Customer Advisory Board Member for Centrify
Centrify
December 10, 2020
Customer Advisory Board Member for Centrify
See publication
Tags: AI, Cloud, Cybersecurity
OPT, Inc.
OPT
November 16, 2020
Advisory board member for OPT, Inc. for cybersecurity and digital transformation
See publication
Tags: AI, Cloud, Cybersecurity
2019Elevate IT Advisory Board
ElevateIT
January 01, 2020
Advisory board member for The ElevateIT: DFW Technology Summit which is designed to connect you with local experts and resources to assist with your IT & Security needs. The 2nd Annual ElevateIT: DFW Technology Summit will be hosted at the Irving Convention Center on March 18th, 2020.
See publication
Tags: AI, Cybersecurity, Data Center
2020 ElevateIT Advisory Board Member - Houston
ElevateIT
January 01, 2020
Advisory Board Member for the 2nd Annual ElevateIT: Houston Technology Summit and learn why South Texas has long been a hot bed for innovation and disruption. Fueled by the oil and gas, medical, and manufacturing industries, Houston has become home to a vast numbers of IT & Security firms, who have successfully transformed the landscape into a Technology Mecca.
See publication
Tags: AI, Cloud, Cybersecurity
2020 ElevateIT Advisory Board Member - San Antonio
ElevateIT
January 01, 2020
Advisory Board Member for the 1st Annual ElevateIT: San Antonio Technology Summit and learn why South Texas has long been a hot bed for cybersecurity and disruption. Fueled by the oil and gas, medical, and manufacturing industries.
See publication
Tags: AI, Cloud, Cybersecurity
2019 Elevate IT Advisory Board - Houston
ElevateIT
October 16, 2019
Advisory board member for The 2019 ElevateIT: Houston Technology Summit which is designed to connect you with local experts and resources to assist with your IT & Security needs.
See publication
Tags: AI, Cybersecurity, Data Center
2019 Elevate IT Advisory Board - DFW
ElevateIT
July 10, 2019
Advisory board member for The 2019 ElevateIT: DFW Technology Summit which is designed to connect you with local experts and resources to assist with your IT & Security needs. The 2nd Annual ElevateIT: DFW Technology Summit will be hosted at the Irving Convention Center on March 18th, 2020.
See publication
Tags: AI, Cybersecurity, Data Center
SMU Advisory Board - Digital Accelerator Program
SMU
June 05, 2017
Advise and discuss the curricula of SMU’s Big Data program as a board member and mentor students enrolled in the program regarding Big data and its value.
See publication
Tags: Analytics, Cloud, Data Center
AirTight Networks
Arista
April 01, 2005
Served as advisory board member for AirTight Networks for 3 years. Assisted with GTM strategy, met with prospective customers and attended conferences on their behalf. Turned into Mojo Networks and then sold to Arista.
See publication
Tags: AI, Cybersecurity, IoT
SMU Meadows School of Arts Advisory Board
Southern Methodist University
September 01, 1998
Advise and discuss the curricula of SMU’s Meadows School of Arts as a advisory board member for technology.
See publication
Tags: Cybersecurity, Data Center, Emerging Technology
Thought Leader Article, Video & Amplification Engagement
SkyBox Security
August 23, 2022
Thought Leader with SkyBox Security for Article, Video & Amplification Engagement.
See publication
Tags: Cloud, Cybersecurity, Security
Implementing Zero Trust from a CISO’s Perspective: Full Cost-Benefit Analysis
Perimeter81
July 27, 2022
Wrote sponsored article for Perimeter81 called: "Implementing Zero Trust from a CISO’s Perspective: Full Cost-Benefit Analysis".
See publication
Tags: Cloud, Cybersecurity, Security
Comprehensive Threat Protection and Remediation Using the Intel vPro Platform and its Many Security and Management Capabilities
Mark Lynd
May 12, 2022
Wrote a sponsored article for Intel for their vPro Platform. The article was titled:
Comprehensive Threat Protection and Remediation Using the Intel vPro Platform and its Many Security and Management Capabilities
See publication
Tags: AI, Cybersecurity, Security
Zero Trust Rising
Cybervizer
February 28, 2021
Zero Trust is being counted on more than ever for cybersecurity and now the NSA has issued Zero Trust guidance for Department of Defense (“DOD”) to protect their critical networks and data. However, it is not only for highly secretive environments like NSA and DOD, but also a great idea for any organization in both private and public sector with cybersecurity concerns as Zero Trust can be transformative for their security posture and more than meet any due-care or fiduciary responsibilities.
See publication
Tags: Cybersecurity, Privacy
More Than 50% of Organizations Can’t Fully Utilize Cloud Security Solutions Due To Understaffing
Cybertvizer
January 14, 2021
The cybersecurity talent shortage is impacting so many businesses globally. More than 50% of IT & #Cybersecurity teams can’t fully utilize cloud security solutions due to understaffing. As this excerpt from a recent HelpNet Security Article highlights:
See publication
Tags: Cloud, Cybersecurity
A Security-first Mindset In Your Organization Is Critical
Cybertvizer
January 11, 2021
It is so critical to create a security-first mindset in your organization. Too many organizations treat security as something they must tolerate or work around. Out in the field, For example, I have heard several executives say that they can’t implement a simple and standard security policy because the business believes it doesn’t support growth, no budget or they fear it might hinder salespeople. That is until the inevitable breach happens and then there is budget and a bunch of executives pointing fingers. That may sound cynical, except I have seen it several times in the last two months and many times before that.
