Thinkers360
Interested in getting your own thought leader profile? Get Started Today.

Mark Lynd

Head of Digital Business at Netsync

Dallas, United States

39954 Followers

*** Cybersecurity - Data Center - Digital Transformation - Artificial Intelligence ***

Ranked in Top 10 - CyberSecurity, Data Center, Cloud & AI
Ranked in Top 15 for Digital Transformation,IoT and Blockchain
Ranked in Top 20 - 100 Most Relevant Blockchain Insiders
Ranked in Top 20 - Cloud Global Power 100 Influencer List
Ranked in Top 15 - Digital Transformation Power 100
Ranked in Top 25 - InfoSec, BigData and 5G
Ranked in Top 50 - InsurTech and FinTech

Mark Lynd (CISSP - ISSAP, ISSMP, CE|H) - Driven executive, author and military veteran who helps cast an innovative digital transformation for companies and measurably build on it. Proven leader who mentors and empowers staff to achieve their goals through leadership, collaboration, empowerment and strives to bring order out of chaos, excellence out of mediocrity, and efficiency out of inefficiency.

C-Level innovator who believes most business decisions today are shaped and influenced by technology because it has the power to transform businesses, relationships and opportunities. Uses vision and leadership to help shape how companies deploy and manage mobile, social, cloud, Internet of Things and technologies to support growth, generate opportunity, increase productivity and profitability.

Mark serves and has served on several corporate boards and was named an Ernst & Young’s "Entrepreneur of Year – Southwest Region" Finalist. He presented the Doak Walker Award on ESPN’s CFB Awards Show to a national television audience and has been quoted by numerous publications including Wall Street Journal, Information Week, eWeek, CSO and others.

He has a Bachelor's of Science degree from the University of Tulsa. Mark Honorably served in the United States Army in the 3rd Ranger Battalion and the 82d Airborne.

Specialties: CyberSecurity, IoT, Blockchain Artificial Intelligence, Cloud, Big Data, Mobile, Social, 5G, CIO, Governance, Due-diligence, Data Center, Military, Veteran

Available For: Authoring, Consulting, Influencing, Speaking
Travels From: Dallas, Texas
Speaking Topics: Cybersecurity, Compliance, Data Center & Artificial Intelligence

Speaking Fee $5,000

Mark LyndPoints
Academic0
Author186
Influencer412
Speaker83
Entrepreneur520
Total1201

Points based upon Thinkers360 patent-pending algorithm.

Thought Leader Profile

Portfolio Mix

Company Information

Company Type: Company
Email: mlynd@netsync.com
Theatre: Global
Media Experience: 20 years
Last Media Training: 04/10/2018
Last Media Interview: 09/18/2019

Areas of Expertise

AI 78.49
Big Data 40.85
Blockchain 34.21
Cloud 68.07
Cybersecurity 100
Data Center 100
Digital Disruption
Digital Transformation 35.80
Emerging Technology 39.85
Entrepreneurship
Fintech 30.23
Healthtech 30.50
IoT 44.46
Predictive Analytics 30.11
Social 30.91
Privacy 39.78
Future of Work 31.74
Management 30.12
Leadership 30.06
5G 30.12

Industry Experience

Consumer Products
Financial Services & Banking
Healthcare
High Tech & Electronics
Hospitality
Insurance
Media
Oil & Gas
Professional Services
Retail
Telecommunications

Please signin or signup to view publication section.

Publications

8 Advisory Board Memberships
2019Elevate IT Advisory Board
ElevateIT
January 01, 2020
Advisory board member for The ElevateIT: DFW Technology Summit which is designed to connect you with local experts and resources to assist with your IT & Security needs. The 2nd Annual ElevateIT: DFW Technology Summit will be hosted at the Irving Convention Center on March 18th, 2020.

See publication

Tags: AI, Cybersecurity, Data Center

2020 ElevateIT Advisory Board Member - Houston
ElevateIT
January 01, 2020
Advisory Board Member for the 2nd Annual ElevateIT: Houston Technology Summit and learn why South Texas has long been a hot bed for innovation and disruption. Fueled by the oil and gas, medical, and manufacturing industries, Houston has become home to a vast numbers of IT & Security firms, who have successfully transformed the landscape into a Technology Mecca.

