CAPABILITY STATEMENT. Mission. Primary NAICS Codes
|
|
|
- Karin Maxwell
- 9 years ago
- Views:
Transcription
1 CAPABILITY STATEMENT Mission Our mission and focus is a holistic approach to security and stabilization that integrates an end-to-end solution empowering our partners and clients with the ability to maximize capacity, function effectively, and protect the integrity of operations and life in high-risk environments and emerging markets. Introduction Aequitas Solutions International, LLC (ASI) is a certified, fully licensed and insured security consultancy and risk mitigation firm providing a comprehensive array of security management, risk mitigation, protective services, intelligence, and crisis/conflict management solutions to clients both domestically and internationally. Corporate Overview ASI is a global security and risk consultancy group specializing in helping organizations manage political, integrity and security risks in complex and hostile environments. We support clients by providing strategic consultancy, expert analysis and in-depth operational expertise, handling sensitive political issues and providing unmatched practical on-the-ground protection, mission support capabilities, and logistics. Our unique combination of services, geographical reach and the trust our clients place in us ensure we can help them to effectively solve their problems and realize new opportunities across the world. We currently have a global footprint with personnel in 34 countries throughout the Americas, Europe, Africa, the Middle East, and Asia with projections to be in 50 countries by mid We have developed a unique pro-active, intelligence driven methodology that integrates strategically placed highly skilled subject matter experts from the protective services, physical security, risk assessment/mitigation, threat/intelligence, guard services, and systems integration communities to address the specific needs of our clients, in both the private and public sectors. Primary NAICS Codes Security Services Security Consulting Security Training Investigations Security Guard and Patrol Services Security Systems Services DUNS Code Certifications Minority Business Enterprise (MBE) MP0495 International Code of Conduct for Private Security Service Providers United Nations Global Compact Professional Associations OSAC Infragard SIA IFPO CSO ASIS ISOA Corporate Headquarters th Street NW Suite 300 Washington DC USA Tel: aequitassolutionsintl.com AEQUITAS SOLUTIONS INTERNATIONAL CAPABILITY STATEMENT Page 1 of 9
2 Our clients consist of multinational corporations, governments, NGOs, high net worth individuals, and other organizations situated in all levels of risk environments from low to severe. As a subsidiary of GCS Security Services, LLC, and a second tier subsidiary of Gonzales Consulting Services, Inc., who has been providing a broad range of security services to the federal government for over 14 years, we have the resources, proven capability, and demonstrated commitment to protect the people, property and assets entrusted to our care. Core Competencies Aequitas Solutions International is a full scope security provider offering services to clients at every level of business in all environments and across all vertical markets. Our primary focus is to become the trusted advisor to our clients in fulfilling their security needs through planning, educating, implementing, and executing a complete solution from end-to-end. Through proven leadership, strategic planning, and subject-matter expertise, ASI consistently delivers intelligence-driven experience-based options, program decision assurance and targeted analysis to ensure security initiatives are on target and cost effective. ASI has the capabilities and capacity to step into the most complex situations and develop innovative solutions that build lasting results. ASI offers enterprise-wide complete security initiatives to our clients through the design, development and implementation of security programs and platforms that address the entire spectrum of security-related concerns in the areas of risk mitigation, strategic initiative planning, conflict and post-conflict management, capacity building, stabilization operations, programmatic methodology and policy making, tactical security and protective operations, physical and facility security, maritime security, force multipliers, intelligence, training, cyber security, border security, geospatial tracking and monitoring, biometric identification, drone technology, risk assessments and threat analysis/perception, crisis incident management, supply chain security and logistical support. Moreover, through our partners and subsidiaries we can also assist in a host of follow-on professional services to include, but not limited to, financial accountability and investment capital, emergency management command and control, strategic communications, security engineering, and infrastructure and sustainability development policymaking. ASI has experience in all realms of the security function and compliance, as well as all industries and sectors. Our team strategizes with your senior management to help develop security objectives that best align with the organization's goals and efforts. Our solutions are situation-specific and sensitive to local culture and traditions with an understanding that one size does not fit all, and in order to produce dynamic results our people must understand your organization and your needs through established frameworks and identifiable benchmarks. The key component to drive the development and implementation of these benchmarks is our holistic approach to security that utilizes our Protective Security Solution Cycle (PSSC), a focused matrix and methodology that encompasses all the elements of: AEQUITAS SOLUTIONS INTERNATIONAL CAPABILITY STATEMENT Page 2 of 9
3 Prevention Detection Response Recovery Resolution Cost Management This total operational risk model creates a distinct advantage over traditional security thought in that it stresses resiliency over just protection. This approach helps to identify current issues and areas of risk while creating a framework for predicting future weaknesses and liabilities. We accomplish this through a unique pro-active approach that works in symmetry with our clients operational and institutional models by utilization of our Protective Security Solution Cycle. Through assessment metrics, we identify the major areas of risk then strategically plan a course of action to encompass Prevention, Detection, Response, Recovery, and Resolution with an ever-present eye on Cost Management. This approach allows us to engage our methodologies at any point of a client current situation and work towards an effective security program that reduces current risk and mitigates future threats through planned contingencies. In order to facilitate this enterprise wide security solution our array of services include: Tactical Response Capabilities Highly trained, vetted physical security providers Former Special Operations, Police, and Security Professionals Regionally Oriented Local Knowledge, Language Skills, Customs, Law Enforcement and Political Connections High Risk Security Operations Personnel Protective Operations Multinational Corporations Governments NGOs Close Protection of Key Personnel and Stakeholders Dignitaries Diplomats Corporate Executives High Net Worth Individuals Mission Essential Personnel Emergency Response/Evacuation Motorcade/Convoy Operations Aviation Security Maritime Security Travel Security Executives, Diplomats, High-Net Worth Individuals and Families AEQUITAS SOLUTIONS INTERNATIONAL CAPABILITY STATEMENT Page 3 of 9
