Unlock access to Thinkers360 AI to fast-track your search for analysts and influencers.
This feature is available for Enterprise Lite and Enterprise Members Only.
You have been temporarily restricted. Please be more thoughtful when adding content for your portfolio. Your portfolio and digital media kit and should be reflective of the professional image you wish to convey. Accounts may be temporarily restricted if we receive reports of spamming or if the system detects excessive entries.
Membership
Publish your original ideas on the Thinkers360 platform!
This feature is available for Pro and Pro-Plus Members Only.
Speaker Bureau functionality whereby individuals can be featured speakers within our Speaker Bureau service and enterprises can find and work with speakers.
This feature is available for Pro, Pro-Plus, Premium and Enterprise Members Only.
Highlight your featured products and services within our company directory for enhanced visibility to active B2B buyers worldwide. This feature is available for Pro, Pro Plus, Premium and Enterprise Members Only.
Contribute to the Thinkers360 Member Blog and have your thought leadership featured on our web site, newsletter and social channels. Reach our opt-in B2B thought leader community and influencer marketplace with over 100M followers on social media combined!
You’ve reached your daily limit for entering quotes. Please only add personally-authored content which is reflective of your digital media kit and thought leadership portfolio.
Thinkers360 Content Library
For full access to the Thinkers360 content library, please join ourContent Planor become a contributor by posting your own personally-authored content into the system viaAdd PublicationorImport Publication.
Dashboard
Unlock your personalized dashboard including metrics for your member blogs and press releases as well as all the features and benefits of our member plans!
Interested in getting your own thought leader profile? Get Started Today.
Mark Lynd
Head of Executive Advisory & Corporate Strategy at Netsync
Frisco, United States
** Top Ranked GlobalThought Leader, Author, and Keynote Speaker for Cybersecurity, Cloud, and AI **
Mark Lynd is an accomplished executive with over 2 decades of experience, and 4x CIO & CISO for global companies including a global financial services organization operating in 27 countries. He is the Head of Executive Advisory & Corporate Strategy at Netsync, a global technology reseller, and part of the executive leadership team, helping public and private sector clients worldwide.
Mark is a sought-after thought leader and speaker, frequently presenting on topics such as cybersecurity, artificial intelligence, cloud computing, STEM, and veteran affairs for organizations like Oracle, IBM Watson, Cisco, HP, Dell, AT&T, Intel, and other leading organizations.
Mark's achievements include being a finalist for Ernst & Young's "Entrepreneur of the Year - Southwest Region, presenting the Doak Walker Award on ESPN and being consistently ranked in the top 5 for thought leaders for cybersecurity, security, cloud, and Artificial intelligence for several years.
He's contributed his expertise to several academic and technology boards, including SMU's Cox School of Business.
Mark holds a Bachelor of Science degree from the University of Tulsa and attended The Wharton School. Mark is a proud military veteran who served honorably in the US Army's 3rd Ranger Battalion & 82nd Airborne.
Specialties: CyberSecurity, IoT, Artificial Intelligence, Higher Ed, K12, EdTech, Cloud, Big Data, Mobile, Social, CIO, Governance, Due-diligence, Data Center, Military, Veteran, AI
Available For: Authoring, Consulting, Influencing, Speaking Travels From: Dallas, Texas Speaking Topics: Cybersecurity, Cloud, K12, Higher Education, Data Center & Artificial Intelligence
Dell Tech World: Innovate with confidence: How security can be your differentiator
August 05, 2023
Hosting a Ransomware Roundtable for Pure Storage and Netsync
August 05, 2023
My Interview with SailPoint's Senior Identity Strategist Paul Degraff about identity security in today's challenging environment.
August 05, 2023
Featured Topics
Cybersecurity: Vision And Leadership Required
- Key Items That They Need To Know About Being Secure In Our Digital World
- Discover Cybersecurity Frameworks Like Zero Trust And The Value They Create.
- 7 Cybersecurity Steps That Will Take Teams and Businesses To the Next Level
- How Strong Cybersecurity Can Cause Disruption In An Industry
- How To Build An Achievable Cybersecurity Roadmap and Communicate It To Leadership
- Using Transparency and Collaboration To Foster An Internal Culture of Success
- The Top Ten Barriers To True And Successful Cybersecurity State
- 5 Important Markers Of Cybersecurity Success
A Proactive Strategy For Ransomware That Reduces Risk
- Discuss Is It Best To Assume You Will Be Hit With Ransomware
- What Steps To Take In The First 24 Hours After A Ransomware Attack
- To Pay Or Not To Pay? Understand How To Make The Best Decision For Your Organization
- Utilizing Artificial Intelligence To Reduce Ransomware Exposure
- 7 key steps to protecting your organization from malicious ransomware attacks
- How To Formulate and Execute A Strong Anti-Ransomware State
- 3 Important Markers Of a Strong Response Strategy
Successful Cybersecurity In Today's Chaotic World
- Key Items That They Need To Know About Being Relevant In Our Digital World
- 15 Enterprise Security Myths Exposed From Mark's e-Book
- How To Discover And Quantify Your Cyber-Risks
- The Top Ten Items To Be Aware Of During A Cyber-risk Assessment
- How To Develop And Employ A Best Practices Cyber-risk Action And Management Plan
- The Top Ten Barriers To True And Successful Digital Transformation
- Successful Use Of Cybersecurity Policies, Procedures and Guidelines To Minimize Risk
- Top CyberSecurity Tips For Tracking Your Results, Fine-tuning Your Approach And Reporting.
2019Elevate IT Advisory Board
ElevateIT
January 01, 2020
Advisory board member for The ElevateIT: DFW Technology Summit which is designed to connect you with local experts and resources to assist with your IT & Security needs. The 2nd Annual ElevateIT: DFW Technology Summit will be hosted at the Irving Convention Center on March 18th, 2020.
2020 ElevateIT Advisory Board Member - Houston
ElevateIT
January 01, 2020
Advisory Board Member for the 2nd Annual ElevateIT: Houston Technology Summit and learn why South Texas has long been a hot bed for innovation and disruption. Fueled by the oil and gas, medical, and manufacturing industries, Houston has become home to a vast numbers of IT & Security firms, who have successfully transformed the landscape into a Technology Mecca.
2020 ElevateIT Advisory Board Member - San Antonio
ElevateIT
January 01, 2020
Advisory Board Member for the 1st Annual ElevateIT: San Antonio Technology Summit and learn why South Texas has long been a hot bed for cybersecurity and disruption. Fueled by the oil and gas, medical, and manufacturing industries.
