and RPG III to “C” conversions. It was sold to one of the largest technology companies in the world at the time. It was purchased because of its expert systems around technology operations.

See publication

Tags: AI, Data Center, Emerging Technology

1 Industry Award
Top 100 Global Thought Leaders and Influencers to Follow in 2020
The Awards Magazine
February 15, 2021
Top 100 Global Thought Leaders and Influencers to Follow in 2020 by The Awards Magazine

See publication

Tags: Cybersecurity

3 Industry Certifications
Okta Pre-Sales Proficient Certification
Okta
May 19, 2020
Okta Identity Management Partner Sales Fundamentals Certification

Issued May, 2020 – Expired May, 2022

See publication

Tags: AI, Cloud, Cybersecurity

Okta Sales Fundamentals Accreditation
Okta
May 19, 2020
Okta Identity Management Sales Fundamentals Accreditation

Issued May, 2020 – Expired May, 2022

See publication

Tags: AI, Cloud, Cybersecurity

Okta Presales Fundamentals Accreditation
Okta
May 19, 2020
Okta Identity Management Presales Fundamentals Accreditation

Issued May, 2020 – Expired May, 2022

See publication

Tags: AI, Cloud, Cybersecurity

5 Influencer Awards
30 Security Experts to Follow in 2023
Media Sonar Technologies
June 05, 2023
Next up on our list of security experts is Mark Lynd, Head of Digital Business at NETSYNC., a global technology value-added reseller.

Lynd is an accomplished executive with over 23 years of experience in technology and cybersecurity. Throughout his distinguished career, he has held various leadership positions, including CEO, CIO, CTO, and CISO, for several global organizations.

See publication

Tags: Security

Top Cyber Security Experts & Influencers to follow in 2023
Whizlabs
April 27, 2023
As everything becomes digitized, cybersecurity has become an ever-growing field in ensuring the safety and security of our digital world. With the constant looming of cyber attacks, it’s more important to stay up-to-date on the latest trends and insights in the industry.

To help you stay ahead of the curve, we’ve picked some top cybersecurity influencers in no particular order to follow in 2023. From industry experts to ethical hackers, these thought leaders can pave the way for a safer digital future.

See publication

Tags: Cybersecurity

15 5G Experts to Follow on Social Media
AT&T
November 16, 2021
15 5G Experts to Follow on Social Media by AT&T

See publication

Tags: 5G

Ranked #6 in Cybersecurity Power 100
Rise.Global
September 20, 2019
Currently Ranked #6 in Cybersecurity Power 100 by Rise.Global.

See publication

Tags: Cybersecurity, Social

#8 Ranked AI Thought Leader by Rise.Global
Rise. Global
September 20, 2019
Currently ranked the #8 AI Thought Leader by Rise.Global

See publication

Tags: AI, Digital Transformation, Social

13 Keynotes
Automation and Efficiency Via Artificial Intelligence
MISAC
September 25, 2023
Netsync’s Mark Lynd is on tap to present “Automation and Efficiency Via Artificial Intelligence” at the 2023 MISAC Annual Conference scheduled for September 24-27 at the Westin Rancho Mirage Golf Resort & Spa in Rancho Mirage, California. Lynd’s keynote is scheduled for Monday, September 25th.

In describing his presentation, Lynd stated “we will explore the possibilities of automation powered by artificial intelligence in aiding governments to enhance their efficiency and effectiveness. We will focus on how AI can take charge of tasks, minimize errors, and improve decision-making. We will also examine how AI can facilitate an understanding of constituents’ needs and preferences empowering local governments to deliver improved services to their communities.”

Lynd has over two decades of IT experience. Currently, he’s the Head of Executive Advisory & Corporate Strategy at Netsync where he helps public and private sector clients worldwide. Lynd’s accomplishments include being ranked as the #1 Global Security Thought Leader in 2022 by Thinkers360. He is also recognized as a top global cybersecurity and AI expert and keynote speaker.

Lynd is a four-time CIO and CISO for several global organizations, including a global financial services organization operating in 27 countries. He has contributed expertise to academic and technology boards, including SMU’s Cox School of Business.

In addition, Lynd is a proud military veteran having served honorably in the US Army’s 3rd Ranger Battalion & 82nd Airborne. Mark holds a Bachelor of Science from the University of Tulsa and he attended The Wharton School.

See publication

Tags: AI, Cybersecurity, Security

5 Brilliant Ways to Reduce Cybersecurity Risk for Your Organization
Netsync
April 13, 2023
Keynote on lowering cyber risk and incident response for Lake Travis ISD Administration, staff, and principals. This included a 2+ hour Incident Response Table Top.

See publication

Tags: AI, Cybersecurity, Security

Modern Risk Management for K12
Netsync
January 19, 2023
Keynote for Leadership, Extended Cabinet, and Principals on lowering cyber risk and incident response for San Antonio ISD Cyber Summit. This included a 3+ hour Incident Response Table Top.

See publication

Tags: AI, Cybersecurity, Security

How To Be More Secure with Zero Trust and MFA
Netsync
August 24, 2022
Join the Netsync and Cisco team for an evening of
specialty cocktails and open discussion around your top
security concerns. #1 Security Thought Leader, Mark Lynd
will lead the discussion around Zero Trust and Multifactor
Authentication. If you're in West Texas, you don't want to
miss this event with some of the top security experts from
both Cisco and Netsync.