4 Emergency Extraction, Risk Mitigation, Car and Driver, Personal Security Details, Security Surveys, Training Facility Security/Force Protection Static Security Guard Services Patrol Operations Common Access/Special Access Programs Security Engineering and Design Consultancy (Unified Facilities Criteria (UFCs), Interagency Security Committee (ISC) Standards) Closed Caption TV/Cameras Intrusion Detection/Alarm Systems Access Control Systems Active and Passive Barrier Systems Command and Control Centre Systems Communications Systems Ballistics Protection Perimeter Solutions Asset Security Supply Chain Transport Security Consultancy Specialized Program Development Labor Disputes Kidnap and Ransom Crisis/Conflict Management Contingency Planning and Operations Threat specific Location-specific Stabilization Operations Business Continuity Planning Mission Critical Support (Ground/Air/Medical) Pre-deployment Medical Intelligence and Personalized Medical Deployment Kits Medical Evacuation Strategic and Emergency Communications Risk Mitigation Threat Assessments/Risk Analysis Security Audits and Reviews Advance Site Survey SOP/Policy Development Conflict Assessment and Strategic Analysis AEQUITAS SOLUTIONS INTERNATIONAL CAPABILITY STATEMENT Page 4 of 9
5 Emergency Management and Planning Cyber/Information Security Penetration Testing Real-time Threat Intelligence and Proprietary Analysis Physical, geopolitical, criminal, terrorism, medical, environmental, financial, cyber Open Source, In-Country Analysis, Real-Time Alerts Due Diligence Intelligence Software and Training Intelligence Consulting Services Geospatial Physical Tracking Beacons (satellite and GSM) Real-time fleet management Real-time management of powered and non-powered assets Application based, real-time traveler tracking and communication support with intelligence updates/alerts Emergency Button, Data and Voice Capable Tracking Beacons Assets and Personnel Only Activated When Required Accident, Assault, Medical Emergency, Unstable Environment Training High-Risk Protections (Operators) Hostile Environment Awareness Training (HEAT) Travel Security Kidnap and Ransom Crisis Management Counter Terrorism Terrorism Incident Response (Land-based or Maritime) Kidnappings/Abductions Counter Terrorism Measures (Land-based or Maritime) Counter IED C/T Program Development Executive Management and Terrorism Cybersecurity and Terrorism Bio-Hazard Awareness and Response Medical Emergency Response Team Training Strategic and Emergency Communications Differentiators In the security consultancy and risk mitigation industry there exists a plethora of companies that claim to provide top tier personnel and services. However, it is our clients ability to continue operations and functions at their highest level in all environments due to the confidence and peace of mind instilled by ASI that truly distinguishes us from the competition. AEQUITAS SOLUTIONS INTERNATIONAL CAPABILITY STATEMENT Page 5 of 9
6 We achieve these results not only through our array of offerings, but, more importantly, by combining: Experienced Diverse Leadership Focused Pro-active Solutions Proven Methodologies Industry Specific Enterprise-wide Strategies Tier I Security Managers and Teams Intelligence Driven Security Operations Industry Leading Partnerships Independent Quality Assurance Audits Through utilization of ASI and our partners, your organization will receive the multi-faceted benefit of access to top-level decision makers and Subject Matter Experts that can leverage years of experience, exceptional skill sets, and substantial networks to develop programs and initiatives that are unparalleled in the industry. Methodology We bring together subject matter experts from various technical backgrounds to conduct assessments and provide consultancy and risk mitigation strategies to meet any threat through rigorous evaluation and testing that is the cornerstone of our methodology. Criticality Assessments We identify and prioritize the most critical assets to your organization. Our ranking helps to determine the qualitative and quantitative impact to your organization if those assets are lost or compromised. Threat Assessments Through a refined methodology and utilization of special resources, our team will determine what the greatest threats are to your personnel, property, and assets. Predictive Intelligence Through utilization of advanced technology solutions, we provide live time intelligence, threat assessments and alert notifications to our Clients operating worldwide. Security Vulnerability Assessments Our team will assess your current level of physical security protection and identify vulnerabilities impacting the successful protection of your personnel, property, and assets. Penetration Testing Our operations team will test the validity and reliability of current security tactics, techniques, procedures and systems to gauge effectiveness against current threats. Policy, Plans and Procedures Review We evaluate existing policy, plans and procedures to determine if they are adequate to detect, deter and defend against known threats to your personnel, property and assets. Risk Assessments Our team will provide a detailed Assessment Report highlighting our findings and recommending specific risk mitigation strategies to minimize potential threats or impacts to your operations or personnel. Personnel AEQUITAS SOLUTIONS INTERNATIONAL CAPABILITY STATEMENT Page 6 of 9
