Affordably Source Securities Fraud Experts and Industry Participants for Market Research, Diligence and Projects

Submit an anonymous Project Description -- Start receiving responses within a few hours

Have a need? Explain it here






How Zintro Works

  1. 1. Provide a clear description of your needs and your expectations of an expert, consultant or job candidate and Zintro will match it with the most relevant professionals in our platform.
  2. 2. Within a day or two typically 6 - 12 Experts, who have opted-in, will contact you with a brief explanation of their qualifications and how they can help.
  3. 3. You can communicate back and forth, qualify each other, connect and pay fees to Experts through Zintro.
  4. Zintro is free, anonymous and without obligation.

Loved by Thousands

Loved by thousands logos

Need Help?A phone icon1-877-236-7016

Recent Securities Fraud Inquiries

Area Icon

Securities Fraud

I am a dissident shareholder (45%) of a private company that is being sold despite my opposition for about $10mm in milestone payments that i doubt i will ever see. I think the company/board (sole director that will be ceo after transaction) has misrepresented sale to other shareholders to get their support. Does this constitute securities fraud? Need legal expert advice for securities fraud /10b5 to support litigator who is not an expert in this area.

  1. Profile Picture

    Ronald |Managing Director

    I have been involved as an expert witness on numerous occasions on similar *****, as recently as l...

    3 Hours Later
  2. Profile Picture

    Mark |CEO, Threat & Fraud Assessment

    First, I am exceptionally familiar with SEC and *****stment frauds. For initial information I...

    7.6 Hours Later
  3. Profile Picture

    Jonathan |Principal Consultant

    If you can prove the Company gave different ***** different shareholders, yes, you can buil...

    2.7 Days Later
+6 Other Responses
Area Icon

Churning Case

Looking for interest rate futures expert for churning case

  1. Profile Picture

    Richard |president

    AM familiar with futures trading in most asset classes..equities, treasuries, currencies, etc. Churn...

    28 Minutes Later
  2. Profile Picture

    Dave |CEO

    Since 1984 we have provide for legal support services in a professional capacity for FCM, CPO, CTA, ...

    1 Hour Later
  3. Profile Picture

    W |

    I'm sorry, however my skill sets do not ***** requirements....

    22.3 Hours Later
+4 Other Responses
Area Icon

Security Industry

We are currently working with our partner; a leading consulting company in seoul focused on the security industry and would like to speak with experts who would contribute their opinion on the industry. Some sample questions on the industry would be: - overall market view: major market trend, market size (how does the company estimate the security market size; methodology or logic) - market segmentation: market segmentations (how did the company divide the market, and their rationale behind it) - value proposition: customer needs per each segment - 4p (price, product, promotion, place): major product/services and marketing strategies/actions per each segment - enabler: incentive system, kpi, organization structure (whether it is driven by product cut or customer cut) we are mainly focusing our interest on the following company : adt, secom, alsok, s1, kt telecop, adt caps, niscayah, prosegur, thales, utc fire and security. Best regards, maria

  1. Profile Picture

    Michael |Senior Systems Consultant

    Thank you for your inquiry, I may be able to help you find your answers. I have been in the securit...

    2.8 Hours Later
  2. Profile Picture

    James |Technology Director

    I am well versed in Korean security market with contacts. I have visited Korea myself . Search surve...

    7.8 Hours Later
  3. Profile Picture

    Charles |Chief Executive Officer

    Hello, I'm interested to assist you with your inquiry and project. Please advise of your project de...

    24.2 Days Later
+6 Other Responses
Area Icon

Anti-fraud

I am a journalist writing an article for a large uk-based publication that will look at the vulnerability of everyday objects that are now being built with technological and online capabilities; otherwise known as the 'internet of things'. The key to my piece is assessing what the most vulnerable internet of things technologies are in terms of exposing users to fraud (like identify theft, monitoring of their behaviour, accessing bank accounts where devices are linked to use-based spending, monitoring the geo-location of victims to make frauds more effective – say by email deception, understanding their consumer behaviour – again to make them targets for fraud attacks and scams, etc.). Would anyone have any knowledge on this topic and willing to speak with me?

