Affordably Source Pfishing Experts and Industry Participants for Market Research, Diligence and Projects

Submit an anonymous Project Description -- Start receiving responses within a few hours

Have a need? Explain it here






How Zintro Works

  1. 1. Provide a clear description of your needs and your expectations of an expert, consultant or job candidate and Zintro will match it with the most relevant professionals in our platform.
  2. 2. Within a day or two typically 6 - 12 Experts, who have opted-in, will contact you with a brief explanation of their qualifications and how they can help.
  3. 3. You can communicate back and forth, qualify each other, connect and pay fees to Experts through Zintro.
  4. Zintro is free, anonymous and without obligation.

Loved by Thousands

Loved by thousands logos

Need Help?A phone icon1-877-236-7016

Recent Pfishing Inquiries

Area Icon

Computer Security In Insurance

Looking for experts in cyber security insurance law

  1. Profile Picture

    Rahul |Chief Technical Officer

    Thanks for your message. We have expertise and experience in Cyber Security domain including ISO 270...

    4.8 Hours Later
  2. Profile Picture

    Norman |Consultant

    Sir, There is no detail visible in your inquiry on Zintro thus difficult to know what to respond. I ...

    7.2 Hours Later
  3. Profile Picture

    Bryan |InfoSec

    I can help in external security. ...

    7.8 Hours Later
+6 Other Responses
Area Icon

Network Security Testing Market

We are a well established investment firm based in the us. We're looking to do some market research in the penetration testing space and would like to speak to people who have assessed, purchased, or used vendors such as core security, cigital, netspi or digital defense. We’d prefer to speak to those in the financial or retail verticals if possible. Below are some questions to ask prospective experts to help us select the ones we’d like to engage with: 1. Are you a key decision maker who manages or oversees penetration testing? 2. Do your penetration testing needs focus more around network security or application security, or both? 3. Have you chosen to utilize a penetration testing service such as core security, cigital, netspi or digital defense? 4. Please state your current title and employer. Thank you.

  1. Profile Picture

    Richard |Executive Chair

    I've sponsored and purchased both network *****ing and *****rity assessment s...

    8.3 Hours Later
  2. Profile Picture

    Anand |Managing Partner

    Have been a decision maker for the *****ing for many of the customers. Have worked with C...

    10.7 Hours Later
  3. Profile Picture

    John |Director, IT Security & Controls

    As the CISO for a publicly traded global medical devi ce manufacturer, I'm the key decision maker an...

    4.7 Days Later
+11 Other Responses
Area Icon

Hr Financial And Cyber Security

Hello!   we are a global market research firm, currently looking for experts who can assist us gain a detailed understanding of the ”consulting market in us” with focus on following a)      hr consulting b)      financial consulting c)       cyber security consulting   list of requirements: ·         market size & growth (*only for financial consulting) ·         segmentation on the basis of services and end-use (*only for financial consulting)   ·         top suppliers (mainstream and diverse) and their market share (hr, financial & cyber security) ·         % contribution of supplier diversity on the overall spend  (hr, financial & cyber security) ·         are there any barriers in leveraging diverse suppliers? (hr, financial & cyber security) ·         case studies of leading banking & financial institutions using diverse suppliers for consulting services (hr, financial & cyber security) ·         leading sourcing practices - how leading companies source these categories? (engagement model, partnerships/supplier relationships, contract structures etc.) - (hr, financial & cyber security)   the main focus of our study is to identify diverse suppliers (minority-owned, women owned, veteran owned, lgbt-owned, service disabled veteran owned) in this space. We would like to engage via phone consult with experts knowledgeable about consulting service providers. Ideal candidates should have deep knowledge of industry trends and practices, key suppliers, industry partnerships, best practices etc.   we are looking for a phone consult to discuss the points mentioned above. Kindly drop in a note with your cv/relevant experience in the consulting industry, if you are interested to proceed.   best regards, thomas

  1. Profile Picture

    Shaun |Vice President

    Hi We have completed a similar project recently. Please share further details. Thanks Shaun...

    9.7 Hours Later
  2. Profile Picture

    Shyam |CFO Advisor

    Deep knowledge within HR Financial and cyber consultuing space and can assist...

    12.4 Hours Later
  3. Profile Picture

    Gautam |HR Expert

    Dear sir, I am intersted to join. Gautam Chaudhury *****...

