You are on page 1of 18

CAPTURE PLAN

SECURITY TECHNOLOGY COMPANY


Program Overview

Why Pursue Security Technology Business?

Plan of Action and Milestones (POA&M)

Client Environment

Analysis of Competition

Why the Team?

Win Strategy
Program Overview:
• Deliver turn-key security technology solutions to the Iraq
market and other markets in the region
• Perform risk analysis and vulnerability assessments for key
infrastructure and transportation assets throughout the
country as a precursor to delivering technology solutions
• Identify and recommend appropriate technology solutions
to mitigate risks and counter terrorist and other criminal
actions
• Perform design, installation, test, maintenance and
operations support for delivered solutions
• Develop a "tool box" of technology [people, procedures and
equipment] to be used to support the foregoing activities
• Provide “business intelligence” support for companies
interested in doing business in the region
Program Overview (cont’d):

• Provide the following training and support:


• Physical security, emergency response team
• Continuity of operations planning, exercise and evaluation
• Incident counteraction planning, exercise and evaluation
• Risk analysis, vulnerability assessment best practices
• Transportation and key asset protection [KAP]
Program Overview

Why Pursue Security Technology Business?

Plan of Action and Milestones (POA&M)

Client Environment

Analysis of Competition

Why the Team?

Win Strategy
MARKET IS HUGE!
THE MARKET IS HUGE!

Transportation
Information &
Communications
Hospital and
Medical Government
Services

Water
Supply
Electric
Power
Banking &
Finance Oil & Gas
Production and
Storage
Program Overview

Why Pursue Security Technology Business?

Plan of Action and Milestones (POA&M)

Client Environment

Analysis of Competition

Why the Team?

Win Strategy
Program Overview

Why Pursue Security Technology Business?

Plan of Action and Milestones (POA&M)

Client Environment

Analysis of Competition

Why the Team?

Win Strategy
Program Overview

Why Pursue Security Technology Business?

Plan of Action and Milestones (POA&M)

Client Environment

Analysis of Competition

Why the Team?

Win Strategy
Program Overview

Why Pursue Security Technology Business?

Plan of Action and Milestones (POA&M)

Client Environment

Analysis of Competition

Why the Team?

Win Strategy
Why the Team?
 Technical security operations experience including
requirements analysis, systems evaluation, design &
implementation.
 Hands-on experience in all aspects of crisis
management planning, analysis & operations.
 Security assessments of federal / state government
facilities & metropolitan transit systems with specific
experience relating to critical infrastructure analysis
following the events of September 11, 2001.
 Developed a model incident counter-measures (anti-
terrorism) program structure to be used as an aid in
mitigating terrorist, criminal, and insider threats.
Why the Team?

 Extensive knowledge and understanding of technical


security requirements and standards.
 Experience in technical security programs to include
aviation (Port Authority of NY and NJ, JFK IAP, MIAP,
Regan National, Hong Kong International, and entire
program for USAIR), ports, and government facilities.
 Participated in various risk and vulnerability
assessments of critical infrastructure following 9/11.
 Extensive experience working in Iraq outside secure
areas since January 2004 and performed various
security analyses in Iraq since June 2004.
 Extensive experience working in Iraq, with Iraqis.
Understanding the Requirement
Understanding the Requirement
Program Overview

Why Pursue Security Technology Business?

Plan of Action and Milestones (POA&M)

Client Environment

Analysis of Competition

Why the Team?

Win Strategy
www.bhdefense.com

You might also like