See publication
Tags: Cybersecurity, Business Strategy
Ransomware Gangs Are Targeting Executives
Cybervizer
January 09, 2021
In the field, we are seeing a great deal of extortion, as a backup to the ransom not being paid by organizations hit by ransomware. Once they have the proper access internally, they are often able to pipe out some of the data before encrypting, thereby giving them a backup should the organization choose not to pay.
See publication
Tags: Cybersecurity, Data Center
Cybersecurity in a Rapidly Evolving Threat Landscape
LinkedIn
October 26, 2020
It’s hard to imagine modern life (particularly with the recent emphasis on remote work) without the level of connectivity we currently enjoy. Businesses are hard at work increasing the capability of that connectivity: We’re connecting more and more devices through the Internet of Things (IoT), and making a leap forward in speed, bandwidth and reduced latency with 5G. This trend of exponential growth of devices is expected to continue for the foreseeable future and it will bring a larger attack surface and many new threat vectors to the security equation.
See publication
Tags: Cybersecurity, Leadership, 5G
5 Keys to Successfully Implementing a Productive Remote Workplace
Oracle
March 30, 2020
Wrote article for Oracle Security. The title of the article was "5 Keys to Successfully Implementing a Productive Remote Workplace".
See publication
Tags: Cybersecurity, Emerging Technology, Privacy
RSA 2020 Recap: Cloud Security Moves to the Front
Oracle
March 10, 2020
Wrote and article for Oracle titled: "RSA 2020 Recap: Cloud Security Moves to the Front".
See publication
Tags: Cybersecurity, Emerging Technology, Privacy
Threat Series: The Future of Cloud Security
Oracle
February 24, 2020
In the last installment of our series, we wrap up our conversation with Greg Jensen with a discussion around the future of cloud security and how leaders can help their businesses stay informed in the security space with the help of the annual Oracle and KPMG Cloud Threat Report.
See publication
Tags: AI, Cloud, Cybersecurity
Threat Series: The Importance of Visibility for Cloud Security
Oracle
February 20, 2020
In our part 2 of our 3-post series, we continue the conversation with Greg Jensen and discuss the Shared Responsibility Security Model and the importance of visibility in the cloud.
See publication
Tags: AI, Cloud, Cybersecurity
Threat Series: Keeping Up with the Challenging Landscape of Cloud Security
Oracle
February 18, 2020
Author of "Threat Series: Keeping Up with the Challenging Landscape of Cloud Security" that was published on Oracle main blog.
See publication
Tags: Cloud, Cybersecurity, Data Center
Misconfiguration, Bots, Cybercriminals – Where’s the Real Threat?
Oracle
September 12, 2019
A security article regarding misconfigurations, bots and cybercriminals for Oracle’s main blog.
See publication
Tags: Cloud, Cybersecurity, Digital Transformation
Cloud Computing Predictions for 2019: More Migrations, Onward with Openness
Oracle
January 10, 2019
Predictions for Cloud computing in 2019 for Oracle.
See publication
Tags: Big Data, Cloud, Emerging Technology
Cybersecurity Predictions for 2019: Advanced Attacks, Bigger Breaches
Oracle
January 07, 2019
Predictions for Cybersecurity in 2019 for Oracle.
See publication
Tags: Cybersecurity, FinTech
5 Artificial Intelligence and Machine Learning Use-Cases for Cybersecurity - Bitnewstoday
Bitnewstoday.com
December 04, 2018
Evolving cybersecurity risks and trends continue to force organizations to adopt waves of precautionary changes and solutions to protect themselves, further forcing organizations to adapt, evolve or fall behind in the marketplace.
See publication
Tags: AI, Analytics, Cybersecurity
Get Your Team Productive with AI Now
LinkedIn
November 15, 2018
One of the most interesting benefits to IBM Watson Studio is its integrated collaboration environment as it allows a team made of data scientists, business analysts, SMEs and others collaborate without having to share accounts, move data around or use work arounds often required when using multiple consoles, tools or different products needed to create, manage and successfully run AI, machine learning or deep learning projects from end to end.
See publication
Tags: AI, Analytics, Cloud
5 Artificial Intelligence and Machine Learning Use-Cases for Cybersecurity
LinkedIn
September 09, 2018
3 articles
Like
83
Comment
14
25
Evolving cybersecurity risks and trends continue to force organizations to adopt waves of precautionary changes and solutions to protect themselves, further forcing organizations to adapt, evolve or fall behind in the marketplace. Rapid technological development and adoption across diverse industries presents additional developmental challenges for organizational cybersecurity processes and systems.
See publication
Tags: Cybersecurity
Harnessing AI's Power Is Easier Now!
LinkedIn
July 30, 2018
In my experience as a C-level executive and long-time AI professional, I’ve learned that people who want to utilize artificial Intelligence find getting started to be the most difficult part. Even the more confident practitioners could easily become intimidated by the array and complexity of tools to navigate.
But this problem is now a thing of the past. With IBM Watson Studio, you and your project can now hit the ground running. IBM Watson Studio’s integrated environment makes AI significantly easier, by allowing users to quickly and easily build visually appealing projects and models.
See publication
Tags: AI, Predictive Analytics
Feeding The Monster: The Huge Impact And Real-World Uses Of Blockchain
LinkedIn
January 18, 2018
Blockchain is an immensely hyped and important digital record-keeping technology that reached early prominence due to its origin and use in cryptocurrencies like Bitcoin, Ethereum and Ripple. But, its impact is destined to be much larger than just cryptocurrency as it provides an innovative, secure and immutable way for transactional systems to record and store data and records with multiple parties.