See publication

Tags: Cloud, Cybersecurity, Security

Netsync SKO - 52 Exhibitors and Manufacturers
Netsync
July 12, 2022
I did the keynote for the Cybersecurity Sessions/day included Okta, Cisco, Artic Wolf and Intel in my presentation. This was in front of over 200+ people, 52 Exhibitors and Manufacturers.

See publication

Tags: Cloud, Cybersecurity, Security

Keynote at BSides Conference
South Texas College
May 21, 2022
Keynote at BSides Conference at South Texas College in McAllen, Texas

See publication

Tags: AI, Cybersecurity, Security

Lowering K12 Risk Through Quality Incident Response
Region 1 Service Center
October 29, 2021
Gave keynote address at Region 1 Technology Summit in McAllen, Texas.

See publication

Tags: AI, Cloud, Cybersecurity

Proper Incident Response Table Top
Texas Education Technology Leaders
October 22, 2021
Gave Keynote Table Top at Texas Education Technology Leaders Fall Summit, TECC-West Campus, Lewisville ISD

See publication

Tags: AI, Cloud, Cybersecurity

Technology Leadership Academy: Infrastructure Readiness & Security
Technology Leadership Academy
December 08, 2020
Gave keynote to the Technology Leadership Academy to over 31 K12 CIOs on "Infrastructure Readiness & Security".

See publication

Tags: AI, Cloud, Cybersecurity

Ransomware: Protect. Detect. RESPOND.
University 0of Redlands
October 29, 2019
Gave keynote at University of Redlands Technology Summit to over 200 people. It was how to protect, detect and respond to a ransomware attack.

See publication

Tags: Cloud, Cybersecurity, Data Center

Ransomware: Protect. Detect & Respond in McAllen, Texas
Region One Education Service Center
October 25, 2019
Discuss how ransomware has become top of the mind issue for CIOs and CISOs globally.

Although today’s hyperconnected world offers numerous benefits, it also brings with it the specter of cybercrime. More connected devices mean more entry points into a network and a broader attack surface. With the proliferation of malware, such as cryptojacking, phishing and DDoS attacks, it’s estimated that more than 100,000 malicious cyberassaults take place each and every day.



Join Netsync as we discuss how to be proactive and mitigate your risk to ransomware.

- What steps to take in the first 24 hours after a ransomware attack
- To pay or not to pay? Understand how to make the best decision for your organization
- 7 key steps to protect your organization from malicious ransomware attacks

See publication

Tags: Cloud, Cybersecurity, Data Center

Ransomware: Modern Day Scourge
Netsync & Cisco
October 24, 2019
Discuss how ransomware has become top of the mind issue for CIOs and CISOs globally. Also discussed how to put together a comprehensive strategy to combat ransomware.

Although today’s hyperconnected world offers numerous benefits, it also brings with it the specter of cybercrime. More connected devices mean more entry points into a network and a broader attack surface. With the proliferation of malware, such as cryptojacking, phishing and DDoS attacks, it’s estimated that more than 100,000 malicious cyberassaults take place each and every day.



Join Netsync as we discuss how to be proactive and mitigate your risk to ransomware.

- What steps to take in the first 24 hours after a ransomware attack
- To pay or not to pay? Understand how to make the best decision for your organization
- 7 key steps to protect your organization from malicious ransomware attacks

See publication

Tags: Cloud, Cybersecurity, Data Center

CISO v. CIO - Comparing Operation Goals with Contrasting Cyber Security Concerns
ElevateIT
July 11, 2019
This will surely be the Keynote of the Year, as both of these dynamic speaker and industry leaders provide insight into their worlds as they guide you through the challenges the C-Suite faces monetizing technology, weighed against ever present security risks.

See publication

Tags: Cloud, Cybersecurity, Digital Transformation

7 Media Interviews
Leading Efforts Towards Building a Safer & More Resilient Digital World
Digital First Magazine
August 21, 2023
Recently, in an exclusive interview with Digital First Magazine, Mark shared his insights on the future of cybersecurity landscape, his professional journey, key recommendations for CISOs on how to make informed decisions, success mantras, words of wisdom, and much more. The following excerpts are taken from the interview.

See publication

Tags: AI, Cybersecurity

Media Interview at Dell Tech World
Dell
August 02, 2023
Media Interview with Courtney Hughes at Dell Tech World. It was live at Dell Tech World and also streamed around the world.

See publication

Tags: Cloud, Cybersecurity, Security

Fortify and Protect Your Organization from Cyber Threats with PowerProtect
Dell
May 23, 2023
Hear how the PowerProtect portfolio can help preserve data integrity and uses machine learning to help ensure recoverability from Brian, Mark, and Jim.

See publication

Tags: AI, Cybersecurity, Security

Cybersecurity Conversation with Mark Lynd, Head of Digital Business, NETSYNC
The New York Information Security Meetup
October 21, 2021
Cybersecurity Conversation with Mark Lynd, Head of Digital Business, NETSYNC. They cover Deep Fakes, AI and cybersecurity.

See publication

Tags: AI, Cloud, Cybersecurity

Interview with Mark Lynd, Head of Digital Business, NETSYNC
The New York Information Security Meetup
September 28, 2021
Interview with Mark Lynd, Head of Digital Business, NETSYNC

See publication

Tags: AI, Cloud, Cybersecurity

Oracle Influencer Roundtable
Oracle
September 17, 2019
We were video interviewed at Oracle OpenWorld 2019 for Oracle Influencer Roundtable at the Moscone Studios.

