Affordably Source Information Security And Data Protection Experts and Industry Participants for Market Research, Diligence and Projects

Submit an anonymous Project Description -- Start receiving responses within a few hours

Have a need? Explain it here






How Zintro Works

  1. 1. Provide a clear description of your needs and your expectations of an expert, consultant or job candidate and Zintro will match it with the most relevant professionals in our platform.
  2. 2. Within a day or two typically 6 - 12 Experts, who have opted-in, will contact you with a brief explanation of their qualifications and how they can help.
  3. 3. You can communicate back and forth, qualify each other, connect and pay fees to Experts through Zintro.
  4. Zintro is free, anonymous and without obligation.

Loved by Thousands

Loved by thousands logos

Need Help?A phone icon1-877-236-7016

Recent Information Security And Data Protection Inquiries

Area Icon

Information And Data Securities

Looking for information security data classification expert.

  1. Profile Picture

    Faisal |Consultant

    Dear Sir/Madam, With reference to your inquiry regarding ***** *****rities, I would l...

    39 Minutes Later
  2. Profile Picture

    Robert |CEO

    I am an expert in these areas. What exactly are you looking for?...

    48 Minutes Later
  3. Profile Picture

    Cristian |Senior Security Engineer

    Hello! I am interested and would like to hear more details....

    1.5 Hours Later
+8 Other Responses
Area Icon

Information Security And Data Privacy

We are a leading webinar publisher (wholly owned by the financial times)and a authorized zintro partner. We are seeking an expert to lead a 60-minute webinar on the topic of “what ceos need to know about the legal issues surrounding information security and data privacy, and how to protect your company”. The speaker will be responsible for compiling a basic 15-20-slide powerpoint for the presentation (template provided) and being available for the live recording or for a pre-record prior to that date. Speakers will be asked to sign a waiver, release and consent form that requires the speaker to provide their intellectual property for the purposes of presenting with us. While we will maintain a copyright of the final product (powerpoint with our logos and recording of presentation), we will not hold a copyright on the intellectual property provided by the speaker and the speaker will be free to use such concepts in the future. The chosen speaker will receive compensation and tremendous professional exposure. Speakers will not be asked to pay any fees. Our lecturers have come from: mit sloan, sap, columbia university, harvard business review, cornell university, ernst & young, deloitte, kpmg, new york university, and many more top organizations.

  1. Profile Picture

    Alan |Senior Manager, Information Security

    What is the financial compensation? ...

    8.4 Hours Later
  2. Profile Picture

    David |Managing Director, Engineer, Business Co

    Currently I am in the process of having an *****rity lead implementer course accredited t...

    16.1 Hours Later
  3. Profile Picture

    Shankar |Security Solutions Strategist

    i am interested to ***** a speaker in your webinar. I have been a speaker in various engage...

    20.3 Hours Later
+6 Other Responses
Area Icon

Erp Systems, Data Security And Compliance

We would like to have a better understanding of the market for erp data security and compliance / grc management. Specifically focused on third-party security software for erp systems but also need to understand erp data security and compliance more broadly. Discussion points: a. Security features native to sap and oracle erp systems, including contextual access control, location-based access control, multi-factor authentication, security analytics, etc. B. Third-party software vendors that provide supplemental security and grc functionality. C. Whether or not sap and oracle can and will build more advanced security features in lieu of third-party vendors. This would be for a 1-hour paid 60 min phone consultation. To show your relevance in this space, please answer the question below. 1.Briefly discuss the level or extent of your experience in erp data security and compliance / grc management. 2. Are you familiar with any third-party security software for erp systems (contextual access control, multi-factor authentication, integrated risk management solutions, etc.)? Kindly indicate (1-3): 3. Can you talk about the discussion points mentioned above? **please note that we are only interested in your personal point of view and are not seeking confidential information. Referrals are highly appreciated**

  1. Profile Picture

    Ana |EVP and C. Compliance Officer

    I have worked with ERP systems, and others, for over 20 years, always with security as a major point...

    3.1 Hours Later
  2. Profile Picture

    Subramanyam |

    Sure as Global Tech Leader for SAP I M aware of SAP GRC besides downstream and upstream systems I/c ...

    3.5 Hours Later
  3. Profile Picture

    Peter |Managing Director - Information Technolo

    As the Managing Director of *****nology for our global financial services firm, I am resp...

    3.6 Hours Later
+11 Other Responses
Area Icon

Hipaa Compliant Data Warehouse

Need a ciso with experience in creating and implementing security policies for hipaa compliant data warehouses to support a new security documentation process in preparation for qecp certification. Please cite relevant experience and availability.