See publication
Tags: Blockchain, Cryptocurrency, Cybersecurity
Board Member - Cybervizer
Cybervizer
November 02, 2020
Board Member at Cybervizer, which is focused on cybersecurity and cloud consulting and influencer activities for organizations like HP, AT&T, Oracle and others.
See publication
Tags: AI, Cloud, Cybersecurity
Board Member
WellAware
May 11, 2020
Board Member for WellAware, a top IIoT company that has raised over $160MM. Top-level customer list coupled with innovative technology and SaaS business model means incredible value.
See publication
Tags: Digital Transformation, IoT, Privacy
FireScope, Inc.
FireScope, Inc.
August 28, 2006
I was a board member for FireScope, Inc., Corporate Board for nine years.
See publication
Tags: AI, Cybersecurity, IoT
SMU Cox Business School Board
SMU
September 10, 1999
I was a board member for the Southern Methodist University’s Cox School of Business for three years.
See publication
Tags: AI, Cybersecurity, Emerging Technology
Vectrix Board Member
Vectrix, Inc
May 20, 1996
Mark was a board member of the Vectrix Corporate Board for 5 years.
See publication
Tags: AI, Cybersecurity, Digital Transformation
Relevant Track
Relevant Track
September 17, 2013
Founded in 2013 and focused on delivering high quality AI, cybersecurity and Data Center solutions, thought leadership and engagements. Customers include FedEx, Intel, IBM Watson and many others.
See publication
Tags: AI, Cybersecurity, Data Center
Relevant Track, LLC
Relevant Track, LLC
April 15, 2013
Founded Relevant Track, LLC in April, 2013 to provide cybersecurity, AI and cloud consulting.
See publication
Tags: AI, Cloud, Cybersecurity
FireScope, Inc.
FireScope, Inc.
August 28, 2006
Co-founded FireScope on August 28, 2006 - During my tenure Mark served as CMO, CIO, Chief Product Officer, CISO , EVP Partners supporting offices in North America, EMEA and APAC, until December 2014.
Provides technology and go to market leadership for the global FireScope organization. An innovative SaaS Service Management company dedicated to simplifying IT operations and determining the business impact that technology has on a business. Mark architected and provided the technology and marketing vision for the FireScope Stratis solutions. Under Mark’s leadership FireScope developed and deployed Stratis, the only commercial multi-tenant elastic (3 tiers) management cloud with big data back-end product in the world, while working closely with the customers to make sure it met their needs.
See publication
Tags: AI, Cloud, Cybersecurity
Co-Founded Vectrix
Vectrix
April 01, 1996
Led a team of 400+ creative and highly motivated professionals that help our clients put digital capabilities at the core of their ability to improve, enable and transform, their businesses and the way they engage their customers. We did this by offering digital branding, technology advisory, development, digital marketing, digital analytics in an integrated fashion. We did this for customers like P&G, American Airlines, M&M Mars, Coors, Time Warner, Victoria Secrets, Anheuser Busch, etc...
• Doubled company’s size to $32M in twenty-seven months.
• Led and worked closely with sales and creative teams to drive top-line revenues.
• Developed GTM strategy and operating plan, identified and acquired management team, and led
due diligence for four acquisitions.
• Built lasting collaborative relationships and alliances with iconic customers and partners
• Led delivery of numerous marketing, information technology and e-commerce
solutions to large client base including VISA, Chase, Motorola, M&M/Mars, Nabisco& Fandango
See publication
Tags: AI, Cybersecurity, Data Center
Innovative Business Technologies, Inc. (“IBT”)
IBT, Inc.
May 14, 1993
IBT was a technology com-any based in Tulsa, Oklahoma focused on Artificial Intelligence and RPG III to “C” conversions. It was sold to one of the largest technology companies in the world at the time. It was purchased because of its expert systems around technology operations.
See publication
Tags: AI, Data Center, Emerging Technology
5 Brilliant Ways to Reduce Cybersecurity Risk for Your Organization
Netsync
April 13, 2023
Keynote on lowering cyber risk and incident response for Lake Travis ISD Administration, staff, and principals. This included a 2+ hour Incident Response Table Top.
See publication
Tags: AI, Cybersecurity, Security
Modern Risk Management for K12
Netsync
January 19, 2023
Keynote for Leadership, Extended Cabinet, and Principals on lowering cyber risk and incident response for San Antonio ISD Cyber Summit. This included a 3+ hour Incident Response Table Top.
See publication
Tags: AI, Cybersecurity, Security
How To Be More Secure with Zero Trust and MFA
Netsync
August 24, 2022
Join the Netsync and Cisco team for an evening of
specialty cocktails and open discussion around your top
security concerns. #1 Security Thought Leader, Mark Lynd
will lead the discussion around Zero Trust and Multifactor
Authentication. If you're in West Texas, you don't want to
miss this event with some of the top security experts from
both Cisco and Netsync.
See publication
Tags: Cloud, Cybersecurity, Security
Netsync SKO - 52 Exhibitors and Manufacturers
Netsync
July 12, 2022
I did the keynote for the Cybersecurity Sessions/day included Okta, Cisco, Artic Wolf and Intel in my presentation. This was in front of over 200+ people, 52 Exhibitors and Manufacturers.