See publication

Tags: AI, Cloud, Cybersecurity

2020 ElevateIT Advisory Board Member - San Antonio
ElevateIT
January 01, 2020
Advisory Board Member for the 1st Annual ElevateIT: San Antonio Technology Summit and learn why South Texas has long been a hot bed for cybersecurity and disruption. Fueled by the oil and gas, medical, and manufacturing industries.

See publication

Tags: AI, Cloud, Cybersecurity

2019 Elevate IT Advisory Board - Houston
ElevateIT
October 16, 2019
Advisory board member for The 2019 ElevateIT: Houston Technology Summit which is designed to connect you with local experts and resources to assist with your IT & Security needs.

See publication

Tags: AI, Cybersecurity, Data Center

2019 Elevate IT Advisory Board - DFW
ElevateIT
July 10, 2019
Advisory board member for The 2019 ElevateIT: DFW Technology Summit which is designed to connect you with local experts and resources to assist with your IT & Security needs. The 2nd Annual ElevateIT: DFW Technology Summit will be hosted at the Irving Convention Center on March 18th, 2020.

See publication

Tags: AI, Cybersecurity, Data Center

SMU Advisory Board - Digital Accelerator Program
SMU
June 05, 2017
Advise and discuss the curricula of SMU’s Big Data program as a board member and mentor students enrolled in the program regarding Big data and its value.

See publication

Tags: Analytics, Cloud, Data Center

AirTight Networks
Arista
April 01, 2005
Served as advisory board member for AirTight Networks for 3 years. Assisted with GTM strategy, met with prospective customers and attended conferences on their behalf. Turned into Mojo Networks and then sold to Arista.

See publication

Tags: AI, Cybersecurity, IoT

SMU Meadows School of Arts Advisory Board
Southern Methodist University
September 01, 1998
Advise and discuss the curricula of SMU’s Meadows School of Arts as a advisory board member for technology.

See publication

Tags: Cybersecurity, Data Center, Emerging Technology

12 Article/Blogs
Cybersecurity in a Rapidly Evolving Threat Landscape
LinkedIn
October 26, 2020
It’s hard to imagine modern life (particularly with the recent emphasis on remote work) without the level of connectivity we currently enjoy. Businesses are hard at work increasing the capability of that connectivity: We’re connecting more and more devices through the Internet of Things (IoT), and making a leap forward in speed, bandwidth and reduced latency with 5G. This trend of exponential growth of devices is expected to continue for the foreseeable future and it will bring a larger attack surface and many new threat vectors to the security equation.

See publication

Tags: Cybersecurity, Leadership, 5G

5 Keys to Successfully Implementing a Productive Remote Workplace
Oracle
March 30, 2020
Wrote article for Oracle Security. The title of the article was "5 Keys to Successfully Implementing a Productive Remote Workplace".

See publication

Tags: Cybersecurity, Emerging Technology, Privacy

RSA 2020 Recap: Cloud Security Moves to the Front
Oracle
March 10, 2020
Wrote and article for Oracle titled: "RSA 2020 Recap: Cloud Security Moves to the Front".

See publication

Tags: Cybersecurity, Emerging Technology, Privacy

Threat Series: Keeping Up with the Challenging Landscape of Cloud Security
Oracle
February 18, 2020
Author of "Threat Series: Keeping Up with the Challenging Landscape of Cloud Security" that was published on Oracle main blog.

See publication

Tags: Cloud, Cybersecurity, Data Center

Misconfiguration, Bots, Cybercriminals – Where’s the Real Threat?
Oracle
September 12, 2019
A security article regarding misconfigurations, bots and cybercriminals for Oracle’s main blog.

See publication

Tags: Cloud, Cybersecurity, Digital Transformation

Cloud Computing Predictions for 2019: More Migrations, Onward with Openness
Oracle
January 10, 2019
Predictions for Cloud computing in 2019 for Oracle.

See publication

Tags: Big Data, Cloud, Emerging Technology

Cybersecurity Predictions for 2019: Advanced Attacks, Bigger Breaches
Oracle
January 07, 2019
Predictions for Cybersecurity in 2019 for Oracle.

