SlideShare une entreprise Scribd logo
1  sur  29
2437 Bay Area Blvd., Suite 140 Houston, Texas 77058 Phone: 832-588-5362
You are on the top of the world! Because you have just closed the largest overseas deal ever for your company.
Suddenly you hear gunshots - And the next thing that you see is
 
You Are In Shock –  What Just Happened?
You have just been kidnapped!
There are  only  two possible outcomes - Which outcome would you prefer?
It All Counts! ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Following The 6 P’s P rior P roper P lanning   P revents P oor    P erformance Waterborne Operations Aviation Operations Intelligence Operations Center Protective Details P&I Tactical Training
People take hostages all over the world Sometimes it’s purely terror and intimidation,  sometimes it is just about money They make a demand AGR starts negotiating This is just one thing that we do the world over and we are very good at what we do
The world is full of threats which change daily from city to city and country to country. Making the world safer for you to do business. A crisis can erupt at anytime in any place 24 hours a day 365 days a year.
Global Threats Kidnappings Terrorism Major Financial Crimes Drug Offences Hazardous Environments Source: NationMaster.com 1 2 6 3 4 8 9 5 10 7
The War on Terror
Who is Alliance Group Research (AGR)? We are many things to many people, some even compare us to -
 
AGR provides many of the same services of numerous government agencies for both private corporations and governments foreign and domestic. However, when the government is called in - ,[object Object],[object Object],[object Object],[object Object]
Business Description ,[object Object],[object Object],[object Object],AGR operates three distinctive divisions; P rotection I ntelligence T echnology P.I.T.   –  Controlled Striking Power
AG Research Management and Staff ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Operational Expertise Richard B. Cole , President and Chief Executive Officer Member  ­  Information Systems Security Association Member – Federal Bureau of Investigation (FBI)   Infragard Houston Members Alliance Experience and Expertise includes –  Sales and Marketing Startup Ventures Sales Force Development Sales Organization Capital Formation Reorganizations Strategic Analysis Strategic Partnerships High Profile Client Relations Product Line Launch Product Development Distribution Line Development Market Analysis Financial Analysis Operational Budgets Forecasting Cash Management Business Strategies Public Relations Contract Negotiations Human Resources Financial Oversight Legal Oversight Board Organization
Technical Expertise Ross A. Leo,  President – Technology Services Division CISSP  – Certified Information Security Systems Professional CISM  -  Certified Information Systems Manager ABCP  -  Associate Business Continuity Planner CHS III – Certified Homeland Security Technical Expertise Systems Analysis and Design Information Security Program Development and Execution Risk Management Programs Design and Implementation Site Planning and Installation Disaster Recovery/Contingency Planning Configuration Management and Control Network Analysis, Planning, and Installation Information Systems Auditing Information Technology Assessment and Impact Analysis Facilities Management and Maintenance (Centralized)
Protection and Intelligence Expertise Wolfgang W. Ziegler , President - Protection and Intelligence Division Chief Security Officer CPP - Certified Protection Professional  PCI - Professional Certified Investigator  CHS-III – Certified Homeland Security Certified Hostage Negotiator Protection/Intelligence Expertise includes -  Complex Investigations    Organized Crime  Computer Crimes Racketeering   Fraud  Embezzlement Narcotics Smuggling    Homicides  Surveillance Drug Enforcement   Sex Crimes  Counter Surveillance Conspiracies       Money Laundering Interrogation Search and Seizure   Hazardous Environments Survival Training  Smuggling Trends   Violator Identification Threat Assessment Electronic Crimes    Advanced Explosives HAZMAT Security Awareness    Dignitary Protection  Mobility Licensed Airline Transport Pilot, Fixed Wing Aircraft including  Single Engine, Multi-engine, Executive and Boeing Jets
Service Offerings AGR delivers interwoven reliable options and advanced technologies to safeguard information, human and physical assets. Our options create an agile yet highly secure operational environment necessary for today’s ever changing threats. Litigation Support Human Asset Protection Knowledge Transfer Information Systems Security Physical Asset Protection Alliance Group Research
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Providing Global Coverage 1 2 6 3 4 8 9 5 10 7   Corporate Headquarters Areas of Operation
Corporate & Professional Affiliations ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Interesting Kidnapping Statistics* Less than 30% of all kidnappings are reported and involved -   23% Business People   27% Dependents of Business People i.e., Spouse, Children, Parents   14% Non-professional Employees   8% Journalists   8% Government Officials   3% Project Engineers  Kidnappings occurred in –  73% Latin America 15% Asia Pacific   9% former Eastern Block and Soviet Union and Africa   3% North America * Source KR&E Insurance
Breaking Headline News Bomb explosion kills man in  Vegas outside Luxor hotel  You never know – Who, Where, When, Why or How 6 Bomb-Plot Suspects Have  Medical Ties   Men drive blazing jeep into Glasgow  airport in new attack   Mexican politician slain in city as he drove down a main city road in Monterrey   Mexico suspends almost 300 high-ranking Federal police officers for corruption   London Bombing London Bomber Neurosurgeon Luxor Hotel – Las Vegas Mexico Federal Police Corruption
Some Relate AGR and  The Services We Perform To -
By Taking Risk Seriously Makes The World Safer For You To Do Business.