7 We employ highly experienced, qualified and vetted subject matter experts from a variety of specialized career fields. We utilize their unique and diverse skill sets to develop customized security and risk mitigation teams that can operate in a variety of domestic and international environments. We closely match our personnel and advanced technology solutions to each Client, mission, and area(s) of operation to insure you are getting the best protection specialist or team to match your specific needs. At ASI, we seek innovative leaders and team players who thrive in fast-paced and challenging environments performing at their best when expectations are highest and demands are greatest. In order to maintain this high degree of excellence, professionalism, and expertise, we ensure that all our personnel are from designated backgrounds. Our agents are all former: Diplomatic Security Agents Military Special Operations Maritime Security Specialists Federal Agents Law Enforcement Specialists Personal Protection Specialists Counterterrorism Specialists Intelligence/Threat Analysts Physical Security Experts Leadership Edward Fairchild President/Aequitas Solutions International Mr. Fairchild is the President of Aequitas Solutions International, LLC - a subsidiary of GCS Security Services which provides global security consultancy, protective services and risk mitigation services. Mr. Fairchild specializes in creating, implementing, and executing security solutions in high threat/high risk environments across the globe. Since 1996, Mr. Fairchild has specialized in protective security, risk mitigation, and intelligence operations and leadership. He has worked in the Counter-Terrorism field for more than 20 years. He has in-depth experiences in US Embassy security operations and management, executive protection for US Presidents, Diplomats and Foreign Heads of State, and commanding thousands of high-risk missions. Mr. Fairchild s prior roles include Chief of Security Operations, Diplomatic Security Detail Leader, Executive Protection Team Leader, and Facility Security Officer for the US State Department, Bureau of Diplomatic Security, Office of High-Threat Protections, US Department of Defense, and various foreign governments and private clients. Mr. Fairchild holds professional certifications in Conflict Analysis and Conflict Management in conjunction with Conflict Negotiation and Post-Conflict Resolution from the United States Institute of Peace. Further, he holds certifications in Terrorism Studies and Counter Terrorism from both Michigan State University and Georgetown University combined with advanced security studies at the European Center for Security Studies. Mr. Fairchild is finalizing certification as a Federal Emergency Management Specialist through the Department of Homeland Security to be completed in He is currently an active member of the US State Department Overseas Security Advisory Council and sits on the Africa Regional Council. He is also an active member of Infragard, an FBI led coalition of security professionals dedicated to protecting critical infrastructure components. Mr. Fairchild is also a frequent member of security roundtables at the Atlantic Council, a DC-based Foreign Affairs think tank. AEQUITAS SOLUTIONS INTERNATIONAL CAPABILITY STATEMENT Page 7 of 9
8 In addition, Mr. Fairchild sits on the Board of Directors for MissionVets, a veteran focused non-profit organization. Testimonials: Edward is definitely a leader in his field and is recognized and commended for his selfless contribution. He has served as a key component to the overall safety and security to Chief of Mission personnel. Edward would be a valuable asset to any organization and I am pleased to provide my wholehearted endorsement. Ambassador David Satterfield, Director General, Multi-National Forces and Observers (Current)/US Senior Principal Deputy Secretary of State (Ret.) Ed Fairchild is a remarkable and resourceful security professional with a deep and varied skill set, and global resources. He is the type of person that you want to have on your team when the stakes are very high. Jeffrey Hartman ediscovery & Computer Forensics Entrepreneur Steven Schrimpf President/GCSSS Mr. Schrimpf is the President for GCS Security Services and oversees all operational aspects of the company. Since 1986, he has highly specialized training and experience in law enforcement, security and counter-terrorism operations. He has experience conducting and overseeing large scale domestic and international investigations, managing large government guard forces and conducting security vulnerability, criticality and threat assessments for some of our nation s most critical assets and facilities. Mr. Schrimpf is a certified Security Engineer by the US Army Corps of Engineers (USACE). This designation is for the design and assessment of physical security systems and Tactics, Techniques, and Procedures (TTPs) for the protection of critical infrastructure against criminal or terrorist threats. He was assigned as a Security Specialist for Air Force Space Command (AFSPC), responsible for designing and maintaining physical security programs to protect Priority Level 1 Space and Missile Warning assets worldwide. He was also assigned as an Inspector General for Air Force Space Command, responsible for inspecting and assessing the effectiveness and compliance of DoD physical security programs and TTPs. He is currently Chairman for the American Society of Industrial Security (ASIS) International and a certified Terrorism Liaison Officer working within the national fusion center framework. He is also an active member of Infragard, an FBI led coalition of security professionals dedicated to protecting critical infrastructure components. He holds a B.S. degree in Organizational Management and a Master s degree in Human Resource Management. AEQUITAS SOLUTIONS INTERNATIONAL CAPABILITY STATEMENT Page 8 of 9
9 John Criswell Physical Security Manager Mr. Criswell has over 25 years of experience in physical security, vulnerability assessment, risk assessment and mitigation, security design, integration and engineering, information security protection, and anti/counter- terror-ism operations with the Department of Defense. He has specialized training and certifications from the Defense Threat Reduction Agency, the Army Corp of Engineers (certified Security Engineer), the Naval Post Graduate School and the Department of Defense. During his career he was responsible for the protection of highly sensitive priority level assets for the federal government and held numerous senior leadership positions. He holds a Bachelor s of Arts in Political Science (with Honors). Advisory Board In addition to our proven leadership, Aequitas Solutions International has a notable contingent of subject matter experts, consultants and advisors whose expertise and experience are entwined in the very vertical markets that we serve. This group is uniquely suited for development and implementation of industry specific security and risk mitigation planning and operations. At every level from the top down, ASI, has a thorough and comprehensive understanding of the factors that drive our clients businesses and organizations from vision and management to operations and resilience. Conclusion Aequitas is a Latin term that has many meanings from Equality to Justice. Our leadership purposefully chose this name to represent our unwavering commitment to establishing thriving stable societies across the global landscape by securing the avenues for economic growth and diplomatic means. We are unfaltering in our dedication to helping our clients and partners operate undeterred in any environment. Aequitas Solutions International will provide peace of mind in an uncertain world. AEQUITAS SOLUTIONS INTERNATIONAL CAPABILITY STATEMENT Page 9 of 9
Enabling Mission Success
Enabling Mission Success Challenging Work in Challenging Places Implementing complex programs in remote or high-risk locations demands effective planning, rapid response and value-added solutions. Triple
JOB ANNOUNCEMENT. Chief Security Officer, Cheniere Energy, Inc.