See publication

Tags: Cybersecurity, Fintech

5 Artificial Intelligence and Machine Learning Use-Cases for Cybersecurity - Bitnewstoday
Bitnewstoday.com
December 04, 2018
Evolving cybersecurity risks and trends continue to force organizations to adopt waves of precautionary changes and solutions to protect themselves, further forcing organizations to adapt, evolve or fall behind in the marketplace.

See publication

Tags: AI, Analytics, Cybersecurity

Get Your Team Productive with AI Now
LinkedIn
November 15, 2018
One of the most interesting benefits to IBM Watson Studio is its integrated collaboration environment as it allows a team made of data scientists, business analysts, SMEs and others collaborate without having to share accounts, move data around or use work arounds often required when using multiple consoles, tools or different products needed to create, manage and successfully run AI, machine learning or deep learning projects from end to end.

See publication

Tags: AI, Analytics, Cloud

5 Artificial Intelligence and Machine Learning Use-Cases for Cybersecurity
LinkedIn
September 09, 2018
3 articles

Like
83

Comment
14


25


Evolving cybersecurity risks and trends continue to force organizations to adopt waves of precautionary changes and solutions to protect themselves, further forcing organizations to adapt, evolve or fall behind in the marketplace. Rapid technological development and adoption across diverse industries presents additional developmental challenges for organizational cybersecurity processes and systems.

See publication

Tags: Cybersecurity

Harnessing AI's Power Is Easier Now!
LinkedIn
July 30, 2018
In my experience as a C-level executive and long-time AI professional, I’ve learned that people who want to utilize artificial Intelligence find getting started to be the most difficult part. Even the more confident practitioners could easily become intimidated by the array and complexity of tools to navigate.

But this problem is now a thing of the past. With IBM Watson Studio, you and your project can now hit the ground running. IBM Watson Studio’s integrated environment makes AI significantly easier, by allowing users to quickly and easily build visually appealing projects and models.

See publication

Tags: AI, Predictive Analytics

Feeding The Monster: The Huge Impact And Real-World Uses Of Blockchain
LinkedIn
January 18, 2018
Blockchain is an immensely hyped and important digital record-keeping technology that reached early prominence due to its origin and use in cryptocurrencies like Bitcoin, Ethereum and Ripple. But, its impact is destined to be much larger than just cryptocurrency as it provides an innovative, secure and immutable way for transactional systems to record and store data and records with multiple parties.

See publication

Tags: Blockchain, Cryptocurrency, Cybersecurity

4 Board Memberships
Board Member
WellAware
May 11, 2020
Board Member for WellAware, a top IIoT company that has raised over $160MM. Top-level customer list coupled with innovative technology and SaaS business model means incredible value.

See publication

Tags: Digital Transformation, IoT, Privacy

FireScope, Inc.
FireScope, Inc.
August 28, 2006
I was a board member for FireScope, Inc., Corporate Board for nine years.

See publication

Tags: AI, Cybersecurity, IoT

SMU Cox Business School Board
SMU
September 10, 1999
I was a board member for the Southern Methodist University’s Cox School of Business for three years.

See publication

Tags: AI, Cybersecurity, Emerging Technology

Vectrix Board Member
Vectrix, Inc
May 20, 1996
Mark was a board member of the Vectrix Corporate Board for 5 years.

See publication

Tags: AI, Cybersecurity, Digital Transformation

2 Books
The CyberSecurity Intelligence Report - Bot Mitigation & Management
Oracle
February 04, 2019
Cybersecurity is like fighting a never-ending battle against a relentless foe. It’s not about wiping out the threat for good; it’s about staying one step ahead.

Bot Management is a crucial tactic in this ongoing battle. Right now, over 50% of internet traffic is bots. However, not all bot traffic is bad. For example, search engine and RSS bots help your site increase visibility and provide real-time content updates. The challenge is both telling human from bot and good bot from bad. We created this briefing to help organizations take control of their cybersecurity, starting with bot management and mitigation. We asked cybersecurity experts for their best tips on identifying bots, mitigating damage, and creating a culture of security in your organization.

See publication

Tags: AI, Cloud, Cybersecurity

15 Enterprise Security Myths Exposed
Relevant Track
November 07, 2016
***eBook by Mark Lynd *** Unfortunately, there are still too many enterprise security myths being perpetuated and this can negatively impact many enterprises through a false sense of security. This interactive eBook seeks to expose and combat those myths.

