Affordably Source Cyberthreat Experts and Industry Participants for Market Research, Diligence and Projects

Submit an anonymous Project Description -- Start receiving responses within a few hours

Have a need? Explain it here






How Zintro Works

  1. 1. Provide a clear description of your needs and your expectations of an expert, consultant or job candidate and Zintro will match it with the most relevant professionals in our platform.
  2. 2. Within a day or two typically 6 - 12 Experts, who have opted-in, will contact you with a brief explanation of their qualifications and how they can help.
  3. 3. You can communicate back and forth, qualify each other, connect and pay fees to Experts through Zintro.
  4. Zintro is free, anonymous and without obligation.

Loved by Thousands

Loved by thousands logos

Need Help?A phone icon1-877-236-7016

Recent Cyberthreat Inquiries

Area Icon

Online Business Protection

We are looking to do multiple paid phone consults with customers or partners of shopify, magento, or big commerce about ns8. We want to have a better understanding of online businesses security against advertising fraud, transaction fraud, and poor site performance this would be for a 1-hour paid phone consult. Please respond with a few short statements to the questions below. 1. Were you the person personally responsible for evaluating, selecting and implementing ns8 or other online security? Please comment about the extent of your involvement in the decision-making process. 2. Can you articulate the unique ip/value prop vs others? Please briefly elaborate 3. Can you share your insight on areas you would like ns8 to do better or areas for improvement? Please explain briefly.

  1. Profile Picture

    Bharath |Board member,SVP/EVP

    Greetings I have direct experience with business ***** trust services from my prior rol...

    1.9 Hours Later
  2. Profile Picture

    Lesley |Chief Marketing Officer

    I represent companies that do around 1bn a month in transactions across varying markets and varying ...

    19.3 Hours Later
  3. Profile Picture

    David |Sales Director America's

    1- Just NS8 2- Only partner of PrestaShop for now 3- Don't know their competition besides payment pl...

    22.5 Hours Later
+12 Other Responses
Area Icon

It Security Analysis And Operations

We are looking to speak with 5-8 security operations and security analysts it staff in fortune 500 organizations, people responsible for acting on indicators of attack or compromise and investigating out cyber attacks in their organization. The ideal industries of focus will be financial services (investment banks, insurance, large retail/comm banks) & healthcare (insurers, hospitals). Thank you.

  1. Profile Picture

    Patricio |IT Global Leader

    I am interested in ***** this phone consult. I am an experienced IT Security Assistant Di...

    23 Minutes Later
  2. Profile Picture

    John |Senior

    I am interested in this position....

    3.4 Hours Later
  3. Profile Picture

    David |Technical Director - Consulting

    My expertise is not in IT security - it is in development of secure products; hardware and software....

    4.3 Hours Later
+9 Other Responses
Area Icon

Cyber Security In South Africa

We are trying to understand the cybersecurity ecosystem in south africa, focusing on cyber training and consultation services - what is the awareness level of the cyber threat in south africa? Of the government and the general public - how does the government implement legislations and regulations regarding cyber security in the country? - how does the cyber security competitive landscape look like in south africa? Are there many local players? Do defense and cyber security giants show activity in the country? - who are the leading local vendors for cyber training and consultation services? - are there government initiatives regarding cyber security training? Educational programs? Military cyber training centers? We are willing to pay a generous honorarium for each 45 - 60 minute call. Thanks!

  1. Profile Picture

    Shyam |CFO Advisor

    we are amidst investing in a South african Cyber training company and I am well versed and can disc...

    6.5 Hours Later
  2. Profile Picture

    Ramamurthy |Owner & CEO

    I am a Cyber Security specialist conducting IS audits, consultancy in IS Policy and other online sec...

    10.2 Hours Later
  3. Profile Picture

    Dr Venkat |Global Consultant

    I have some idea ,but need to work with one of our local partners in South Africa ...