  1. Profile Picture

    Ed |Consultant

    Have a fair amount of knowledge on this subject and did a blog on it a few years ago (fraudwar.blogs...

    1.2 Hours Later
  2. Profile Picture

    M |

    Hi, I'm deeply experienced in this area, built fraud systems for global payment schemes and banks, r...

    5 Hours Later
  3. Profile Picture

    Dora |Marketing Manager

    UK is an area from that i am alert of internet scam & cheat!!! ...

    7.7 Hours Later
+5 Other Responses
Area Icon

Debit Card Fraud

I been the victim of debt card fraud my debit card was stolen and used for transactions that i did not do but my bank said they did research and found no evidence of fraud but thats not possible because i did not make those transactions

  1. Profile Picture

    Kevin |Fraud Prevention Consultant

    This is a straightforward investigation, I had the exact same thing happen to me in the UK. I can ad...

    9 Minutes Later
  2. Profile Picture

    Howard |CTO

    This is an issue with Debit Cards where with a Credit Card you would have been protected. What you ...

    1.7 Hours Later
  3. Profile Picture

    Alan |Principal Advisor

    Hi I have extensive fraud and *****rience within financial institutions including card...

    2.5 Days Later
+8 Other Responses
Area Icon

Telecommunications/cable Industry

Scope: the main objective is to understand how operators/service providers are adopting artificial intelligence (ai). It will cover understanding details on what ai is being used for, pain-points addressed by using ai, how it is being implemented and which organizations or partners are being used to deliver it. Interviews to be conducted with experts who work in following companies only: at&t, t-mobile, dish, bell, cox communications industry: telecommunications/cable companies focus geography: usa, canada type of interviews: telephonic interview duration: 60 minutes timeline: before 8th march number of experts: 4 expert job title(s): senior executives having experience of using ai services and solutions and have knowledge of network side of the organization. E.G. • senior director / head of network planning and design • senior vp / head of network operations • director of strategy & innovation • director, artificial intelligence • director - network engineering • cto / cio • associate director, advanced analytics • senior vice president - product & technology • director - technology, chief data office screening questions (must qualify below mentioned criteria): must have knowledge of at least 5 of the following ai-specific use cases: • network management and operations • cloud and it operations • enterprise operations (sw-wan, iot, edge) • network design and optimization • ran spectrum and traffic management including oran/smo • network roll out • customer experience management • service assurance • security/fraud and revenue assurance • custom use case • other: monetization, financial forecasting, hr, bid/contract management, marketing, billing/charging, smartbots, other (specify) key pointers for the discussion: 1) where is ai being invested in by operators today and where is it expected to be in the future? 2) which use cases and business functions are using ai and what pain-points are they addressing? 3) which use cases offer the most significant value to the operators? 4) how do operators support their ai projects, what partners do they have? 5) what type of service/product pricing models are best for operators and is it changing? 6) do operators expect spending on ai to increase or decrease in the future?

  1. Profile Picture

    Ean Chukwuemeka |Oracle for Startups, Founder/Participant

    I am an A.I. Specialist and Chief A.I. Architect. I work with Fortune 500 companies down to small bu...

    3.9 Hours Later
  2. Profile Picture

    Jace |Chief Technology Officer (CTO) & SVP Pro

    I'm a long time ***** user of A/I. My history of experience goes back to the early 1990s. I'...

    3.9 Hours Later
  3. Profile Picture

    Lee |Director of IT Operations

    We have a few use cases where we currently use AI. The first is on radiology images and screening f...

    4.5 Hours Later
+50 Other Responses
Area Icon

Online Fraud

I work for one of the top pr firms in the world. We are looking for an online security expert on behalf of a client.

  1. Profile Picture

    Vittal |Member

    Hi, I got your inquiry from Zintro. Would be glad to assist with your requirement. My *****il...

    9 Minutes Later
  2. Profile Picture

    Crypto |Founder

    Yes. I am interested in looking at the assist. Can you send me details on what way the client needs ...

    18 Minutes Later
  3. Profile Picture

    Chris |Security Manager

    Hi, Please send more details on *****...

