Speaker · Author · Cybersecurity AI Leader

KEN
SATKUNAM

CISM · President & Founder, NorthStar Technology Group

Twenty-five years at the intersection of technology, security, and regulated business. Ken helps organizations understand that protecting and propelling are not opposites — they're the same strategy, executed in order.

CybersecurityAI GovernanceProtect to Propel™HIPAA · CMMC · FTCInc. 5000
View Topics →
25+Years in IT Leadership
Inc. 5000 Honoree
CISMCertified
1Amazon Best-Seller
3National Offices
About Ken

Security is the foundation.
AI is the accelerator.

Ken Satkunam
Amazon
Best-Selling
Author

Ken Satkunam is the President and Founder of NorthStar Technology Group, a managed IT and cybersecurity firm headquartered in Fargo, North Dakota, with offices in Huntsville, Alabama and Folsom, California.

He has spent more than 25 years in IT leadership, serving organizations from small practices to enterprises with 23,000+ employees. His work sits at the intersection of cybersecurity, compliance, and AI modernization — helping regulated organizations build the infrastructure they need to grow without fear.

NorthStar has been recognized on the Inc. 5000 list of fastest-growing companies two consecutive years — #3837 in 2024 and #2393 in 2025 — with 178% revenue growth. The firm serves healthcare organizations, DoD contractors, financial institutions, and law firms across the United States.

Ken is the co-author of Cyber Attack Prevention, an Amazon best-seller, and holds the Certified Information Security Manager (CISM) credential from ISACA. He is a nationally recognized speaker on cybersecurity, AI governance, and the Protect to Propel™ framework — the belief that security is not a cost center, but the foundation for competitive advantage.

He has presented at healthcare, legal, financial services, and defense conferences across the country, and serves as a trusted advisor to CEOs, boards, and leadership teams navigating the convergence of AI adoption and regulatory compliance.

“You don't protect to prevent.
You protect to propel.”
— Ken Satkunam, CISM · northstartechnologygroup.com
Speaking Topics

Six topics.
One framework.

01
🤖

AI Without Guardrails Is a Liability, Not an Advantage

Most organizations are adopting AI faster than they're governing it. This talk examines the compliance, security, and operational risks of unstructured AI adoption — and how regulated organizations can move fast without creating exposure.

AI GovernanceComplianceRisk Management
02
🛡️

Protect to Propel™: The Framework for Regulated Growth

Security and growth are not opposites. The organizations that thrive over the next decade will be the ones that built the foundation first — secure, compliant, and then strategically modernized with AI.

Strategic FrameworkCybersecurityAI Modernization
03
⚖️

What Cyber Insurance Actually Requires Now

The cyber insurance market has fundamentally changed. Insurers are denying claims, not renewing policies, and demanding documented controls. This session breaks down what underwriters actually require in 2026.

Cyber InsuranceRisk TransferCompliance
04
🏥

HIPAA, CMMC, and FTC Safeguards: The Compliance Convergence

Healthcare, defense contractors, and financial services firms are facing regulatory convergence. The controls that satisfy one framework increasingly satisfy others — here's how to build once and comply everywhere.

HIPAACMMCFTC Safeguards
05
🧠

The vCAIO Model: Fractional AI Leadership for the Modern Organization

Most organizations need AI strategy but can't justify a full-time Chief AI Officer. The vCAIO model delivers executive AI leadership on a fractional basis — including governance, roadmap, and agent deployment.

AI LeadershipvCAIODigital Transformation
06
🔒

Ransomware Resilience: Beyond Backup and Pray

Ransomware isn't a backup problem — it's an architecture problem. This session covers the technical and organizational controls that determine whether a ransomware event is a disruption or a disaster.

RansomwareIncident ResponseBusiness Continuity
Credentials & Recognition

Built on 25 years.
Recognized nationally.

🏆

Inc. 5000 — Two-Time Honoree

#2393 (2025) and #3837 (2024). Recognized for sustained, profitable growth in the MSP sector.

🎓

CISM — Certified Information Security Manager

ISACA credential. One of the most recognized designations in information security management.

📖

Amazon Best-Selling Author

Co-author of Cyber Attack Prevention. Available on Amazon.

📡

Channel Futures MSP 501 Honoree

Recognized among the top managed service providers in North America.

🏢

25+ Years in IT Leadership

Founded NorthStar Technology Group in 2000. Prior roles included CIO for organizations with 23,000+ employees.

🌐

National Speaker & Conference Presenter

Presented at healthcare, legal, financial services, and defense conferences across the country.

Who Ken Speaks To

Right audience.
Right format.

Audiences

  • 🏥Healthcare associations and provider groups
  • ⚖️State and national bar associations
  • 💼Financial services and accounting organizations
  • 🛡️Defense industry and CMMC forums
  • 🤝MSP and technology partner conferences
  • 🎯CEO and C-suite leadership forums

Formats

  • 🎤Keynote (45–75 minutes)
  • 🗣️Panel moderator or participant
  • 📋Workshop or half-day intensive
  • 💻Virtual and hybrid events
  • 🏢Executive briefings and board presentations
  • 📰Media interviews and podcast appearances
Book Ken

One conversation.
That's how it starts.

Ken is available for keynotes, panels, executive briefings, and media appearances. To inquire about speaking engagements, media requests, or book availability, reach out directly.

Visit northstartechnologygroup.com →

Ken's Published Work

📚 Resource Articles →👤 Author Profile →