Speaking
Where Security Doctrine Meets Enterprise AI Reality
For boards, C-suites, and conference audiences that need more than frameworks — and are accountable for decisions that cannot be undone.
Career Experience
Honeywell · Raytheon · MedStar Health · Booz Allen Hamilton · Plurilock
NSA · DARPA · DNI/CIO · DHS/CISA
Most security and AI speakers arrive with a single domain. Michael Ruiz does not. Over twenty-five years, he has operated as a signals intelligence analyst at NSA, built global OT cybersecurity businesses at Honeywell, led digital transformation inside a major health system, and now advises boards on AI governance and secure transformation strategy. He has held accountability at every layer of the stack — classified intelligence production, industrial control system security, enterprise platform architecture, and C-suite operating decisions — across sectors where failure has physical, not just financial, consequences. He speaks from the position of someone who has run the programs, hired the teams, and lived with the outcomes. His audiences leave with frameworks they can apply the next morning, not frameworks they need to translate from theory into practice.
As Covered By
Coverage has appeared across global security, technology, and healthcare media.
Financial Times
Global cyber resilience and collaborative defense
The Atlantic
Healthcare digital transformation and patient innovation
The Register
Cybersecurity implications of space and satellite systems
VentureBeat
OT/IoT security strategy and industrial cyber roadmap
Honeywell
Silent residency threats and OT cybersecurity visibility
Nexus Connect / Claroty
IT/OT convergence and governance models
Selected Engagements
Global Cybersecurity Forum
Riyadh, Saudi Arabia
“Beyond the Firewall”
Honeywell User Group Executive
Madrid, Spain
“Megatrends in OT Cybersecurity”
Global Cybersecurity Forum
Riyadh, Saudi Arabia
“Supply Chain Fortification”
NATO CCDCOE Cyber Warfare Conference
Tallinn, Estonia
“Cyber C2: A Current Concept for Future Doctrine”
Air Force IT Conference
Montgomery, AL
“Cyber Security and Operations”
Speaking Themes
The Architecture of Secure AI
Most enterprises are deploying AI without the structural foundations required to govern, secure, and operate it at scale. This theme addresses what those foundations are and why building them after deployment compounds risk rather than reducing it.
Board-Level AI Governance
AI governance is following the same delegation arc as cybersecurity a decade ago — producing the same category of avoidable incidents. This theme gives directors four accountability questions that belong in the boardroom now.
OT Security and the IT Control Fallacy
Applying enterprise IT security controls to industrial environments does not reduce risk — it introduces a new category of it. This theme addresses the structural difference between IT and OT risk, and what purpose-built industrial security actually requires.
Security as a Business Discipline
GRC programs produce evidence of compliance, not clarity about risk. This theme reframes security leadership as a decision-support function — one that converts signals into business decisions rather than audit findings.
Audiences
- C-suite and board executives
- Technology leadership teams (CTOs, CIOs, CISOs)
- Conference and summit organizers
- Government and public sector technology leaders
- Industry associations and sector ISACs
- Executive education and university programs
Formats
- Keynote presentations (30–60 minutes)
- Conference talks and panel discussions
- Executive briefings and workshops
- Board-level presentations
- Webinars and virtual events
- Podcast and media appearances
Inquire about availability
Include your event date, audience, and the specific problem your audience needs to leave with a clearer answer to. Every engagement is tailored — there are no off-the-shelf keynotes. Replies within two business days.