JOB ANNOUNCEMENT Chief Security Officer, Cheniere Energy, Inc. Position Overview The Vice President and Chief Security Risk Officer (CSRO) reports to the Chairman, Chief Executive Officer and President
INTELLIGENCE. RISK MITIGATION. RESPONSE. CONSULTANCY.
INTELLIGENCE. RISK MITIGATION. RESPONSE. CONSULTANCY. 23 Grafton Street London W1S 4EY UK Main Tel: +44 (0) 207 887 2699 ABOUT PGI PGI is a privately owned UK business offering integrated, intelligence-led
Written Statement of Richard Dewey Executive Vice President New York Independent System Operator
Written Statement of Richard Dewey Executive Vice President New York Independent System Operator Senate Standing Committee on Veterans, Homeland Security and Military Affairs Senator Thomas D. Croci, Chairman
Physical Security Services
Physical Security Services The ANVIL Group Physical Security Services The ANVIL Group is an internationally renowned and accredited security company specialising in Crisis Avoidance. Established in 1988,
The Comprehensive National Cybersecurity Initiative
The Comprehensive National Cybersecurity Initiative President Obama has identified cybersecurity as one of the most serious economic and national security challenges we face as a nation, but one that we
Security Vulnerability Assessment
Security Vulnerability Assessment Deter, Detect, Delay, Respond the elements for minimizing your operational risk. A detailed SVA assists you to understand how best to do so. Security Vulnerability Assessment
THE WHITE HOUSE. Office of the Press Secretary. For Immediate Release February 12, 2013. February 12, 2013
THE WHITE HOUSE Office of the Press Secretary For Immediate Release February 12, 2013 February 12, 2013 PRESIDENTIAL POLICY DIRECTIVE/PPD-21 SUBJECT: Critical Infrastructure Security and Resilience The
CyberSecurity Solutions. Delivering
CyberSecurity Solutions Delivering Confidence Staying One Step Ahead Cyber attacks pose a real and growing threat to nations, corporations and individuals globally. As a trusted leader in cyber solutions
El Camino College Homeland Security Spring 2016 Courses
El Camino College Homeland Security Spring 2016 Courses With over 250,000 federal positions in Homeland Security and associated divisions, students may find good career opportunities in this field. Explore
Crisis Prevention and Response Services. NYA International. Crisis Prevention and Response Services. Crisis Prevention and Response Services
NYA International B Effective risk management begins with a comprehensive understanding of the threat and an organisation s vulnerability, and the application of appropriate mitigation measures. Operating
Statement of Gil Vega. Associate Chief Information Officer for Cybersecurity and Chief Information Security Officer. U.S. Department of Energy
Statement of Gil Vega Associate Chief Information Officer for Cybersecurity and Chief Information Security Officer U.S. Department of Energy Before the Subcommittee on Oversight and Investigations Committee
Subject: Critical Infrastructure Identification, Prioritization, and Protection
For Immediate Release Office of the Press Secretary The White House December 17, 2003 Homeland Security Presidential Directive / HSPD-7 Subject: Critical Infrastructure Identification, Prioritization,
NATIONAL STRATEGY FOR GLOBAL SUPPLY CHAIN SECURITY
NATIONAL STRATEGY FOR GLOBAL SUPPLY CHAIN SECURITY JANUARY 2012 Table of Contents Executive Summary 1 Introduction 2 Our Strategic Goals 2 Our Strategic Approach 3 The Path Forward 5 Conclusion 6 Executive
December 17, 2003 Homeland Security Presidential Directive/Hspd-7
For Immediate Release Office of the Press Secretary December 17, 2003 December 17, 2003 Homeland Security Presidential Directive/Hspd-7 Subject: Critical Infrastructure Identification, Prioritization,
While interagency education and training have long been staples of the intelligence and
Navigating Interagency Education and Training Courses by John Dyson While interagency education and training have long been staples of the intelligence and law enforcement communities, such efforts are
Fusion Center Guidelines
Fusion Center Guidelines Developing and Sharing Information and Intelligence in a New Era Guidelines for Establishing and Operating Fusion Centers at the Local, State, and Federal Levels Law Enforcement
SECURITY / INTELLIGENCE / CONSULTING
SECURITY / INTELLIGENCE / CONSULTING Hayes Group International (HGI) is a global security and intelligence consulting and advisory firm specializing in emerging and frontier markets. Focused on development
UNCLASSIFIED. UNCLASSIFIED Office of Secretary Of Defense Page 1 of 9 R-1 Line #139
Exhibit R-2, RDT&E Budget Item Justification: PB 2015 Office of Secretary Of Defense Date: March 2014 0400: Research, Development, Test & Evaluation, Defense-Wide / BA 6: RDT&E Management Support COST
Keynote: FBI Wednesday, February 4 noon 1:10 p.m.
