Information Security And Data Privacy
We are a leading webinar publisher (wholly owned by the financial times)and a authorized zintro partner.
We are seeking an expert to lead a 60-minute webinar on the topic of “what ceos need to know about the legal issues surrounding information security and data privacy, and how to protect your company”. The speaker will be responsible for compiling a basic 15-20-slide powerpoint for the presentation (template provided) and being available for the live recording or for a pre-record prior to that date. Speakers will be asked to sign a waiver, release and consent form that requires the speaker to provide their intellectual property for the purposes of presenting with us. While we will maintain a copyright of the final product (powerpoint with our logos and recording of presentation), we will not hold a copyright on the intellectual property provided by the speaker and the speaker will be free to use such concepts in the future.
The chosen speaker will receive compensation and tremendous professional exposure. Speakers will not be asked to pay any fees. Our lecturers have come from: mit sloan, sap, columbia university, harvard business review, cornell university, ernst & young, deloitte, kpmg, new york university, and many more top organizations.
+6 Other ResponsesData Privacy Management
Our client would like to speak with multiple decision-makers who have a strong influence about which privacy software to use or purchase within their company.
They are aiming to better understand the challenges that their company faces in deciding which privacy software to implement in their department or business units.
This is a 1-hour paid video consultation. If open to participating, please provide a brief answer to the question below:
do you have familiarity or understanding of all of the departments or business units within the company that determine privacy software decision-making?
A. My team has sole control of privacy software management decision-making.
B. My team shares control of privacy software management decision-making with other teams that i am very familiar with.
C. My team shares control of privacy software management decision-making with other teams that i am unfamiliar with or have limited visibility to.
Please note that we are only interested in your personal point of view and are not seeking confidential information.
Referrals are highly appreciated.
+41 Other ResponsesInformation Security And Privacy
We are a leading webinar publisher (wholly owned by the financial times) and a authorized zintro partner.
We are seeking an expert to lead a 60-minute webinar on the topic of “how information security and privacy will impact your bottom line as a gc”. The speaker will be responsible for compiling a basic 15-20-slide powerpoint for the presentation (template provided) and being available for the live recording or for a pre-record prior to that date. Speakers will be asked to sign a waiver, release and consent form that requires the speaker to provide their intellectual property for the purposes of presenting with us. While we will maintain a copyright of the final product (powerpoint with our logos and recording of presentation), we will not hold a copyright on the intellectual property provided by the speaker and the speaker will be free to use such concepts in the future.
The chosen speaker will receive compensation and tremendous professional exposure. Speakers will not be asked to pay any fees. Our lecturers have come from: mit sloan, sap, columbia university, harvard business review, cornell university, ernst & young, deloitte, kpmg, new york university, and many more top organizations. For additional requirements or information contact me
+7 Other ResponsesInformation Security
Hi consultant,
hope you are doing well !!
we have an opportunity for endpoint security engineer with one of our clients in savannah, ga
please see the job details below and let me know if you would be interested in this role.
if interested, please send me a copy of your resume, your contact details, your availability and a good time to connect with you.
Title: endpoint security engineer
location: savannah, ga
terms: contract
job details:
job description - (endpoint security (level-2):
should have minimum 6+ years of experience in information security- endpoint security
should have good understanding on information security concepts
must have managed and have strong knowledge on following products:
sophos endpoint protection suite
sophos/ utimaco safeguard encryption
sophos log writer
sophos reporting interface
sophos port auditor
mcafee epolicy orchestrator
mcafee viruscan enterprise for storage
tenable nessus security center v5.0
should have good knowledge of configuring policies for hips, personal firewall, device & port control, data loss protection components of sophos endpoint protection suite.
Very good experience with antivirus technology, experience in handling virus outbreaks, malware cleanup, policy creation, signature update & reporting.
Should have strong knowledge on full disk encryption technology
should be willing to work in rotational shifts
excellent communication and conversation skills
strong analytical and problem solving skills
good documentation skills
should have a great customer handling skills
experience with antivirus solutions across multiple operating systems
powershell scripting experience a plus
thanks,
varish
+3 Other ResponsesData Privacy And Risk Compliance Management
Our client would like to speak with multiple decision-makers who are actively involved in data protection, risk management, and compliance discussions in their company.
They are aiming to have a better understanding of the strategies and processes on how you handle initiatives on the following:
information protection & governance
compliance management
data & insider risk management
privacy management
this is for a 90-minute paid focus group interview. If open to participating, please provide a brief answer to the question below:
1. Thinking of data privacy and ediscovery tasks, what is the level of involvement you possess when deciding on a product, staffing, and/or service offerings that support your company’s data privacy initiatives?
A. I have the primary responsibility.
B. I share responsibility equally with others.
C. I delegate the task to others
d. I have little or no responsibility for that task.
2. What is the level of involvement you possess in compliance-related initiatives?
A. I have the primary responsibility.
B. I share responsibility equally with others.
C. I delegate the task to others
d. I have little or no responsibility for that task.
Please note that we are only interested in your personal point of view and are not seeking confidential information.