See publication

Tags: Big Data, Cybersecurity, Digital Transformation

3 Book Chapters
Closing Vulnerabilities
Oracle Dyn
October 15, 2018
Security misconfiguration is the most common website vulnerability that most people are not aware
of. Many business leaders assume that after they have approved the purchase and installation of security products and services that they are fully protected.

See publication

Tags: Cloud, Cybersecurity

Closing Vulnerabilities
Oracle Dyn
October 15, 2018
Security misconfiguration is the most common website vulnerability that most people are not aware
of. Many business leaders assume that after they have approved the purchase and installation of security products and services that they are fully protected.

See publication

Tags: Cloud, Cybersecurity

Emerging Trends
Oracle Dyn
October 15, 2018
Some of the most important current trends in bot traffic and site exploitatiOn

See publication

Tags: Cloud, Cybersecurity, Emerging Technology

5 Founders
Relevant Track
Relevant Track
September 17, 2013
Founded in 2013 and focused on delivering high quality AI, cybersecurity and Data Center solutions, thought leadership and engagements. Customers include FedEx, Intel, IBM Watson and many others.

See publication

Tags: AI, Cybersecurity, Data Center

Relevant Track, LLC
Relevant Track, LLC
April 15, 2013
Founded Relevant Track, LLC in April, 2013 to provide cybersecurity, AI and cloud consulting.

See publication

Tags: AI, Cloud, Cybersecurity

FireScope, Inc.
FireScope, Inc.
August 28, 2006
Co-founded FireScope on August 28, 2006 - During my tenure Mark served as CMO, CIO, Chief Product Officer, CISO , EVP Partners supporting offices in North America, EMEA and APAC, until December 2014.

Provides technology and go to market leadership for the global FireScope organization. An innovative SaaS Service Management company dedicated to simplifying IT operations and determining the business impact that technology has on a business. Mark architected and provided the technology and marketing vision for the FireScope Stratis solutions. Under Mark’s leadership FireScope developed and deployed Stratis, the only commercial multi-tenant elastic (3 tiers) management cloud with big data back-end product in the world, while working closely with the customers to make sure it met their needs.

See publication

Tags: AI, Cloud, Cybersecurity

Co-Founded Vectrix
Vectrix
April 01, 1996
Led a team of 400+ creative and highly motivated professionals that help our clients put digital capabilities at the core of their ability to improve, enable and transform, their businesses and the way they engage their customers. We did this by offering digital branding, technology advisory, development, digital marketing, digital analytics in an integrated fashion. We did this for customers like P&G, American Airlines, M&M Mars, Coors, Time Warner, Victoria Secrets, Anheuser Busch, etc...

• Doubled company’s size to $32M in twenty-seven months.
• Led and worked closely with sales and creative teams to drive top-line revenues.
• Developed GTM strategy and operating plan, identified and acquired management team, and led
due diligence for four acquisitions.
• Built lasting collaborative relationships and alliances with iconic customers and partners
• Led delivery of numerous marketing, information technology and e-commerce
solutions to large client base including VISA, Chase, Motorola, M&M/Mars, Nabisco& Fandango

See publication

Tags: AI, Cybersecurity, Data Center

Innovative Business Technologies, Inc. (“IBT”)
IBT, Inc.
May 14, 1993
IBT was a technology com-any based in Tulsa, Oklahoma focused on Artificial Intelligence and RPG III to “C” conversions. It was sold to one of the largest technology companies in the world at the time. It was purchased because of its expert systems around technology operations.

See publication

Tags: AI, Data Center, Emerging Technology

2 Influencer Awards
Ranked #6 in Cybersecurity Power 100
Rise.Global
September 20, 2019
Currently Ranked #6 in Cybersecurity Power 100 by Rise.Global.

See publication

Tags: Cybersecurity, Social

#8 Ranked AI Thought Leader by Rise.Global
Rise. Global
September 20, 2019
Currently ranked the #8 AI Thought Leader by Rise.Global

See publication

Tags: AI, Digital Transformation, Social

4 Keynotes
Ransomware: Protect. Detect. RESPOND.
University 0of Redlands
October 29, 2019
Gave keynote at University of Redlands Technology Summit to over 200 people. It was how to protect, detect and respond to a ransomware attack.