Keynote: FBI Wednesday, February 4 noon 1:10 p.m. Speaker: Leo Taddeo Special Agent in Change, Cyber/Special Operations Division Federal Bureau of Investigation Biography: Leo Taddeo Leo Taddeo is the
Actions and Recommendations (A/R) Summary
Actions and Recommendations (A/R) Summary Priority I: A National Cyberspace Security Response System A/R 1-1: DHS will create a single point-ofcontact for the federal government s interaction with industry
Global Security Program Overview
STATE STREET GLOBAL SECURITY Global Security Program Overview ASIS International Kansas City Chapter March 5, 2015 Stephen D Baker CPP Vice President & Deputy Chief Security Officer About State Street
Leveraging innovative security solutions for government. Helping to protect government IT infrastructure, meet compliance demands and reduce costs
IBM Global Technology Services Leveraging innovative security solutions for government. Helping to protect government IT infrastructure, meet compliance demands and reduce costs Achieving a secure government
FACT SHEET. General Information about the Defense Contract Management Agency
FACT SHEET General Information about the Defense Contract Management Agency Mission: We are the independent eyes and ears of DoD and its partners, delivering actionable acquisition insight from the factory
GLOBAL FORENSIC AND DISPUTE SERVICES CYBER PROTECTION SPECIALISTS
GLOBAL FORENSIC AND DISPUTE SERVICES CYBER PROTECTION SPECIALISTS THE TEAM William Beer São Paulo William Beer brings over 25 years of diverse international consulting experience advising on and managing
Reliable, Repeatable, Measurable, Affordable
Reliable, Repeatable, Measurable, Affordable Defense-in-Depth Across Your Cyber Security Life-Cycle Faced with today s intensifying threat environment, where do you turn for cyber security answers you
V: RECOMMENDATIONS TERRORIST ATTACKS ON U.S. FACILITIES IN BENGHAZI
V: RECOMMENDATIONS TERRORIST ATTACKS ON U.S. FACILITIES IN BENGHAZI Recommendation: The Executive Branch should provide for a central planning and coordination mechanism (likely within an existing entity)
U.S. DoD Physical Security Market
U.S. DoD Physical Security Market Technologies Used for DoD Applications June 2011 Table of Contents Executive Summary 7 Introduction 8 Definitions and Scope 9-11 Percentage of FY 2010 Total Budget Request
OVERVIEW OF THE ADMINISTRATION S FY 2005 REQUEST FOR HOMELAND SECURITY By Steven M. Kosiak
March 22, 2004 OVERVIEW OF THE ADMINISTRATION S FY 2005 REQUEST FOR HOMELAND SECURITY By Steven M. Kosiak The Bush Administration s fiscal year (FY) 2005 budget request includes $47.4 billion for homeland
Appendix -- Homeland Security Mission Funding by Agency and Budget Account (budget authority in millions of dollars)
Department of Agriculture 508.8-528.6-603.6 Agricultural Research Service/ Buildings and Facilities/005-18-1401 - - 45.0-113.7 Protecting Critical Infrastructure and Key Assets - - 45.0-113.7 Agricultural
STATEMENT BY DAVID DEVRIES PRINCIPAL DEPUTY DEPARTMENT OF DEFENSE CHIEF INFORMATION OFFICER BEFORE THE
STATEMENT BY DAVID DEVRIES PRINCIPAL DEPUTY DEPARTMENT OF DEFENSE CHIEF INFORMATION OFFICER BEFORE THE HOUSE OVERSIGHT AND GOVERNMENT REFORM COMMITTEE S INFORMATION TECHNOLOGY SUBCOMMITTEE AND THE VETERANS
C ETS C/ETS: CYBER INTELLIGENCE + ENTERPRISE SOLUTIONS CSCSS / ENTERPRISE TECHNOLOGY + SECURITY
CSCSS / ENTERPRISE TECHNOLOGY + SECURITY C/ETS: CYBER INTELLIGENCE + ENTERPRISE SOLUTIONS CENTRE FOR STRATEGIC CSCSS CYBERSPACE + SECURITY SCIENCE CSCSS / ENTERPRISE TECHNOLOGY + SECURITY GROUP Information
Diligence Management Consultants Company profile. Middle East - Africa - South Asia
Diligence Management Consultants Company profile Middle East - Africa - South Asia Chapter 1 Who we are Established in 2008 in the United Arab Emirates, Diligence has emerged as the primary security and
Appendix A: Gap Analysis Spreadsheet. Competency and Skill List. Critical Thinking
Appendix A: Gap Analysis Spreadsheet Competency and Skill List Competency Critical Thinking Data Collection & Examination Communication & Collaboration Technical Exploitation Information Security Computing
CYBER PANEL MEMBERS. Mr. Hart is a member of the United States Air Force Senior Executive Service with over fifteen years service as an SES.