2019 Elevate IT Advisory Board - Houston
ElevateIT
October 16, 2019
Advisory board member for The 2019 ElevateIT: Houston Technology Summit which is designed to connect you with local experts and resources to assist with your IT & Security needs.
2019 Elevate IT Advisory Board - DFW
ElevateIT
July 10, 2019
Advisory board member for The 2019 ElevateIT: DFW Technology Summit which is designed to connect you with local experts and resources to assist with your IT & Security needs. The 2nd Annual ElevateIT: DFW Technology Summit will be hosted at the Irving Convention Center on March 18th, 2020.
SMU Advisory Board - Digital Accelerator Program
SMU
June 05, 2017
Advise and discuss the curricula of SMU’s Big Data program as a board member and mentor students enrolled in the program regarding Big data and its value.
Served as advisory board member for AirTight Networks for 3 years. Assisted with GTM strategy, met with prospective customers and attended conferences on their behalf. Turned into Mojo Networks and then sold to Arista.
Tags: Cybersecurity, Data Center, Emerging Technology
1 Analyst Report
Part of the Dell Innovation Index Research Group
Dell
March 10, 2023
The Innovation Index, Dell’s latest research based on responses from 6,600 business and IT leaders across the globe, assesses organizations’ innovation maturity. It is a point-in-time snapshot of how organizations are innovating despite unprecedented uncertainty, after a global pandemic and amidst rampant inflation.
Are You Worried About VMWare's Impact and Pricing Under Broadcom?
cybervizer
July 16, 2024
Being an experienced 4x CIO and CISO who has navigated numerous tech transitions over the past couple of decades, I've come to realize that change is a constant in our industry. The recent purchase of VMware by Broadcom for a whopping $61 billion has caused quite a stir in the enterprise IT world, leaving many top executives pondering the future of their virtualization and cloud infrastructure strategies.
Near Real-Time Recovery: The New Standard in Cyber Resilience
LinkedIn
July 03, 2024
Imagine this: A devastating ransomware attack strikes your organization. Your critical systems are paralyzed, data is inaccessible, and the clock is ticking. The pressure is immense; every passing minute translates to potential revenue loss, reputational damage, and operational chaos. This is a nightmare scenario that C-level executives, especially CEOs, CFOs, COOs, CIOs, and CISOs, dread
Silent Siege: How Stealthy OT Threats Could Leave Us In The Dark Ages
Mark Lynd
June 21, 2024
As someone who works, advises, and provides risk management and incident response tabletop exercises for business, IT, and OT executives for over 100 private and public sector customers, including cities, counties, K12s, higher education institutions, hospitals, energy companies, and more, it has given me keen insights into the real threat and potential impact of cyberattacks on their Operational Technology (OT). While much attention is given to safeguarding personal information and financial data, operational technology security is a crucial yet often overlooked aspect of cybersecurity that demands immediate focus. This article dives into OT security, highlighting its importance and how severe attacks could disrupt essential services like electricity, emergency care, and water supply for extended periods, causing real harm and societal chaos.
Protecting AI from Modern Cyber Attacks
Mark Lynd
May 30, 2024
Artificial Intelligence is becoming crucial for businesses of every scale, offering innovative and impactful abilities. As its utilization grows rapidly, ensuring the protection of these systems from cyber risks becomes increasingly important.
In my experience of over two decades working with artificial intelligence, which includes Expert Systems, Machine Learning, Genetic Algorithms, Generative AI, and more, I have observed how AI's advancement has revolutionized various industries.
Cybersecurity Imperative: Why The C-Suite Must Champion Incident Response and Near Real-Time Recovery
Mark Lynd
May 23, 2024
Ransomware attacks are escalating in complexity and frequency, posing significant threats to organizations of all sizes. In this article, I will attempt to highlight the critical importance of incident response (IR) planning and rapid recovery measures in mitigating evolving cyber threats like ransomware.
We Are in an AI Arms Race in Cybersecurity
Mark Lynd
May 10, 2024
As someone who has and continues to work with hundreds of public and private sector organizations to enhance their cybersecurity posture, the emergence of AI-powered threats has become increasingly concerning. As a former 4x CIO and CISO, who has weathered the storm of a successful cyber attack, I can attest to the severe and lasting repercussions these incidents inflict on an organization.
Minutes Matter, Hours are Expensive, and Days are Lethal
Mark Lynd
May 09, 2024
Why Your Enterprise Can’t Afford to Wait on Ransomware Recovery
In the last 18 months or so, I have facilitated over 100+ Incident Response tabletops for some of the biggest public and private sector brands out there, and each session has sharply reminded me of just how exposed many organizations are to cyber threats. The vulnerability is not just theoretical; it is alarmingly tangible. As a former CISO who has weathered the storm of a successful cyber attack, I understand the deep and lasting impact such an event can have on an organization. My personal experiences have fueled a commitment to help others fortify their defenses and prevent similar fallout. This is not just professional advice; it's a shared battle against a common adversary..
7 Metrics to Measure Your Cybersecurity Strategy
Mark Lynd
May 08, 2024
Do you ask yourself is our cybersecurity strategy working? Is it cost-effective? Are we getting real value for what we are paying for? Is our leadership confident in our efforts? In today's chaotic world where the number and sophistication of threats are rising, it is very challenging. It seems every day the news cycle reports on yet another organization victim of a cyber-attack. So, it is important to have confidence and assurance that your cybersecurity strategy is performing.
Near Real-Time Ransomware Recovery is Possible!
Import from medium.com
May 07, 2024
As some cyber threats continue to evolve and get past security teams using the latest current defensive solutions, the ability to quickly recover from a ransomware attack has become a critical component of modern data protection strategies. Near real-time data recovery management solutions have emer
Navigating Cyber Threats with Intel vPro
LinkedIn
April 12, 2024
As a former 4x CIO or CISO, I was no stranger to the challenges of securing my organization's digital assets in an increasingly treacherous cyber threat landscape. It led me to seek out and employ innovative solutions to assist my team in securing our assets without negatively impacting the business itself. The challenges now are even greater with the rise of remote work and advanced cyber threats.
A Leader’s Guide to Incident Response
Mark Lynd
January 03, 2024
Incident response is an important part of protecting an organization from security incidents. It involves identifying, assessing, and mitigating the impact of a security incident. Cybersecurity incidents can cause significant damage to the organization's operations, reputation, and finances.
