C2 Integration has extensive knowledge, experience, and capability to help secure your supply chains, protect your intellectual property and R&D, ensure the integrity of critical technology, and detect and guard against threats to critical infrastructure and its industrial base. C2I’s Supply Chain Risk Management (SCRM) threat detection, identification, and mitigation program covers down all the following areas and more: Critical Technology Protection (CTP), Intellectual Property (IP) Protection, Counter-Proliferation (CP), Public Health Preparedness and Supply Chain Resilience, Critical Infrastructure Protection and its industrial base (e.g., Power Grid, Pharmaceutical, Agriculture, and Transportation), Information Communications Technology (ICT) supply chain, the Defense Industrial Base (DIB), and the National Security Industrial Base (NSIB).
We utilize skill sets such as Law Enforcement Investigations Techniques, Identity Intelligence (I2), All-Source Intelligence, Counter Networks analysis, and Export Controls and Compliance Oversight/Monitoring. All-in-all, our products, and processes typically include the following components: Open source and publicly available information collection, analysis, production, exploitation. We also offer assistance with planning, administration, investigation, devising or refining policy and procedures, strategy development, etc.
We have a network of subject matter expert small business partners and, through our teaming arrangements with them, can offer additional combined services and product packages (e.g., subject matter expert analytical production bundled with Artificial intelligence- Machine Learning-Deep Learning-Computer Vision- language translation (AI/ML) tools).
CAGE CODE: 87EL6
NAICS Codes: 332999, 339999, 511210 , 517911, 517919, 541330, 541611, 541614, 541618, 541690, 541990 , 561110 , 561611 , 561990, 611430, 611699
Copyright © 2022 C2Integration - All Rights Reserved.