Mr. Bennett Hart, Senior Consultant in Intelligence, Operations, Technology, Training, Proposal Red Teams, and Key Personnel Selection. Mr. Hart is a member of the United States Air Force Senior Executive
ENTERPRISE COMPUTING ENVIRONMENT. Creating connections THROUGH SERVICE & WORKFORCE EXCELLENCE
ITA Strategic Plan FY 2011 - FY 2016 U.S. Army Information Technology Agency REALIZING The DoD ENTERPRISE COMPUTING ENVIRONMENT Creating connections THROUGH SERVICE & WORKFORCE EXCELLENCE Provide Quality
GAO DEPARTMENT OF HOMELAND SECURITY. Actions Taken Toward Management Integration, but a Comprehensive Strategy Is Still Needed
GAO November 2009 United States Government Accountability Office Report to the Subcommittee on Oversight of Government Management, the Federal Workforce, and the District of Columbia, Committee on Homeland
Cybersecurity: Mission integration to protect your assets
Cybersecurity: Mission integration to protect your assets C Y B E R S O L U T I O N S P O L I C Y O P E R AT I O N S P E O P L E T E C H N O L O G Y M A N A G E M E N T Ready for what s next Cyber solutions
DOD DIRECTIVE 4715.21 CLIMATE CHANGE ADAPTATION AND RESILIENCE
DOD DIRECTIVE 4715.21 CLIMATE CHANGE ADAPTATION AND RESILIENCE Originating Component: Office of the Under Secretary of Defense for Acquisition, Technology, and Logistics Effective: January 14, 2016 Releasability:
Enterprise Security Tactical Plan
Enterprise Security Tactical Plan Fiscal Years 2011 2012 (July 1, 2010 to June 30, 2012) Prepared By: State Chief Information Security Officer The Information Security Council State of Minnesota Enterprise
Department of Defense NetOps Strategic Vision
Department of Defense NetOps Strategic Vision December 2008 Department of Defense Chief Information Officer The Pentagon Washington, D.C. Table of Contents 1 Purpose...1 2 Introduction...1 2.1 NetOps
CYBER SECURITY, A GROWING CIO PRIORITY
www.wipro.com CYBER SECURITY, A GROWING CIO PRIORITY Bivin John Verghese, Practitioner - Managed Security Services, Wipro Ltd. Contents 03 ------------------------------------- Abstract 03 -------------------------------------
DHS. CMSI Webinar Series
DHS CMSI Webinar Series Renee Forney Executive Director As the Executive Director for the Cyberskills Management Support Initiative (CMSI), Ms. Forney supports the Undersecretary for Management (USM) for
Purpose of the Governor s strategy. Guiding Principles
Purpose of the Governor s strategy The Governor s initiative to develop and implement a State of Tennessee program to counter terrorism within the State is outlined in this document. The primary purpose
Cyber Incident Annex. Cooperating Agencies: Coordinating Agencies:
Cyber Incident Annex Coordinating Agencies: Department of Defense Department of Homeland Security/Information Analysis and Infrastructure Protection/National Cyber Security Division Department of Justice
FACT SHEET. General Information About the Defense Contract Management Agency
FACT SHEET General Information About the Defense Contract Management Agency Mission: We provide Contract Administration Services to the Department of Defense Acquisition Enterprise and its partners to
Department of Defense INSTRUCTION. Reference: (a) DoD Directive 3020.26, Defense Continuity Programs (DCP), September 8, 2004January 9, 2009
Department of Defense INSTRUCTION SUBJECT: Defense Continuity Plan Development NUMBER 3020.42 February 17, 2006 Certified current as of April 27, 2011 Reference: (a) DoD Directive 3020.26, Defense Continuity
UNITED STATES DEPARTMENT OF STATE BUREAU OF DIPLOMATIC SECURITY DIPLOMATIC SECURITY PROTECTS
UNITED STATES DEPARTMENT OF STATE BUREAU OF DIPLOMATIC SECURITY DIPLOMATIC SECURITY PROTECTS 1 DIPLOMATIC SECURITY PROTECTS The Bureau of Diplomatic Security is the security and law enforcement arm of
INTRODUCTION. Purpose. Scope. Policies. Worker Safety and Health Support Annex. Coordinating Agency: Cooperating Agencies:
Coordinating Agency: Department of Labor/Occupational Safety and Health Administration Cooperating Agencies: Department of Defense Department of Energy Department of Health and Human Services Department
DEPARTMENT OF THE NAVY HEADQUARTERS UNITED STATES MARINE CORPS 3000 MARINE CORPS PENTAGON WASHINGTON, DC 20350 3000
DEPARTMENT OF THE NAVY HEADQUARTERS UNITED STATES MARINE CORPS 3000 MARINE CORPS PENTAGON WASHINGTON, DC 20350 3000 MCO 3030.1 POC MARINE CORPS ORDER 3030.1 From : To: Commandant of the Marine Corps Distribution
united states Department of state Bureau of Diplomatic Security Diplomatic Security
united states Department of state Bureau of Diplomatic Security Diplomatic Security REGIONAL SECURITY OFFICE 1 Introduction... 1 Law Enforcement and Security Services... 3 U.S. Embassy, Personnel, and
WRITTEN TESTIMONY OF
WRITTEN TESTIMONY OF KEVIN MANDIA CHIEF EXECUTIVE OFFICER MANDIANT CORPORATION BEFORE THE SUBCOMMITTEE ON CRIME AND TERRORISM JUDICIARY COMMITTEE UNITED STATES SENATE May 8, 2013 Introduction Thank you
Department of Homeland Security Office of Inspector General. Review of U.S. Coast Guard Enterprise Architecture Implementation Process