Are You Worried About VMWare's Pricing Under Broadcom?
LinkedIn
July 18, 2024
We are sitting at the intersection of cybersecurity and artificial intelligence in the enterprise and there is much to know and do. Our goal is not just to keep you updated with the latest AI, cybersecurity and other crucial tech trends and breakthroughs that may matter to you, but also to feed your curiosity.
Cybervizer Newsletter: Near Real-Time Recovery: The New Standard in Cyber Resilience
Cybervizer
July 09, 2024
Near Real-Time Recovery: The New Standard in Cyber Resilience
Why CEOs, CFOs, and CISOs Must Adopt Modern Data Protection Strategies
Imagine this: A devastating ransomware attack strikes your organization. Your critical systems are paralyzed, data is inaccessible, and the clock is ticking. The pressure is immense; every passing minute translates to potential revenue loss, reputational damage, and operational chaos. This is a nightmare scenario that C-level executives, especially CEOs, CFOs, COOs, CIOs, and CISOs, dread.
Cybervizer Newsletter: Cyber Activism Grows as Elections are Being Held in 55 Countries this Year
Cybervizer
July 02, 2024
Hacktivism has become a powerful force that is shaping how activism and digital conflicts unfold as we progress through 2024, hacktivism. It is an unusual mix of hacking and activism gaining momentum driven by political motives, social justice causes, and the desire for global transformation. This trend is not merely temporary but a significant aspect of today's geopolitical landscape, especially with 55 countries holding elections this year, representing 42% of all nations.
Cybervizer Newsletter: The LockBit 3.0 Breach on the Federal Reserve
Cybervizer
June 25, 2024
The digital age, while offering unprecedented convenience and connectivity, has ushered in an era where cyber threats loom ominously over even the most fortified institutions. The LockBit 3.0 ransomware attack on the Federal Reserve is a stark and brazen testament to this reality. This incident has not only shaken the core of the U.S. financial system but has also underscored the dire need for heightened vigilance and robust cybersecurity frameworks across the board.
Unlocking the Potential of XDR For Greater Visibility and Consolidation
LinkedIn
June 14, 2024
We are sitting at the intersection of cybersecurity and artificial intelligence in the enterprise and there is much to know and do. Our goal is not just to keep you updated with the latest AI, cybersecurity and other crucial tech trends and breakthroughs that may matter to you, but also to feed your curiosity
Can Generative AI Improve Your Cybersecurity Posture in 2024 and Beyond?
Linkedln
June 04, 2024
Our goal is not just to keep you updated with the latest AI, cybersecurity and other crucial tech trends and breakthroughs that may matter to you, but also to feed your curiosity.
Protecting AI from Modern Cyber Attacks
Linkedln
May 30, 2024
Artificial Intelligence is becoming crucial for businesses of every scale, offering innovative and impactful abilities. As its utilization grows rapidly, ensuring the protection of these systems from cyber risks becomes increasingly important.
Why The C-Suite Must Champion Incident Response and Near Real-Time Recovery
LinkedIn
May 24, 2024
Our goal is not just to keep you updated with the latest AI, cybersecurity and other crucial tech trends and breakthroughs that may matter to you, but also to feed your curiosity.
Forrester's Top 5 Cybersecurity Threats for 2024
LinkedIn
May 21, 2024
We are a 10K+ Strong Community, and our goal is not just to keep you updated with the latest AI, cybersecurity and other crucial tech trends and breakthroughs that may matter to you, but also to feed your curiosity
It Has to Change! Incident Response Needs More Attention Now!
LinkedIn
May 17, 2024
We are a 10K+ Strong Community, and our goal is not just to keep you updated with the latest AI, cybersecurity and other crucial tech trends and breakthroughs that may matter to you, but also to feed your curiosity.
Minutes Matter, Hours are Expensive, and Days are Lethal
LinkedIn
May 09, 2024
In the last 18 months or so, I have facilitated over 100+ Incident Response tabletops for some of the biggest public and private sector brands out there, and each session has sharply reminded me of just how exposed many organizations are to cyber threats. The vulnerability is not just theoretical; it is alarmingly tangible. As a former CISO who has weathered the storm of a successful cyber attack, I understand the deep and lasting impact such an event can have on an organization.
Our Community Grows as Two Newsletters and Audiences Become One
LinkedIn
May 03, 2024
We have just merged another newsletter with large audience into our growing community. To that end, we would like to welcome the Critical Intersection audience and the AI Impact Theory audiences to the newly combined and renamed Cybervizer newsletter delivered to you every Tuesday and Friday!
The Critical Intersection
Linkedin
November 21, 2023
Welcome to the newly renamed The Critical Intersection newsletter delivered to you every Tuesday and Friday! As artificial intelligence and cybersecurity, along with other technologies increasingly converge, understanding these critical intersections will be vital for organizations seeking to navigate a complex threat environment.
OpenAI CEO Says GPT-5 Could Be Superintelligent
The Critical Intersection newsletter
November 14, 2023
Welcome to the newly renamed The Critical Intersection newsletter! Previously known as The Morning Boot, have listened and refreshed this newsletter to better serve your interests in today's changing cybersecurity landscape. As artificial intelligence and cybersecurity, along with other technologies increasingly converge, understanding these critical intersections will be vital for organizations seeking to navigate a complex threat environment. The Critical Intersection aims to provide the most relevant insights to enhance your cyber resilience in today's complex threat landscape.
Jan 11 2023 Edition of Morning Boot Cybersecurity Newsletter
Relevant Track, LLC.
January 11, 2023
January 11, 2023 edition of the Morning Boot Cybersecurity newsletter, as Mark shares actionable cybersecurity news, tips, original content, and practical advice.
Be part of a growing audience of more than 140,000+ tech and cybersecurity professionals who get insights from my content.
Jan 03 - Morning Boot Newsletter
Relevant Track, LLC.
January 03, 2023
January 3, 2023 edition of the Morning Boot Cybersecurity newsletter, as Mark shares actionable cybersecurity news, tips, original content, and practical advice.
Be part of a growing audience of more than 140,000+ tech and cybersecurity professionals who get insights from my content.
Generative AI-based Personal AI-Powered Sales Multiplier application and company focused on salespersons, entrepreneurs, and small business owners.
As a salesperson, entrepreneur, or small business owner, have you ever wished you had an extra set of hands or two to increase productivity and sales?