See publication

Tags: Cloud, Cybersecurity, Data Center

Ransomware: Protect. Detect & Respond in McAllen, Texas
Region One Education Service Center
October 25, 2019
Discuss how ransomware has become top of the mind issue for CIOs and CISOs globally.

Although today’s hyperconnected world offers numerous benefits, it also brings with it the specter of cybercrime. More connected devices mean more entry points into a network and a broader attack surface. With the proliferation of malware, such as cryptojacking, phishing and DDoS attacks, it’s estimated that more than 100,000 malicious cyberassaults take place each and every day.



Join Netsync as we discuss how to be proactive and mitigate your risk to ransomware.

- What steps to take in the first 24 hours after a ransomware attack
- To pay or not to pay? Understand how to make the best decision for your organization
- 7 key steps to protect your organization from malicious ransomware attacks

See publication

Tags: Cloud, Cybersecurity, Data Center

Ransomware: Modern Day Scourge
Netsync & Cisco
October 24, 2019
Discuss how ransomware has become top of the mind issue for CIOs and CISOs globally. Also discussed how to put together a comprehensive strategy to combat ransomware.

Although today’s hyperconnected world offers numerous benefits, it also brings with it the specter of cybercrime. More connected devices mean more entry points into a network and a broader attack surface. With the proliferation of malware, such as cryptojacking, phishing and DDoS attacks, it’s estimated that more than 100,000 malicious cyberassaults take place each and every day.



Join Netsync as we discuss how to be proactive and mitigate your risk to ransomware.

- What steps to take in the first 24 hours after a ransomware attack
- To pay or not to pay? Understand how to make the best decision for your organization
- 7 key steps to protect your organization from malicious ransomware attacks

See publication

Tags: Cloud, Cybersecurity, Data Center

CISO v. CIO - Comparing Operation Goals with Contrasting Cyber Security Concerns
ElevateIT
July 11, 2019
This will surely be the Keynote of the Year, as both of these dynamic speaker and industry leaders provide insight into their worlds as they guide you through the challenges the C-Suite faces monetizing technology, weighed against ever present security risks.

See publication

Tags: Cloud, Cybersecurity, Digital Transformation

2 Media Interviews
Oracle Influencer Roundtable
Oracle
September 17, 2019
We were video interviewed at Oracle OpenWorld 2019 for Oracle Influencer Roundtable at the Moscone Studios.

See publication

Tags: AI, Cloud, Cybersecurity

Building Trust with Digital Identity and Blockchain
ThreatMetrix
May 02, 2018
I recently joined Frank Teruel, CFO of ThreatMetrix for the latest Digital Identity 360 Video Episode: “Building Trust with Digital Identity and Blockchain” Watch video here: http://bit.ly/2jAQUtW

See publication

Tags: AI, Blockchain, Cybersecurity

5 Panels
Cybersecurity in a Hyper-Connected World
LinkedIn
October 21, 2020
It’s time to talk cybersecurity on the next #BIZTALKS Twitter chat hosted by AT&T Business. Join me and other experts on Wednesday, October 21, at 12 pm CDT to participate in a discussion about the many facets of modern cybersecurity. https://bit.ly/3dxCCFi i #cybersecurity #TwitterChat

See publication

Tags: Cybersecurity, Management, Leadership

Cloud Adoption: Getting Everyone On Board Securely
Oracle
September 16, 2019
Our panel of four discussed the many things an enterprise should consider to securely going to the cloud.

See publication

Tags: Cloud, Cybersecurity, Digital Transformation

CSuite Forum: Planning for the Unplannable in IT - Unintended Consequences of Unexpected Real World Events
ElevateIT
July 11, 2019
Mark moderated a panel discussion regarding Planning for the Unplannable in IT - Unintended Consequences of Unexpected Real World Events with three others.

See publication

Tags: Cloud, Cybersecurity, Digital Transformation

North Texas Medical Cybersecurity Summit - Medical Cybersecurity is Changing Fast
WWT and CI.Security
April 25, 2019
An hour long panel with three CIOs from major healthcare organizations, in which I moderated and participated. This summit was sponsored by WWT and CI.Security and was held at Bitter Sisters’ Brewery’s hosting area.