Department of Homeland Security Office of Inspector General Review of U.S. Coast Guard Enterprise Architecture Implementation Process OIG-09-93 July 2009 Contents/Abbreviations Executive Summary...1 Background...2
State of Minnesota. Enterprise Security Strategic Plan. Fiscal Years 2009 2013
State of Minnesota Enterprise Security Strategic Plan Fiscal Years 2009 2013 Jointly Prepared By: Office of Enterprise Technology - Enterprise Security Office Members of the Information Security Council
BSA GLOBAL CYBERSECURITY FRAMEWORK
2010 BSA GLOBAL CYBERSECURITY FRAMEWORK BSA GLOBAL CYBERSECURITY FRAMEWORK Over the last 20 years, consumers, businesses and governments 1 around the world have moved online to conduct business, and access
Managed Security Services D e l i vering real-time protection to help organizations st r e n g t h e n their security posture in the face of today s
Managed Security Services D e l i vering real-time protection to help organizations st r e n g t h e n their security posture in the face of today s emerging threats. In today s sophisticated online env
GENERAL SERVICES ADMINISTRATION FEDERAL SUPPLY SERVICE AUTHORIZED FEDERAL SUPPLY SCHEDULE PRICE LIST
Management and Engineering Technologies International, Inc. (GS-10F-0349M) GENERAL SERVICES ADMINISTRATION FEDERAL SUPPLY SERVICE AUTHORIZED FEDERAL SUPPLY SCHEDULE PRICE LIST On-line access to contract
U.S. Department of Justice FY 2016 Budget Request NATIONAL SECURITY. +$106.8 Million in Program Increases. FY 2016 Overview
U.S. Department of Justice FY 2016 Budget Request NATIONAL SECURITY +$106.8 Million in Program Increases FY 2016 Overview Defending U.S. citizens from both internal and external threats remains the Department
FFIEC Cybersecurity Assessment Tool
Overview In light of the increasing volume and sophistication of cyber threats, the Federal Financial Institutions Examination Council 1 (FFIEC) developed the Cybersecurity Tool (), on behalf of its members,
FEDERAL RÉSUMÉ. Client Name PROFILE SUMMARY
A d d r e s s C i t y, S t a t e Z i p FEDERAL RÉSUMÉ Client Name E m a i l A d d r e s s P h o n e N u m b e r Citizenship: U.S. Citizen Veteran Status: Retired Job Announcement Number: ABDC-4894892 Job
GLOBAL PROPERTY. Commercial Property START
Commercial Property START A LEADER About Global Property AIG s Global Property division brings sophisticated and extensive capabilities to our clients risk management programs. AIG s unrivalled worldwide
COUNTERINTELLIGENCE. Protecting Key Assets: A Corporate Counterintelligence Guide
COUNTERINTELLIGENCE O F F I C E O F T H E N A T I O N A L C O U N T E R I N T E L L I G E N C E Protecting Key Assets: A Corporate Counterintelligence Guide E X E C U T I V E Counterintelligence for the
Department of Defense DIRECTIVE
Department of Defense DIRECTIVE NUMBER 5505.13E March 1, 2010 ASD(NII)/DoD CIO SUBJECT: DoD Executive Agent (EA) for the DoD Cyber Crime Center (DC3) References: See Enclosure 1 1. PURPOSE. This Directive:
Network Management and Defense Telos offers a full range of managed services for:
Network Management and Defense Telos offers a full range of managed services for: Network Management Operations Defense Cybersecurity and Information Assurance Software and Application Assurance Telos:
Department of Defense INSTRUCTION
Department of Defense INSTRUCTION SUBJECT: National Defense Intelligence College University (NDIC NIU) NUMBER 3305.01 December 22, 2006 Incorporating Change 1, February 9, 2011 USD(I) References: (a) DoD
EDWARD G. LEWIS 556 East Gill Way, Superior, Colorado 80027-8002 Tel: 303-494-6537; Fax: 303-494-0645; E-Mail: [email protected]
556 East Gill Way, Superior, Colorado 80027-8002 Tel: 303-494-6537; Fax: 303-494-0645; E-Mail: [email protected] PROFESSIONAL EXPERIENCE 2001 - Present Member, Board of Directors, National Veterans Business
INTELLIGENCE AND ANALYSIS
OFFICE OF INTELLIGENCE AND ANALYSIS U.S. DEPARTMENT OF THE TREASURY WORKING AT OIA OIA S MISSION POSITION DESCRIPTIONS BENEFITS & CONTACT INFORMATION working at oia OIA officers support the formulation
Developing a Mature Security Operations Center
Developing a Mature Security Operations Center Introduction Cybersecurity in the federal government is at a crossroads. Each month, there are more than 1.8 billion attacks on federal agency networks, and
Hearing before the House Permanent Select Committee on Intelligence. Homeland Security and Intelligence: Next Steps in Evolving the Mission
Hearing before the House Permanent Select Committee on Intelligence Homeland Security and Intelligence: Next Steps in Evolving the Mission 18 January 2012 American expectations of how their government
Law Enforcement and Homeland Security Anti-Terrorism Training
Law Enforcement and Homeland Security Anti-Terrorism Training Our Experience Influences Your Success Florida Department of Law Enforcement A close partnership was developed between FDLE and ASERO while
AT A HEARING ENTITLED THREATS TO THE HOMELAND
STATEMENT OF JAMES B. COMEY DIRECTOR FEDERAL BUREAU OF INVESTIGATION BEFORE THE COMMITTEE ON HOMELAND SECURITY AND GOVERNMENTAL AFFAIRS UNITED STATES SENATE AT A HEARING ENTITLED THREATS TO THE HOMELAND
Manned Information Security