    18 Minutes Later
+13 Other Responses
Area Icon

High Security Combo Locks Market

We are interested in security experts who can speak about high-security combo locks. Ideally, from the following perspectives 1. Security experts - from manufacturers of high-security combo locks 1a. Oem engineers/product managers for pharmacy and hospital safes/lockers (anywhere that drugs are stored) 1b. Oem engineers/product managers for truck trailers & specialty automotive if they can speak to the type of locks they install 1c. Experts in transportation security (cargo shipping, facilities security, trucking security) 1d. Transit facilities security contractors (the people who advice on locks for things like airport jetway doors) 2. Healthcare storage & facilities 2a. Purchasing managers at large healthcare facilities 2b. Pharmacy location managers 3. Cargo container manufacturers 3a.Shipping containter manufacturers 3b.Insurance managers / large shipping company logistics execs 4. Trucking security 4a. Product managers/engineers for truck trailers, specialty automotive 4b. After-market specialists - gear security 5. Transit facilities 5a.Transit facilities securities contractors (airports, ports, truck stations) 5b. Transit facilities managers this would be for a 30-minute paid phone consultation. To show your relevance in this space, please consider answering the questions only that applies to your specific background/industry experience 1. For all perspectives: - what is the level or extent of your experience in this space? 2. For healthcare storage & facilities - can you provide an overview of the types of locks you purchase and according to their use in your healthcare/pharmacy facilities? 3. Cargo container manufacturers - would you be able to discuss the security/lock needs for shipping containers? - do you handle/manage insurance logistics for your company? If yes, can you speak about trends in security for this industry? 4. Trucking security - can you talk about the types of locks installed for truck trailers, specialty automotive? - do you manage/handle after-market? If yes, are you familiar with gear security? 5. Transit facilities - are you a contractor who manages security requirements for transit facilities (airports, ports, truck stations)? - do you manage or handle transit facilities? If yes, can you discuss the types of locks installed on doors and utilities for this space? **please note that we are only interested in your personal point of view and are not seeking confidential information. ***referrals are highly appreciated

  1. Profile Picture

    Xiaohui |Vice President, Head of Biostatistics

    I can't contribute to the project....

    2.6 Days Later
  2. Profile Picture

    Henry |Sr. Advisor - Cloud Architecture

    I'd love to share my past 10 years working experience on Healthcare storage & facilities - Purchasin...

    2.6 Days Later
  3. Profile Picture

    Samit |Head of Procurement

    "This is a topic that I manage the research and sourcing decision for at my company. If be happy to ...

    2.6 Days Later
+15 Other Responses
Area Icon

Online Business Protection

We are looking to do multiple paid phone consults with customers or partners of shopify, magento, or big commerce about ns8. We want to have a better understanding of online businesses security against advertising fraud, transaction fraud, and poor site performance this would be for a 1-hour paid phone consult. Please respond with a few short statements to the questions below. 1. Were you the person personally responsible for evaluating, selecting and implementing ns8 or other online security? Please comment about the extent of your involvement in the decision-making process. 2. Can you articulate the unique ip/value prop vs others? Please briefly elaborate 3. Can you share your insight on areas you would like ns8 to do better or areas for improvement? Please explain briefly.

  1. Profile Picture

    Bharath |Board member,SVP/EVP

    Greetings I have direct experience with business ***** trust services from my prior rol...

    53 Minutes Later
  2. Profile Picture

    Lesley |Chief Marketing Officer

    I represent companies that do around 1bn a month in transactions across varying markets and varying ...

    18.3 Hours Later
  3. Profile Picture

    David |Sales Director America's

    1- Just NS8 2- Only partner of PrestaShop for now 3- Don't know their competition besides payment pl...