Introducing Boost CoPilot, your AI-driven sales co-worker who automates tasks, improves productivity, and enhances communication. Stop wasting time on tedious tasks and focus on selling.
Board Member - Cybervizer
Cybervizer
November 02, 2020
Board Member at Cybervizer, which is focused on cybersecurity and cloud consulting and influencer activities for organizations like HP, AT&T, Oracle and others.
Board Member for WellAware, a top IIoT company that has raised over $160MM. Top-level customer list coupled with innovative technology and SaaS business model means incredible value.
Cybersecurity Life Skills for Teens
Relevant Track, LLC
April 21, 2023
In today’s digital age, it’s more important than ever for teens to be equipped with the knowledge and skills to navigate the online world safely and securely. “Cybersecurity Life Skills for Teens” is an essential guide to help teens protect their privacy, reputation, security, and themselves while online. This book covers everything from the basics of cybersecurity and social media savvy to careers in cybersecurity.
Many teens have questions about cybersecurity, given they spend so much time on their devices browsing, shopping, researching, and texting with friends, yet don’t know where to turn.
Good news! They have a place now.
Cybersecurity Life Skills for Teens by Mark Lynd helps teens deal with the many cybersecurity challenges they face in their daily lives.
The CyberSecurity Intelligence Report - Bot Mitigation & Management
Oracle
February 04, 2019
Cybersecurity is like fighting a never-ending battle against a relentless foe. It’s not about wiping out the threat for good; it’s about staying one step ahead.
Bot Management is a crucial tactic in this ongoing battle. Right now, over 50% of internet traffic is bots. However, not all bot traffic is bad. For example, search engine and RSS bots help your site increase visibility and provide real-time content updates. The challenge is both telling human from bot and good bot from bad. We created this briefing to help organizations take control of their cybersecurity, starting with bot management and mitigation. We asked cybersecurity experts for their best tips on identifying bots, mitigating damage, and creating a culture of security in your organization.
Can Artificial Intelligence (AI) be Trusted to Run Cybersecurity?
Packt
January 20, 2020
Shira Rubinoff's Cyber Minds brings together the top authorities in cybersecurity to discuss the emergent threats that face industries, societies, militaries, and governments today. With new technology threats, rising international tensions, and state-sponsored cyber attacks, cybersecurity is more important than ever. Cyber Minds serves as a strategic briefing on cybersecurity and data safety, collecting expert insights from sector security leaders, including: General Gregory Touhill, former Federal Chief Information Security Officer of the United States Kevin L. Jackson, CEO and Founder, GovCloud Mark Lynd, Digital Business Leader, NETSYNC Joseph Steinberg, Internet Security advisor and thought leader Jim Reavis, Co-Founder and CEO, Cloud Security Alliance Dr. Tom Kellerman, Chief Cybersecurity Officer for Carbon Black Inc and Vice Chair of Strategic Cyber Ventures Board Mary Ann Davidson, Chief Security Officer, Oracle Dr. Sally Eaves, Emergent Technology CTO, Global Strategy Advisor – Blockchain AI FinTech, Social Impact award winner, keynote speaker and author Dr. Guenther Dobrauz, Partner with PwC in Zurich and Leader of PwC Legal Switzerland Barmak Meftah, President, AT&T Cybersecurity Cleve Adams, CEO, Site 1001 (AI and big data based smart building company) Ann Johnson, Corporate Vice President – Cybersecurity Solutions Group, Microsoft Barbara Humpton, CEO, Siemens USA Businesses and states depend on effective cybersecurity.
Closing Vulnerabilities
Oracle Dyn
October 15, 2018
Security misconfiguration is the most common website vulnerability that most people are not aware
of. Many business leaders assume that after they have approved the purchase and installation of security products and services that they are fully protected.
Closing Vulnerabilities
Oracle Dyn
October 15, 2018
Security misconfiguration is the most common website vulnerability that most people are not aware
of. Many business leaders assume that after they have approved the purchase and installation of security products and services that they are fully protected.
9 Valuable Things Leaders Should Know About Cyber Insurance
Relevant Track, LLC.
November 14, 2022
Understand How to Obtain Proper Coverage, Reduce Premiums, Eliminate Gaps and More
Knowledge is always the best weapon in a Leader’s arsenal, and cyber insurance is no exception. Remote work and sophisticated cyber threats have more than doubled your attack surface in the last two years increasing cyber insurance premiums 74%.
Join hosts Netsync and Arctic Wolf, for an information packed session featuring one of the nation’s top cybersecurity experts, Mark Lynd, Head of Digital Business at Netsync..
As a recognized global thought-leader, Mark will untangle the most pressing issues surrounding Cyber Insurance, including getting insured, meeting audit requirements and avoiding cyber insurance claim issues that every business needs to know.
15 Enterprise Security Myths Exposed
Relevant Track
November 07, 2016
***eBook by Mark Lynd *** Unfortunately, there are still too many enterprise security myths being perpetuated and this can negatively impact many enterprises through a false sense of security. This interactive eBook seeks to expose and combat those myths.
Texas A&M University ETID External Advisory Board & Council
Texas A&M
April 23, 2024
This is a board and council that will advise and steer the Engineering Technology and Industrial Distribution
department ITSV program in the College of Engineering. This program is engaged with our industry partners and has external advisory board members to ensure the program is continually relevant in today's rapidly changing marketplace given AI, ITSM, and cybersecurity advancements.
Founded in 2013 and focused on delivering high quality AI, cybersecurity and Data Center solutions, thought leadership and engagements. Customers include FedEx, Intel, IBM Watson and many others.
Co-founded FireScope on August 28, 2006 - During my tenure Mark served as CMO, CIO, Chief Product Officer, CISO , EVP Partners supporting offices in North America, EMEA and APAC, until December 2014.
Provides technology and go to market leadership for the global FireScope organization. An innovative SaaS Service Management company dedicated to simplifying IT operations and determining the business impact that technology has on a business. Mark architected and provided the technology and marketing vision for the FireScope Stratis solutions. Under Mark’s leadership FireScope developed and deployed Stratis, the only commercial multi-tenant elastic (3 tiers) management cloud with big data back-end product in the world, while working closely with the customers to make sure it met their needs.
Led a team of 400+ creative and highly motivated professionals that help our clients put digital capabilities at the core of their ability to improve, enable and transform, their businesses and the way they engage their customers. We did this by offering digital branding, technology advisory, development, digital marketing, digital analytics in an integrated fashion. We did this for customers like P&G, American Airlines, M&M Mars, Coors, Time Warner, Victoria Secrets, Anheuser Busch, etc...