See publication

Tags: AI, Cloud, Cybersecurity

Building Trust with Digital Identity and Blockchain
ThreatMetrix
May 02, 2018
I recently joined Frank Teruel, CFO of ThreatMetrix for the latest Digital Identity 360 Video Episode: “Building Trust with Digital Identity and Blockchain” Watch video here: http://bit.ly/2jAQUtW

See publication

Tags: AI, Blockchain, Cybersecurity

1 Mentor
Executive Security Mentor for Texas A&M Security Interns
Texas A&M
August 18, 2022
I was the Executive Security Mentor for 3 Texas A&M Security Interns during the Summer of 2022. All three successfully completed their internship.

See publication

Tags: Cloud, Cybersecurity, Security

7 Miscellaneouss
How Intel vPro Multilayer Security Protects Your Business
Intel
June 21, 2023
Wrote and create video content for sponsored article for Intel vPro.

See publication

Tags: AI, Cybersecurity, Security

Influencer Engagement with Security Scorecard
Security Scorecard
March 20, 2023
SecurityScorecard continues to share its excellent #cybersecurity insights from #WEF23. They dive into more topics that they uncovered around geopolitical tensions, cyber privacy regulations, security-focused business culture, and more.

See publication

Tags: AI, Cybersecurity, Security

Sponsored NetScout Webinar Tweets
NetScout
July 26, 2022
Performed a Sponsored NetScout Webinar Tweets session supporting NetScout Webinar

See publication

Tags: AI, Cybersecurity, Security

Sponsored Twitter Chat for NetScout
NetScout
June 14, 2022
I did a paid sponsored Twitter chat for NetScout

See publication

Tags: Cloud, Cybersecurity, Security

Five Cybersecurity Experts on Protecting Your Brand on Social Media
SafeGuard Cyber
November 10, 2021
What are some of the ways you can secure your social platforms and everything connected to them? Here’s what five industry experts and thought leaders have to say about protecting your brand’s social media accounts.

See publication

Tags: AI, Cloud, Cybersecurity

AT&T BizTalk Twitter Chat - Top Security Concerns and Crucial next Steps
AT&T
June 16, 2021
Online Twitter chat regarding "Top Security Concerns and Crucial next Steps" with 7 of the top cybersecurity influencers and SMEs globally.

See publication

Tags: AI, Cloud, Cybersecurity

AT&T #BizTalks
AT&T
October 08, 2020
AT&T #BizTalks Twitter chat, we a Participate in the chat on Wednesday, October 21 at noon CDT/1 pm EDT.

See publication

Tags: AI, Cloud, Cybersecurity

1 Miscellaneous
Hands-on Security Table Top Exercise for Leadership
TETL
October 22, 2021
Asked to be a guest lecturer/cyber expert and present with two academics at the Texas Education Technology Leaders event.

See publication

Tags: Cloud, Cybersecurity, Security

10 Panels
Fireside Chat on Modernizing and Securing the Academy
MoreNET
April 19, 2023
Maria Thompson and Mark Lynd, with Amazon Web Services (AWS)- Join Maria Thompson, AWS Cybersecurity Leader, and Mark Lynd, Head of Digital Business at Netsync for a Fireside Chat on Modernizing and Securing the Academy with AWS. Maria and Mark will highlight the challenges and threats facing the Education Sector and how Institutions can secure their campus. Topics of discussion will include the prevalence of Ransomware Attacks, Cyber Security Insurance, Recruiting and Retaining Cyber Security Talent, Cloud Security Governance & Best Practices, and Securing Multi/Hybrid Cloud.
• AWS – Head of Cybersecurity Maria Thompson
• Netsync Head of Digital Business – Mark Lynd
• AWS Partner Sales Manager – Tracie Bryant

See publication

Tags: AI, Cybersecurity, Security

Panel at RSA: Cybersecurity Secrets Revealed
NetScout
June 06, 2022
Spoke on panel at RSA with Jo Peterson, Gary Sockrider as we discuss "Cybersecurity Secrets Revealed".

See publication

Tags: AI, Cybersecurity, Security

Top Cyber Concerns: Cybersecurity Secrets Revealed
NetScout
June 06, 2022
I spoke at the RSA Conference with fellow influencer Jo Peterson for NetScout at their RSA event.

See publication

Tags: AI, Cybersecurity, Security

PureStorage Ransomware Roundtable
Pure Storage
February 08, 2021
PureStorage Ransomware Roundtable

See publication

Tags: AI, Cloud, Cybersecurity

BrightTalk: CISOs Are Turning to Security-as-a-Service
BrightTalk
November 12, 2020
Was a panelist on a BrightTalk panel titled: " CISOs Are Turning to Security-as-a-Service".

See publication

Tags: AI, Cloud, Cybersecurity

Cybersecurity in a Hyper-Connected World
LinkedIn
October 21, 2020
It’s time to talk cybersecurity on the next #BIZTALKS Twitter chat hosted by AT&T Business. Join me and other experts on Wednesday, October 21, at 12 pm CDT to participate in a discussion about the many facets of modern cybersecurity. https://bit.ly/3dxCCFi i #cybersecurity #TwitterChat

See publication

Tags: Cybersecurity, Management, Leadership

Cloud Adoption: Getting Everyone On Board Securely
Oracle
September 16, 2019
Our panel of four discussed the many things an enterprise should consider to securely going to the cloud.

See publication

Tags: Cloud, Cybersecurity, Digital Transformation

CSuite Forum: Planning for the Unplannable in IT - Unintended Consequences of Unexpected Real World Events
ElevateIT
July 11, 2019
Mark moderated a panel discussion regarding Planning for the Unplannable in IT - Unintended Consequences of Unexpected Real World Events with three others.

