Affordably Source Data Security Experts and Industry Participants for Market Research, Diligence and Projects

Submit an anonymous Project Description -- Start receiving responses within a few hours

Have a need? Explain it here






How Zintro Works

  1. 1. Provide a clear description of your needs and your expectations of an expert, consultant or job candidate and Zintro will match it with the most relevant professionals in our platform.
  2. 2. Within a day or two typically 6 - 12 Experts, who have opted-in, will contact you with a brief explanation of their qualifications and how they can help.
  3. 3. You can communicate back and forth, qualify each other, connect and pay fees to Experts through Zintro.
  4. Zintro is free, anonymous and without obligation.

Loved by Thousands

Loved by thousands logos

Need Help?A phone icon1-877-236-7016

Recent Data Security Inquiries

Area Icon

Data Security Solutions

Technical consultant (australia) - implementation services needed we are looking for data security solutions professional services providers. We seek people qualified to conduct on-site assistance with custom database, file and web application security deployments and substantial upgrade efforts involving our clients standard support programs. Please respond if you are extensively trained in data security, #infosec or have more than one of the following certifications and would like more billable hours. Cissp, cisa, ceh, giac

  1. Profile Picture

    Tamaghna |Independent Security Researcher

    Hello, please let me know how can we take it forward. Thank you....

    4.8 Hours Later
  2. Profile Picture

    Charles |Chief Executive Officer

    Hello, I'm interested to discuss your inquiry and project. Please have a look at my background and...

    22.8 Hours Later
  3. Profile Picture

    Lowell |CIO, Sr Consultant, Technical Solutions

    I could be interested. I have my CISSP and Security+. I am in the Dallas TX area and OK with some tr...

    2.9 Days Later
+3 Other Responses
Area Icon

Information And Data Securities

Looking for information security data classification expert.

  1. Profile Picture

    Faisal |Consultant

    Dear Sir/Madam, With reference to your inquiry regarding ***** *****rities, I would l...

    1.7 Hours Later
  2. Profile Picture

    Robert |CEO

    I am an expert in these areas. What exactly are you looking for?...

    1.8 Hours Later
  3. Profile Picture

    Cristian |Senior Security Engineer

    Hello! I am interested and would like to hear more details....

    2.5 Hours Later
+8 Other Responses
Area Icon

Information Security And Data Privacy

We are a leading webinar publisher (wholly owned by the financial times)and a authorized zintro partner. We are seeking an expert to lead a 60-minute webinar on the topic of “what ceos need to know about the legal issues surrounding information security and data privacy, and how to protect your company”. The speaker will be responsible for compiling a basic 15-20-slide powerpoint for the presentation (template provided) and being available for the live recording or for a pre-record prior to that date. Speakers will be asked to sign a waiver, release and consent form that requires the speaker to provide their intellectual property for the purposes of presenting with us. While we will maintain a copyright of the final product (powerpoint with our logos and recording of presentation), we will not hold a copyright on the intellectual property provided by the speaker and the speaker will be free to use such concepts in the future. The chosen speaker will receive compensation and tremendous professional exposure. Speakers will not be asked to pay any fees. Our lecturers have come from: mit sloan, sap, columbia university, harvard business review, cornell university, ernst & young, deloitte, kpmg, new york university, and many more top organizations.

  1. Profile Picture

    Alan |Senior Manager, Information Security

    What is the financial compensation? ...

    9.4 Hours Later
  2. Profile Picture

    David |Managing Director, Engineer, Business Co

    Currently I am in the process of having an *****rity lead implementer course accredited t...

    17.1 Hours Later
  3. Profile Picture

    Shankar |Security Solutions Strategist

    i am interested to ***** a speaker in your webinar. I have been a speaker in various engage...

    21.3 Hours Later
+6 Other Responses
Area Icon

It Security And Data Compliance

We are looking to speak with multiple decision-makers in compliance, it, or legal job functions that have influence over the adoption and purchase of communication/collaborations tools. Desired participants should recently adopted or considering encryption for their productivity/communication/collaboration software uses. This is for a paid 1 - hour web interview. Qualifying questions 1. How would you describe your level of influence in the decision to assess, evaluate, adopt, or purchase new organization/company communication/collaboration tools? By “communication and collaboration software” we mean software enabling real-time and asynchronous collaboration, meetings, instant messaging, file sharing, etc. Would you say you? A. I am the final decision-maker b. I share in the decision making c. I have some influence d. I have little to no influence e. We do not have any productivity and collaboration software **please note that we are only interested in your personal point of view and are not seeking confidential information. ***referrals are highly appreciated

  1. Profile Picture

    Mitch |Head of IT Operations and Technology

    I am the final decision-maker...