See publication
Tags: Cloud, Cybersecurity, Security
Keynote at BSides Conference
South Texas College
May 21, 2022
Keynote at BSides Conference at South Texas College in McAllen, Texas
See publication
Tags: AI, Cybersecurity, Security
Lowering K12 Risk Through Quality Incident Response
Region 1 Service Center
October 29, 2021
Gave keynote address at Region 1 Technology Summit in McAllen, Texas.
See publication
Tags: AI, Cloud, Cybersecurity
Proper Incident Response Table Top
Texas Education Technology Leaders
October 22, 2021
Gave Keynote Table Top at Texas Education Technology Leaders Fall Summit, TECC-West Campus, Lewisville ISD
See publication
Tags: AI, Cloud, Cybersecurity
Technology Leadership Academy: Infrastructure Readiness & Security
Technology Leadership Academy
December 08, 2020
Gave keynote to the Technology Leadership Academy to over 31 K12 CIOs on "Infrastructure Readiness & Security".
See publication
Tags: AI, Cloud, Cybersecurity
Ransomware: Protect. Detect. RESPOND.
University 0of Redlands
October 29, 2019
Gave keynote at University of Redlands Technology Summit to over 200 people. It was how to protect, detect and respond to a ransomware attack.
See publication
Tags: Cloud, Cybersecurity, Data Center
Ransomware: Protect. Detect & Respond in McAllen, Texas
Region One Education Service Center
October 25, 2019
Discuss how ransomware has become top of the mind issue for CIOs and CISOs globally.
Although today’s hyperconnected world offers numerous benefits, it also brings with it the specter of cybercrime. More connected devices mean more entry points into a network and a broader attack surface. With the proliferation of malware, such as cryptojacking, phishing and DDoS attacks, it’s estimated that more than 100,000 malicious cyberassaults take place each and every day.
Join Netsync as we discuss how to be proactive and mitigate your risk to ransomware.
- What steps to take in the first 24 hours after a ransomware attack
- To pay or not to pay? Understand how to make the best decision for your organization
- 7 key steps to protect your organization from malicious ransomware attacks
See publication
Tags: Cloud, Cybersecurity, Data Center
Ransomware: Modern Day Scourge
Netsync & Cisco
October 24, 2019
Discuss how ransomware has become top of the mind issue for CIOs and CISOs globally. Also discussed how to put together a comprehensive strategy to combat ransomware.
Although today’s hyperconnected world offers numerous benefits, it also brings with it the specter of cybercrime. More connected devices mean more entry points into a network and a broader attack surface. With the proliferation of malware, such as cryptojacking, phishing and DDoS attacks, it’s estimated that more than 100,000 malicious cyberassaults take place each and every day.
Join Netsync as we discuss how to be proactive and mitigate your risk to ransomware.
- What steps to take in the first 24 hours after a ransomware attack
- To pay or not to pay? Understand how to make the best decision for your organization
- 7 key steps to protect your organization from malicious ransomware attacks
See publication
Tags: Cloud, Cybersecurity, Data Center
CISO v. CIO - Comparing Operation Goals with Contrasting Cyber Security Concerns
ElevateIT
July 11, 2019
This will surely be the Keynote of the Year, as both of these dynamic speaker and industry leaders provide insight into their worlds as they guide you through the challenges the C-Suite faces monetizing technology, weighed against ever present security risks.
See publication
Tags: Cloud, Cybersecurity, Digital Transformation
Fireside Chat on Modernizing and Securing the Academy
MoreNET
April 19, 2023
Maria Thompson and Mark Lynd, with Amazon Web Services (AWS)- Join Maria Thompson, AWS Cybersecurity Leader, and Mark Lynd, Head of Digital Business at Netsync for a Fireside Chat on Modernizing and Securing the Academy with AWS. Maria and Mark will highlight the challenges and threats facing the Education Sector and how Institutions can secure their campus. Topics of discussion will include the prevalence of Ransomware Attacks, Cyber Security Insurance, Recruiting and Retaining Cyber Security Talent, Cloud Security Governance & Best Practices, and Securing Multi/Hybrid Cloud.
• AWS – Head of Cybersecurity Maria Thompson
• Netsync Head of Digital Business – Mark Lynd
• AWS Partner Sales Manager – Tracie Bryant
See publication
Tags: AI, Cybersecurity, Security
Panel at RSA: Cybersecurity Secrets Revealed
NetScout
June 06, 2022
Spoke on panel at RSA with Jo Peterson, Gary Sockrider as we discuss "Cybersecurity Secrets Revealed".
See publication
Tags: AI, Cybersecurity, Security
Top Cyber Concerns: Cybersecurity Secrets Revealed
NetScout
June 06, 2022
I spoke at the RSA Conference with fellow influencer Jo Peterson for NetScout at their RSA event.
See publication
Tags: AI, Cybersecurity, Security
PureStorage Ransomware Roundtable
Pure Storage
February 08, 2021
PureStorage Ransomware Roundtable
See publication
Tags: AI, Cloud, Cybersecurity
BrightTalk: CISOs Are Turning to Security-as-a-Service
BrightTalk
November 12, 2020
Was a panelist on a BrightTalk panel titled: " CISOs Are Turning to Security-as-a-Service".