Manned Information Security Adversary Pursuit and Active Network Defense root9b Technologies (RTNB) Presented By: John Harbaugh, COO CONFIDENTIALITY NOTICE This briefing, including any attachments, is
STATE OF MARYLAND Strategy for Homeland Security
STATE OF MARYLAND Strategy for Homeland Security Published June 2004 Governor s Office of Homeland Security Dennis R. Schrader, Director Robert L. Ehrlich, Jr. Governor Michael S. Steele Lt. Governor HOMELAND
Cyber Security Awareness Workshop
December 5, 2012 War Memorial Building, Balboa Park Participant Guide The San Diego Cyber Security Threat Awareness Response and Recovery Program (C-STARR) is hosted by the City of San Diego and the Securing
STATEMENT OF MR. THOMAS ATKIN ACTING ASSISTANT SECRETARY OF DEFENSE FOR HOMELAND DEFENSE AND GLOBAL SECURITY OFFICE OF THE SECRETARY OF DEFENSE;
STATEMENT OF MR. THOMAS ATKIN ACTING ASSISTANT SECRETARY OF DEFENSE FOR HOMELAND DEFENSE AND GLOBAL SECURITY OFFICE OF THE SECRETARY OF DEFENSE; LIEUTENANT GENERAL JAMES K. MCLAUGHLIN DEPUTY COMMANDER,
Department of Defense INSTRUCTION. Measurement and Signature Intelligence (MASINT)
Department of Defense INSTRUCTION NUMBER 5105.58 April 22, 2009 USD(I) SUBJECT: Measurement and Signature Intelligence (MASINT) References: See Enclosure 1 1. PURPOSE. This Instruction reissues DoD Instruction
SOTERIA. Understanding, Training, Contingency. Understanding, Training, Contingency
SOTERIA Understanding, Training, Contingency Understanding, Training, Contingency Keel Strategic s formation in 2010 was the collaborative work of a number of people from across the emerging investment
How To Protect Your It Infrastructure
Proactive Real-Time Monitoring and Risk Management Managed Security Services NCS Group Offices Australia Bahrain Brunei China Dubai Hong Kong SAR Korea Malaysia Philippines Singapore Sri Lanka Understanding
State Homeland Security Strategy (2012)
Section 1 > Introduction Purpose The purpose of the State Homeland Security Strategy (SHSS) is to identify statewide whole community priorities to achieve and sustain a strengthened ability to prevent,
Cyber Incident Annex. Federal Coordinating Agencies. Coordinating Agencies. ITS-Information Technology Systems
Cyber Incident Annex Coordinating Agencies ITS-Information Technology Systems Support Agencies Mississippi Department of Homeland Security Mississippi Emergency Management Agency Mississippi Department
Organizational Security Track FAQ
Organizational Security Track FAQ What do organizational security management professionals do? Organizational security management professionals are employed by organizations (corporations, partnerships,
Middle Class Economics: Cybersecurity Updated August 7, 2015
Middle Class Economics: Cybersecurity Updated August 7, 2015 The President's 2016 Budget is designed to bring middle class economics into the 21st Century. This Budget shows what we can do if we invest
DoD CIVILIAN LEADER DEVELOPMENT FRAMEWORK COMPETENCY DEFINITIONS. Leading Change
DoD CIVILIAN LEADER DEVELOPMENT FRAMEWORK COMPETENCY DEFINITIONS Leading Change Definition: This core competency involves the ability to bring about strategic change, both within and outside the organization,
Deputy Chief Financial Officer Peggy Sherry. And. Chief Information Security Officer Robert West. U.S. Department of Homeland Security.
Deputy Chief Financial Officer Peggy Sherry And Chief Information Security Officer Robert West U.S. Department of Homeland Security Testimony Before the Subcommittee on Government Organization, Efficiency
Enterprise IT. Aligning Strong Solutions, Assuring Enterprise Strength
Enterprise IT Aligning Strong Solutions, Assuring Enterprise Strength Strategic planning aligns your enterprise IT infrastructure with your mission, operational and efficiency goals. From the start, we
Department of Defense DIRECTIVE
Department of Defense DIRECTIVE NUMBER 5144.02 November 21, 2014 DCMO SUBJECT: DoD Chief Information Officer (DoD CIO) References: See Enclosure 1. PURPOSE. Under the authority vested in the Secretary
GAO COMBATING TERRORISM. Comments on Counterterrorism Leadership and National Strategy. Testimony
GAO United States General Accounting Office Testimony Before the Subcommittee on National Security, Veterans Affairs, and International Relations, Committee on Government Reform, House of Representatives
Emergency Support Function (ESF) #5 Emergency Management. ESF Coordinator: St. Louis County Police Department, Office of Emergency Management (OEM)
Emergency Support Function (ESF) #5 Emergency Management ESF Coordinator: St. Louis County Police Department, Office of Emergency Management (OEM) Primary Department: St. Louis County Police Department,
Edmund E. Perea J.D, Esq
Edmund E. Perea J.D, Esq Attorney at Law P.O.Box 65340 Albuquerque New Mexico 87193 505-720-3822 [email protected] Office of Civil Rights U.S. Department of Justice Settlement Agreement regarding the
PHILADELPHIA POLICE DEPARTMENT DIRECTIVE 7.17
PHILADELPHIA POLICE DEPARTMENT DIRECTIVE 7.17 Issued Date:01-29-15 Effective Date:01-29-15 Updated Date: SUBJECT: DELAWARE VALLEY INTELLIGENCE CENTER UNIT 1. BACKGROUND A. The Delaware Valley Intelligence
