Source Data Privacy Experts for your Project, Phone Consult or Job

Submit an anonymous Inquiry -- Start receiving responses within a few hours

Have a need? Explain it here

Zintro does not display, sell or trade e-mail addresses

An eye iconForgot password?
Submit Inquiry

By clicking Submit Inquiry you agree to our TermsVIEW

or Request Pricing Information

How Zintro Works

  1. 1. Provide a clear description of your needs and your expectations of an expert, consultant or job candidate and Zintro will match it with the most relevant professionals in our platform.
  2. 2. Within a day or two typically 6 - 12 Experts, who have opted-in, will contact you with a brief explanation of their qualifications and how they can help.
  3. 3. You can communicate back and forth, qualify each other, connect and pay fees to Experts through Zintro.
  4. Zintro is free, anonymous and without obligation.

Loved by Thousands

Loved by thousands logos

Need Help?A phone icon1-877-236-7016

Recent Data Privacy Inquiries

Area Icon

Information Security And Data Privacy

We are a leading webinar publisher (wholly owned by the financial times)and a authorized zintro partner. We are seeking an expert to lead a 60-minute webinar on the topic of “what ceos need to know about the legal issues surrounding information security and data privacy, and how to protect your company”. The speaker will be responsible for compiling a basic 15-20-slide powerpoint for the presentation (template provided) and being available for the live recording or for a pre-record prior to that date. Speakers will be asked to sign a waiver, release and consent form that requires the speaker to provide their intellectual property for the purposes of presenting with us. While we will maintain a copyright of the final product (powerpoint with our logos and recording of presentation), we will not hold a copyright on the intellectual property provided by the speaker and the speaker will be free to use such concepts in the future. The chosen speaker will receive compensation and tremendous professional exposure. Speakers will not be asked to pay any fees. Our lecturers have come from: mit sloan, sap, columbia university, harvard business review, cornell university, ernst & young, deloitte, kpmg, new york university, and many more top organizations.

  1. Profile Picture

    Alan |Director

    What is the financial compensation? ...

    8.4 Hours Later
  2. Profile Picture

    David |Managing Director, Engineer, Business Co

    Currently I am in the process of having an *****rity lead implementer course accredited t...

    16.1 Hours Later
  3. Profile Picture

    Shankar |Security Solutions Strategist

    i am interested to ***** a speaker in your webinar. I have been a speaker in various engage...

    20.3 Hours Later
+6 Other Responses
Area Icon

Gdpr Compliance

I am looking for someone that has gdpr compliance expertise in the digital adops/publishing arena. I have a couple of sites that are in need of compliance and i need someone to lead the charge for me and provide clear concise direction on exactly what is needed to become compliant.

    +undefined Other Responses
    Area Icon

    Data Security

    The zintro blog needs you! i write the zintro blog. I am looking for your expert opinion on the question below and a written response that is one to three paragraphs long. Your response may be used in an article that i will write and post on the zintro site. You will be named in the article and a link to your expert profile will be included. Your contribution is voluntary (there is no direct payment involved, but you will get lots of traffic to your expert profile). If interested, please send me your response via znotes in the next one or two days. Question: a group of hackers claiming to have stolen information on 12 million apple inc. User accounts, leaked a million id numbers from apple inc. Devices-numbers that they claim to have taken from a database that also had people's other personal information on it. What do you think about personal privacy and protection issues that apple users have? This is a great marketing opportunity to get your name and expert opinion published on our blog. Here is a sample: http://blog.Zintro.Com/2012/01/16/keystone-xl-pipeline-pros-and-cons/ please include your full name, we will link it to your expert profile, getting you more presence on zintro. If you have any questions, please let me know. Thank you! idil kan

    1. Profile Picture

      Howard |Executive VP

      It is everyones responsibilty to insure that personal ***** protected from unauthorized use...

      1.1 Days Later
    2. Profile Picture

      Emanuel |Senior Disaster Recovery Planner

      Sorry I missed this. Emanuel...

      47.1 Days Later
    +2 Other Responses
    Area Icon

    Record Procurement

    Record procurement-litigation support services 1. Supply market landscape - overview of supply market in the u.S. – types of suppliers, most dominant supplier segment - list of key suppliers in the u.S. Compliance to info protect: 1. Appropriate access controls within the solution 2. Encryption of data at rest etc.

    1. Profile Picture

      Thomas |Lecturer & Professor in Data Management

      I could only help with encryption of ***** rest, but the remainder I am unfamiliar with....

      3.3 Hours Later
    2. Profile Picture

      Shyam |VP of Finance

      Very knowledgeable about Access controls in US and can assist...

      10.8 Hours Later
    +2 Other Responses
    Area Icon

    Data Privacy

    Our company is looking for privacy and security experts to come in and help train our it team on these topics. We are looking to have someone here very soon. We are located in washington state.

    1. Profile Picture

      Crypto |Founder

      I am based in India and expert in ***** *****rity. ...

