Affordably Source Lost Data Destruction Experts and Industry Participants for Market Research, Diligence and Projects

Submit an anonymous Project Description -- Start receiving responses within a few hours

Have a need? Explain it here






How Zintro Works

  1. 1. Provide a clear description of your needs and your expectations of an expert, consultant or job candidate and Zintro will match it with the most relevant professionals in our platform.
  2. 2. Within a day or two typically 6 - 12 Experts, who have opted-in, will contact you with a brief explanation of their qualifications and how they can help.
  3. 3. You can communicate back and forth, qualify each other, connect and pay fees to Experts through Zintro.
  4. Zintro is free, anonymous and without obligation.

Loved by Thousands

Loved by thousands logos

Need Help?A phone icon1-877-236-7016

Recent Lost Data Destruction Inquiries

Area Icon

Computer Security

Assist with protocols and develop collection tools; assist with data analysis, interpretation, reports; assist in writing final reports

  1. Profile Picture

    Lito |IT Consultant

    Hello I am an experienced *****yst and I am familiar with analysis tools. Would be good to talk,...

    6.7 Days Later
  2. Profile Picture

    Geoffrey |Consultant

    Have only now seen this Inquiry (21 Dec)! From limited *****lied, I doubt that my "data ...

    16 Days Later
+2 Other Responses
Area Icon

Information Security And Data Privacy

We are a leading webinar publisher (wholly owned by the financial times)and a authorized zintro partner. We are seeking an expert to lead a 60-minute webinar on the topic of “what ceos need to know about the legal issues surrounding information security and data privacy, and how to protect your company”. The speaker will be responsible for compiling a basic 15-20-slide powerpoint for the presentation (template provided) and being available for the live recording or for a pre-record prior to that date. Speakers will be asked to sign a waiver, release and consent form that requires the speaker to provide their intellectual property for the purposes of presenting with us. While we will maintain a copyright of the final product (powerpoint with our logos and recording of presentation), we will not hold a copyright on the intellectual property provided by the speaker and the speaker will be free to use such concepts in the future. The chosen speaker will receive compensation and tremendous professional exposure. Speakers will not be asked to pay any fees. Our lecturers have come from: mit sloan, sap, columbia university, harvard business review, cornell university, ernst & young, deloitte, kpmg, new york university, and many more top organizations.

  1. Profile Picture

    Alan |Senior Manager, Information Security

    What is the financial compensation? ...

    8.4 Hours Later
  2. Profile Picture

    David |Managing Director, Engineer, Business Co

    Currently I am in the process of having an *****rity lead implementer course accredited t...

    16.1 Hours Later
  3. Profile Picture

    Shankar |Security Solutions Strategist

    i am interested to ***** a speaker in your webinar. I have been a speaker in various engage...

    20.3 Hours Later
+6 Other Responses
Area Icon

It Security And Data Compliance

We are looking to speak with multiple decision-makers in compliance, it, or legal job functions that have influence over the adoption and purchase of communication/collaborations tools. Desired participants should recently adopted or considering encryption for their productivity/communication/collaboration software uses. This is for a paid 1 - hour web interview. Qualifying questions 1. How would you describe your level of influence in the decision to assess, evaluate, adopt, or purchase new organization/company communication/collaboration tools? By “communication and collaboration software” we mean software enabling real-time and asynchronous collaboration, meetings, instant messaging, file sharing, etc. Would you say you? A. I am the final decision-maker b. I share in the decision making c. I have some influence d. I have little to no influence e. We do not have any productivity and collaboration software **please note that we are only interested in your personal point of view and are not seeking confidential information. ***referrals are highly appreciated

  1. Profile Picture

    Mitch |Head of IT Operations and Technology

    I am the final decision-maker...

    32 Minutes Later
  2. Profile Picture

    Martyn |Chief Information Security Officer

    B. I sit on the IT leadership team of a FTSE 250 company and make joint decisions on these things. I...

    37 Minutes Later
  3. Profile Picture

    Ritesh |COO | Global Head of Digital Technology

    Being a tech leader for over two decades, led large *****uding leading banks / payment ...

    45 Minutes Later
+43 Other Responses
Area Icon

It Security

I am looking for an it consultant with the following it security clearance certifications who is available to work on site (travel) and remotely as needed. Cism certified information security manager cisa certified information systems auditor cgeit certified in the governance of enterprise it

  1. Profile Picture

    Ariben |Manager Information Security

    Hi, My nearly 14 years of experience in Infrastructure Management, Security Management, Cyber Foren...

    12 Minutes Later
  2. Profile Picture

    Rohit |Managing Partner & Director

    Hi we can assist in your requirements. I represent a firm of management consultants and we have an a...

    36 Minutes Later
  3. Profile Picture

    Chet |CISO

    Do not have the CGEIT but could obtain it quickly. Have CISSP, CISM, CISA, GSNA, ITIL and a expired...

    7.4 Hours Later
+16 Other Responses
Area Icon

Computer Security In Insurance

Looking for experts in cyber security insurance law

  1. Profile Picture

    Rahul |Chief Technical Officer

    Thanks for your message. We have expertise and experience in Cyber Security domain including ISO 270...

    4.8 Hours Later
  2. Profile Picture

    Norman |Consultant

    Sir, There is no detail visible in your inquiry on Zintro thus difficult to know what to respond. I ...

    7.2 Hours Later
  3. Profile Picture

    Bryan |InfoSec

    I can help in external security. ...

