Source Data Privacy Experts for your Project, Phone Consult or Job

Submit an anonymous Inquiry -- Start receiving responses within a few hours

Have a need? Explain it here

Zintro does not display, sell or trade e-mail addresses

An eye iconForgot password?
Submit Inquiry

By clicking Submit Inquiry you agree to our TermsVIEW

or Request a Demo

How Zintro Works

  1. 1. Provide a clear description of your needs and your expectations of an expert, consultant or job candidate and Zintro will match it with the most relevant professionals in our platform.
  2. 2. Within a day or two typically 6 - 12 Experts, who have opted-in, will contact you with a brief explanation of their qualifications and how they can help.
  3. 3. You can communicate back and forth, qualify each other, connect and pay fees to Experts through Zintro.
  4. Zintro is free, anonymous and without obligation.

Loved by Thousands

Loved by thousands logos

Need Help?A phone icon1-877-236-7016

Recent Data Privacy Inquiries

Area Icon

Information Security And Data Privacy

We are a leading webinar publisher (wholly owned by the financial times)and a authorized zintro partner. We are seeking an expert to lead a 60-minute webinar on the topic of “what ceos need to know about the legal issues surrounding information security and data privacy, and how to protect your company”. The speaker will be responsible for compiling a basic 15-20-slide powerpoint for the presentation (template provided) and being available for the live recording or for a pre-record prior to that date. Speakers will be asked to sign a waiver, release and consent form that requires the speaker to provide their intellectual property for the purposes of presenting with us. While we will maintain a copyright of the final product (powerpoint with our logos and recording of presentation), we will not hold a copyright on the intellectual property provided by the speaker and the speaker will be free to use such concepts in the future. The chosen speaker will receive compensation and tremendous professional exposure. Speakers will not be asked to pay any fees. Our lecturers have come from: mit sloan, sap, columbia university, harvard business review, cornell university, ernst & young, deloitte, kpmg, new york university, and many more top organizations.

  1. Profile Picture

    Alan |Director

    What is the financial compensation? ...

    8.4 Hours Later
  2. Profile Picture

    David |Managing Director, Engineer, Business Co

    Currently I am in the process of having an *****rity lead implementer course accredited t...

    16.1 Hours Later
  3. Profile Picture

    Shankar |Security Solutions Strategist

    i am interested to ***** a speaker in your webinar. I have been a speaker in various engage...

    20.3 Hours Later
+6 Other Responses
Area Icon

Data Privacy

Looking for an auditor with expertise and skills in the following areas: privacy protection, information security, and data protection. Time sensitive request.

  1. Profile Picture

    Kishore |Consultant

    Hi LWalter, I am interested in such projects. If you can ***** the project like industry, inf...

    28 Minutes Later
  2. Profile Picture

    Aaron |Senior Application Developer

    Hello LWalter, I have extensive experience with IT Security and *****ting. I have traced backe...

    29 Minutes Later
  3. Profile Picture

    Steven |Founder/Principal

    Hello, I can help you. I have had my own consulting practice (www.ncontrol-llc.com) for over five y...

    37 Minutes Later
+16 Other Responses
Area Icon

Information Security And Privacy

We are a leading webinar publisher (wholly owned by the financial times) and a authorized zintro partner. We are seeking an expert to lead a 60-minute webinar on the topic of “how information security and privacy will impact your bottom line as a gc”. The speaker will be responsible for compiling a basic 15-20-slide powerpoint for the presentation (template provided) and being available for the live recording or for a pre-record prior to that date. Speakers will be asked to sign a waiver, release and consent form that requires the speaker to provide their intellectual property for the purposes of presenting with us. While we will maintain a copyright of the final product (powerpoint with our logos and recording of presentation), we will not hold a copyright on the intellectual property provided by the speaker and the speaker will be free to use such concepts in the future. The chosen speaker will receive compensation and tremendous professional exposure. Speakers will not be asked to pay any fees. Our lecturers have come from: mit sloan, sap, columbia university, harvard business review, cornell university, ernst & young, deloitte, kpmg, new york university, and many more top organizations. For additional requirements or information contact me

  1. Profile Picture

    ANDREW R. |CTO/Chief Enterprise Architect & CSO

    I can certainly lead such a webinar....