    7.1 Days Later
+11 Other Responses
Area Icon

Cyber Security Landscape

Our multinational client is working on research about the cyber security landscape particularly on firmware/hardware — at the level of the business user’s machine vs. At the network or cloud level. They are interested in speaking with experts based on the criteria below: - us based expert certified by nist (national institute of standards and technology) - expert / entrepreneur in israel but who has a focus on firmware / hardware — at the level of the business user’s machine vs. At the network or cloud level. This will be for a 1-hour webcam interview. Please provide a brief response below as to your relevance in the space. 1. Can you share your background in the overall cybersecurity landscape? 2. Can you share a holistic view as to what components are in play on the it security landscape particularly in secured-core pcs?

  1. Profile Picture

    Naresh |Advisory Board

    I can discuss the current trends, such as Zero Trust Network, Software Defined Perimeter, convergenc...

    1.8 Hours Later
  2. Profile Picture

    New |

    Hi, Currently ***** one of the leading MSSP, have in-depth expertise in all the cyber secu...

    22.4 Hours Later
  3. Profile Picture

    Omri |Global IT and cyber security Manager

    1. Can you share your background in the overall cybersecurity landscape? - Yes, Global IT Infrastruc...

    1.2 Days Later
+38 Other Responses
Area Icon

Zero Trust Network Solutions

We are looking for security decision makers either c-level or c-1 (meaning they directly report to the c level exec) are very or extremely knowledgeable about zero trust. The candidates must have significant influence in decisions made at organization for cybersecurity, threat protection, identity management, risk management, application security or digital forensics and incident response this is for a paid 1-hour face-to-face web interview. **please note that we are only interested in your personal point of view and are not seeking confidential information. This is not a sales solicitation. All the information you provide us is kept strictly confidential. It is used for classification purposes only. Kindly respond to the questions below as to your relevance in this space: 1. What level of authority do you have in the purchase and selection of solutions or services related to security and threat protection in your company? 2. How familiar are you with the concept of zero trust?

  1. Profile Picture

    Tim |Director of Security

    I report to the CISO and previously lead security at HealthStream. I have extensive experience in A...

    1.9 Hours Later
  2. Profile Picture

    Klint |Chief Information Security Officer, VP T

    Yes, I’m available for this...

    2 Hours Later
  3. Profile Picture

    Angel |Director Of Information Technology

    As Chief *****cer I have full authority in the purchase and selection of solutions or ser...

    2.1 Hours Later
+197 Other Responses
Area Icon

Cyber Defense

We are looking for an expert in the field of cyber defense, specifically in the european and latin american markets. We wish to identify relevant governmental organizations & officials responsible for cyber defense budgets and initiatives, with an emphasis on decision makers & influencing figures. The most relevant countries are the uk, switzerland, germany, czech republic, brazil and mexico. It should be noted a regional expert (i.E. European market or latin american market) are also relevant. Also, the candidate doesn't need to be an expert on all countries mentioned above.

  1. Profile Picture

    Jeffrey |Chief Intelligence Officer

    Recommend *****eb/en for *****ican markets....

    2.1 Hours Later
  2. Profile Picture

    Hiro |Chief Consultant

    I will be happy to talk about what their issues may be and identify exactly what they want accuratel...

    8.6 Hours Later
  3. Profile Picture

    Anand |Managing Partner

    Can help on this discussion...

    11.8 Hours Later
+5 Other Responses
Area Icon

South African Cybersecurity Market & Trends

We are trying to understand the cybersecurity ecosystem in south africa, focusing on cyber training and consultation services - what is the awareness level of the cyber threat in south africa? Of the government and the general public - how does the government implement legislations and regulations regarding cyber security in the country? - how does the cyber security competitive landscape look like in south africa? Are there many local players? Do defense and cyber security giants show activity in the country? - who are the leading local vendors for cyber training and consultation services? - are there government initiatives regarding cyber security training? Educational programs? Military cyber training centers? We are willing to pay a generous honorarium for each 45 - 60 minute call. Thanks!

  1. Profile Picture

    Douglas |CEO

    I built the KPMG CyberSecurity practice and re-organized the global Deloitte cybersecurity practice....

    2.3 Hours Later
  2. Profile Picture

    Craig |Managing Director

    I had a look through the questions and yes we are actively involved in the cyber security training /...

    6.1 Days Later
+3 Other Responses
See More Inquiries

Top Cyberthreat Experts

See More Experts
Share
LinkedInTwitterFacebookGoogle+