    7.8 Hours Later
+6 Other Responses
Area Icon

Data Security Law

We are a leading webinar publisher (wholly owned by the financial times) and an authorized zintro partner. We are seeking an expert to lead a 60-minute webinar on the topic of “what insurance lawyers need to know about coverage for data security breaches”. The speaker will be responsible for compiling a basic 15-20-slide powerpoint for the presentation (template provided) and being available for the live recording or for a pre-record prior to that date. Speakers will be asked to sign a waiver, release and consent form that requires the speaker to provide their intellectual property for the purposes of presenting with us. While we will maintain a copyright of the final product (powerpoint with our logos and recording of presentation), we will not hold a copyright on the intellectual property provided by the speaker and the speaker will be free to use such concepts in the future. The chosen speaker will receive compensation and tremendous professional exposure. Speakers will not be asked to pay any fees. Our lecturers have come from: mit sloan, sap, columbia university, harvard business review, cornell university, ernst & young, deloitte, kpmg, new york university, and many more top organizations. For additional requirements or information, please send your resume and any relevant information.

  1. Profile Picture

    Shankar |Security Solutions Strategist

    i am interested to ***** a speaker in your webinar. I have been a speaker in various engage...

    19.9 Hours Later
  2. Profile Picture

    Yazan |Freelance Consultant/Project Manager

    Dear , I am interested as I have the relevant experience and *****l needed. Best rega...

    3.6 Days Later
+2 Other Responses
Area Icon

Security Intelligence

We are looking to speak to customers of exabeam. Exabeam is a security intelligence solution that leverages existing log data to quickly detect modern cyber attacks, prioritize security incidents, and accelerate effective response. Some current customers of exabeam are adp, black rock, legg mason, barclays, td ameritrade, gap, levi’s, optiv, & ebay. We are looking for customers in the u.S. Only. The typical titles would be director/vp of security, director of soc, ciso etc. This would be for a 1 hour paid phone consultation.

  1. Profile Picture

    Russell |Analyst

    Fee negotiable...

    26 Minutes Later
  2. Profile Picture

    Anand |Managing Partner

    I am a practising security consultant. I hav ...

    10.5 Hours Later
  3. Profile Picture

    Gaurav |Pharmaceutical Quality Systems Consultan

    I have twenty years of Industry experience and knowledge and can help you with this *****...

    6.8 Days Later
+26 Other Responses
Area Icon

Europe Technical Security Service

Hi. Need expert insights for technical security services in northern and central europe. High level information is required on industry practice, market trends, operating costs. Kindly get in touch. Thanks :)

  1. Profile Picture

    Tarun |Partner

    Hi, I have all the relevant inputs on this for Europe. Please write to me for discussion. Regards...

    3.9 Hours Later
  2. Profile Picture

    Shah |Management Consultant

    need to know a bit more of what is required...

    4.8 Hours Later
+2 Other Responses
Area Icon

It Asset Management

My company is interested in hiring a consultant with 10+ years of experience in the it asset management space. With a focus on itad and data destruction.

  1. Profile Picture

    Joe |CEO / VP Sales / Director Level

    Only if the ITAM company is an E Steward Certified / BAN company. If so, interested in learning mor...

    4.4 Hours Later
  2. Profile Picture

    Darrel |Partner

    I mainly focus on food and beverage. Please let me know if it is food and beverage...

    1.2 Days Later
+3 Other Responses
Area Icon

Computer Security

Looking for analysts/experts to interview for an article about what companies should expect to pay for computing-related security expenses (i.E., software and services, not staff), based on company size, data security needs, and complexity of systems in place?

  1. Profile Picture

    Emad Sayed |Information Security Consultant

    I would be interested. Can you send me detailed *****t the work?...

    6 Minutes Later
  2. Profile Picture

    Richard |Founder

    I am interested in your Computer Security Press Interview Inquiry for coyotemoon....

    7 Minutes Later
  3. Profile Picture

    Michael |Head of Cyber and Co-Founder

    I can definitely assist you on this....

    17 Minutes Later
+40 Other Responses
Area Icon

It Asset Management And Device Disposal Services

Hi , we have following requirements on it asset management and device disposal services in us, europe, apac, latam and mea: 1. International standards/ policies for devices disposal a. What are the process for collection and wipe out of devices? B. Are there any policies in terms of international security? If yes, what are the international (local/regional) standards that a service provider should have? 2. Industry best practices for it asset management and disposal a. How companies maintain and dispose it devices (mobiles, laptops, printers and tablets)? B. How many suppliers do they engage with? Can companies engage one global supplier? Thanks

  1. Profile Picture

    Hoppy |Consultant

    Hi, I have over 25 years experience in the waste management sector, including cleaning, recycling & ...

    4.9 Hours Later
  2. Profile Picture

    Stephen |Service Manager

    I have experience in this area and would be open to helping out...

    18.8 Hours Later
  3. Profile Picture

    Richard |Environmental Engineering Consultant

    I am capable to researching publicly available ***** develop responses to your concerns [li...

    1.7 Days Later
+13 Other Responses
Area Icon

Cyber Security

Looking for a certifed security consultant to assist the nist 800-53 security team acheive compliance in 6 months. The assitance would be part-time as a subject matter expert.

  1. Profile Picture

    Jeffrey |Chief Intelligence Officer

    19 years NIST and FISMA experience. ...

    55 Minutes Later
  2. Profile Picture

    Robert |CEO

    I am interested in working on this project. I have 25 years of experience implementing NIST guideli...

    1.3 Hours Later
  3. Profile Picture

    Yusuf |Founder/Owner, CEO and Principal Consult

    I am interested, in consulting for this project. I am CISSP, CISM, SAN-GNSA, and CEH certified. My b...

    8.8 Hours Later
+5 Other Responses
See More Inquiries

Top Lost Data Destruction Experts

See More Experts
Share
LinkedInTwitterFacebookGoogle+