Power Speaker on Enterprise Cyber Security

G. Mark Hardy closes the gap between security issues and Return on Investment (ROI) because he is fluent in business and security issues. He was hand-picked to address the top executives of Fortune 1000 firms across the country in small group settings addressing an enterprise-wide accountability approach to security.

Comfortable in front of large audiences of technologists and at home with C-level executives, G. Mark Hardy can reach your audience effectively every time.

G. Mark Hardy has been providing information security expertise to government, military, and commercial clients for over 25 years. A long-standing industry veteran, he is a perennial speaker at major industry trade shows. As president of National Security Corporation, he directs the efforts of the information security consulting firm he founded in 1988.

Mr. Hardy's professional background includes information security planning and policy development, managing security assessment and penetration teams, data encryption and authentication (including "breaking" commercial cryptographic algorithms), software development and strategic planning for e-commerce, and writing commercial risk assessment software. He has developed information security plans for four U.S. Military commands, and wrote the communications security encryption requirements for an experimental military satellite program.

G. Mark is a founding member and on the Advisory Board of the National CyberWatch Center (www.nationalcyberwatch.org).

Selected Videos of Presentations

Military and Leadership Presentations

Security and Hacking Presentations


B.A, Mathematics, Northwestern University
B.S., Computer Science, Northwestern University
M.B.A, Loyola College of Maryland
M.S.S., Masters of Strategic Studies,U.S. Army War College


Certified Information Systems Security Professional (CISSP)
Certified Information Security Manager (CISM)
Certified Information Systems Auditor (CISA)
Global Information Assurance Certification Security Leader (GIAC)

Certified Instructor, SANS (2012-present) for the following courses:

  • MGT512 - Security Essentials for Managers with Knowledge Compression (5 day course)
  • MGT514 - IT Security Strategy, Policy, and Leadership (5 day course)
  • MGT305 - Technical Communication and Presentation Skills for Security Professionals (1 day course)
  • MGT414 - SANS Training Program for CISSP Certification (6 day course)
  • MGT415 - A Practical Introduction to Risk Assessment (2 day course)
  • MGT432 - Information Security for Business Executives (1 day course)
  • MGT442 - Information Security Risk Assessment (2 day course)
  • MGT519 - Information Security Policy In-Depth (2 day course)

Selected Keynotes and Presentations

  • "Layer 8: Understanding Politics in Cyber Security, Keynote, RVAsec
  • "Disruptive Tactics for Disrupting Terrorist Financial Operations," closing plenary session, INFOWARCON
  • "Everybody's Been Hacked: Get Over It and Get On With It!," keynote Seattle WA, 2015
  • "Cyber Leadership: How to Win the Battle AND the War," keynote, IBM conference, Toronto CA 2015
  • “Securing the Chaos,” (confidential client), Linthicum, MD 2015
  • “Complex Challenges in Security,” COSAC, Ireland 2014
  • “Manging Security and Risks with Mobility,” 2014
  • “Weaponizing Digital Currency,” INFOWARCON 2014
  • “How the West was Pwned,” keynote, Security Conference Toronto (SecTor) 2013
  • “Battle in the Clouds: Cyberwar Goes Virtual,” COSAC, Ireland 2013
  • Cryptography Panel Chair, HACKERS 29 (2013)
  • “When Business Processes Fly the Coop,” keynote, Information Security Decisions (ISD) 2013
  • “Going Beyond Mobile Device Management: Leveraging NAC for Mobile Devices,” ISD 2013
  • “10 Things Executives Should Know About Cybersecurity and Cybercrime,” (Confidential Client), London 2013
  • “Enterprise Risk Management,” “Security Policy Development,” “Achieving Security in the Cloud”, “Encryption for the Enterprise,” ISACA 2013
  • “Hacking as an Act of War,” COSAC Conference, Ireland 2012
  • Other recent presentations include: “Mobile Malware,” “Large-Scale Attack Software,” “Security in IPv6,”
    “Advanced Persistent Threat (APT),” Mobile Tracking for Your Cell Phone,” and “Securing Your Enterprise in the 21st Century”

Selected Security Publications

See More Publications