    1.5 Hours Later
  2. Profile Picture

    Martyn |Chief Information Security Officer

    B. I sit on the IT leadership team of a FTSE 250 company and make joint decisions on these things. I...

    1.6 Hours Later
  3. Profile Picture

    Ritesh |COO | Global Head of Digital Technology

    Being a tech leader for over two decades, led large *****uding leading banks / payment ...

    1.8 Hours Later
+43 Other Responses
Area Icon

Data Security Law

We are a leading webinar publisher (wholly owned by the financial times) and an authorized zintro partner. We are seeking an expert to lead a 60-minute webinar on the topic of “what insurance lawyers need to know about coverage for data security breaches”. The speaker will be responsible for compiling a basic 15-20-slide powerpoint for the presentation (template provided) and being available for the live recording or for a pre-record prior to that date. Speakers will be asked to sign a waiver, release and consent form that requires the speaker to provide their intellectual property for the purposes of presenting with us. While we will maintain a copyright of the final product (powerpoint with our logos and recording of presentation), we will not hold a copyright on the intellectual property provided by the speaker and the speaker will be free to use such concepts in the future. The chosen speaker will receive compensation and tremendous professional exposure. Speakers will not be asked to pay any fees. Our lecturers have come from: mit sloan, sap, columbia university, harvard business review, cornell university, ernst & young, deloitte, kpmg, new york university, and many more top organizations. For additional requirements or information, please send your resume and any relevant information.

  1. Profile Picture

    Shankar |Security Solutions Strategist

    i am interested to ***** a speaker in your webinar. I have been a speaker in various engage...

    20.9 Hours Later
  2. Profile Picture

    Yazan |Freelance Consultant/Project Manager

    Dear , I am interested as I have the relevant experience and *****l needed. Best rega...

    3.6 Days Later
+2 Other Responses
Area Icon

Cyber Security

We require a subject matter expert in cyber security, more specifically ransomware as a guest/keynote speaker in a webinar planned for sept 22. The sme must have relevant experience in online & data security, solid communication skills and good understanding of ransomware attacks.

  1. Profile Picture

    John |President & Chief Forensic Examiner

    I was part of *****r which took down Cryptolocker and I run the Ransomware Working Group, a...

    2.3 Hours Later
  2. Profile Picture

    Raghavan |Principal

    I bring in SME expertise in malware security trends (trojan and ransomware) and have architected sec...

    4.3 Hours Later
  3. Profile Picture

    Anthony |Principal Consultant

    I am a software development professional with 20+ years in Med Device, Healthcare IT space. I held ...

    4.4 Hours Later
+17 Other Responses
Area Icon

New Jersey Patient Data

Looking for an it security expert in the compliance of sox, hipaa, and fda (those concerning the protection of patient data) regulations. I am the plaintiff in a whistleblowing and discrimination case in the state of new jersey, union county.

  1. Profile Picture

    steve |ceo

    Hi, We are experts in FDA and HIPAA *****, not SOX. Please contact me at 248 515 0097 if you ...

    1.9 Hours Later
  2. Profile Picture

    Joshua |CEO

    I am a former FDA reviewer with 10 years of hands on software development experience and have taught...

    4.3 Hours Later
  3. Profile Picture

    Isaac |Zintro Expert

    Hi there, I have the ability to assist you via my business partners, who are experts. If you like to...

    10.1 Hours Later
+5 Other Responses
Area Icon

Information And Cyber Security

We are looking for it professionals working in small and mid-sized companies to discuss issues with cyber security, specifically in how they deal with the threat of 'human error' among company employees.

  1. Profile Picture

    Wayne |Lead Advisor, Advisory Board

    I've been a SME CIO for years, and dealt with human error all along. I'm NOT a full-time security gu...

    2.8 Hours Later
  2. Profile Picture

    Ramamurthy |CEO

    With my experience in IT filed for the past 25+ years and with my specialty in cyber security (I am ...