• Doubled company’s size to $32M in twenty-seven months.
• Led and worked closely with sales and creative teams to drive top-line revenues.
• Developed GTM strategy and operating plan, identified and acquired management team, and led
due diligence for four acquisitions.
• Built lasting collaborative relationships and alliances with iconic customers and partners
• Led delivery of numerous marketing, information technology and e-commerce
solutions to large client base including VISA, Chase, Motorola, M&M/Mars, Nabisco& Fandango
Innovative Business Technologies, Inc. (“IBT”)
IBT, Inc.
May 14, 1993
IBT was a technology com-any based in Tulsa, Oklahoma focused on Artificial Intelligence and RPG III to “C” conversions. It was sold to one of the largest technology companies in the world at the time. It was purchased because of its expert systems around technology operations.
Top Cybersecurity Influencers 2024
The Cyber Express
May 30, 2024
One of The Cyber Express' Top Cybersecurity Influencers 2024. The ever-evolving landscape of cybersecurity is shaped by this dedicated group of individuals. These pioneers, through their research, entrepreneurship, and tireless efforts, have left a significant mark on the industry.
50 CISOs and Cybersecurity Leaders Shaping the Future of Information Security
SecureFrame
May 28, 2024
Modern CISOs are tasked with navigating a host of complex challenges. They must possess a thorough understanding of their organization's evolving threat landscape while managing the delicate balance between mitigating business risks and seizing opportunities. Amidst a significant talent shortage, they need to attract and retain top cybersecurity talent while also keeping their teams focused and motivated on high-impact projects. With information security being a high priority for board members and investors, CISOs are often tasked with achieving more with fewer resources.
To honor these leaders, we are spotlighting 50 distinguished CISOs who are advancing stronger information security practices. The selection criteria for these CISOs included their professional achievements and level of industry experience, along with:
Demonstrated leadership: These CISOs are dedicated to sharing their knowledge and expertise.
A forward-thinking mindset: Successful CISOs are proactive, continually anticipating future challenges and devising ways to fortify organizations against them.
Level of influence: Whether advising senior government officials, engaging thousands of followers, or shaping new legislation, these CISOs serve as global advocates for enhanced information security.
Top Cyber Security Experts & Influencers to follow in 2024
Whizlabs
May 16, 2024
As everything becomes digitized, cybersecurity has become an ever-growing field in ensuring the safety and security of our digital world. With the constant looming of cyber attacks, it’s more important to stay up-to-date on the latest trends and insights in the industry.
To help you stay ahead of the curve, we’ve picked some top cybersecurity influencers in no particular order to follow in 2024. From industry experts to ethical hackers, these thought leaders can pave the way for a safer digital future.
30 Security Experts to Follow in 2023
Media Sonar Technologies
June 05, 2023
Next up on our list of security experts is Mark Lynd, Head of Digital Business at NETSYNC., a global technology value-added reseller.
Lynd is an accomplished executive with over 23 years of experience in technology and cybersecurity. Throughout his distinguished career, he has held various leadership positions, including CEO, CIO, CTO, and CISO, for several global organizations.
Top Cyber Security Experts & Influencers to follow in 2023
Whizlabs
April 27, 2023
As everything becomes digitized, cybersecurity has become an ever-growing field in ensuring the safety and security of our digital world. With the constant looming of cyber attacks, it’s more important to stay up-to-date on the latest trends and insights in the industry.
To help you stay ahead of the curve, we’ve picked some top cybersecurity influencers in no particular order to follow in 2023. From industry experts to ethical hackers, these thought leaders can pave the way for a safer digital future.
Automation and Efficiency Via Artificial Intelligence
MISAC
September 25, 2023
Netsync’s Mark Lynd is on tap to present “Automation and Efficiency Via Artificial Intelligence” at the 2023 MISAC Annual Conference scheduled for September 24-27 at the Westin Rancho Mirage Golf Resort & Spa in Rancho Mirage, California. Lynd’s keynote is scheduled for Monday, September 25th.
In describing his presentation, Lynd stated “we will explore the possibilities of automation powered by artificial intelligence in aiding governments to enhance their efficiency and effectiveness. We will focus on how AI can take charge of tasks, minimize errors, and improve decision-making. We will also examine how AI can facilitate an understanding of constituents’ needs and preferences empowering local governments to deliver improved services to their communities.”
Lynd has over two decades of IT experience. Currently, he’s the Head of Executive Advisory & Corporate Strategy at Netsync where he helps public and private sector clients worldwide. Lynd’s accomplishments include being ranked as the #1 Global Security Thought Leader in 2022 by Thinkers360. He is also recognized as a top global cybersecurity and AI expert and keynote speaker.
Lynd is a four-time CIO and CISO for several global organizations, including a global financial services organization operating in 27 countries. He has contributed expertise to academic and technology boards, including SMU’s Cox School of Business.
In addition, Lynd is a proud military veteran having served honorably in the US Army’s 3rd Ranger Battalion & 82nd Airborne. Mark holds a Bachelor of Science from the University of Tulsa and he attended The Wharton School.
5 Brilliant Ways to Reduce Cybersecurity Risk for Your Organization
Netsync
April 13, 2023
Keynote on lowering cyber risk and incident response for Lake Travis ISD Administration, staff, and principals. This included a 2+ hour Incident Response Table Top.
Modern Risk Management for K12
Netsync
January 19, 2023
Keynote for Leadership, Extended Cabinet, and Principals on lowering cyber risk and incident response for San Antonio ISD Cyber Summit. This included a 3+ hour Incident Response Table Top.
How To Be More Secure with Zero Trust and MFA
Netsync
August 24, 2022
Join the Netsync and Cisco team for an evening of
specialty cocktails and open discussion around your top
security concerns. #1 Security Thought Leader, Mark Lynd
will lead the discussion around Zero Trust and Multifactor
Authentication. If you're in West Texas, you don't want to
miss this event with some of the top security experts from
both Cisco and Netsync.
Netsync SKO - 52 Exhibitors and Manufacturers
Netsync
July 12, 2022
I did the keynote for the Cybersecurity Sessions/day included Okta, Cisco, Artic Wolf and Intel in my presentation. This was in front of over 200+ people, 52 Exhibitors and Manufacturers.