    14 Hours Later
+14 Other Responses
Area Icon

Cyber Security

The zintro blog needs you!i’m looking for your expert opinion on the news below and a written response that is one to three paragraphs long.Your response may be used in an article that i will write and post on the zintro site.You will be named in the article and a link to your profile will be included.Your contribution is voluntary(there is no direct payment involved,but you will get lots of traffic to your expert profile).If interested,please send me your response via znotes within the next few days. The washington post reported on a program called prism,which gives the national security agency direct access to internet companies’ servers.Google and apple denied that relationship with the government.Facebook says that it doesn’t provide the government with direct access to its servers and microsoft claims that it only provides customer data when there is a legal order.What’s the extent of the nsa’s reach into the communications in the us? This is a great marketing opportunity to get your name and expert opinion published on our blog. Here is a sample: http://blog.Zintro.Com/2012/01/16/keystone-xl-pipeline-pros-and-cons/ please include your full name,we will link it to your profile,getting you more presence on zintro.If you have any questions,please let me know. Thank you! idil kan

  1. Profile Picture

    Charles |Chief Executive Officer

    Hello Idil, Thank you for your inquiry. I am very interested to ***** this project. Plea...

    5 Minutes Later
  2. Profile Picture

    Robert |systems engineering

    not interested...

    24 Minutes Later
  3. Profile Picture

    Ken |Director

    I am interested in contributing....

    1.9 Hours Later
+6 Other Responses
Area Icon

Computer Security

Assist with protocols and develop collection tools; assist with data analysis, interpretation, reports; assist in writing final reports

  1. Profile Picture

    Lito |IT Consultant

    Hello I am an experienced *****yst and I am familiar with analysis tools. Would be good to talk,...

    6.7 Days Later
  2. Profile Picture

    Geoffrey |Consultant

    Have only now seen this Inquiry (21 Dec)! From limited *****lied, I doubt that my "data ...

    16 Days Later
+2 Other Responses
Area Icon

Security Intelligence

We are looking to speak to customers of exabeam. Exabeam is a security intelligence solution that leverages existing log data to quickly detect modern cyber attacks, prioritize security incidents, and accelerate effective response. Some current customers of exabeam are adp, black rock, legg mason, barclays, td ameritrade, gap, levi’s, optiv, & ebay. We are looking for customers in the u.S. Only. The typical titles would be director/vp of security, director of soc, ciso etc. This would be for a 1 hour paid phone consultation.

  1. Profile Picture

    Russell |Analyst

    Fee negotiable...

    26 Minutes Later
  2. Profile Picture

    Anand |Managing Partner

    I am a practising security consultant. I hav ...

    10.5 Hours Later
  3. Profile Picture

    Gaurav |Pharmaceutical Quality Systems Consultan

    I have twenty years of Industry experience and knowledge and can help you with this *****...

    6.8 Days Later
+26 Other Responses
Area Icon

It Security

I am looking for an it consultant with the following it security clearance certifications who is available to work on site (travel) and remotely as needed. Cism certified information security manager cisa certified information systems auditor cgeit certified in the governance of enterprise it

  1. Profile Picture

    Ariben |Manager Information Security

    Hi, My nearly 14 years of experience in Infrastructure Management, Security Management, Cyber Foren...

    12 Minutes Later
  2. Profile Picture

    Rohit |Managing Partner & Director

    Hi we can assist in your requirements. I represent a firm of management consultants and we have an a...

    36 Minutes Later
  3. Profile Picture

    Chet |CISO

    Do not have the CGEIT but could obtain it quickly. Have CISSP, CISM, CISA, GSNA, ITIL and a expired...

    7.4 Hours Later
+16 Other Responses
Area Icon

Cyber Security

Subject: consulting opportunity re: cyber security description: seeking subject matter experts (smes) to assess novel intellectual property (ip) in the above field, and determine its commercial viability (i.E., licensing, new products/services, and/or start-up opportunities. -the assessments will be brief engagements, 2-6 hours and on a intermittent basis, e.G. One/month or once every couple months ... The engagements are dependent on frequency of clients submitting applications to be assessed -work will be online and telephone. Qualifications: bachelor’s degree, minimum 10+ years in the field, with broad overview of the cyber security field. Preferably u.S.-based consultancies. Areas of expertise: looking for smes with strong r&d/technical background, and smes with direct experience in product development and commercialization in the field, including entrepreneurial experience. (or combination of technical side and commercialization side

  1. Profile Picture

    Dennis |President

    I can *****tographic algorithms, not necessarily to declare them safe and effective, but to ...

    21 Minutes Later
  2. Profile Picture

    Charles |Chief Executive Officer

    Hello, Thank you for your inquiry regarding Cyber Security and SMEs. I believe I can assist you wi...

    2.1 Hours Later
  3. Profile Picture

    Narendra |Director

    Hello, We are a consulting company specialising in Cyber Security *****liance and Ne...

