It Security And Data Compliance
We are looking to speak with multiple decision-makers in compliance, it, or legal job functions that have influence over the adoption and purchase of communication/collaborations tools. Desired participants should recently adopted or considering encryption for their productivity/communication/collaboration software uses.
This is for a paid 1 - hour web interview.
1. How would you describe your level of influence in the decision to assess, evaluate, adopt, or purchase new organization/company communication/collaboration tools? By “communication and collaboration software” we mean software enabling real-time and asynchronous collaboration, meetings, instant messaging, file sharing, etc. Would you say you?
A. I am the final decision-maker
b. I share in the decision making
c. I have some influence
d. I have little to no influence
e. We do not have any productivity and collaboration software
**please note that we are only interested in your personal point of view and are not seeking confidential information.
***referrals are highly appreciated
+43 Other Responses
Cyber Security Software Solutions
Our client would like to speak with multiple it security decision-makers who are involved in purchasing cyber security software, solutions & services for their organization.
They are aiming to better understand how businesses approach cybersecurity, the priorities and needs, and the types of solutions and services that they are currently using.
This is a 1-hour paid web interview. If open to participating, please provide a brief answer to the screener below:
how involved are you in making the decisions for it security?
Please note that we are only interested in your personal point of view and are not seeking confidential information.
Referrals are welcome.
+59 Other Responses
Wide Information Security Planning
Execsense, a division of the financial times, is an exclusive digital network of career-driven thought leaders. We are seeking an expert to lead a 60-minute webinar on the topic of “strategies for ctos & cios on developing and executing an enterprise-wide information security plan” scheduled for 2/10 at 1 p.M. Est.
The speaker will be responsible for compiling a basic 15-20-slide powerpoint for the presentation (template provided) and being available for the live recording or for a pre-record prior to that date. Speakers will be asked to sign a waiver, release and consent form that requires the speaker to provide their intellectual property for the purposes of presenting with us. While we will maintain a copyright of the final product (powerpoint our logos and recording of presentation), we will not hold a copyright on the intellectual property provided by the speaker and the speaker will be free to use such concepts in the future. The chosen speaker will receive compensation and tremendous professional exposure. Speakers will not be asked to pay any fees. Our lecturers have come from: mit sloan, sap, forbes, cornell university, ernst & young, deloitte, kpmg, new york university, and many more top organizations. For additional requirements or information, please send your resume and any relevant information, as well as this original posting.
daniel+6 Other Responses