See publication

Tags: Cloud, Cybersecurity, Digital Transformation

North Texas Medical Cybersecurity Summit - Medical Cybersecurity is Changing Fast
WWT and CI.Security
April 25, 2019
An hour long panel with three CIOs from major healthcare organizations, in which I moderated and participated. This summit was sponsored by WWT and CI.Security and was held at Bitter Sisters’ Brewery’s hosting area.

See publication

Tags: AI, Cybersecurity, HealthTech

TeXchange - HACKS - FRAUD - BLOCKCHAIN - CYBER - SCARY
TexChange - Custis Hoge
April 17, 2019
A panel with three C-Suite executives that I moderated. The event was attended by 65+ people and the panel ran about 1.5 hours.

See publication

Tags: AI, Cloud, Cybersecurity

3 Podcasts
Connecting GRC With DRM
Kiteworks
May 15, 2023
In this Kitecast episode, Mark discusses the significance of GRC (Governance, Risk Management, and Compliance) in today’s technology landscape, which is being propelled by accelerated evolution in cyber threats, third-party risks, and data security issues in the cloud. One outcome is that organizations must prioritize GRC strategies rather than making them an afterthought. In addition, Mark argues that Digital Rights Management (DRM) is critical when implementing a GRC strategy that addresses a zero-trust model focused on protecting sensitive content.

Beyond connecting GRC with DRM, Mark also speaks about artificial intelligence (AI), why it is important to teach cybersecurity life skills to teenagers, what he will be covering in his next book, how lack of DRM governance in the higher education sector is exposing national secrets, and more. This is an insightful discussion for anyone interested in learning from a proven leader who is dedicated to digital transformation and cybersecurity.

See publication

Tags: AI, Cybersecurity, Security

TomorrowToday Show - Digital Doomsday
Tomorrow Today Show
July 15, 2022
I was a guest on the Podcast Tomorrow Today Show hosted by Dr. JT Kostman and the title on the episode was "Digital Doomsday".

See publication

Tags: AI, Cybersecurity, Security

The CyberHub Interview of Veteran Mark Lynd by James Azar
The Cyberhub Podcast
November 16, 2020
The CyberHub Interview of Veteran Mark Lynd by James Azar.

See publication

Tags: AI, Cloud, Cybersecurity

1 Presentation
Zero Trust for K12's
Netsync
May 17, 2021
This presentation is for K12's leadership in Texas, California, Arizona, and Florida regarding making investments into creating and maintaining a Zero Trust framework and architecture for their environments.

See publication

Tags: AI, Cloud, Cybersecurity

2 Quotes
World Backup Day
Promereon Group
March 20, 2023
We at Promereon Group asked Mark Lynd, Head of Digital Business at Netsync, for a #WorldBackupDay 2023 quote with his advice, insights, and thoughts on this huge topic, here's what he had to say.

See publication

Tags: Security

Thought Leader Quote for Data Privacy
Promereon Group
March 06, 2023
We asked the head of Digital Business at NETSYNC Mark Lynd, for his thoughts on the topic of #DataPrivacy:

"Threat intelligence's cyber resiliency-boosting power is generally overlooked. By understanding threat actors' current tactics, and techniques, businesses can improve situational awareness, cybersecurity spending, risk exposure, and security posture."

See publication

Tags: Security

32 Speaking Engagements
Innovation in Today's Insecure World
Dell
May 25, 2023
Did a speaking event on innovation and cyber. Truly enjoyed sharing the stage with Dell's Mindy Cancila and our media host Courtney today.

See publication

Tags: AI, Cybersecurity, Security

Zero Trust Demystified
Dell
May 24, 2023
Zero Trust - A word floating around our industry and gracing the front pages of the tech press. But what is it and how can IT organizations and security teams start their Zero Trust journey without stifling innovation? Join Dell's Herb Kelsey and industry expert Mark Lynd, as they cut through the hype and get to the reality of Zero Trust today.

See publication

Tags: AI, Cybersecurity, Security

Applying Zero Trust Principles to Your Hybrid-Cloud and Multi-cloud Environments
KeyData
January 25, 2023
Join me for this exciting upcoming "Applying Zero Trust Principles to Your Hybrid-Cloud and Multi-cloud Environments" Webinar

Looking forward to joining KeyData Associates CTO, Brian Read and Microsoft's Chief Security Advisor Ken Malcolmson CISSP CCSP, as we discuss how you can apply #ZeroTrust principles to your #hybridcloud and #multicloud environments.

Join our educational session to explain the key #riskmanagement strategies and how to best implement and maintain controls to meet Zero Trust principles.

Key take aways:

- Challenges that organizations are having when applying zero trust to their hybrid-cloud environments.
- A structured approach to developing your Zero Trust strategy and - some specific controls to achieve it.
- Examples and #bestpractices for applying Zero Trust in a multi-cloud and hybrid cloud environment
- How to get started assessing your current multi-cloud and hybrid #cloud environment

See publication

Tags: AI, Cloud, Security

Cisco Sponsored CISO Dinner Event
Cisco
August 11, 2022
I spoke/presented at a Cisco Sponsored CISO Dinner Event in Austin/

See publication

Tags: AI, Cybersecurity, Security

Zero Trust: Securing Modern Government Organizations
FLGISA
July 29, 2022
Gave one of only five top level presentations at Florida Government Information Systems Associations 2022 Conference in Ft Lauderdale, Florida.