  1. Profile Picture

    "_"*Z |Zintro Expert

    I know the exact person for this gig...

    38 Minutes Later
  2. Profile Picture

    Donald |President and CEO

    Previously served as HIPAA implementation officer for the Army Reserve and as a member of the DoD H...

    44 Minutes Later
  3. Profile Picture

    Muneer |Founder & CEO

    SYSUSA can help, www.sysusa.com. We have significant expertise in GRC. We have delivered hundreds of...

    2.3 Hours Later
+9 Other Responses
Area Icon

Security Master Reference Data

Security master reference data analyst for financial services firm

  1. Profile Picture

    Muhammad |Consultant

    How do you want to store Reference data? Is it OneTick or KDB or any *****base? What venue...

    3.1 Hours Later
  2. Profile Picture

    Joshua |President

    Dear AJ, I am a huge expert in reference *****ss asset classes, ***** and what would be par...

    7.2 Hours Later
  3. Profile Picture

    Ray |Global Engagement manager

    Is this a contracting position? What location? Any particular industry exp?...

    12.1 Days Later
+6 Other Responses
Area Icon

Data Security Law

We are a leading webinar publisher (wholly owned by the financial times) and an authorized zintro partner. We are seeking an expert to lead a 60-minute webinar on the topic of “what insurance lawyers need to know about coverage for data security breaches”. The speaker will be responsible for compiling a basic 15-20-slide powerpoint for the presentation (template provided) and being available for the live recording or for a pre-record prior to that date. Speakers will be asked to sign a waiver, release and consent form that requires the speaker to provide their intellectual property for the purposes of presenting with us. While we will maintain a copyright of the final product (powerpoint with our logos and recording of presentation), we will not hold a copyright on the intellectual property provided by the speaker and the speaker will be free to use such concepts in the future. The chosen speaker will receive compensation and tremendous professional exposure. Speakers will not be asked to pay any fees. Our lecturers have come from: mit sloan, sap, columbia university, harvard business review, cornell university, ernst & young, deloitte, kpmg, new york university, and many more top organizations. For additional requirements or information, please send your resume and any relevant information.

  1. Profile Picture

    Shankar |Security Solutions Strategist

    i am interested to ***** a speaker in your webinar. I have been a speaker in various engage...

    19.9 Hours Later
  2. Profile Picture

    Yazan |Freelance Consultant/Project Manager

    Dear , I am interested as I have the relevant experience and *****l needed. Best rega...

    3.6 Days Later
+2 Other Responses
Area Icon

Data Privacy And Cyber Security

Required details on data privacy and cyber security in payroll outsourcing. Please can you explain the buyers requirements in terms of data privacy and cyber security and how supplier are meeting this? And what is is the general cap on on data privacy and cyber security incidents in the agreements

  1. Profile Picture

    Jay |Cybersecurity Consultant, Managing Direc

    So far ive found zintro to be a way for an ***** pick the brains if professionals with no ...

    6.2 Hours Later
  2. Profile Picture

    Codi |_

    First, the *****s to outline what items (PII) will be exchanged with this vendor. Fully ...

    6.6 Hours Later
  3. Profile Picture

    Priya |Security Advisor

    Hi, It would be great, if you write us your requirement in detail to ***** you can s...

    6.6 Hours Later
+49 Other Responses
Area Icon

Information Security

Hi consultant, hope you are doing well !! we have an opportunity for endpoint security engineer with one of our clients in savannah, ga please see the job details below and let me know if you would be interested in this role.  if interested, please send me a copy of your resume, your contact details, your availability and a good time to connect with you. Title: endpoint security engineer location: savannah, ga terms: contract job details: job description - (endpoint security (level-2): should have minimum 6+ years of experience in information security- endpoint security  should have good understanding on information security concepts  must have managed and have strong knowledge on following products: sophos endpoint protection suite sophos/ utimaco safeguard encryption sophos log writer sophos reporting interface sophos port auditor mcafee epolicy orchestrator mcafee viruscan enterprise for storage tenable nessus security center v5.0  should have good knowledge of configuring policies for hips, personal firewall, device & port control, data loss protection components of sophos endpoint protection suite. Very good experience with antivirus technology, experience in handling virus outbreaks, malware cleanup, policy creation, signature update & reporting. Should have strong knowledge on full disk encryption technology  should be willing to work in rotational shifts  excellent communication and conversation skills  strong analytical and problem solving skills  good documentation skills  should have a great customer handling skills  experience with antivirus solutions across multiple operating systems  powershell scripting experience a plus thanks, varish

  1. Profile Picture

    Richard |Founder

    VARISH, I am a Certified Systems Security Engineer with extensive experience with Software Developm...