Referrals are highly appreciated
+59 Other ResponsesData Privacy
Hi zintro expert,
the zintro blog needs you! we are looking for expert opinions on the news mentioned below and would like to hear from you within the next couple of days.
While weâd love your thoughts, we realize that your time is valuable, so here are a couple of things you need to know before deciding whether or not to participate:
replies should be brief a about 1-2 paragraphs â and include your full name
participation is voluntary a no payment will be involved
if chosen, you'll be named in the post and we'll include a link to your zintro profile which will generate more visitors for you
wondering what the post would look like? Here is a sample: http://blog.Zintro.Com/2012/01/16/keystone-xl-pipeline-pros-and-cons/
hereâs the topic on which weâd love your thoughts:
data privacy/market research
location analytics firms such as euclid and radius networks, have reached an agreement with the future of privacy forum (fpf) for a code of conduct, developed with senator charles schumer, which was signed at the end of october. It ensures that people receive notification when location tracking takes place and that they are given the information they need to opt out.
In addition, under the fpf code, companies that collect data senator schumer's interest in the issue dates back to the november 11 reports of location tracking in several u.S. Shopping malls. Originally senator schumer wanted companies to track only those consumers who opted in but he changed his stance. Now he requests that retailers give shoppers a 'clear and obvious opportunity to opt out before tracking them.'
according to research live, under the fpf code, companies that collect data through this technology must limit how the information is used and shared and how long it may be retained. The code mandates that companies de-identify the data and explain in their privacy policy how they do so. Companies are required to get opt-in consent when personal information is collected, or when a consumer will be contacted. The code calls for opt-out consent where the information collected is not personal. In addition, this data cannot be collected or used in an adverse manner for employment, healthcare or insurance purposes.
What are your thoughts about the new code of conduct? How will it affect future private policies?
Getting your name and expert opinion published on our blog is a great marketing opportunity. If interested, please send us your response via znotes within a couple of days. Don't forget to include your full name.
If you have any questions, please let us know.
Thank you!
the zintro blog team
+2 Other ResponsesLegal Privacy Management
We would like to speak with multiple experts based in the us who are familiar in assessing and evaluating information protection or privacy. We are interested to speak to chief legal officer, deputy general counsel, assistant/associate general counsel and general counsel.
This would be for a 1 hour paid phone consult. Please respond with a few brief statements as to your relevance in this space.
1. Do you have more than 1,000 employees in your organization including all sites and branches globally?
2. What department you are currently handling?
3. Do you have extensive knowledge on privacy, regulatory and compliance management?
+34 Other ResponsesRecord Procurement
Record procurement-litigation support services
1. Supply market landscape
- overview of supply market in the u.S. – types of suppliers, most dominant supplier segment
- list of key suppliers in the u.S.
Compliance to info protect:
1. Appropriate access controls within the solution
2. Encryption of data at rest etc.
+2 Other ResponsesGdpr Compliance
Gdpr compliance advisory
need for experts providing industry best practices related to gdpr privacy by design initiative(case examples, practical implementation guidelines)
+35 Other ResponsesData Protection & Risk Compliance
Our client would like to speak with multiple decision-makers who are actively involved in data protection, risk management, and compliance discussions in their company.
They are aiming to have a better understanding of the strategies and processes on how you handle initiatives on the following:
information protection & governance
compliance management
data & insider risk management
privacy management
this is for a 60-minute web interview. If open to participating, please provide a brief answer to the questions below:
1. Thinking of data privacy and ediscovery tasks, what is the level of involvement you possess when deciding on a product, staffing, and/or service offerings that support your company’s data privacy initiatives?
A. I have the primary responsibility.
B. I share responsibility equally with others.
C. I delegate the task to others
d. I have little or no responsibility for that task.
2. What is the level of involvement you possess in compliance-related initiatives?
A. I have the primary responsibility.
B. I share responsibility equally with others.
C. I delegate the task to others
d. I have little or no responsibility for that task.
Please note that we are only interested in your personal point of view and are not seeking confidential information.
Referrals are highly appreciated
+28 Other ResponsesIt Security And Data Compliance
We are looking to speak with multiple decision-makers in compliance, it, or legal job functions that have influence over the adoption and purchase of communication/collaborations tools. Desired participants should recently adopted or considering encryption for their productivity/communication/collaboration software uses.
This is for a paid 1 - hour web interview.
Qualifying questions
1. How would you describe your level of influence in the decision to assess, evaluate, adopt, or purchase new organization/company communication/collaboration tools? By “communication and collaboration software” we mean software enabling real-time and asynchronous collaboration, meetings, instant messaging, file sharing, etc. Would you say you?
A. I am the final decision-maker
b. I share in the decision making
c. I have some influence
d. I have little to no influence
e. We do not have any productivity and collaboration software
**please note that we are only interested in your personal point of view and are not seeking confidential information.
***referrals are highly appreciated
+43 Other ResponsesSouth Africa Popi
I am looking for consultants/experts/trainers for in-person seminars with 20+years of experience, who have got expertise in popi to associate with my company. We associate with industry experts and create professional training for our customers. If you are interested in training and education then please let me know and i can explain the entire training and consulting proposal for your consideration. Interested consultants can email me as per below contact details :
ashi
+3 Other Responses