Data Security Solutions
Technical consultant (australia) - implementation services needed
we are looking for data security solutions professional services providers. We seek people qualified to conduct on-site assistance with custom database, file and web application security deployments and substantial upgrade efforts involving our clients standard support programs.
Please respond if you are extensively trained in data security, #infosec or have more than one of the following certifications and would like more billable hours.
Cissp, cisa, ceh, giac
+3 Other ResponsesInformation Security And Data Privacy
We are a leading webinar publisher (wholly owned by the financial times)and a authorized zintro partner.
We are seeking an expert to lead a 60-minute webinar on the topic of “what ceos need to know about the legal issues surrounding information security and data privacy, and how to protect your company”. The speaker will be responsible for compiling a basic 15-20-slide powerpoint for the presentation (template provided) and being available for the live recording or for a pre-record prior to that date. Speakers will be asked to sign a waiver, release and consent form that requires the speaker to provide their intellectual property for the purposes of presenting with us. While we will maintain a copyright of the final product (powerpoint with our logos and recording of presentation), we will not hold a copyright on the intellectual property provided by the speaker and the speaker will be free to use such concepts in the future.
The chosen speaker will receive compensation and tremendous professional exposure. Speakers will not be asked to pay any fees. Our lecturers have come from: mit sloan, sap, columbia university, harvard business review, cornell university, ernst & young, deloitte, kpmg, new york university, and many more top organizations.
+6 Other ResponsesIt Security And Data Compliance
We are looking to speak with multiple decision-makers in compliance, it, or legal job functions that have influence over the adoption and purchase of communication/collaborations tools. Desired participants should recently adopted or considering encryption for their productivity/communication/collaboration software uses.
This is for a paid 1 - hour web interview.
Qualifying questions
1. How would you describe your level of influence in the decision to assess, evaluate, adopt, or purchase new organization/company communication/collaboration tools? By “communication and collaboration software” we mean software enabling real-time and asynchronous collaboration, meetings, instant messaging, file sharing, etc. Would you say you?
A. I am the final decision-maker
b. I share in the decision making
c. I have some influence
d. I have little to no influence
e. We do not have any productivity and collaboration software
**please note that we are only interested in your personal point of view and are not seeking confidential information.
***referrals are highly appreciated
+43 Other Responses