    19.5 Hours Later
  2. Profile Picture

    Muhammad |Zintro Expert

    Thanks. However, we are likely to find a suitable ***** could serve as an Endpoint Securit...

    1.1 Days Later
+3 Other Responses
Area Icon

Data Security Solutions

Technical consultant (australia) - implementation services needed we are looking for data security solutions professional services providers. We seek people qualified to conduct on-site assistance with custom database, file and web application security deployments and substantial upgrade efforts involving our clients standard support programs. Please respond if you are extensively trained in data security, #infosec or have more than one of the following certifications and would like more billable hours. Cissp, cisa, ceh, giac

  1. Profile Picture

    Tamaghna |Independent Security Researcher

    Hello, please let me know how can we take it forward. Thank you....

    3.8 Hours Later
  2. Profile Picture

    Charles |Chief Executive Officer

    Hello, I'm interested to discuss your inquiry and project. Please have a look at my background and...

    21.8 Hours Later
  3. Profile Picture

    Lowell |CIO, Sr Consultant, Technical Solutions

    I could be interested. I have my CISSP and Security+. I am in the Dallas TX area and OK with some tr...

    2.8 Days Later
+3 Other Responses
Area Icon

Cloud Data Platforms Security Framework

We would like to speak with multiple experts, data architects building cloud data platforms with experience working with security frameworks. More importantly, the expert is prepared to talk through how to implement specific policies in apache ranger at a high level with sample scenarios. This is for 60 mins paid phone consultation. To show your relevance in this space, please answer the questions below: 1. Do you have 6+ months of experience managing access control using apache ranger policies? 2. What big data and cloud platforms do you have experience with? (i.E. Snowflake, databricks, amazon redshift, amazon emr, cloudera, etc) 3. What challenges have you faced around governing access to hadoop ecosystems using apache ranger? 4. On a scale of 1-10 (10 being the most challenging), how would you rate the challenges in the prior question? **please note that we are only interested in your personal point of view and are not seeking confidential information. This is not a sales solicitation. All the information you provide us is kept strictly confidential. It is used for classification purposes**

  1. Profile Picture

    Henry |Sr. Advisor - Cloud Architecture

    As you requested: 1. Do you have 6+ months of experience managing access control using Apache Ranger...

    37 Minutes Later
  2. Profile Picture

    Thomas | Executive Director

    Having written more than a dozen articles on cloud for top enterprise companies, I have great insigh...

    39 Minutes Later
  3. Profile Picture

    Nilesh |Data Engineering Lead

    "1. Do you have 6+ months of experience managing access control using Apache Ranger policies? Ans: Y...

    24 Hours Later
+23 Other Responses
Area Icon

Cyber Security

We require a subject matter expert in cyber security, more specifically ransomware as a guest/keynote speaker in a webinar planned for sept 22. The sme must have relevant experience in online & data security, solid communication skills and good understanding of ransomware attacks.

  1. Profile Picture

    John |President & Chief Forensic Examiner

    I was part of *****r which took down Cryptolocker and I run the Ransomware Working Group, a...

    1.3 Hours Later
  2. Profile Picture

    Raghavan |Principal

    I bring in SME expertise in malware security trends (trojan and ransomware) and have architected sec...

    3.3 Hours Later
  3. Profile Picture

    Anthony |Principal Consultant

    I am a software development professional with 20+ years in Med Device, Healthcare IT space. I held ...

    3.4 Hours Later
+17 Other Responses
Area Icon

Security Intelligence

We are looking to speak to customers of exabeam. Exabeam is a security intelligence solution that leverages existing log data to quickly detect modern cyber attacks, prioritize security incidents, and accelerate effective response. Some current customers of exabeam are adp, black rock, legg mason, barclays, td ameritrade, gap, levi’s, optiv, & ebay. We are looking for customers in the u.S. Only. The typical titles would be director/vp of security, director of soc, ciso etc. This would be for a 1 hour paid phone consultation.

  1. Profile Picture

    Russell |Analyst

    Fee negotiable...

    26 Minutes Later
  2. Profile Picture

    Anand |Managing Partner

    I am a practising security consultant. I hav ...

    10.5 Hours Later
  3. Profile Picture

    Gaurav |Pharmaceutical Quality Systems Consultan

    I have twenty years of Industry experience and knowledge and can help you with this *****...

    6.8 Days Later
+26 Other Responses
See More Inquiries

Top Information Security And Data Protection Experts

See More Experts
Share
LinkedInTwitterFacebookGoogle+