Contenu connexe

Tendances

Cyber Threat Intelligence
Cyber Threat IntelligenceCyber Threat Intelligence
Cyber Threat Intelligenceseadeloitte
 
Mitigating Malware Presentation Jkd 11 10 08 Aitp
Mitigating Malware Presentation Jkd 11 10 08 AitpMitigating Malware Presentation Jkd 11 10 08 Aitp
Mitigating Malware Presentation Jkd 11 10 08 AitpJoann Davis
 
5 Steps to Securing Your Company's Crown Jewels
5 Steps to Securing Your Company's Crown Jewels5 Steps to Securing Your Company's Crown Jewels
5 Steps to Securing Your Company's Crown JewelsIBM Security
 
Is it a Risk to Be Compliant?
Is it a Risk to Be Compliant?Is it a Risk to Be Compliant?
Is it a Risk to Be Compliant?PECB
 
Cybersecurity is a Team Sport: How to Use Teams, Strategies, and Processes to...
Cybersecurity is a Team Sport: How to Use Teams, Strategies, and Processes to...Cybersecurity is a Team Sport: How to Use Teams, Strategies, and Processes to...
Cybersecurity is a Team Sport: How to Use Teams, Strategies, and Processes to...Shawn Tuma
 
A CIRO's-eye view of Digital Risk Management
A CIRO's-eye view of Digital Risk ManagementA CIRO's-eye view of Digital Risk Management
A CIRO's-eye view of Digital Risk ManagementDaren Dunkel
 
Cybersecurity in the Boardroom
Cybersecurity in the BoardroomCybersecurity in the Boardroom
Cybersecurity in the BoardroomMarko Suswanto
 
Isaca houston presentation 12 4 12
Isaca houston presentation 12 4 12Isaca houston presentation 12 4 12
Isaca houston presentation 12 4 12Patrick Florer
 
Big Iron to Big Data Analytics for Security, Compliance, and the Mainframe
Big Iron to Big Data Analytics for Security, Compliance, and the MainframeBig Iron to Big Data Analytics for Security, Compliance, and the Mainframe
Big Iron to Big Data Analytics for Security, Compliance, and the MainframePrecisely
 
Fundamentals of Information Systems Security Chapter 4
Fundamentals of Information Systems Security Chapter 4Fundamentals of Information Systems Security Chapter 4
Fundamentals of Information Systems Security Chapter 4Dr. Ahmed Al Zaidy
 
Enterprise cyber security
Enterprise cyber securityEnterprise cyber security
Enterprise cyber securitynsheel
 
Data Breach Response is a Team Sport
Data Breach Response is a Team SportData Breach Response is a Team Sport
Data Breach Response is a Team SportQuarles & Brady
 
Learning from Verizon 2017 Data Breach Investigations Report – The New Targets
Learning from Verizon 2017 Data Breach Investigations Report – The New TargetsLearning from Verizon 2017 Data Breach Investigations Report – The New Targets
Learning from Verizon 2017 Data Breach Investigations Report – The New TargetsUlf Mattsson
 