      1 Minute Later
    2. Profile Picture

      Rkrishna |Consultant

      Well....can you share the industry type ....am a certified ISO security professional....

      1 Minute Later
    3. Profile Picture

      Jeffrey |Chief Security Strategist

      25 years experience in the field. Known for education, training, and program build capabilities. ...

      1 Minute Later
    +43 Other Responses
    Area Icon

    Data Privacy

    Looking for an auditor with expertise and skills in the following areas: privacy protection, information security, and data protection. Time sensitive request.

    1. Profile Picture

      Kishore |Consultant

      Hi LWalter, I am interested in such projects. If you can ***** the project like industry, inf...

      28 Minutes Later
    2. Profile Picture

      Aaron |Senior Application Developer

      Hello LWalter, I have extensive experience with IT Security and *****ting. I have traced backe...

      29 Minutes Later
    3. Profile Picture

      Steven |Founder/Principal

      Hello, I can help you. I have had my own consulting practice (www.ncontrol-llc.com) for over five y...

      37 Minutes Later
    +16 Other Responses
    Area Icon

    Information Security And Privacy

    We are a leading webinar publisher (wholly owned by the financial times) and a authorized zintro partner. We are seeking an expert to lead a 60-minute webinar on the topic of “how information security and privacy will impact your bottom line as a gc”. The speaker will be responsible for compiling a basic 15-20-slide powerpoint for the presentation (template provided) and being available for the live recording or for a pre-record prior to that date. Speakers will be asked to sign a waiver, release and consent form that requires the speaker to provide their intellectual property for the purposes of presenting with us. While we will maintain a copyright of the final product (powerpoint with our logos and recording of presentation), we will not hold a copyright on the intellectual property provided by the speaker and the speaker will be free to use such concepts in the future. The chosen speaker will receive compensation and tremendous professional exposure. Speakers will not be asked to pay any fees. Our lecturers have come from: mit sloan, sap, columbia university, harvard business review, cornell university, ernst & young, deloitte, kpmg, new york university, and many more top organizations. For additional requirements or information contact me

    1. Profile Picture

      ANDREW R. |CTO/Chief Enterprise Architect & CSO

      I can certainly lead such a webinar....

      1.5 Hours Later
    2. Profile Picture

      Emanuel |Senior Disaster Recovery Planner

      Inforamtion Security and Privacy are at the top of the list for many *****. Technology and ...

      1.7 Hours Later
    3. Profile Picture

      Robert |Principal

      I would be happy to speak with you about such a webinar. I have been a Contributor to the "Computer ...

      1.9 Hours Later
    +7 Other Responses
    Area Icon

    Data Protection Officers

    Looking to speak with experts who could help us understand the roles and responsibilities, challenges, and investment priorities of dpos in the light of the recent eu regulation - general data protection regulation (gdpr).

      +undefined Other Responses
      Area Icon

      Data Privacy

      Hi zintro expert, the zintro blog needs you! we are looking for expert opinions on the news mentioned below and would like to hear from you within the next couple of days. While we’d love your thoughts, we realize that your time is valuable, so here are a couple of things you need to know before deciding whether or not to participate: replies should be brief a about 1-2 paragraphs – and include your full name participation is voluntary a no payment will be involved if chosen, you'€™ll be named in the post and we'€™ll include a link to your zintro profile which will generate more visitors for you wondering what the post would look like? Here is a sample: http://blog.Zintro.Com/2012/01/16/keystone-xl-pipeline-pros-and-cons/ here’s the topic on which we’d love your thoughts: data privacy/market research location analytics firms such as euclid and radius networks, have reached an agreement with the future of privacy forum (fpf) for a code of conduct, developed with senator charles schumer, which was signed at the end of october. It ensures that people receive notification when location tracking takes place and that they are given the information they need to opt out. In addition, under the fpf code, companies that collect data senator schumer's interest in the issue dates back to the november 11 reports of location tracking in several u.S. Shopping malls. Originally senator schumer wanted companies to track only those consumers who opted in but he changed his stance. Now he requests that retailers give shoppers a 'clear and obvious opportunity to opt out before tracking them.' according to research live, under the fpf code, companies that collect data through this technology must limit how the information is used and shared and how long it may be retained. The code mandates that companies de-identify the data and explain in their privacy policy how they do so. Companies are required to get opt-in consent when personal information is collected, or when a consumer will be contacted. The code calls for opt-out consent where the information collected is not personal. In addition, this data cannot be collected or used in an adverse manner for employment, healthcare or insurance purposes. What are your thoughts about the new code of conduct? How will it affect future private policies? Getting your name and expert opinion published on our blog is a great marketing opportunity. If interested, please send us your response via znotes within a couple of days. Don't forget to include your full name. If you have any questions, please let us know. Thank you! the zintro blog team

      1. Profile Picture

        Andrew |Virtual CIO (Information Security, IT Op

        The FPF code is a good start on improving the *****acy of US customers. I would have preferred ...