See publication
Tags: AI, Cloud, Cybersecurity
Cybersecurity in a Hyper-Connected World
LinkedIn
October 21, 2020
It’s time to talk cybersecurity on the next #BIZTALKS Twitter chat hosted by AT&T Business. Join me and other experts on Wednesday, October 21, at 12 pm CDT to participate in a discussion about the many facets of modern cybersecurity. https://bit.ly/3dxCCFi i #cybersecurity #TwitterChat
See publication
Tags: Cybersecurity, Management, Leadership
Cloud Adoption: Getting Everyone On Board Securely
Oracle
September 16, 2019
Our panel of four discussed the many things an enterprise should consider to securely going to the cloud.
See publication
Tags: Cloud, Cybersecurity, Digital Transformation
CSuite Forum: Planning for the Unplannable in IT - Unintended Consequences of Unexpected Real World Events
ElevateIT
July 11, 2019
Mark moderated a panel discussion regarding Planning for the Unplannable in IT - Unintended Consequences of Unexpected Real World Events with three others.
See publication
Tags: Cloud, Cybersecurity, Digital Transformation
North Texas Medical Cybersecurity Summit - Medical Cybersecurity is Changing Fast
WWT and CI.Security
April 25, 2019
An hour long panel with three CIOs from major healthcare organizations, in which I moderated and participated. This summit was sponsored by WWT and CI.Security and was held at Bitter Sisters’ Brewery’s hosting area.
See publication
Tags: AI, Cybersecurity, HealthTech
TeXchange - HACKS - FRAUD - BLOCKCHAIN - CYBER - SCARY
TexChange - Custis Hoge
April 17, 2019
A panel with three C-Suite executives that I moderated. The event was attended by 65+ people and the panel ran about 1.5 hours.
See publication
Tags: AI, Cloud, Cybersecurity
Cisco Sponsored CISO Dinner Event
Cisco
August 11, 2022
I spoke/presented at a Cisco Sponsored CISO Dinner Event in Austin/
See publication
Tags: AI, Cybersecurity, Security
Zero Trust: Securing Modern Government Organizations
FLGISA
July 29, 2022
Gave one of only five top level presentations at Florida Government Information Systems Associations 2022 Conference in Ft Lauderdale, Florida.
See publication
Tags: Cloud, Cybersecurity, Security
Moderator for Okta Panel
Netsync
May 11, 2022
I was the moderator for Okta "Secure identity" Panel with 3 panelists. This was in front of over 200+ people, 52 Exhibitors and Manufacturers.
See publication
Tags: AI, Cybersecurity, Security
Moderator for Cisco "Introduction into SASE" Panel with 3 panelists
Netsync
May 10, 2022
I was the moderator for Cisco "Introduction into SASE" Panel with 3 panelists. This was in front of over 200+ people, 52 Exhibitors and Manufacturers.
See publication
Tags: Cloud, Cybersecurity, Security
Cyber Leadership & Culture
Radware
December 07, 2021
Speaker at Radware’s Frictionless Security Summit in Tuscon, Arizona
See publication
Tags: Cloud, Cybersecurity, Data Center
CISO's Response to Breaches and Data Loss
Netsync
November 17, 2021
Spoke at Netsync National Security Tour Event at Al Biernat's Board Room
See publication
Tags: AI, Cybersecurity, National Security
CISO
Texas Education Technology Leaders
October 22, 2021
Spoke at Netsync Cybersecurity Event at Al Biernat's Board Room
See publication
Tags: AI, Cloud, Cybersecurity
Zero Trust for K12's - Securing Education
Texas K12 CTO Council
June 16, 2021
Discuss the Zero Trust framework, which relies on the pretense of Never Trust Always Verify. Below is the agenda for the presentation:
1. Zero Trust in an Insecure World
-Threat Landscape
-New Cybersecurity Mindset
-Drivers of Zero Trust
-Zero Trust Benefits for K12
2. Zero Trust Framework
-Never Trust, Always Verify
-Zero Trust Model – Identity
-Zero Trust Model – Segmentation
3. Realizing Zero Trust
-Sample Approach - Evolving with your Organization
-7 Questions You Can Ask Yourself
4. Incident Response - Assume You Will Be Compromised
-The 6 Steps of Incident Response
-Incident Response Goals
It relates Zero Trust to other supported approaches like NIST and Texas Cybersecurity Framework.
See publication
Tags: Cloud, Cybersecurity, EdTech
Technology Leadership Academy Presentation
Cybervizer
January 12, 2021
Video presentation from Technology Leadership Academy Conference on Infrastructure Readiness and Security given to 30+ K12 CIOs and education Technology Executives.
See publication
Tags: AI, Cybersecurity, Leadership
TCEA Speaker: SOC Managed Services
Netsync
January 04, 2021
Exhibit Hall Speaker at TCEA 2021 about SOC Managed Services.
See publication
Tags: AI, Cloud, Cybersecurity
How Zero Trust Can Change The Way We Secure Higher Education
University of Redlands
October 08, 2020
This was a co-keynote speaking presentation at the University of Redlands Technology Summit,
See publication
Tags: Business Continuity, Cybersecurity, Digital Transformation
CCPA: 7 Things Every CISO Should Know
Oracle
February 26, 2020
Spoke at RSA for Oracle Security. The title of the speaking event was "CCPA: 7 Things Every CISO Should Know".
See publication
Tags: Cloud, Cybersecurity, Data Center
CCPA: 7 Things Every CISO Should Know
Oracle
February 25, 2020
Spoke at RSA for Oracle Security. The title of the speaking event was "CCPA: 7 Things Every CISO Should Know".