    1.5 Hours Later
  2. Profile Picture

    Emanuel |Senior Disaster Recovery Planner

    Inforamtion Security and Privacy are at the top of the list for many *****. Technology and ...

    1.7 Hours Later
  3. Profile Picture

    Robert |Principal

    I would be happy to speak with you about such a webinar. I have been a Contributor to the "Computer ...

    1.9 Hours Later
+7 Other Responses
Area Icon

Confidential Information Leak

I need an expert in damages for release of confidential information in a quasi banking context. The information implicates a very well know individual in the business community world wide who has taught in one of the premier graduate mba programs in the usa. He is also an officer/diirector of a publicly traded corporation and the disclosure could harm his ability to raise funds and manage the corporation.

  1. Profile Picture

    Michael |Global ISO

    Are you looking to place an ***** the cost of your breach, or do you need help with the breach...

    3.1 Days Later
  2. Profile Picture

    roberto |Mission Critical IT facilities consultan

    Dear sirs Can you -as confidenciality allow- tell me how can I hell you in this issue? On this basis...

    3.8 Days Later
  3. Profile Picture

    Doug |Sr. Enterprise Consulting

    I'd like to learn more about this opportunity and can provide expert assistance in *****rity, pr...

    4.5 Days Later
+6 Other Responses
Area Icon

Data Privacy

Our company is looking for privacy and security experts to come in and help train our it team on these topics. We are looking to have someone here very soon. We are located in washington state.

  1. Profile Picture

    Crypto |Founder

    I am based in India and expert in ***** *****rity. ...

    1 Minute Later
  2. Profile Picture

    Rkrishna |Consultant

    Well....can you share the industry type ....am a certified ISO security professional....

    1 Minute Later
  3. Profile Picture

    Jeffrey |Chief Security Strategist

    25 years experience in the field. Known for education, training, and program build capabilities. ...

    1 Minute Later
+43 Other Responses
Area Icon

Risk Analysis And Privacy Protection

Hi zintro expert, the zintro blog needs you! we are looking for expert opinions on the news mentioned below and would like to hear from you within the next couple of days. While we’d love your thoughts, we realize that your time is valuable, so here are a couple of things you need to know before deciding whether or not to participate: - replies should be brief €“ about 1-2 paragraphs €“ and include your full name - participation is voluntary no payment will be involved - if chosen, you€™ll be named in the post and we€™ll include a link to your zintro profile which will generate more visitors for you wondering what the post would look like? Here is a sample: http://blog.Zintro.Com/2012/01/16/keystone-xl-pipeline-pros-and-cons/ here€™s the topic on which wed love your thoughts: risk analysis and privacy protection there has been an increase in stories about how big data is driving step change in the performance of many firms. Obviously there are privacy and risk concerns associated with having so much information about employees and customers, and keeping this data private is a major issue for companies. However, according to a blogger at cmswire.Com, the fear of big data can result in missed opportunities, including enormous potential to drive revenues, improve customer relationships and satisfaction, and minimize cost. What are your thoughts about how risk and assurance practitioners are responding to these issues? Getting your name and expert opinion published on our blog is a great marketing opportunity. If interested, please send us your response via znotes within a couple of days. Don’t forget to include your full name. If you have any questions, please let us know. Thank you! the zintro blog team

  1. Profile Picture

    Ester |Owner

    My name is Ester Horowitz and I am interim compliance officer in the healthcare space. All that you...

    2.4 Hours Later
  2. Profile Picture

    Asish |Chief Enterprise Architect & Data Sci

    Big *****ines Structured and Unstructured ***** Big *****rs 4V ( Variety , Velocity, Va...

    2.3 Days Later
  3. Profile Picture

    K.S. |Proprietor

    Risk Analysis and Privacy Protection needs details of Risk to be covered, to identify the risk prope...