See publication

Tags: AI, Cybersecurity, Healthtech

TeXchange - HACKS - FRAUD - BLOCKCHAIN - CYBER - SCARY
TexChange - Custis Hoge
April 17, 2019
A panel with three C-Suite executives that I moderated. The event was attended by 65+ people and the panel ran about 1.5 hours.

See publication

Tags: AI, Cloud, Cybersecurity

18 Speaking Engagements
CCPA: 7 Things Every CISO Should Know
Oracle
February 26, 2020
Spoke at RSA for Oracle Security. The title of the speaking event was "CCPA: 7 Things Every CISO Should Know".

See publication

Tags: Cloud, Cybersecurity, Data Center

CCPA: 7 Things Every CISO Should Know
Oracle
February 25, 2020
Spoke at RSA for Oracle Security. The title of the speaking event was "CCPA: 7 Things Every CISO Should Know".

See publication

Tags: Cybersecurity, Emerging Technology, Privacy

Join Netsync, Cisco and NetApp at The Movies - Star Wars - Dallas, TX
Netsync
December 19, 2019
Come witness the event of the Galaxy!

Join us for the premier of Star Wars The Rise of Skywalker in Dallas on December 19th at Cinepolis Luxury Cinemas. Netsync, NetApp, and Cisco Meraki are your sponsors for this great event.

Enjoy food, drinks, and fun while reclining in luxury at Cinepolis Luxury Cinemas in Dallas, Texas.

See publication

Tags: AI, Cloud, Cybersecurity

Mitigate Your Risk For Ransomware - San Antonio, TX
Netsync
December 17, 2019
Although today’s hyperconnected world offers numerous benefits, it also brings with it the specter of cybercrime. More connected devices mean more entry points into a network and a broader attack surface. With the proliferation of malware, such as cryptojacking, phishing and DDoS attacks, it’s estimated that more than 100,000 malicious cyberassaults take place each and every day.

Join Netsync and Cohesity as we discuss how to be proactive and mitigate your risk to Ransomware.

What steps to take in the first 24 hours after a ransomware attack
To pay or not to pay? Understand how to make the best decision for your organization
7 key steps to proactively protecting your organization from malicious ransomware attacks

See publication

Tags: AI, Cybersecurity, Data Center

Mitigate Your Risk For Ransomware - Costa Mesa, CA
Netsync
December 05, 2019
Although today’s hyperconnected world offers numerous benefits, it also brings with it the specter of cybercrime. More connected devices mean more entry points into a network and a broader attack surface. With the proliferation of malware, such as cryptojacking, phishing and DDoS attacks, it’s estimated that more than 100,000 malicious cyberassaults take place each and every day.

Join Netsync, Cohesity, and Cisco as we discuss how to be proactive and mitigate your risk to Ransomware.

What steps to take in the first 24 hours after a ransomware attack
To pay or not to pay? Understand how to make the best decision for your organization
7 key steps to proactively protecting your organization from malicious ransomware attacks

See publication

Tags: AI, Cloud, Cybersecurity

Mitigate Your Risk For Ransomware - Redlands, CA
Netsync
December 04, 2019
Although today’s hyperconnected world offers numerous benefits, it also brings with it the specter of cybercrime. More connected devices mean more entry points into a network and a broader attack surface. With the proliferation of malware, such as cryptojacking, phishing and DDoS attacks, it’s estimated that more than 100,000 malicious cyberassaults take place each and every day.

Join Netsync, Cohesity, and Cisco as we discuss how to be proactive and mitigate your risk to Ransomware.

What steps to take in the first 24 hours after a ransomware attack
To pay or not to pay? Understand how to make the best decision for your organization
7 key steps to proactively protecting your organization from malicious ransomware attacks

See publication

Tags: AI, Cybersecurity, Data Center

Mitigate Your Risk For Ransomware
Netsync
November 14, 2019
Although today’s hyperconnected world offers numerous benefits, it also brings with it the specter of cybercrime. More connected devices mean more entry points into a network and a broader attack surface. With the proliferation of malware, such as cryptojacking, phishing and DDoS attacks, it’s estimated that more than 100,000 malicious cyberassaults take place each and every day.