See publication
Tags: Cybersecurity, Emerging Technology, Privacy
Join Netsync, Cisco and NetApp at The Movies - Star Wars - Dallas, TX
Netsync
December 19, 2019
Come witness the event of the Galaxy!
Join us for the premier of Star Wars The Rise of Skywalker in Dallas on December 19th at Cinepolis Luxury Cinemas. Netsync, NetApp, and Cisco Meraki are your sponsors for this great event.
Enjoy food, drinks, and fun while reclining in luxury at Cinepolis Luxury Cinemas in Dallas, Texas.
See publication
Tags: AI, Cloud, Cybersecurity
Mitigate Your Risk For Ransomware - San Antonio, TX
Netsync
December 17, 2019
Although today’s hyperconnected world offers numerous benefits, it also brings with it the specter of cybercrime. More connected devices mean more entry points into a network and a broader attack surface. With the proliferation of malware, such as cryptojacking, phishing and DDoS attacks, it’s estimated that more than 100,000 malicious cyberassaults take place each and every day.
Join Netsync and Cohesity as we discuss how to be proactive and mitigate your risk to Ransomware.
What steps to take in the first 24 hours after a ransomware attack
To pay or not to pay? Understand how to make the best decision for your organization
7 key steps to proactively protecting your organization from malicious ransomware attacks
See publication
Tags: AI, Cybersecurity, Data Center
Mitigate Your Risk For Ransomware - Costa Mesa, CA
Netsync
December 05, 2019
Although today’s hyperconnected world offers numerous benefits, it also brings with it the specter of cybercrime. More connected devices mean more entry points into a network and a broader attack surface. With the proliferation of malware, such as cryptojacking, phishing and DDoS attacks, it’s estimated that more than 100,000 malicious cyberassaults take place each and every day.
Join Netsync, Cohesity, and Cisco as we discuss how to be proactive and mitigate your risk to Ransomware.
What steps to take in the first 24 hours after a ransomware attack
To pay or not to pay? Understand how to make the best decision for your organization
7 key steps to proactively protecting your organization from malicious ransomware attacks
See publication
Tags: AI, Cloud, Cybersecurity
Mitigate Your Risk For Ransomware - Redlands, CA
Netsync
December 04, 2019
Although today’s hyperconnected world offers numerous benefits, it also brings with it the specter of cybercrime. More connected devices mean more entry points into a network and a broader attack surface. With the proliferation of malware, such as cryptojacking, phishing and DDoS attacks, it’s estimated that more than 100,000 malicious cyberassaults take place each and every day.
Join Netsync, Cohesity, and Cisco as we discuss how to be proactive and mitigate your risk to Ransomware.
What steps to take in the first 24 hours after a ransomware attack
To pay or not to pay? Understand how to make the best decision for your organization
7 key steps to proactively protecting your organization from malicious ransomware attacks
See publication
Tags: AI, Cybersecurity, Data Center
Mitigate Your Risk For Ransomware
Netsync
November 14, 2019
Although today’s hyperconnected world offers numerous benefits, it also brings with it the specter of cybercrime. More connected devices mean more entry points into a network and a broader attack surface. With the proliferation of malware, such as cryptojacking, phishing and DDoS attacks, it’s estimated that more than 100,000 malicious cyberassaults take place each and every day.
Join Netsync, Cohesity, and Cisco as we discuss how to be proactive and mitigate your risk to Ransomware.
What steps to take in the first 24 hours after a ransomware attack
To pay or not to pay? Understand how to make the best decision for your organization
7 key steps to proactively protecting your organization from malicious ransomware attacks
See publication
Tags: AI, Cloud, Cybersecurity
CIO Roundtable: The Future of AI in the Enterprise
ElevateIT
October 16, 2019
Presented at CIO Roundtable: “The Future of AI in the Ever-Changing Enterprise Landscape” at ElevateIT Technology Summit in Houston, Texas
See publication
Tags: AI, Cybersecurity, Data Center
Technology Ball - STEM Education
Technology Ball
October 09, 2019
Discussed AI and cybersecurity for STEM at Technology Ball event.
See publication
Tags: AI, Cybersecurity, Data Center
Securing Business Critical Cloud Workloads: Threats, Implications, and Outcomes
Oracle
September 17, 2019
I spoke about how to secure workloads in a multi-cloud environent.
See publication
Tags: Cloud, Cybersecurity, Digital Transformation
How To Have A Strong Career In Cybersecurity
NPower
September 06, 2019
Spoke to a group of 49 students at NPower regarding a career in cybersecurity
See publication
Tags: AI, Cybersecurity, Digital Transformation
CIO Roundtable - The Future of AI in the Ever Changing Enterprise Landscape
ElevateIT
July 11, 2019
Spoke about the Future of AI in the Ever Changing Enterprise Landscape to a group of C-level people.
See publication
Tags: AI, Cybersecurity, Digital Transformation
Intro To Cryptocurrencies And Why They Must Evolve To Reach The Masses
Greenhill School
November 07, 2018
Intro to cryptocurrencies and why they must evolve to reach the masses is largely an introduction to crypto and then covers the challenges and needs to grow and reach the masses.
See publication
Tags: Blockchain, Cryptocurrency, Cybersecurity
Digital Identity Is Not An Opt-In Scenario
North Texas ISSA
September 05, 2018
Discusses the challenges with maintaing and protecting your digital identity. Also it talks about how artificial intelligence can be used to protect one’s identity.