    2.4 Days Later
+3 Other Responses
Area Icon

Information Security

Hi consultant, hope you are doing well !! we have an opportunity for endpoint security engineer with one of our clients in savannah, ga please see the job details below and let me know if you would be interested in this role.  if interested, please send me a copy of your resume, your contact details, your availability and a good time to connect with you. Title: endpoint security engineer location: savannah, ga terms: contract job details: job description - (endpoint security (level-2): should have minimum 6+ years of experience in information security- endpoint security  should have good understanding on information security concepts  must have managed and have strong knowledge on following products: sophos endpoint protection suite sophos/ utimaco safeguard encryption sophos log writer sophos reporting interface sophos port auditor mcafee epolicy orchestrator mcafee viruscan enterprise for storage tenable nessus security center v5.0  should have good knowledge of configuring policies for hips, personal firewall, device & port control, data loss protection components of sophos endpoint protection suite. Very good experience with antivirus technology, experience in handling virus outbreaks, malware cleanup, policy creation, signature update & reporting. Should have strong knowledge on full disk encryption technology  should be willing to work in rotational shifts  excellent communication and conversation skills  strong analytical and problem solving skills  good documentation skills  should have a great customer handling skills  experience with antivirus solutions across multiple operating systems  powershell scripting experience a plus thanks, varish

  1. Profile Picture

    Richard |Founder

    VARISH, I am a Certified Systems Security Engineer with extensive experience with Software Developm...

    19.5 Hours Later
  2. Profile Picture

    Muhammad |Zintro Expert

    Thanks. However, we are likely to find a suitable ***** could serve as an Endpoint Securit...

    1.1 Days Later
+3 Other Responses
Area Icon

Online Media

I am looking for an expert for security -protection of high quality copy written digital files being delivered globally via desktop client and progressive download from a cdn

  1. Profile Picture

    Enda |CEO

    I can support you on how to protect online media to be distributed and downloaded from a CDN...

    18 Minutes Later
  2. Profile Picture

    Gustavo |Solution Architect

    I can definitely help you with ***** me know if you want to have a first screening session...

    4.5 Hours Later
+3 Other Responses
Area Icon

Data Privacy

Hi zintro expert, the zintro blog needs you! we are looking for expert opinions on the news mentioned below and would like to hear from you within the next couple of days. While we’d love your thoughts, we realize that your time is valuable, so here are a couple of things you need to know before deciding whether or not to participate: replies should be brief a about 1-2 paragraphs – and include your full name participation is voluntary a no payment will be involved if chosen, you'€™ll be named in the post and we'€™ll include a link to your zintro profile which will generate more visitors for you wondering what the post would look like? Here is a sample: http://blog.Zintro.Com/2012/01/16/keystone-xl-pipeline-pros-and-cons/ here’s the topic on which we’d love your thoughts: data privacy/market research location analytics firms such as euclid and radius networks, have reached an agreement with the future of privacy forum (fpf) for a code of conduct, developed with senator charles schumer, which was signed at the end of october. It ensures that people receive notification when location tracking takes place and that they are given the information they need to opt out. In addition, under the fpf code, companies that collect data senator schumer's interest in the issue dates back to the november 11 reports of location tracking in several u.S. Shopping malls. Originally senator schumer wanted companies to track only those consumers who opted in but he changed his stance. Now he requests that retailers give shoppers a 'clear and obvious opportunity to opt out before tracking them.' according to research live, under the fpf code, companies that collect data through this technology must limit how the information is used and shared and how long it may be retained. The code mandates that companies de-identify the data and explain in their privacy policy how they do so. Companies are required to get opt-in consent when personal information is collected, or when a consumer will be contacted. The code calls for opt-out consent where the information collected is not personal. In addition, this data cannot be collected or used in an adverse manner for employment, healthcare or insurance purposes. What are your thoughts about the new code of conduct? How will it affect future private policies? Getting your name and expert opinion published on our blog is a great marketing opportunity. If interested, please send us your response via znotes within a couple of days. Don't forget to include your full name. If you have any questions, please let us know. Thank you! the zintro blog team

  1. Profile Picture

    Andrew |Virtual CIO (Information Security, IT Op

    The FPF code is a good start on improving the *****acy of US customers. I would have preferred ...

    1.6 Hours Later
  2. Profile Picture

    David |President and Founder

    There is a ***** for new *****rding the collection and use of *****rmati...

