C2Integration

C2IntegrationC2IntegrationC2Integration

C2Integration

C2IntegrationC2IntegrationC2Integration
  • Home
  • About Us
    • Philosophy
    • Leadership
    • Senior Advisors
    • Our Partners
  • Government
    • Capabilities Statement
    • Contracts
    • Past Performance
    • NAICS and PSC Codes
  • Products
    • At A Glance
    • Our Products and Services
    • Training and Education
    • Compliance Monitoring
  • Careers
    • Careers
    • Apply Now
  • Contact Us
  • Blog
  • More
    • Home
    • About Us
      • Philosophy
      • Leadership
      • Senior Advisors
      • Our Partners
    • Government
      • Capabilities Statement
      • Contracts
      • Past Performance
      • NAICS and PSC Codes
    • Products
      • At A Glance
      • Our Products and Services
      • Training and Education
      • Compliance Monitoring
    • Careers
      • Careers
      • Apply Now
    • Contact Us
    • Blog
  • Home
  • About Us
    • Philosophy
    • Leadership
    • Senior Advisors
    • Our Partners
  • Government
    • Capabilities Statement
    • Contracts
    • Past Performance
    • NAICS and PSC Codes
  • Products
    • At A Glance
    • Our Products and Services
    • Training and Education
    • Compliance Monitoring
  • Careers
    • Careers
    • Apply Now
  • Contact Us
  • Blog

AT A GLANCE

CORE COMPETENCIES:   
 

C2 Integration has extensive knowledge, experience, and capability to help secure your supply chains, protect your intellectual property and R&D, ensure the integrity of critical technology, and detect and guard against threats to critical infrastructure and its industrial base.  C2I’s Supply Chain Risk Management (SCRM) threat detection, identification, and mitigation program covers down all the following areas and more: Critical Technology Protection (CTP), Intellectual Property (IP) Protection, Counter-Proliferation (CP), Public Health Preparedness and Supply Chain Resilience, Critical Infrastructure Protection and its industrial base (e.g., Power Grid, Pharmaceutical, Agriculture, and Transportation), Information Communications Technology (ICT) supply chain, the Defense Industrial Base (DIB), and the National Security Industrial Base (NSIB).   


We utilize skill sets such as Law Enforcement Investigations Techniques, Identity Intelligence (I2), All-Source Intelligence, Counter Networks analysis, and Export Controls and Compliance Oversight/Monitoring.  All-in-all, our products, and processes typically include the following components:  Open source and publicly available information collection, analysis, production, exploitation.  We also offer assistance with planning, administration, investigation, devising or refining policy and procedures, strategy development, etc.  

We have a network of subject matter expert small business partners and, through our teaming arrangements with them, can offer additional combined services and product packages (e.g., subject matter expert analytical production bundled with Artificial intelligence- Machine Learning-Deep Learning-Computer Vision- language translation (AI/ML) tools).  


View our SCRM Slick Sheet Here


CAGE CODE: 87EL6 

DUNS: 0831392934 

NAICS Codes: 332999, 339999, 511210 , 517911, 517919, 541330, 541611, 541614, 541618, 541690, 541990 , 561110 , 561611 , 561990, 611430, 611699 


Copyright © 2023 C2Integration - All Rights Reserved.