Join Netsync, Cohesity, and Cisco as we discuss how to be proactive and mitigate your risk to Ransomware.

What steps to take in the first 24 hours after a ransomware attack
To pay or not to pay? Understand how to make the best decision for your organization
7 key steps to proactively protecting your organization from malicious ransomware attacks

See publication

Tags: AI, Cloud, Cybersecurity

CIO Roundtable: The Future of AI in the Enterprise
ElevateIT
October 16, 2019
Presented at CIO Roundtable: “The Future of AI in the Ever-Changing Enterprise Landscape” at ElevateIT Technology Summit in Houston, Texas

See publication

Tags: AI, Cybersecurity, Data Center

Technology Ball - STEM Education
Technology Ball
October 09, 2019
Discussed AI and cybersecurity for STEM at Technology Ball event.

See publication

Tags: AI, Cybersecurity, Data Center

Securing Business Critical Cloud Workloads: Threats, Implications, and Outcomes
Oracle
September 17, 2019
I spoke about how to secure workloads in a multi-cloud environent.

See publication

Tags: Cloud, Cybersecurity, Digital Transformation

How To Have A Strong Career In Cybersecurity
NPower
September 06, 2019
Spoke to a group of 49 students at NPower regarding a career in cybersecurity

See publication

Tags: AI, Cybersecurity, Digital Transformation

CIO Roundtable - The Future of AI in the Ever Changing Enterprise Landscape
ElevateIT
July 11, 2019
Spoke about the Future of AI in the Ever Changing Enterprise Landscape to a group of C-level people.

See publication

Tags: AI, Cybersecurity, Digital Transformation

Intro To Cryptocurrencies And Why They Must Evolve To Reach The Masses
Greenhill School
November 07, 2018
Intro to cryptocurrencies and why they must evolve to reach the masses is largely an introduction to crypto and then covers the challenges and needs to grow and reach the masses.

See publication

Tags: Blockchain, Cryptocurrency, Cybersecurity

Digital Identity Is Not An Opt-In Scenario
North Texas ISSA
September 05, 2018
Discusses the challenges with maintaing and protecting your digital identity. Also it talks about how artificial intelligence can be used to protect one’s identity.

See publication

Tags: Blockchain, Cryptocurrency, Cybersecurity

Keynote: When and Why Family Office, Venture and Private Equity Move En Masse Into Crypto
BCI Summit 2018
June 12, 2018
I performed the keynote on June 12th and also moderated two panels and was a panelist on another. BCI Summit Investment Summit was designed to educate and discuss blockchain and cryptocurrency for portfolio investors

See publication

Tags: Blockchain, Cryptocurrency, Cybersecurity

Seven AI Trends Affecting The Enterprise
IBM Systems
April 30, 2018
Seven AI Trends Affecting The Enterprise Presentation at IBM TechU in Orlando, Florida.

See publication

Tags: AI, Blockchain, Digital Transformation

IBM Think 2018
IBM
March 20, 2018
I was a paid influencer and speaker for IBM at IBM Think 2018.

See publication

Tags: AI, Big Data, Cybersecurity

Combine Machine Learning and Blockchain to Create Greater Trust
Blockchain Global Advisors
February 12, 2018
Mark Lynd's presentation: "Combining Machine Learning and Blockchain To Create Greater Trust." Digital Trust is one of the key ingredients to companies with significant digital businesses or looking to create important digital businesses.

See publication

Tags: AI, Blockchain, Cybersecurity

8 Videos
How Cities are Leveraging the Remote Workplace
Netsync
May 24, 2020
My relevant Interview with Juergen Bayer, Sr Security Advisor, at Hewlett Packard Enterprise.
We talks about the importance of endpoint security and strong security hygiene in remote work environment in today’s challenging times. Many organizations are being forced to find ways to secure their remote environments due to the #COVID19 pandemic and, as a result, need to find innovative ways to secure #BYOD ("Bring Your Own Device") and workers/students homes.