        1.6 Hours Later
      2. Profile Picture

        David |President and Founder

        There is a ***** for new *****rding the collection and use of *****rmati...

        1.1 Days Later
      +2 Other Responses
      Area Icon

      Risk Analysis And Privacy Protection

      Hi zintro expert, the zintro blog needs you! we are looking for expert opinions on the news mentioned below and would like to hear from you within the next couple of days. While we’d love your thoughts, we realize that your time is valuable, so here are a couple of things you need to know before deciding whether or not to participate: - replies should be brief €“ about 1-2 paragraphs €“ and include your full name - participation is voluntary no payment will be involved - if chosen, you€™ll be named in the post and we€™ll include a link to your zintro profile which will generate more visitors for you wondering what the post would look like? Here is a sample: http://blog.Zintro.Com/2012/01/16/keystone-xl-pipeline-pros-and-cons/ here€™s the topic on which wed love your thoughts: risk analysis and privacy protection there has been an increase in stories about how big data is driving step change in the performance of many firms. Obviously there are privacy and risk concerns associated with having so much information about employees and customers, and keeping this data private is a major issue for companies. However, according to a blogger at cmswire.Com, the fear of big data can result in missed opportunities, including enormous potential to drive revenues, improve customer relationships and satisfaction, and minimize cost. What are your thoughts about how risk and assurance practitioners are responding to these issues? Getting your name and expert opinion published on our blog is a great marketing opportunity. If interested, please send us your response via znotes within a couple of days. Don’t forget to include your full name. If you have any questions, please let us know. Thank you! the zintro blog team

      1. Profile Picture

        Ester |Owner

        My name is Ester Horowitz and I am interim compliance officer in the healthcare space. All that you...

        2.4 Hours Later
      2. Profile Picture

        Asish |Chief Enterprise Architect & Data Sci

        Big *****ines Structured and Unstructured ***** Big *****rs 4V ( Variety , Velocity, Va...

        2.3 Days Later
      3. Profile Picture

        K.S. |Proprietor

        Risk Analysis and Privacy Protection needs details of Risk to be covered, to identify the risk prope...

        2.4 Days Later
      +3 Other Responses
      Area Icon

      Information Security

      Hi consultant, hope you are doing well !! we have an opportunity for endpoint security engineer with one of our clients in savannah, ga please see the job details below and let me know if you would be interested in this role.  if interested, please send me a copy of your resume, your contact details, your availability and a good time to connect with you. Title: endpoint security engineer location: savannah, ga terms: contract job details: job description - (endpoint security (level-2): should have minimum 6+ years of experience in information security- endpoint security  should have good understanding on information security concepts  must have managed and have strong knowledge on following products: sophos endpoint protection suite sophos/ utimaco safeguard encryption sophos log writer sophos reporting interface sophos port auditor mcafee epolicy orchestrator mcafee viruscan enterprise for storage tenable nessus security center v5.0  should have good knowledge of configuring policies for hips, personal firewall, device & port control, data loss protection components of sophos endpoint protection suite. Very good experience with antivirus technology, experience in handling virus outbreaks, malware cleanup, policy creation, signature update & reporting. Should have strong knowledge on full disk encryption technology  should be willing to work in rotational shifts  excellent communication and conversation skills  strong analytical and problem solving skills  good documentation skills  should have a great customer handling skills  experience with antivirus solutions across multiple operating systems  powershell scripting experience a plus thanks, varish

      1. Profile Picture

        Richard |Founder

        VARISH, I am a Certified Systems Security Engineer with extensive experience with Software Developm...

        19.5 Hours Later
      2. Profile Picture

        Muhammad |Zintro Expert

        Thanks. However, we are likely to find a suitable ***** could serve as an Endpoint Securit...

        1.1 Days Later
      +3 Other Responses
      Area Icon

      Confidential Information Leak

      I need an expert in damages for release of confidential information in a quasi banking context. The information implicates a very well know individual in the business community world wide who has taught in one of the premier graduate mba programs in the usa. He is also an officer/diirector of a publicly traded corporation and the disclosure could harm his ability to raise funds and manage the corporation.

      1. Profile Picture

        Michael |Global ISO

        Are you looking to place an ***** the cost of your breach, or do you need help with the breach...

        3.1 Days Later
      2. Profile Picture

        roberto |Mission Critical IT facilities consultan

        Dear sirs Can you -as confidenciality allow- tell me how can I hell you in this issue? On this basis...

        3.8 Days Later
      3. Profile Picture

        Doug |Sr. Enterprise Consulting

        I'd like to learn more about this opportunity and can provide expert assistance in *****rity, pr...

        4.5 Days Later
      +6 Other Responses
      See More Inquiries

      Top Data Privacy Experts

      See More Experts
      Share
      LinkedInTwitterFacebookGoogle+