C2Integration
C2Integration
  • Home
  • About Us
    • Philosophy
    • Leadership
    • Senior Advisors
    • Our Partners
  • Government
    • Capabilities Statement
    • Contracts
    • Past Performance
    • NAICS and PSC Codes
  • Products
    • At A Glance
    • Our Products and Services
    • Training and Education
  • Careers
    • Careers
    • Apply Now
  • Contact Us
  • Blog
  • More
    • Home
    • About Us
      • Philosophy
      • Leadership
      • Senior Advisors
      • Our Partners
    • Government
      • Capabilities Statement
      • Contracts
      • Past Performance
      • NAICS and PSC Codes
    • Products
      • At A Glance
      • Our Products and Services
      • Training and Education
    • Careers
      • Careers
      • Apply Now
    • Contact Us
    • Blog
  • Sign In

  • My Account
  • Signed in as:

  • filler@godaddy.com


  • My Account
  • Sign out

Signed in as:

filler@godaddy.com

  • Home
  • About Us
    • Philosophy
    • Leadership
    • Senior Advisors
    • Our Partners
  • Government
    • Capabilities Statement
    • Contracts
    • Past Performance
    • NAICS and PSC Codes
  • Products
    • At A Glance
    • Our Products and Services
    • Training and Education
  • Careers
    • Careers
    • Apply Now
  • Contact Us
  • Blog

Account


  • My Account
  • Sign out


  • Sign In
  • My Account

AT A GLANCE

CORE COMPETENCIES:   
 

C2 Integration has extensive knowledge, experience, and capability to help secure your supply chains, protect your intellectual property and R&D, ensure the integrity of critical technology, and detect and guard against threats to critical infrastructure and its industrial base.  C2I’s Supply Chain Risk Management (SCRM) threat detection, identification, and mitigation program covers down all the following areas and more: Critical Technology Protection (CTP), Intellectual Property (IP) Protection, Counter-Proliferation (CP), Public Health Preparedness and Supply Chain Resilience, Critical Infrastructure Protection and its industrial base (e.g., Power Grid, Pharmaceutical, Agriculture, and Transportation), Information Communications Technology (ICT) supply chain, the Defense Industrial Base (DIB), and the National Security Industrial Base (NSIB).   


We utilize skill sets such as Law Enforcement Investigations Techniques, Identity Intelligence (I2), All-Source Intelligence, Counter Networks analysis, and Export Controls and Compliance Oversight/Monitoring.  All-in-all, our products, and processes typically include the following components:  Open source and publicly available information collection, analysis, production, exploitation.  We also offer assistance with planning, administration, investigation, devising or refining policy and procedures, strategy development, etc.  

We have a network of subject matter expert small business partners and, through our teaming arrangements with them, can offer additional combined services and product packages (e.g., subject matter expert analytical production bundled with Artificial intelligence- Machine Learning-Deep Learning-Computer Vision- language translation (AI/ML) tools).  


View our SCRM Slick Sheet Here


CAGE CODE: 87EL6 

DUNS: 0831392934 

NAICS Codes: 332999, 339999, 511210 , 517911, 517919, 541330, 541611, 541614, 541618, 541690, 541990 , 561110 , 561611 , 561990, 611430, 611699 


Copyright © 2024 C2Integration - All Rights Reserved.