See publication
Tags: Blockchain, Cryptocurrency, Cybersecurity
Keynote: When and Why Family Office, Venture and Private Equity Move En Masse Into Crypto
BCI Summit 2018
June 12, 2018
I performed the keynote on June 12th and also moderated two panels and was a panelist on another. BCI Summit Investment Summit was designed to educate and discuss blockchain and cryptocurrency for portfolio investors
See publication
Tags: Blockchain, Cryptocurrency, Cybersecurity
Seven AI Trends Affecting The Enterprise
IBM Systems
April 30, 2018
Seven AI Trends Affecting The Enterprise Presentation at IBM TechU in Orlando, Florida.
See publication
Tags: AI, Blockchain, Digital Transformation
IBM Think 2018
IBM
March 20, 2018
I was a paid influencer and speaker for IBM at IBM Think 2018.
See publication
Tags: AI, Big Data, Cybersecurity
Combine Machine Learning and Blockchain to Create Greater Trust
Blockchain Global Advisors
February 12, 2018
Mark Lynd's presentation: "Combining Machine Learning and Blockchain To Create Greater Trust." Digital Trust is one of the key ingredients to companies with significant digital businesses or looking to create important digital businesses.
See publication
Tags: AI, Blockchain, Cybersecurity
Video: Interviews Len Noble
Netsync
August 19, 2022
This week @mclynd speaks with Len Noble, Executive #Sales Director for #Netsync, to discuss our focus on #partnerships & how that impacts our customer's day-to-day experiences & our internal team's achievements in the #industry.
See publication
Tags: Cloud, Cybersecurity, Security
How industry leaders can keep up with an escalating volume of threats.
Skybox Security
August 18, 2022
What are the key ingredients of a risk-based #Cybersecurity strategy?
Another great part of my recent conversation with Skybox Security VP of Sales Engineering, Alastair Williams, was discussing how industry leaders can keep up with an escalating volume of threats.
Read the report Skybox Security recently released to learn how your organization can reduce #CyberRisk with proactive Security Posture Management.
See publication
Tags: Cloud, Cybersecurity, Security
Interviewed Alastair Williams from Skybox Security - 2nd video in series
Skybox Security
August 15, 2022
Interviewed Alastair Williams from Skybox Security about risk-based approach for Skybox Security as part of a series/campaign.
See publication
Tags: Cloud, Cybersecurity, Security
Interview with Dan Lier Former LA Laker and Noted Motivational Speaker
Netsync
August 10, 2022
This week @mclynd speaks with Dan Lier, keynote #speaker at the #Netsync SKO 2022 & premier Las Vegas #Sales and #Leadership Expert, to discuss the #psychology behind success and how personal beliefs drive behavior.
See publication
Tags: Cloud, Cybersecurity, Security
Interview on Security Partnerships with Kurt Sell
Netsync
August 02, 2022
This week @mclynd speaks with @theRealKurtSell, Sales Director for #Netsync, to discuss our commitment to customers and employees and the engineering excellence we provide partners.
See publication
Tags: Cloud, Cybersecurity, Security
Interviewed Alastair Williams from Skybox Security
Skybox Security
July 29, 2022
Interviewed Alastair Williams from Skybox Security about risk-based approach for Skybox Security as part of a series/campaign.
See publication
Tags: Cloud, Cybersecurity, Security
Interviewing with Security Architect Timothy Ramsey
Netsync
July 27, 2022
This week @mclynd speaks with Timothy Ramsey, Solutions Architect for #Netsync, to discuss how we provide our customers with the leading security solutions that give them peace of mind.
See publication
Tags: AI, Cybersecurity, Security
Interview with Okta's Ralph Figueiredo
Netsync
July 21, 2022
Mark speaks with @RalphCA1, Director of #PublicSector Alliances from
@okta, to discuss what #okta does & the top capabilities they provide to customers.
See publication
Tags: AI, Cybersecurity, Security
Interviewing Juniper's Ron Davis
Netsync
July 08, 2022
Interviewing Juniper's Ron Davis regarding their security offerings.
See publication
Tags: AI, Cybersecurity, Security
Netsync and Okta
Netsync Network Solutions
July 08, 2022
Okta Ralph Figueirdo speaks with Mark Lynd
See publication
Tags: Cloud, Cybersecurity, Security
Interviewing Netsync CEO Khalid Abunaja
Netsync
July 07, 2022
Netsync Khalid Abunaja peaks with Mark Lynd
See publication
Tags: Cloud, Cybersecurity, Security
Interviewing AppDynamics' Jamie Francher
Netsync
July 04, 2022
AppDynamics Jamie Francher speaks with Mark Lynd regarding monitoring and security.
See publication
Tags: AI, Cybersecurity, Security
Interview Chris Butler Regarding Security Sales and Channel
Netsync
July 04, 2022
Interview Chris Butler Regarding Security Sales and Channel
See publication
Tags: AI, Cybersecurity, Security
Interview with Security Architect Jacob Parks
Netsync
June 30, 2022
Interview with Security Architect Jacob Parks
See publication
Tags: AI, Cybersecurity, Security
Netsync Jeremy Freeman speaks with Mark Lynd regarding Security with ISDs
Netsync
June 29, 2022
Netsync Jeremy Freeman speaks with Mark Lynd regarding Security with ISDs
See publication
Tags: AI, Cybersecurity, Security
How to Secure Your Organization
Netysnc
March 14, 2022
Performed a video titled "How to Secure Your Organization".