Ransomware: Protect. Detect & Respond in McAllen, Texas
Region One Education Service Center
October 25, 2019
Discuss how ransomware has become top of the mind issue for CIOs and CISOs globally.
Although today’s hyperconnected world offers numerous benefits, it also brings with it the specter of cybercrime. More connected devices mean more entry points into a network and a broader attack surface. With the proliferation of malware, such as cryptojacking, phishing and DDoS attacks, it’s estimated that more than 100,000 malicious cyberassaults take place each and every day.
Join Netsync as we discuss how to be proactive and mitigate your risk to ransomware.
- What steps to take in the first 24 hours after a ransomware attack
- To pay or not to pay? Understand how to make the best decision for your organization
- 7 key steps to protect your organization from malicious ransomware attacks
Ransomware: Modern Day Scourge
Netsync & Cisco
October 24, 2019
Discuss how ransomware has become top of the mind issue for CIOs and CISOs globally. Also discussed how to put together a comprehensive strategy to combat ransomware.
Although today’s hyperconnected world offers numerous benefits, it also brings with it the specter of cybercrime. More connected devices mean more entry points into a network and a broader attack surface. With the proliferation of malware, such as cryptojacking, phishing and DDoS attacks, it’s estimated that more than 100,000 malicious cyberassaults take place each and every day.
Join Netsync as we discuss how to be proactive and mitigate your risk to ransomware.
- What steps to take in the first 24 hours after a ransomware attack
- To pay or not to pay? Understand how to make the best decision for your organization
- 7 key steps to protect your organization from malicious ransomware attacks
CISO v. CIO - Comparing Operation Goals with Contrasting Cyber Security Concerns
ElevateIT
July 11, 2019
This will surely be the Keynote of the Year, as both of these dynamic speaker and industry leaders provide insight into their worlds as they guide you through the challenges the C-Suite faces monetizing technology, weighed against ever present security risks.
Tags: Cloud, Cybersecurity, Digital Transformation
7 Media Interviews
Leading Efforts Towards Building a Safer & More Resilient Digital World
Digital First Magazine
August 21, 2023
Recently, in an exclusive interview with Digital First Magazine, Mark shared his insights on the future of cybersecurity landscape, his professional journey, key recommendations for CISOs on how to make informed decisions, success mantras, words of wisdom, and much more. The following excerpts are taken from the interview.
Fortify and Protect Your Organization from Cyber Threats with PowerProtect
Dell
May 23, 2023
Hear how the PowerProtect portfolio can help preserve data integrity and uses machine learning to help ensure recoverability from Brian, Mark, and Jim.
Building Trust with Digital Identity and Blockchain
ThreatMetrix
May 02, 2018
I recently joined Frank Teruel, CFO of ThreatMetrix for the latest Digital Identity 360 Video Episode: “Building Trust with Digital Identity and Blockchain” Watch video here: http://bit.ly/2jAQUtW
Influencer Engagement with Security Scorecard
Security Scorecard
March 20, 2023
SecurityScorecard continues to share its excellent #cybersecurity insights from #WEF23. They dive into more topics that they uncovered around geopolitical tensions, cyber privacy regulations, security-focused business culture, and more.
Five Cybersecurity Experts on Protecting Your Brand on Social Media
SafeGuard Cyber
November 10, 2021
What are some of the ways you can secure your social platforms and everything connected to them? Here’s what five industry experts and thought leaders have to say about protecting your brand’s social media accounts.
Fireside Chat on Modernizing and Securing the Academy
MoreNET
April 19, 2023
Maria Thompson and Mark Lynd, with Amazon Web Services (AWS)- Join Maria Thompson, AWS Cybersecurity Leader, and Mark Lynd, Head of Digital Business at Netsync for a Fireside Chat on Modernizing and Securing the Academy with AWS. Maria and Mark will highlight the challenges and threats facing the Education Sector and how Institutions can secure their campus. Topics of discussion will include the prevalence of Ransomware Attacks, Cyber Security Insurance, Recruiting and Retaining Cyber Security Talent, Cloud Security Governance & Best Practices, and Securing Multi/Hybrid Cloud.
• AWS – Head of Cybersecurity Maria Thompson
• Netsync Head of Digital Business – Mark Lynd
• AWS Partner Sales Manager – Tracie Bryant
Cybersecurity in a Hyper-Connected World
LinkedIn
October 21, 2020
It’s time to talk cybersecurity on the next #BIZTALKS Twitter chat hosted by AT&T Business. Join me and other experts on Wednesday, October 21, at 12 pm CDT to participate in a discussion about the many facets of modern cybersecurity. https://bit.ly/3dxCCFi i #cybersecurity #TwitterChat
Tags: Cloud, Cybersecurity, Digital Transformation
CSuite Forum: Planning for the Unplannable in IT - Unintended Consequences of Unexpected Real World Events
ElevateIT
July 11, 2019
Mark moderated a panel discussion regarding Planning for the Unplannable in IT - Unintended Consequences of Unexpected Real World Events with three others.
Tags: Cloud, Cybersecurity, Digital Transformation
North Texas Medical Cybersecurity Summit - Medical Cybersecurity is Changing Fast
WWT and CI.Security
April 25, 2019
An hour long panel with three CIOs from major healthcare organizations, in which I moderated and participated. This summit was sponsored by WWT and CI.Security and was held at Bitter Sisters’ Brewery’s hosting area.
The SecurityANGLE with Shelly Kramer: Navigating Cyber Insurance: Key Considerations for the C-Suite
The Cube
March 30, 2024
Navigating Cyber Insurance: Key Considerations for the C-Suite. Unlock cybersecurity insights with The SecurityANGLE podcast — a deep dive into the latest digital defense trends with Shelly Kramer. With cybercrime expected to cause $10.5 trillion in damages by 2025, it’s time to get smart about #cyberinsurance. Join Shelly Kramer & Jo Peterson for SecurityANGLE with Mark Lynd.
In this Kitecast episode, Mark discusses the significance of GRC (Governance, Risk Management, and Compliance) in today’s technology landscape, which is being propelled by accelerated evolution in cyber threats, third-party risks, and data security issues in the cloud. One outcome is that organizations must prioritize GRC strategies rather than making them an afterthought. In addition, Mark argues that Digital Rights Management (DRM) is critical when implementing a GRC strategy that addresses a zero-trust model focused on protecting sensitive content.