    2.9 Hours Later
  3. Profile Picture

    Merritt |Zintro Expert

    I'm a double Harvard ***** expertise exactly in this area. Glad to provide more information....

    3.1 Hours Later
+11 Other Responses
Area Icon

Erp Systems, Data Security And Compliance

We would like to have a better understanding of the market for erp data security and compliance / grc management. Specifically focused on third-party security software for erp systems but also need to understand erp data security and compliance more broadly. Discussion points: a. Security features native to sap and oracle erp systems, including contextual access control, location-based access control, multi-factor authentication, security analytics, etc. B. Third-party software vendors that provide supplemental security and grc functionality. C. Whether or not sap and oracle can and will build more advanced security features in lieu of third-party vendors. This would be for a 1-hour paid 60 min phone consultation. To show your relevance in this space, please answer the question below. 1.Briefly discuss the level or extent of your experience in erp data security and compliance / grc management. 2. Are you familiar with any third-party security software for erp systems (contextual access control, multi-factor authentication, integrated risk management solutions, etc.)? Kindly indicate (1-3): 3. Can you talk about the discussion points mentioned above? **please note that we are only interested in your personal point of view and are not seeking confidential information. Referrals are highly appreciated**

  1. Profile Picture

    Ana |EVP and C. Compliance Officer

    I have worked with ERP systems, and others, for over 20 years, always with security as a major point...

    4.1 Hours Later
  2. Profile Picture

    Subramanyam |

    Sure as Global Tech Leader for SAP I M aware of SAP GRC besides downstream and upstream systems I/c ...

    4.5 Hours Later
  3. Profile Picture

    Peter |Managing Director - Information Technolo

    As the Managing Director of *****nology for our global financial services firm, I am resp...

    4.6 Hours Later
+11 Other Responses
Area Icon

Endpoint Data Management

Individuals responsible for (or play a key role in) setting policies and selecting vendors for their company’s endpoint data backup/recovery and data security products are needed for consultation/interview. We are looking for full-time employees embedded in a target organization (not former employees, consultants, etc.). Endpoint is defined as a device like a laptop, desktop or tablet, not a network endpoint. Please respond by describing your relevant experience. Thank you.

  1. Profile Picture

    Polina |Oversight & Monitoring Lead, Health Care

    I lead compliance within pharma, overseeing selection and management of endpoint products for data s...

    2.1 Days Later
  2. Profile Picture

    Goodwill |IT Engineer

    I am interested and qualify...

    2.9 Days Later
  3. Profile Picture

    Anand |Managing Partner

    I have relevant experience...

    3.3 Days Later
+7 Other Responses
Area Icon

Endpoint Security And Data Risk Management

We are looking to speak to a former salesperson who worked at absolute software within the last 3-5 years. We would like to better understand the sales process, interaction with oem partners, and value proposition made to potential customers. Thank you.

  1. Profile Picture

    Justin |Senior Account Executive

    Hello: I have worked at 2 of the 3 largest OEM's over the last 15 years so do have distinct knowledg...

    1.2 Days Later
  2. Profile Picture

    Scott |Account Manager

    Hi Jon, Yes I am willing to participate. My role at Absolute Software was Territory Sales Manager...

    4.9 Days Later
  3. Profile Picture

    Ian |Regional Senior Sales Manager

    Good Afternoon, I would be willing to speak with you regarding the Absolute sales process, working w...

    5.1 Days Later
+38 Other Responses
Area Icon

Technical Security Service

Need expert insights for technical security services in finland, germany and austria. High level information for technological trends, hybrid systems for various equipment's. Kindly get in touch. Thanks :)

  1. Profile Picture

    Farhan |Security Architect

    Hi, With my 14 years of IT security experience I can assist in your assignment. Please let me know ...

    2 Hours Later
  2. Profile Picture

    Tarun |Partner

    Hi, I can assist on technical security services for Europe Please write to me. Regards, Nishu ...

    2.5 Hours Later
  3. Profile Picture

    Not |Consultant

    Kevin G. Coleman is a seasoned technology professional with a comprehensive background in technology...

    7.1 Hours Later
+10 Other Responses
See More Inquiries

Top Data Security Experts

See More Experts
Share
LinkedInTwitterFacebookGoogle+