See publication

Tags: Cybersecurity, Future of Work, Privacy

Leveraging the Cloud for Remote Work
Netsync
May 23, 2020
My interesting Interview with Jo Peterson, VP of Cloud and Security Services for Clarify360. She is also a 2016-2020 CRN Women of the Channel Recipient. She is a member of the Forbes Technology Council and one of the Top Global Thought leaders regarding the Cloud.

See publication

Tags: Cloud, Cybersecurity, Privacy

Security Concerns While Working From Home
Netsync
May 23, 2020
Great discussion with Chuck Brooks, top ranked #cybersecurity thought leader, and visionary named #LinkedIn's Top Technology Person to Follow. In this interview we discuss security concerns for #remotework during #COVID19. We discuss concerns, #threats and opportunities that exist around securing the #remoteworkplace now and in the future.

See publication

Tags: Cybersecurity, Future of Work, Privacy

Leverage the Remote Workplace and thrive
Netsync
May 10, 2020
My relevant Interview with Juergen Bayer, Sr Security Advisor, at Hewlett Packard Enterprise.
We talks about the importance of endpoint security and strong security hygiene in remote work environment in today’s challenging times. Many organizations are being forced to find ways to secure their remote environments due to the #COVID19 pandemic and, as a result, need to find innovative ways to secure #BYOD ("Bring Your Own Device") and workers/students homes.

See publication

Tags: Cybersecurity, Future of Work, Privacy

5 Challenges of Securing a Remote Workplace
Netsync
April 26, 2020
My interview with Bob Carver, CISM, CISSP, Principle, Cybersecurity Threat Intelligence and Analytics at Verizon. Bob addresses the top 5 challenges of securing remote work places, including home routers, Wi-Fi, and #VPN providers and the #vulnerabilities that have surfaced as a result of the precipitous rise in remote working due to the #COVID19 pandemic.

See publication

Tags: Cloud, Cybersecurity, Privacy

How to deal with new threats to business continuity.
Netsync
April 22, 2020
My highly relevant Interview with Mark Jordan, Vice President, Technology, of data protection provider Unitrends, a Kaseya company. We talks about the importance for well planned business continuity, especially in today’s challenging times. Many companies are being forced to build out business continuity on the fly due to the #COVID19 pandemic and, as a result, may be broadening their attack surface and leaving their data at risk and unprotected.

See publication

Tags: Cybersecurity, Future of Work, Privacy

Working from Home the New Norm?
Netsync
April 02, 2020
Netsync’s Mark Lynd and Hugh Miller discuss insurance liabilities related to remote workers, establishing and deploying Continuity of Operations plans to address current and future emergencies, and, once the COVID-19 pandemic is over, how organizations can transition back to normal operations and establish new remote working strategies and policies.

See publication

Tags: Cybersecurity, Future of Work, Privacy

How to Stay Cyber Safe While Working Remotely
Netsync
March 30, 2020
Nothing has tested emergency preparedness like the global outbreak of COVID-19, especially as it relates to how technology can help keep remote workers and distance learners productive while adhering to social distancing. Cybersecurity Executive Shira Rubinoff talks with Netsync’s Mark Lynd about how this rapid introduction to remote working solutions can lead to security issues if they’re not deployed properly.

See publication

Tags: Cybersecurity, Future of Work, Privacy

Radar

2 Predictions
2021 Predictions for AI

Date : September 23, 2020

As more and more production AI-based systems come in to play and greater amounts of data are collected, we will see more personalized and tailored services. This will have significant impacts on industries such as healthcare, transportation and financial services to name a few. Therefore it will be critical for these solutions be ethical in their design, development and production or the impact could be far less privacy and more intrusive solicitations.

See Radar

2020 Predictions for AI

Date : September 14, 2020

Most of the more well-known use-cases for artificial intelligence to this point have been voice recognition, bots, and/or machine learning. Tech giants and thousands of start-ups are working diligently on the evolving AI, but candidly, it still falls short of the abilities of a human brain. It may take several years, possibly even decades, and much more compute power before we see the true ability for AI to solve logic problems and have reasoning on par with the human brain.

But, during that journey, we will see this exciting innovation drive some amazing evolutions for AI.

See Radar

Blog

Opportunities

Contact Mark Lynd

Media Kit

Share Profile

Contact Info

  Profile

Mark Lynd


Latest Tweets