    1.1 Days Later
+2 Other Responses
Area Icon

Data Security

The zintro blog needs you! i write the zintro blog. I am looking for your expert opinion on the question below and a written response that is one to three paragraphs long. Your response may be used in an article that i will write and post on the zintro site. You will be named in the article and a link to your expert profile will be included. Your contribution is voluntary (there is no direct payment involved, but you will get lots of traffic to your expert profile). If interested, please send me your response via znotes in the next one or two days. Question: a group of hackers claiming to have stolen information on 12 million apple inc. User accounts, leaked a million id numbers from apple inc. Devices-numbers that they claim to have taken from a database that also had people's other personal information on it. What do you think about personal privacy and protection issues that apple users have? This is a great marketing opportunity to get your name and expert opinion published on our blog. Here is a sample: http://blog.Zintro.Com/2012/01/16/keystone-xl-pipeline-pros-and-cons/ please include your full name, we will link it to your expert profile, getting you more presence on zintro. If you have any questions, please let me know. Thank you! idil kan

  1. Profile Picture

    Howard |Executive VP

    It is everyones responsibilty to insure that personal ***** protected from unauthorized use...

    1.1 Days Later
  2. Profile Picture

    Emanuel |Senior Disaster Recovery Planner

    Sorry I missed this. Emanuel...

    47.1 Days Later
+2 Other Responses
Area Icon

Record Procurement

Record procurement-litigation support services 1. Supply market landscape - overview of supply market in the u.S. – types of suppliers, most dominant supplier segment - list of key suppliers in the u.S. Compliance to info protect: 1. Appropriate access controls within the solution 2. Encryption of data at rest etc.

  1. Profile Picture

    Thomas |Lecturer & Professor in Data Management

    I could only help with encryption of ***** rest, but the remainder I am unfamiliar with....

    3.3 Hours Later
  2. Profile Picture

    Shyam |VP of Finance

    Very knowledgeable about Access controls in US and can assist...

    10.8 Hours Later
+2 Other Responses
Area Icon

Internet Security

Hi zintro expert, the zintro blog needs you! we are looking for expert opinions on the news mentioned below and would like to include your point of view. We realize your time is valuable. One billion -- that's the number of stolen usernames and passwords that a russian cyber-crime gang has apparently accumulated. It's a huge number and a hacking milestone. On a practical level, though, the figure reported in the new york times likely won't translate into anything big. Here are two reasons why: first, the hackers have primarily used the information to target people with spam e-mail and social-media messages on twitter and similar services, according to hold security, the milwaukee-based consultancy that discovered the database of stolen account information. But here's the thing: spammers are highly inefficient. While the one billion figure is eye-grabbing, the real number to focus on is 99.6 percent. That's how often spam filters block those messages, according to the spamhaus project, an anti-spam nonprofit based in london and geneva. In other words, the vast majority of people whose online credentials were stolen likely won't experience any direct harm. Of the people who do see the messages, fewer still will open them. And even then, users will have to be fooled into clicking on links designed to infect their machines or sell them fake pharmaceuticals. Alex holden, founder of hold security, did not immediately respond to requests for comment. Here's the second reason: even if you're unlucky enough to be in the 0.4 percent group that does see the spam messages, there are four steps you can take to protect yourself: don't open spam. You know this. Why do you make us repeat ourselves? Don't be lazy: use a variety of passwords. Online thieves are hoping you use the same credentials for all the sites you access, including ones that store financial information. Update your software with the recommended security patches. Many users still ignore these. And if you're worried your computer might already be infected, take the extreme step of re-installing the operating system to start over. Changing passwords on a breached computer won't do any good. The cyber crooks will have those, too. What are your thoughts? Getting your name and expert opinion published on our blog is a great marketing opportunity. If interested, please send a response to the prompt via znotes within 1-2 days. Don't forget to include your full name. If you have any questions, please let us know. Thank you! the zintro blog team

  1. Profile Picture

    TAIYE |President & Founder

    I believe the 1 billion number may be slightly exaggerated, however it does not diminish the well kn...

    7 Minutes Later
  2. Profile Picture

    Janet |Owner

    I am a *****ection lawyer and would love to comment. Please leave me a note here. Thank you....

    18 Minutes Later
  3. Profile Picture

    Bill |Managing Partner & CEO

    Believing that the only impact of these actions is going to be SPAM is naive at best. First, the h...

    1.5 Hours Later
+6 Other Responses
See More Inquiries

Top Data Privacy Experts

See More Experts
Share
LinkedInTwitterFacebookGoogle+