See publication

Tags: Cloud, Cybersecurity, Security

Moderator for Okta Panel
Netsync
May 11, 2022
I was the moderator for Okta "Secure identity" Panel with 3 panelists. This was in front of over 200+ people, 52 Exhibitors and Manufacturers.

See publication

Tags: AI, Cybersecurity, Security

Moderator for Cisco "Introduction into SASE" Panel with 3 panelists
Netsync
May 10, 2022
I was the moderator for Cisco "Introduction into SASE" Panel with 3 panelists. This was in front of over 200+ people, 52 Exhibitors and Manufacturers.

See publication

Tags: Cloud, Cybersecurity, Security

Cyber Leadership & Culture
Radware
December 07, 2021
Speaker at Radware’s Frictionless Security Summit in Tuscon, Arizona

See publication

Tags: Cloud, Cybersecurity, Data Center

CISO's Response to Breaches and Data Loss
Netsync
November 17, 2021
Spoke at Netsync National Security Tour Event at Al Biernat's Board Room

See publication

Tags: AI, Cybersecurity, National Security

CISO
Texas Education Technology Leaders
October 22, 2021
Spoke at Netsync Cybersecurity Event at Al Biernat's Board Room

See publication

Tags: AI, Cloud, Cybersecurity

Zero Trust for K12's - Securing Education
Texas K12 CTO Council
June 16, 2021
Discuss the Zero Trust framework, which relies on the pretense of Never Trust Always Verify. Below is the agenda for the presentation:

1. Zero Trust in an Insecure World
-Threat Landscape
-New Cybersecurity Mindset
-Drivers of Zero Trust
-Zero Trust Benefits for K12

2. Zero Trust Framework
-Never Trust, Always Verify
-Zero Trust Model – Identity
-Zero Trust Model – Segmentation

3. Realizing Zero Trust
-Sample Approach - Evolving with your Organization
-7 Questions You Can Ask Yourself

4. Incident Response - Assume You Will Be Compromised
-The 6 Steps of Incident Response
-Incident Response Goals

It relates Zero Trust to other supported approaches like NIST and Texas Cybersecurity Framework.

See publication

Tags: Cloud, Cybersecurity, EdTech

Technology Leadership Academy Presentation
Cybervizer
January 12, 2021
Video presentation from Technology Leadership Academy Conference on Infrastructure Readiness and Security given to 30+ K12 CIOs and education Technology Executives.

See publication

Tags: AI, Cybersecurity, Leadership

TCEA Speaker: SOC Managed Services
Netsync
January 04, 2021
Exhibit Hall Speaker at TCEA 2021 about SOC Managed Services.

See publication

Tags: AI, Cloud, Cybersecurity

How Zero Trust Can Change The Way We Secure Higher Education
University of Redlands
October 08, 2020
This was a co-keynote speaking presentation at the University of Redlands Technology Summit,

See publication

Tags: Business Continuity, Cybersecurity, Digital Transformation

CCPA: 7 Things Every CISO Should Know
Oracle
February 26, 2020
Spoke at RSA for Oracle Security. The title of the speaking event was "CCPA: 7 Things Every CISO Should Know".

See publication

Tags: Cloud, Cybersecurity, Data Center

CCPA: 7 Things Every CISO Should Know
Oracle
February 25, 2020
Spoke at RSA for Oracle Security. The title of the speaking event was "CCPA: 7 Things Every CISO Should Know".

See publication

Tags: Cybersecurity, Emerging Technology, Privacy

Join Netsync, Cisco and NetApp at The Movies - Star Wars - Dallas, TX
Netsync
December 19, 2019
Come witness the event of the Galaxy!

Join us for the premier of Star Wars The Rise of Skywalker in Dallas on December 19th at Cinepolis Luxury Cinemas. Netsync, NetApp, and Cisco Meraki are your sponsors for this great event.

Enjoy food, drinks, and fun while reclining in luxury at Cinepolis Luxury Cinemas in Dallas, Texas.

See publication

Tags: AI, Cloud, Cybersecurity

Mitigate Your Risk For Ransomware - San Antonio, TX
Netsync
December 17, 2019
Although today’s hyperconnected world offers numerous benefits, it also brings with it the specter of cybercrime. More connected devices mean more entry points into a network and a broader attack surface. With the proliferation of malware, such as cryptojacking, phishing and DDoS attacks, it’s estimated that more than 100,000 malicious cyberassaults take place each and every day.

Join Netsync and Cohesity as we discuss how to be proactive and mitigate your risk to Ransomware.

What steps to take in the first 24 hours after a ransomware attack
To pay or not to pay? Understand how to make the best decision for your organization
7 key steps to proactively protecting your organization from malicious ransomware attacks

See publication

Tags: AI, Cybersecurity, Data Center

Mitigate Your Risk For Ransomware - Costa Mesa, CA
Netsync
December 05, 2019
Although today’s hyperconnected world offers numerous benefits, it also brings with it the specter of cybercrime. More connected devices mean more entry points into a network and a broader attack surface. With the proliferation of malware, such as cryptojacking, phishing and DDoS attacks, it’s estimated that more than 100,000 malicious cyberassaults take place each and every day.

Join Netsync, Cohesity, and Cisco as we discuss how to be proactive and mitigate your risk to Ransomware.