    14.1 Hours Later
+7 Other Responses
Area Icon

Computer Security

Looking for analysts/experts to interview for an article about what companies should expect to pay for computing-related security expenses (i.E., software and services, not staff), based on company size, data security needs, and complexity of systems in place?

  1. Profile Picture

    Emad Sayed |Information Security Consultant

    I would be interested. Can you send me detailed *****t the work?...

    6 Minutes Later
  2. Profile Picture

    Richard |Founder

    I am interested in your Computer Security Press Interview Inquiry for coyotemoon....

    7 Minutes Later
  3. Profile Picture

    Michael |Head of Cyber and Co-Founder

    I can definitely assist you on this....

    17 Minutes Later
+40 Other Responses
Area Icon

Security Policy Orchestration

Looking for experts in the network security policy management & orchestration space. A 30 minute telephone consults is required. Preferably looking for us based candidates. Experts should know the us market in this area well, the different solutions available, have a good understanding of large enterprises need for such a solution, along with the key market risks and threats for these vendors.

  1. Profile Picture

    Aaron |Zintro Expert

    Depending on your specific questions, I would love to help. Let me know if you'd like to set up a ca...

    3.5 Hours Later
  2. Profile Picture

    Scottard |Executive Security Strategist

    Hi, Saw your inquiry, I would like to assist you. I have over 20 years writing and automating s...

    3.5 Hours Later
  3. Profile Picture

    Ubaid |Expert Senior Consultant

    Hi, I can help you, I have more than 10 years of experiences in *****rity , technical sec...

    3.9 Hours Later
+19 Other Responses
Area Icon

Europe Technical Security Service

Hi. Need expert insights for technical security services in northern and central europe. High level information is required on industry practice, market trends, operating costs. Kindly get in touch. Thanks :)

  1. Profile Picture

    Tarun |Partner

    Hi, I have all the relevant inputs on this for Europe. Please write to me for discussion. Regards...

    3.9 Hours Later
  2. Profile Picture

    Shah |Management Consultant

    need to know a bit more of what is required...

    4.8 Hours Later
+2 Other Responses
Area Icon

Information Security And Data Privacy

We are a leading webinar publisher (wholly owned by the financial times)and a authorized zintro partner. We are seeking an expert to lead a 60-minute webinar on the topic of “what ceos need to know about the legal issues surrounding information security and data privacy, and how to protect your company”. The speaker will be responsible for compiling a basic 15-20-slide powerpoint for the presentation (template provided) and being available for the live recording or for a pre-record prior to that date. Speakers will be asked to sign a waiver, release and consent form that requires the speaker to provide their intellectual property for the purposes of presenting with us. While we will maintain a copyright of the final product (powerpoint with our logos and recording of presentation), we will not hold a copyright on the intellectual property provided by the speaker and the speaker will be free to use such concepts in the future. The chosen speaker will receive compensation and tremendous professional exposure. Speakers will not be asked to pay any fees. Our lecturers have come from: mit sloan, sap, columbia university, harvard business review, cornell university, ernst & young, deloitte, kpmg, new york university, and many more top organizations.

  1. Profile Picture

    Alan |Senior Manager, Information Security

    What is the financial compensation? ...

    8.4 Hours Later
  2. Profile Picture

    David |Managing Director, Engineer, Business Co

    Currently I am in the process of having an *****rity lead implementer course accredited t...

    16.1 Hours Later
  3. Profile Picture

    Shankar |Security Solutions Strategist

    i am interested to ***** a speaker in your webinar. I have been a speaker in various engage...

    20.3 Hours Later
+6 Other Responses
See More Inquiries

In the field of computer security, phishing is the criminally fraudulent process of attempting to acquire sensitive information such as usernames, passwords and credit card details by masquerading as a trustworthy entity in an electronic communication. Communications purporting to be from popular social web sites (YouTube, Facebook, MySpace, Windows Live Messenger), auction sites (eBay), online banks (Wells Fargo, Bank of America, Chase), online payment processors (PayPal), or IT Administrators (Yahoo, ISPs, corporate) are commonly used to lure the unsuspecting. Phishing is typically carried out by e-mail or instant messaging,[1] and it often directs users to enter details at a fake website whose look and feel are almost identical to the legitimate one. Even when using server authentication, it may require skill to detect that the website is fake. Phishing is an example of social engineering techniques used to fool users,[2] and exploits the poor usability of current web security technologies.[3] Attempts to deal with the growing number of reported phishing incidents include legislation, user training, public awareness, and technical security measures.

Top Pfishing Experts

See More Experts
Share
LinkedInTwitterFacebookGoogle+