Source Sas 70 Audit Experts for your Project, Phone Consult or Job

Submit an anonymous Inquiry -- Start receiving responses within a few hours

Have a need? Explain it here

An eye iconForgot password?
Submit Inquiry

By clicking Submit Inquiry you agree to our TermsVIEW

or Request a Demo

How Zintro Works

  1. 1. Provide a brief description of your needs for a Project, Phone Consult or Job and Zintro will match it with the most relevant Experts in our platform.
  2. 2. Within a day or two typically 6 - 12 Experts, who have opted-in, will contact you with a brief explanation of their qualifications and how they can help.
  3. 3. You can communicate back and forth, qualify each other, connect and pay fees to Experts through Zintro.
  4. Zintro is free, anonymous and without obligation.

Need Help?A phone icon1-877-236-7016

Recent Sas 70 Audit Inquiries

Area Icon

Computer Security In Insurance

Looking for experts in cyber security insurance law

  1. Profile Picture

    Rahul |Chief Technical Officer

    Thanks for your message. We have expertise and experience in Cyber Security domain including ISO 270...

    4.8 Hours Later
  2. Profile Picture

    Norman |Consultant

    Sir, There is no detail visible in your inquiry on Zintro thus difficult to know what to respond. I ...

    7.2 Hours Later
  3. Profile Picture

    Bryan |InfoSec

    I can help in external security. ...

    7.8 Hours Later
+6 Other Responses
Area Icon

Computer Security

The zintro blog needs you! i am looking for your expert opinion on the news below and a written response that is one to three paragraphs long. Your response may be used in an article that i will write and post on the zintro site. You will be named in the article and a link to your profile will be included. Your contribution is voluntary (there is no direct payment involved but you will get lots of traffic to your profile). If interested please send me your response via znotes within the next few days. Programmer khalil shreateh posted a notice on zuckerberg's wall pointing out the security vulnerability on facebook that allows people to post on anyone's wall. Technology companies have become more open to help from independent hackers and facebook encourages reports about security vulnerabilities. Facebook pays at least $500 to people who report security problems but shreateh's account was temporarily disabled. How should computer security be handled? This is a great marketing opportunity to get your name and expert opinion published on our blog. Here is a sample: http://blog.Zintro.Com/2012/01/16/keystone-xl-pipeline-pros-and-cons/ please include your full name, we will link it to your profile, getting you more presence on zintro. If you have any questions, let me know. Thank you! idil kan

  1. Profile Picture

    Burton |Retired psychologist has taken an intere

    When I was using a Windows-based system with 300,000 known viruses and was invaded by hackers, every...

    42 Minutes Later
  2. Profile Picture

    Lindsey |Experienced MBA Marketer

    Hi Idil, Here is my response, thanks for the consideration! Computer and specifically internet se...

    1.1 Days Later
+2 Other Responses
Area Icon

Europe Technical Security Service

Hi. Need expert insights for technical security services in northern and central europe. High level information is required on industry practice, market trends, operating costs. Kindly get in touch. Thanks :)

  1. Profile Picture

    Tarun |Partner

    Hi, I have all the relevant inputs on this for Europe. Please write to me for discussion. Regards...

    3.9 Hours Later
  2. Profile Picture

    Shah |Management Consultant

    need to know a bit more of what is required...

    4.8 Hours Later
+2 Other Responses
Area Icon

Cyber Security

The zintro blog needs you!i’m looking for your expert opinion on the news below and a written response that is one to three paragraphs long.Your response may be used in an article that i will write and post on the zintro site.You will be named in the article and a link to your profile will be included.Your contribution is voluntary(there is no direct payment involved,but you will get lots of traffic to your expert profile).If interested,please send me your response via znotes within the next few days. The washington post reported on a program called prism,which gives the national security agency direct access to internet companies’ servers.Google and apple denied that relationship with the government.Facebook says that it doesn’t provide the government with direct access to its servers and microsoft claims that it only provides customer data when there is a legal order.What’s the extent of the nsa’s reach into the communications in the us? This is a great marketing opportunity to get your name and expert opinion published on our blog. Here is a sample: http://blog.Zintro.Com/2012/01/16/keystone-xl-pipeline-pros-and-cons/ please include your full name,we will link it to your profile,getting you more presence on zintro.If you have any questions,please let me know. Thank you! idil kan

  1. Profile Picture

    Chip |Managing Partner and Director of Researc

    Hello Idil, Thank you for your inquiry. I am very interested to ***** this project. Plea...