What steps to take in the first 24 hours after a ransomware attack
To pay or not to pay? Understand how to make the best decision for your organization
7 key steps to proactively protecting your organization from malicious ransomware attacks

See publication

Tags: AI, Cloud, Cybersecurity

Mitigate Your Risk For Ransomware - Redlands, CA
Netsync
December 04, 2019
Although today’s hyperconnected world offers numerous benefits, it also brings with it the specter of cybercrime. More connected devices mean more entry points into a network and a broader attack surface. With the proliferation of malware, such as cryptojacking, phishing and DDoS attacks, it’s estimated that more than 100,000 malicious cyberassaults take place each and every day.

Join Netsync, Cohesity, and Cisco as we discuss how to be proactive and mitigate your risk to Ransomware.

What steps to take in the first 24 hours after a ransomware attack
To pay or not to pay? Understand how to make the best decision for your organization
7 key steps to proactively protecting your organization from malicious ransomware attacks

See publication

Tags: AI, Cybersecurity, Data Center

Mitigate Your Risk For Ransomware
Netsync
November 14, 2019
Although today’s hyperconnected world offers numerous benefits, it also brings with it the specter of cybercrime. More connected devices mean more entry points into a network and a broader attack surface. With the proliferation of malware, such as cryptojacking, phishing and DDoS attacks, it’s estimated that more than 100,000 malicious cyberassaults take place each and every day.

Join Netsync, Cohesity, and Cisco as we discuss how to be proactive and mitigate your risk to Ransomware.

What steps to take in the first 24 hours after a ransomware attack
To pay or not to pay? Understand how to make the best decision for your organization
7 key steps to proactively protecting your organization from malicious ransomware attacks

See publication

Tags: AI, Cloud, Cybersecurity

CIO Roundtable: The Future of AI in the Enterprise
ElevateIT
October 16, 2019
Presented at CIO Roundtable: “The Future of AI in the Ever-Changing Enterprise Landscape” at ElevateIT Technology Summit in Houston, Texas

See publication

Tags: AI, Cybersecurity, Data Center

Technology Ball - STEM Education
Technology Ball
October 09, 2019
Discussed AI and cybersecurity for STEM at Technology Ball event.

See publication

Tags: AI, Cybersecurity, Data Center

Securing Business Critical Cloud Workloads: Threats, Implications, and Outcomes
Oracle
September 17, 2019
I spoke about how to secure workloads in a multi-cloud environent.

See publication

Tags: Cloud, Cybersecurity, Digital Transformation

How To Have A Strong Career In Cybersecurity
NPower
September 06, 2019
Spoke to a group of 49 students at NPower regarding a career in cybersecurity

See publication

Tags: AI, Cybersecurity, Digital Transformation

29 Videos
Video: Interviews Len Noble
Netsync
August 19, 2022
This week @mclynd speaks with Len Noble, Executive #Sales Director for #Netsync, to discuss our focus on #partnerships & how that impacts our customer's day-to-day experiences & our internal team's achievements in the #industry.

See publication

Tags: Cloud, Cybersecurity, Security

How industry leaders can keep up with an escalating volume of threats.
Skybox Security
August 18, 2022
What are the key ingredients of a risk-based #Cybersecurity strategy?

Another great part of my recent conversation with Skybox Security VP of Sales Engineering, Alastair Williams, was discussing how industry leaders can keep up with an escalating volume of threats.

Read the report Skybox Security recently released to learn how your organization can reduce #CyberRisk with proactive Security Posture Management.

See publication

Tags: Cloud, Cybersecurity, Security

Interviewed Alastair Williams from Skybox Security - 2nd video in series
Skybox Security
August 15, 2022
Interviewed Alastair Williams from Skybox Security about risk-based approach for Skybox Security as part of a series/campaign.

See publication

Tags: Cloud, Cybersecurity, Security

Interview with Dan Lier Former LA Laker and Noted Motivational Speaker
Netsync
August 10, 2022
This week @mclynd speaks with Dan Lier, keynote #speaker at the #Netsync SKO 2022 & premier Las Vegas #Sales and #Leadership Expert, to discuss the #psychology behind success and how personal beliefs drive behavior.

See publication

Tags: Cloud, Cybersecurity, Security

Interview on Security Partnerships with Kurt Sell
Netsync
August 02, 2022
This week @mclynd speaks with @theRealKurtSell, Sales Director for #Netsync, to discuss our commitment to customers and employees and the engineering excellence we provide partners.

See publication

Tags: Cloud, Cybersecurity, Security

Interviewed Alastair Williams from Skybox Security
Skybox Security
July 29, 2022
Interviewed Alastair Williams from Skybox Security about risk-based approach for Skybox Security as part of a series/campaign.

See publication

Tags: Cloud, Cybersecurity, Security

Interviewing with Security Architect Timothy Ramsey
Netsync
July 27, 2022
This week @mclynd speaks with Timothy Ramsey, Solutions Architect for #Netsync, to discuss how we provide our customers with the leading security solutions that give them peace of mind.

See publication

Tags: AI, Cybersecurity, Security

Interview with Okta's Ralph Figueiredo
Netsync
July 21, 2022
Mark speaks with @RalphCA1, Director of #PublicSector Alliances from
@okta, to discuss what #okta does & the top capabilities they provide to customers.

See publication

Tags: AI, Cybersecurity, Security

Interviewing Juniper's Ron Davis
Netsync
July 08, 2022
Interviewing Juniper's Ron Davis regarding their security offerings.