    21.5 Hours Later
+12 Other Responses
Area Icon

Fraud Management And Physical Security

Fraud management and physical security: 1.Supply chain around fraud management 2.Vendor landscape for fraud management and physical security 3.Engagement models fraud management and physical security - single/ multiple vendors 4. Sourcing models for fraud management and physical security - in house/ outsource 5.Value proposition in outsourcing these services 6. List of suppliers for fraud management and physical security 7. Supplier consolidation and rationalization options 8.Fraud patterns in banks 9.Dependencies and synergies between fraud and financial crimes aspects and physical security 10.An analysis of the vendors offerings in the following areas: - advanced fraud analytics (data analytics; cyber data analytics; rules developers; architecture; solutions engineers - contact centre operations - quality assurance - detection specialists - credit quality specialists - claims management & processing / back-office / back-end fulfilment - project resources for fraud initiatives

  1. Profile Picture

    Sohail |Director

    Hi, Can you please provide me more details of this enquiry. Is this a research assignment and/or w...

    7 Minutes Later
  2. Profile Picture

    mohammad wmar |senior manager

    i am interested for this job and have experience in this. please send details of email id where i ca...

    3.3 Hours Later
  3. Profile Picture

    Patrick |President

    A large ask for anyone person but I have extensive experience in physical security for high risk, hi...

    3.7 Hours Later
+17 Other Responses
Area Icon

Machine Learning For Cyber Security

Our firm is looking to do multiple paid phone consults with customers/ prior customers of email security solution products such as abnormal security. We want to speak with experts who can share their insights on purchasing criteria, use case, pros and cons, and evaluation of other vendors in this space. This would be for a 1-hour paid phone consult. Please respond with a few short statements to the questions below. 1. Were you the person personally responsible for evaluating, selecting and implementing abnormal security? Please comment about the extent of your involvement in the decision-making process. 2. Can you speak to detail about email security solution, specifically, abnormal security? Please briefly elaborate 3. Who are the other vendors that you evaluated during your decision-making process? Please comment about other vendors you evaluated closely during your buying process. *** referrals will be highly appreciated.

  1. Profile Picture

    Anand |Managing Partner

    1. Were you the person personally responsible for evaluating, selecting and implementing Abnormal Se...

    15.1 Hours Later
  2. Profile Picture

    Sven |Co-Founder & CEO

    As a former CISO I can help. 1. Were you the person personally responsible for evaluating, selectin...

    23.2 Hours Later
  3. Profile Picture

    Ankit |Director

    This is my expertise area having more than 20 years exp in this space. We are current customers of A...

    2.6 Days Later
+13 Other Responses
Area Icon

Public Speaking

Hello, i am looking for a industry expert to conduct a 2 day in person seminar based out of usa. Should have a minimum experience of 25-30 years and should have extensive public speaking experience. Should be able to cover few or most of the below topics: 1. Data breach response presentation 2. Data breach media response templates review 3. Law enforcement notification and liaison – who does what? 4. Cyber crime – exactly who are the bad guys and what are they looking for? 5. Cyber risk assessments – preach prevention first 6. Continuous monitoring of entire eco-system (outsource or in-house?) 7. Security operations design 8. Cyber policy review recommendations and re-design 9. Penetration testing – what should you be looking at? 10. 24/7 continuous monitoring and vulnerability scanning 11. Third party cyber audits and reviews 12. Data breach remediation 13. Identity theft guidelines, phi identification, credit monitoring and resolution 14. Cyber crime investigations 15. Computer forensics 16. Data breach incident response teams (internal/external) 17. Malware and advanced persistent threat detection 18. Data breach notifications – a timeline of events 19. Data breach notification letters to customers and regulators 20. Cyber due diligence 21. Insider threat - defend against both internal and external exposure 22. Digital fraud management reviews 23. Identify evidence, chain of custody, legal and regulatory obligation consulting

  1. Profile Picture

    Brent |CEO

    I'd be interested in hearing more about the specific needs of the engagement. Particularly, timing a...

    1 Hour Later
  2. Profile Picture

    Cyber |IT Security Analyst Consultant

    I can assist. Please provide additional details as to the 2-day seminar outline and the general ter...

    1.2 Hours Later
  3. Profile Picture

    Darko |Sales professional, Coach

    I am really sorry, but I do not have experience for the .... *****s of Expertise: data b...

    1.4 Hours Later
+12 Other Responses
See More Inquiries

Top Securities Fraud Experts

See More Experts
Share
LinkedInTwitterFacebookGoogle+