Beyond connecting GRC with DRM, Mark also speaks about artificial intelligence (AI), why it is important to teach cybersecurity life skills to teenagers, what he will be covering in his next book, how lack of DRM governance in the higher education sector is exposing national secrets, and more. This is an insightful discussion for anyone interested in learning from a proven leader who is dedicated to digital transformation and cybersecurity.
This presentation is for K12's leadership in Texas, California, Arizona, and Florida regarding making investments into creating and maintaining a Zero Trust framework and architecture for their environments.
We at Promereon Group asked Mark Lynd, Head of Digital Business at Netsync, for a #WorldBackupDay 2023 quote with his advice, insights, and thoughts on this huge topic, here's what he had to say.
Thought Leader Quote for Data Privacy
Promereon Group
March 06, 2023
We asked the head of Digital Business at NETSYNC Mark Lynd, for his thoughts on the topic of #DataPrivacy:
"Threat intelligence's cyber resiliency-boosting power is generally overlooked. By understanding threat actors' current tactics, and techniques, businesses can improve situational awareness, cybersecurity spending, risk exposure, and security posture."
Zero Trust - A word floating around our industry and gracing the front pages of the tech press. But what is it and how can IT organizations and security teams start their Zero Trust journey without stifling innovation? Join Dell's Herb Kelsey and industry expert Mark Lynd, as they cut through the hype and get to the reality of Zero Trust today.
Applying Zero Trust Principles to Your Hybrid-Cloud and Multi-cloud Environments
KeyData
January 25, 2023
Join me for this exciting upcoming "Applying Zero Trust Principles to Your Hybrid-Cloud and Multi-cloud Environments" Webinar
Looking forward to joining KeyData Associates CTO, Brian Read and Microsoft's Chief Security Advisor Ken Malcolmson CISSP CCSP, as we discuss how you can apply #ZeroTrust principles to your #hybridcloud and #multicloud environments.
Join our educational session to explain the key #riskmanagement strategies and how to best implement and maintain controls to meet Zero Trust principles.
Key take aways:
- Challenges that organizations are having when applying zero trust to their hybrid-cloud environments.
- A structured approach to developing your Zero Trust strategy and - some specific controls to achieve it.
- Examples and #bestpractices for applying Zero Trust in a multi-cloud and hybrid cloud environment
- How to get started assessing your current multi-cloud and hybrid #cloud environment
Technology Leadership Academy Presentation
Cybervizer
January 12, 2021
Video presentation from Technology Leadership Academy Conference on Infrastructure Readiness and Security given to 30+ K12 CIOs and education Technology Executives.
Join Netsync, Cisco and NetApp at The Movies - Star Wars - Dallas, TX
Netsync
December 19, 2019
Come witness the event of the Galaxy!
Join us for the premier of Star Wars The Rise of Skywalker in Dallas on December 19th at Cinepolis Luxury Cinemas. Netsync, NetApp, and Cisco Meraki are your sponsors for this great event.
Enjoy food, drinks, and fun while reclining in luxury at Cinepolis Luxury Cinemas in Dallas, Texas.
Mitigate Your Risk For Ransomware - San Antonio, TX
Netsync
December 17, 2019
Although today’s hyperconnected world offers numerous benefits, it also brings with it the specter of cybercrime. More connected devices mean more entry points into a network and a broader attack surface. With the proliferation of malware, such as cryptojacking, phishing and DDoS attacks, it’s estimated that more than 100,000 malicious cyberassaults take place each and every day.
Join Netsync and Cohesity as we discuss how to be proactive and mitigate your risk to Ransomware.
What steps to take in the first 24 hours after a ransomware attack
To pay or not to pay? Understand how to make the best decision for your organization
7 key steps to proactively protecting your organization from malicious ransomware attacks
Mitigate Your Risk For Ransomware - Costa Mesa, CA
Netsync
December 05, 2019
Although today’s hyperconnected world offers numerous benefits, it also brings with it the specter of cybercrime. More connected devices mean more entry points into a network and a broader attack surface. With the proliferation of malware, such as cryptojacking, phishing and DDoS attacks, it’s estimated that more than 100,000 malicious cyberassaults take place each and every day.
Join Netsync, Cohesity, and Cisco as we discuss how to be proactive and mitigate your risk to Ransomware.
What steps to take in the first 24 hours after a ransomware attack
To pay or not to pay? Understand how to make the best decision for your organization
7 key steps to proactively protecting your organization from malicious ransomware attacks
Mitigate Your Risk For Ransomware - Redlands, CA
Netsync
December 04, 2019
Although today’s hyperconnected world offers numerous benefits, it also brings with it the specter of cybercrime. More connected devices mean more entry points into a network and a broader attack surface. With the proliferation of malware, such as cryptojacking, phishing and DDoS attacks, it’s estimated that more than 100,000 malicious cyberassaults take place each and every day.
Join Netsync, Cohesity, and Cisco as we discuss how to be proactive and mitigate your risk to Ransomware.
What steps to take in the first 24 hours after a ransomware attack
To pay or not to pay? Understand how to make the best decision for your organization
7 key steps to proactively protecting your organization from malicious ransomware attacks
Mitigate Your Risk For Ransomware
Netsync
November 14, 2019
Although today’s hyperconnected world offers numerous benefits, it also brings with it the specter of cybercrime. More connected devices mean more entry points into a network and a broader attack surface. With the proliferation of malware, such as cryptojacking, phishing and DDoS attacks, it’s estimated that more than 100,000 malicious cyberassaults take place each and every day.
Join Netsync, Cohesity, and Cisco as we discuss how to be proactive and mitigate your risk to Ransomware.
What steps to take in the first 24 hours after a ransomware attack
To pay or not to pay? Understand how to make the best decision for your organization
7 key steps to proactively protecting your organization from malicious ransomware attacks
Video: Interviews Len Noble
Netsync
August 19, 2022
This week @mclynd speaks with Len Noble, Executive #Sales Director for #Netsync, to discuss our focus on #partnerships & how that impacts our customer's day-to-day experiences & our internal team's achievements in the #industry.
How industry leaders can keep up with an escalating volume of threats.
Skybox Security
August 18, 2022
What are the key ingredients of a risk-based #Cybersecurity strategy?
Another great part of my recent conversation with Skybox Security VP of Sales Engineering, Alastair Williams, was discussing how industry leaders can keep up with an escalating volume of threats.
Read the report Skybox Security recently released to learn how your organization can reduce #CyberRisk with proactive Security Posture Management.