See publication

Tags: AI, Cybersecurity, Security

Netsync and Okta
Netsync Network Solutions
July 08, 2022
Okta Ralph Figueirdo speaks with Mark Lynd

See publication

Tags: Cloud, Cybersecurity, Security

Interviewing Netsync CEO Khalid Abunaja
Netsync
July 07, 2022
Netsync Khalid Abunaja peaks with Mark Lynd

See publication

Tags: Cloud, Cybersecurity, Security

Interviewing AppDynamics' Jamie Francher
Netsync
July 04, 2022
AppDynamics Jamie Francher speaks with Mark Lynd regarding monitoring and security.

See publication

Tags: AI, Cybersecurity, Security

Interview Chris Butler Regarding Security Sales and Channel
Netsync
July 04, 2022
Interview Chris Butler Regarding Security Sales and Channel

See publication

Tags: AI, Cybersecurity, Security

Interview with Security Architect Jacob Parks
Netsync
June 30, 2022
Interview with Security Architect Jacob Parks

See publication

Tags: AI, Cybersecurity, Security

Netsync Jeremy Freeman speaks with Mark Lynd regarding Security with ISDs
Netsync
June 29, 2022
Netsync Jeremy Freeman speaks with Mark Lynd regarding Security with ISDs

See publication

Tags: AI, Cybersecurity, Security

How to Secure Your Organization
Netysnc
March 14, 2022
Performed a video titled "How to Secure Your Organization".

See publication

Tags: Cloud, Cybersecurity, Security

Interview on Cybersecurity Journey with Enric Cuixeres Saez, the CIO for Leng-d'Or
Cisco
November 05, 2021
Performed a Cisco Sponsored Interview on Cybersecurity Journey with Enric Cuixeres Saez, the CIO for Leng-d'Or

See publication

Tags: AI, Cloud, Cybersecurity

7 Reasons People Matter in Cybersecurity
Cybervizer
February 11, 2021
People are an essential element in cybersecurity. While some may point out they can be a weakness, the bolder view is if properly trained, positioned and prepared can have a very positive impact on an organization’s security posture.

See publication

Tags: Cybersecurity

Interview with Ray White: Remote Work and Ransomware
Netsync
July 30, 2020
Mark Lynd, Head of Digital Business for Netsync talks with Ray White, Business Development Manager for NetApp about Remote Work and Ransomware.

See publication

Tags: AI, Cloud, Cybersecurity

Video Interview with Verizon’s Bob Carver – Top 5 Challenges of Securing The Remote Workplace
Cybertvizer
July 12, 2020
Take a look at my interesting Interview with Bob Carver, CISM, CISSP, Principle, Cybersecurity Threat Intelligence and Analytics at Verizon.

Bob addresses the top 5 challenges of securing remote workplaces, including home routers, Wi-Fi, and #VPN providers and the #vulnerabilities that have surfaced as a result of the precipitous rise in remote working due to the #COVID19 pandemic.

See publication

Tags: Analytics, Cybersecurity

How Cities are Leveraging the Remote Workplace
Netsync
May 24, 2020
My relevant Interview with Juergen Bayer, Sr Security Advisor, at Hewlett Packard Enterprise.
We talks about the importance of endpoint security and strong security hygiene in remote work environment in today’s challenging times. Many organizations are being forced to find ways to secure their remote environments due to the #COVID19 pandemic and, as a result, need to find innovative ways to secure #BYOD ("Bring Your Own Device") and workers/students homes.

See publication

Tags: Cybersecurity, Future of Work, Privacy

Leveraging the Cloud for Remote Work
Netsync
May 23, 2020
My interesting Interview with Jo Peterson, VP of Cloud and Security Services for Clarify360. She is also a 2016-2020 CRN Women of the Channel Recipient. She is a member of the Forbes Technology Council and one of the Top Global Thought leaders regarding the Cloud.

See publication

Tags: Cloud, Cybersecurity, Privacy

Security Concerns While Working From Home
Netsync
May 23, 2020
Great discussion with Chuck Brooks, top ranked #cybersecurity thought leader, and visionary named #LinkedIn's Top Technology Person to Follow. In this interview we discuss security concerns for #remotework during #COVID19. We discuss concerns, #threats and opportunities that exist around securing the #remoteworkplace now and in the future.

See publication

Tags: Cybersecurity, Future of Work, Privacy

Leverage the Remote Workplace and thrive
Netsync
May 10, 2020
My relevant Interview with Juergen Bayer, Sr Security Advisor, at Hewlett Packard Enterprise.
We talks about the importance of endpoint security and strong security hygiene in remote work environment in today’s challenging times. Many organizations are being forced to find ways to secure their remote environments due to the #COVID19 pandemic and, as a result, need to find innovative ways to secure #BYOD ("Bring Your Own Device") and workers/students homes.

See publication

Tags: Cybersecurity, Future of Work, Privacy

5 Challenges of Securing a Remote Workplace
Netsync
April 26, 2020
My interview with Bob Carver, CISM, CISSP, Principle, Cybersecurity Threat Intelligence and Analytics at Verizon. Bob addresses the top 5 challenges of securing remote work places, including home routers, Wi-Fi, and #VPN providers and the #vulnerabilities that have surfaced as a result of the precipitous rise in remote working due to the #COVID19 pandemic.

See publication

Tags: AI, Cloud, Cybersecurity

1 Video
Moving to the Cloud: SAISD & AWS
AWS
February 09, 2023
In this professionally shot video by a crew out of Chicago on the San Antonio ISD Downtown campus, we discussed their move to the cloud and securing the cloud. It was a 2.5-minute video used to showcase their technology investments to their community.

See publication

Tags: Cloud, EdTech, Security

1 Visiting Lecturer
Lecture: Cyber Risk Management in Education
SAISD
September 19, 2022
Gave a lecture titled Cyber Risk Management in Education for the Superintendent, the Leadership Team, District Cabinet, Principals, and Students from San Antonio ISD (one of Texas' largest school districts).