See publication
Tags: Cloud, Cybersecurity, Security
Interview on Cybersecurity Journey with Enric Cuixeres Saez, the CIO for Leng-d'Or
Cisco
November 05, 2021
Performed a Cisco Sponsored Interview on Cybersecurity Journey with Enric Cuixeres Saez, the CIO for Leng-d'Or
See publication
Tags: AI, Cloud, Cybersecurity
7 Reasons People Matter in Cybersecurity
Cybervizer
February 11, 2021
People are an essential element in cybersecurity. While some may point out they can be a weakness, the bolder view is if properly trained, positioned and prepared can have a very positive impact on an organization’s security posture.
See publication
Tags: Cybersecurity
Interview with Ray White: Remote Work and Ransomware
Netsync
July 30, 2020
Mark Lynd, Head of Digital Business for Netsync talks with Ray White, Business Development Manager for NetApp about Remote Work and Ransomware.
See publication
Tags: AI, Cloud, Cybersecurity
Video Interview with Verizon’s Bob Carver – Top 5 Challenges of Securing The Remote Workplace
Cybertvizer
July 12, 2020
Take a look at my interesting Interview with Bob Carver, CISM, CISSP, Principle, Cybersecurity Threat Intelligence and Analytics at Verizon.
Bob addresses the top 5 challenges of securing remote workplaces, including home routers, Wi-Fi, and #VPN providers and the #vulnerabilities that have surfaced as a result of the precipitous rise in remote working due to the #COVID19 pandemic.
See publication
Tags: Analytics, Cybersecurity
How Cities are Leveraging the Remote Workplace
Netsync
May 24, 2020
My relevant Interview with Juergen Bayer, Sr Security Advisor, at Hewlett Packard Enterprise.
We talks about the importance of endpoint security and strong security hygiene in remote work environment in today’s challenging times. Many organizations are being forced to find ways to secure their remote environments due to the #COVID19 pandemic and, as a result, need to find innovative ways to secure #BYOD ("Bring Your Own Device") and workers/students homes.
See publication
Tags: Cybersecurity, Future of Work, Privacy
Leveraging the Cloud for Remote Work
Netsync
May 23, 2020
My interesting Interview with Jo Peterson, VP of Cloud and Security Services for Clarify360. She is also a 2016-2020 CRN Women of the Channel Recipient. She is a member of the Forbes Technology Council and one of the Top Global Thought leaders regarding the Cloud.
See publication
Tags: Cloud, Cybersecurity, Privacy
Security Concerns While Working From Home
Netsync
May 23, 2020
Great discussion with Chuck Brooks, top ranked #cybersecurity thought leader, and visionary named #LinkedIn's Top Technology Person to Follow. In this interview we discuss security concerns for #remotework during #COVID19. We discuss concerns, #threats and opportunities that exist around securing the #remoteworkplace now and in the future.
See publication
Tags: Cybersecurity, Future of Work, Privacy
Leverage the Remote Workplace and thrive
Netsync
May 10, 2020
My relevant Interview with Juergen Bayer, Sr Security Advisor, at Hewlett Packard Enterprise.
We talks about the importance of endpoint security and strong security hygiene in remote work environment in today’s challenging times. Many organizations are being forced to find ways to secure their remote environments due to the #COVID19 pandemic and, as a result, need to find innovative ways to secure #BYOD ("Bring Your Own Device") and workers/students homes.
See publication
Tags: Cybersecurity, Future of Work, Privacy
5 Challenges of Securing a Remote Workplace
Netsync
April 26, 2020
My interview with Bob Carver, CISM, CISSP, Principle, Cybersecurity Threat Intelligence and Analytics at Verizon. Bob addresses the top 5 challenges of securing remote work places, including home routers, Wi-Fi, and #VPN providers and the #vulnerabilities that have surfaced as a result of the precipitous rise in remote working due to the #COVID19 pandemic.
See publication
Tags: AI, Cloud, Cybersecurity
How to deal with new threats to business continuity.
Netsync
April 22, 2020
My highly relevant Interview with Mark Jordan, Vice President, Technology, of data protection provider Unitrends, a Kaseya company. We talks about the importance for well planned business continuity, especially in today’s challenging times. Many companies are being forced to build out business continuity on the fly due to the #COVID19 pandemic and, as a result, may be broadening their attack surface and leaving their data at risk and unprotected.
See publication
Tags: Cloud, Cybersecurity, Privacy
Working from Home the New Norm?
Netsync
April 02, 2020
Netsync’s Mark Lynd and Hugh Miller discuss insurance liabilities related to remote workers, establishing and deploying Continuity of Operations plans to address current and future emergencies, and, once the COVID-19 pandemic is over, how organizations can transition back to normal operations and establish new remote working strategies and policies.
See publication
Tags: AI, Cybersecurity, Privacy
How to Stay Cyber Safe While Working Remotely
Netsync
March 30, 2020
Nothing has tested emergency preparedness like the global outbreak of COVID-19, especially as it relates to how technology can help keep remote workers and distance learners productive while adhering to social distancing. Cybersecurity Executive Shira Rubinoff talks with Netsync’s Mark Lynd about how this rapid introduction to remote working solutions can lead to security issues if they’re not deployed properly.
See publication
Tags: Cloud, Cybersecurity, Privacy
Combining Machine Learning and Blockchain to Create Greater Trust
IDEAS
September 19, 2018
Presented at IDEAS Conference: Combining Machine Learning and Blockchain to Create Greater Trust
See publication
Tags: AI, Blockchain, Cybersecurity