    5 Minutes Later
  2. Profile Picture

    Robert |systems engineering

    not interested...

    24 Minutes Later
  3. Profile Picture

    Jennifer |Consultant

    Hi Robert Myers, Thank you for your response. As I emphasized in the inquiry, sharing your opinion ...

    35 Minutes Later
+9 Other Responses
Area Icon

Computer Security

Trusted platform module

  1. Profile Picture

    jeff |consultant

    What types of consulting do you need with regard to Trusted Computing Modules? I may be able to be ...

    52 Minutes Later
  2. Profile Picture

    John |Sr. Usability Engineering Consultant

    What is the task you are looking for support with? Obviously ***** TPM, but otherwise this is t...

    1.2 Hours Later
  3. Profile Picture

    Mario |IT consultant and solution provider

    Hi, Can you give me more details about your inquiry? regards...

    1 Day Later
+5 Other Responses
Area Icon

Computer Security

Looking for analysts/experts to interview for an article about what companies should expect to pay for computing-related security expenses (i.E., software and services, not staff), based on company size, data security needs, and complexity of systems in place?

  1. Profile Picture

    Emad Sayed |Information Security Consultant

    I would be interested. Can you send me detailed *****t the work?...

    6 Minutes Later
  2. Profile Picture

    Richard |Founder

    I am interested in your Computer Security Press Interview Inquiry for coyotemoon....

    7 Minutes Later
  3. Profile Picture

    Michael |Ethical Hacker/InfoSec Consultant

    I can definitely assist you on this....

    17 Minutes Later
+40 Other Responses
Area Icon

Hr Financial And Cyber Security

Hello!   we are a global market research firm, currently looking for experts who can assist us gain a detailed understanding of the ”consulting market in us” with focus on following a)      hr consulting b)      financial consulting c)       cyber security consulting   list of requirements: ·         market size & growth (*only for financial consulting) ·         segmentation on the basis of services and end-use (*only for financial consulting)   ·         top suppliers (mainstream and diverse) and their market share (hr, financial & cyber security) ·         % contribution of supplier diversity on the overall spend  (hr, financial & cyber security) ·         are there any barriers in leveraging diverse suppliers? (hr, financial & cyber security) ·         case studies of leading banking & financial institutions using diverse suppliers for consulting services (hr, financial & cyber security) ·         leading sourcing practices - how leading companies source these categories? (engagement model, partnerships/supplier relationships, contract structures etc.) - (hr, financial & cyber security)   the main focus of our study is to identify diverse suppliers (minority-owned, women owned, veteran owned, lgbt-owned, service disabled veteran owned) in this space. We would like to engage via phone consult with experts knowledgeable about consulting service providers. Ideal candidates should have deep knowledge of industry trends and practices, key suppliers, industry partnerships, best practices etc.   we are looking for a phone consult to discuss the points mentioned above. Kindly drop in a note with your cv/relevant experience in the consulting industry, if you are interested to proceed.   best regards, thomas

  1. Profile Picture

    Shaun |Director

    9.7 Hours Later
  2. Profile Picture

    Shyam |VP of Finance

    Deep knowledge within HR Financial and cyber consultuing space and can assist...