See publication

Tags: AI, Cybersecurity, Security

1 Webinar
Zero Trust - The Only Way To Secure The Modern Business - A Master Class
Netsync
July 21, 2022
A webinar on BrightTalk sponsored by Cisco titled: "Zero Trust - The Only Way To Secure The Modern Business - A Master Class"

See publication

Tags: AI, Cybersecurity, Security

1 Workshop
Cybersecurity Workshop & Incident Response Tabletop with Mark Lynd
Netsync
August 02, 2023
Educational tabletop event (Murder - Mystery Style Format) to gain hands-on experience with incident response. This event is perfect for anyone who wants to be better prepared for cyber incidents or wants to improve their incident response capabilities.

See publication

Tags: AI, Cybersecurity, Security

Thinkers360 Credentials

17 Badges

Radar

3 Predictions
2024 Predictions for Cybersecurity

Date : December 09, 2023

By 2024, we can expect to see greater integration of AI in cybersecurity solutions, which will significantly enhance our ability to detect and respond to threats. However, it's important to acknowledge that AI also brings with it some new risks, such as adversarial attacks and concerns around data privacy. Striking a balance between leveraging the benefits of AI while mitigating its drawbacks will be crucial.

Global supply chains and critical infrastructure will continue to be prime targets for ransomware attacks in the coming years. To protect against such threats organizations should adopt proactive measures like implementing near real-time recovery systems and having comprehensive incident response plans in place.

There will be a rise in disinformation campaigns that utilize realistic fake content generated by AI as a means to manipulate public opinion and extort money. To combat this growing cyberattack vector effectively organizations must prioritize source verification techniques, and implement reliable methods for authenticating online information.

As technology advances at an accelerated pace throughout 2024, cyber threats will become even more sophisticated. Maintaining continuous vigilance and adaptability will be key factors in staying ahead of these evolving challenges.

See Radar

2023 Predictions for Cybersecurity

Date : December 15, 2022

"As we head into 2023, the unprecedented convergence of geopolitical tensions, rising attack surfaces, supply chain obstacles, intensifying threat vectors, economic instability, and a pandemic have forced organizations and individuals to adapt in ways that will forever shape our lives and how businesses secure themselves. The far-reaching implications of these events will be felt throughout 2023, and reinforces the need to be proactive in quantifying and mitigating cyber risk both personally and professionally. Quantifying cyber risk is critical to understanding their cyber spend and also how they cyber insure to cover any unacceptable risk. Due to all these issues cybersecurity teams are burnt-out, over-worked and facing greater threats than ever before and it is impacting their cyber efforts and affecting us all both personally and professionally.

Therefore, many organizations and their leadership are putting greater thought into automation and artificial intelligence to help take some of the load off of their over-worked security teams and also to allow for their leadership and teams to accomplish more with less. This is especially important given the rise in the number of attacks and their increasing sophistication. AI and automation can be used to handle some of this tedious and time-consuming work and give leadership greater visibility into their security environment. Lastly, threat intelligence and incident response were receiving more attention and greater acceptance in the second half of 2022 and rightfully so. We should expect that to continue to accelerate throughout 2023."

See Radar

2022 Predictions for Cybersecurity

Date : December 03, 2021

In 2022, public and private sector organizations and their CIOs and CISOs will face a far more challenging cybersecurity environment as cyber-attacks are increasingly more sophisticated and destructive, even using artificial intelligence. This alarming evolution that affects almost everyone coupled with the rapid digital transformation of nearly every organization globally has dramatically increased the attack surfaces and number of threat vectors for organizations big and small. According to a recent report by Shred-it, 67% of small businesses in the U.S. do not have an incident response plan. This lack of preparedness is likely even worse globally. The truth is most organizations have spent money, time, and resources on prevent and detect and very little on respond leaving them vulnerable and at high risk. Therefore, many leading organizations, their boardrooms and leadership are thinking about cybersecurity differently and assuming they will be hit at some point and investing to be better prepared if they do. They are increasingly looking to other technologies and cyber frameworks like the cloud, Zero Trust, machine learning, NIST, Identity and Access Management, threat intelligence and others. This trend will continue throughout 2022 and beyond as the stark reality that these nefarious activities are not decreasing but increasing as the bad actors continue to profit from it.

See Radar

Blog

1 Article/Blog
Cybervizer
Thinkers360
January 14, 2021
A blog, video and podcast website by and for Mark Lynd, a Top 10 ranked thought leader, speaker and influencer focused on cybersecurity, AI and cloud.

See blog

Tags: AI, Cloud, Cybersecurity

Opportunities

1 Keynote
Cybersecurity and Ransomware

Location: Virtual or In-person Event as appro    Date Available: December 04th, 2020     Fees: $1,500 - $10,000 depending on activ

Submission Date: December 04th, 2020     Service Type: Service Offered

Have multiple talking tracks around cybersecurity, ransomware, business continuity, cloud security and others.

Mark has done keynote speaking and speaking for STEM Events, NPower, Veteran Events, CIO Technology Council - Dallas, Oracle, RSA, IBM Watson, Intel, Cisco, Cohesity, HP and many others.

Respond to this opportunity

Contact Mark Lynd

Book Mark Lynd for Speaking

Book a Meeting

Media Kit

Share Profile

Contact Info

  Profile

Mark Lynd


Latest Activity

Latest Opportunities