Interview with Dan Lier Former LA Laker and Noted Motivational Speaker
Netsync
August 10, 2022
This week @mclynd speaks with Dan Lier, keynote #speaker at the #Netsync SKO 2022 & premier Las Vegas #Sales and #Leadership Expert, to discuss the #psychology behind success and how personal beliefs drive behavior.
Interview on Security Partnerships with Kurt Sell
Netsync
August 02, 2022
This week @mclynd speaks with @theRealKurtSell, Sales Director for #Netsync, to discuss our commitment to customers and employees and the engineering excellence we provide partners.
Interviewing with Security Architect Timothy Ramsey
Netsync
July 27, 2022
This week @mclynd speaks with Timothy Ramsey, Solutions Architect for #Netsync, to discuss how we provide our customers with the leading security solutions that give them peace of mind.
Interview with Okta's Ralph Figueiredo
Netsync
July 21, 2022
Mark speaks with @RalphCA1, Director of #PublicSector Alliances from
@okta, to discuss what #okta does & the top capabilities they provide to customers.
Moving to the Cloud: SAISD & AWS
AWS
February 09, 2023
In this professionally shot video by a crew out of Chicago on the San Antonio ISD Downtown campus, we discussed their move to the cloud and securing the cloud. It was a 2.5-minute video used to showcase their technology investments to their community.
Lecture: Cyber Risk Management in Education
SAISD
September 19, 2022
Gave a lecture titled Cyber Risk Management in Education for the Superintendent, the Leadership Team, District Cabinet, Principals, and Students from San Antonio ISD (one of Texas' largest school districts).
The Unreasonable Effectiveness of Streaming Graph"
The Bloor Group
June 10, 2024
Cybersecurity experts are drowning in false positives and data breaches are in the news every other week. Digital twins, advanced persistent threat detection, insider threat detection, attack graph analysis, and a dozen different powerful use cases all require the deep relationship analytics best done on a graph data model. But if you’re going to catch cyber criminals before the company name is all over the next news cycle, you need it now, not hours too late.
In order to find and stop advanced persistent threats and insider threats, DARPA and Crowdstrike funded a new technology, not limited by the time windows all other event stream processors must use or the graph database inability to scale. Come learn along with Top 5 Cybersecurity Thought Leader Mark Lynd about thatDot Streaming Graph and thatDot Novelty, powered by open-source Quine. thatDot takes the speed of event stream processing and combines it with the depth of graph analysis to stop threats in milliseconds.
Cybersecurity Workshop & Incident Response Tabletop with Mark Lynd
Netsync
August 02, 2023
Educational tabletop event (Murder - Mystery Style Format) to gain hands-on experience with incident response. This event is perfect for anyone who wants to be better prepared for cyber incidents or wants to improve their incident response capabilities.
By 2024, we can expect to see greater integration of AI in cybersecurity solutions, which will significantly enhance our ability to detect and respond to threats. However, it's important to acknowledge that AI also brings with it some new risks, such as adversarial attacks and concerns around data privacy. Striking a balance between leveraging the benefits of AI while mitigating its drawbacks will be crucial.
Global supply chains and critical infrastructure will continue to be prime targets for ransomware attacks in the coming years. To protect against such threats organizations should adopt proactive measures like implementing near real-time recovery systems and having comprehensive incident response plans in place.
There will be a rise in disinformation campaigns that utilize realistic fake content generated by AI as a means to manipulate public opinion and extort money. To combat this growing cyberattack vector effectively organizations must prioritize source verification techniques, and implement reliable methods for authenticating online information.
As technology advances at an accelerated pace throughout 2024, cyber threats will become even more sophisticated. Maintaining continuous vigilance and adaptability will be key factors in staying ahead of these evolving challenges.
"As we head into 2023, the unprecedented convergence of geopolitical tensions, rising attack surfaces, supply chain obstacles, intensifying threat vectors, economic instability, and a pandemic have forced organizations and individuals to adapt in ways that will forever shape our lives and how businesses secure themselves. The far-reaching implications of these events will be felt throughout 2023, and reinforces the need to be proactive in quantifying and mitigating cyber risk both personally and professionally. Quantifying cyber risk is critical to understanding their cyber spend and also how they cyber insure to cover any unacceptable risk. Due to all these issues cybersecurity teams are burnt-out, over-worked and facing greater threats than ever before and it is impacting their cyber efforts and affecting us all both personally and professionally.
Therefore, many organizations and their leadership are putting greater thought into automation and artificial intelligence to help take some of the load off of their over-worked security teams and also to allow for their leadership and teams to accomplish more with less. This is especially important given the rise in the number of attacks and their increasing sophistication. AI and automation can be used to handle some of this tedious and time-consuming work and give leadership greater visibility into their security environment. Lastly, threat intelligence and incident response were receiving more attention and greater acceptance in the second half of 2022 and rightfully so. We should expect that to continue to accelerate throughout 2023."
In 2022, public and private sector organizations and their CIOs and CISOs will face a far more challenging cybersecurity environment as cyber-attacks are increasingly more sophisticated and destructive, even using artificial intelligence. This alarming evolution that affects almost everyone coupled with the rapid digital transformation of nearly every organization globally has dramatically increased the attack surfaces and number of threat vectors for organizations big and small. According to a recent report by Shred-it, 67% of small businesses in the U.S. do not have an incident response plan. This lack of preparedness is likely even worse globally. The truth is most organizations have spent money, time, and resources on prevent and detect and very little on respond leaving them vulnerable and at high risk. Therefore, many leading organizations, their boardrooms and leadership are thinking about cybersecurity differently and assuming they will be hit at some point and investing to be better prepared if they do. They are increasingly looking to other technologies and cyber frameworks like the cloud, Zero Trust, machine learning, NIST, Identity and Access Management, threat intelligence and others. This trend will continue throughout 2022 and beyond as the stark reality that these nefarious activities are not decreasing but increasing as the bad actors continue to profit from it.
Location: Virtual or In-person Event as appro Fees: $1,500 - $10,000 depending on activ
Service Type: Service Offered
Have multiple talking tracks around cybersecurity, ransomware, business continuity, cloud security and others.
Mark has done keynote speaking and speaking for STEM Events, NPower, Veteran Events, CIO Technology Council - Dallas, Oracle, RSA, IBM Watson, Intel, Cisco, Cohesity, HP and many others.
Join Thinkers360 for free! Are you a Reader/Writer, Thought Leader/Influencer (looking to increase your earnings), or an Enterprise User (looking to work with experts)?