    12.4 Hours Later
  3. Profile Picture

    Gautam |HR Expert

    14 Hours Later
+36 Other Responses
Area Icon

Cyber Security

The zintro blog needs you!i am looking for your expert opinion on the news below.Your response may be used in an article that i will write and post on the zintro site.Your contribution is voluntary,and while there is no direct payment involved,getting your name and expert opinion published on our blog is a great marketing opportunity that will increase the amount of traffic to your expert profile. As a featured expert,you will be named and a link to your profile will be included.Here is a sample: http://blog.Zintro.Com/2012/01/16/keystone-xl-pipeline-pros-and-cons/ if interested,please send me your one-to-three paragraph response to the following news via znotes within the next few days: the guardian exposed the nsa’s most widespread surveillance program: xkeyscore. According to glenn greenwald, the program can store any information that can be extracted, which includes “nearly everything a typical user does on the internet,” and can also provide real-time surveillance of a target's internet activity for approximately 150 sites and 700 servers worldwide.Is this an invasion of privacy or a necessary security measure? Please include your full name so we can link it to your expert profile and get you more presence on zintro.Let me know if you have any questions. Thank you! gabriela meller

  1. Profile Picture

    Michael |Owner

    As a NYS licensed psychologist, certified forensic consultant and author of the new ***** ...

    1.2 Hours Later
  2. Profile Picture

    Dennis |President

    Do not believe what the NSA or supposed NSA whistleblowers tell you because 1) the NSA lies on purpo...

    3.1 Hours Later
  3. Profile Picture

    Gabriela |Blog Writer

    Hi Michael, I write articles for the Zintro blog and want to thank you for your time and interest!...

    19.8 Hours Later
+8 Other Responses
Area Icon

Computer Security

Assist with protocols and develop collection tools; assist with data analysis, interpretation, reports; assist in writing final reports

  1. Profile Picture

    Lito |IT Consultant

    Hello I am an experienced *****yst and I am familiar with analysis tools. Would be good to talk,...

    6.7 Days Later
  2. Profile Picture

    Geoffrey |Consultant

    Have only now seen this Inquiry (21 Dec)! From limited *****lied, I doubt that my "data ...

    16 Days Later
+2 Other Responses
Area Icon

Acf2

Acf2 contractor required for 12 months contract. Assist with secure audit report generation, configuration of security controls. Must be an acf2 expert. Good day rates apply.

  1. Profile Picture

    Arup Kanti |IT Support Engineer

    ae.linkedin.com/in/arupbissan/...

    62.9 Days Later
+1 Other Responses
Area Icon

Information Security

Hi we are currently looking for partners,associates in the field of information security to expand our business. We have been into this for last 8 years and are looking for big time expansion by tying up with interested organizations.

  1. Profile Picture

    Mike |Senior Consultant

    Where is the location?...

    12 Minutes Later
  2. Profile Picture

    Ajay |Principal Consultant

    Hello, My name is Ajay Porus and I have started my new firm in field of *****rity recent...

    59 Minutes Later
  3. Profile Picture

    krag |CISM, CGEIT

    Having been involved in *****rity for better than three decades, I'm always interested in...

    1.1 Hours Later
+21 Other Responses
Area Icon

It Security

I am looking for an it consultant with the following it security clearance certifications who is available to work on site (travel) and remotely as needed. Cism certified information security manager cisa certified information systems auditor cgeit certified in the governance of enterprise it

  1. Profile Picture

    Ariben |Manager Information Security

    Hi, My nearly 14 years of experience in Infrastructure Management, Security Management, Cyber Foren...

    12 Minutes Later
  2. Profile Picture

    Rohit |Managing Partner & Director

    Hi we can assist in your requirements. I represent a firm of management consultants and we have an a...

    36 Minutes Later
  3. Profile Picture

    Chet |CISO

    Do not have the CGEIT but could obtain it quickly. Have CISSP, CISM, CISA, GSNA, ITIL and a expired...

    7.4 Hours Later
+16 Other Responses
See More Inquiries

Top Sas 70 Audit Experts

See More Experts
Share
LinkedInTwitterFacebookGoogle+