Practical approach to combating cyber crimes
Practical approach to combating cyber crimesPractical approach to combating cyber crimes
Practical approach to combating cyber crimesChinatu Uzuegbu
 
Aceds 2015 Cyberseucity and the Legal Profession - NYC - April 7, 2015
Aceds 2015 Cyberseucity and the Legal Profession - NYC - April 7, 2015Aceds 2015 Cyberseucity and the Legal Profession - NYC - April 7, 2015
Aceds 2015 Cyberseucity and the Legal Profession - NYC - April 7, 2015Joe Bartolo
 
Leveraging Board Governance for Cybersecurity
Leveraging Board Governance for CybersecurityLeveraging Board Governance for Cybersecurity
Leveraging Board Governance for CybersecurityShareDocView.com
 
Preserving the Privilege during Breach Response
Preserving the Privilege during Breach ResponsePreserving the Privilege during Breach Response
Preserving the Privilege during Breach ResponsePriyanka Aash
 
Defending Critical Infrastructure Against Cyber Attacks
Defending Critical Infrastructure Against Cyber AttacksDefending Critical Infrastructure Against Cyber Attacks
Defending Critical Infrastructure Against Cyber AttacksTripwire
 
Cyber Security Planning: Preparing for a Data Breach
Cyber Security Planning: Preparing for a Data BreachCyber Security Planning: Preparing for a Data Breach
Cyber Security Planning: Preparing for a Data BreachFletcher Media
 

Tendances (20)

Cyber Threat Intelligence
Cyber Threat IntelligenceCyber Threat Intelligence
Cyber Threat Intelligence
 
Mitigating Malware Presentation Jkd 11 10 08 Aitp
Mitigating Malware Presentation Jkd 11 10 08 AitpMitigating Malware Presentation Jkd 11 10 08 Aitp
Mitigating Malware Presentation Jkd 11 10 08 Aitp
 
5 Steps to Securing Your Company's Crown Jewels
5 Steps to Securing Your Company's Crown Jewels5 Steps to Securing Your Company's Crown Jewels
5 Steps to Securing Your Company's Crown Jewels
 
Is it a Risk to Be Compliant?
Is it a Risk to Be Compliant?Is it a Risk to Be Compliant?
Is it a Risk to Be Compliant?
 
Cybersecurity is a Team Sport: How to Use Teams, Strategies, and Processes to...
Cybersecurity is a Team Sport: How to Use Teams, Strategies, and Processes to...Cybersecurity is a Team Sport: How to Use Teams, Strategies, and Processes to...
Cybersecurity is a Team Sport: How to Use Teams, Strategies, and Processes to...
 
A CIRO's-eye view of Digital Risk Management
A CIRO's-eye view of Digital Risk ManagementA CIRO's-eye view of Digital Risk Management
A CIRO's-eye view of Digital Risk Management
 
Cybersecurity in the Boardroom
Cybersecurity in the BoardroomCybersecurity in the Boardroom
Cybersecurity in the Boardroom
 
Isaca houston presentation 12 4 12
Isaca houston presentation 12 4 12Isaca houston presentation 12 4 12
Isaca houston presentation 12 4 12
 
Big Iron to Big Data Analytics for Security, Compliance, and the Mainframe
Big Iron to Big Data Analytics for Security, Compliance, and the MainframeBig Iron to Big Data Analytics for Security, Compliance, and the Mainframe
Big Iron to Big Data Analytics for Security, Compliance, and the Mainframe
 
Fundamentals of Information Systems Security Chapter 4
Fundamentals of Information Systems Security Chapter 4Fundamentals of Information Systems Security Chapter 4
Fundamentals of Information Systems Security Chapter 4
 
Enterprise cyber security
Enterprise cyber securityEnterprise cyber security
Enterprise cyber security
 
Data Breach Response is a Team Sport
Data Breach Response is a Team SportData Breach Response is a Team Sport
Data Breach Response is a Team Sport
 
In the news
In the newsIn the news
In the news
 
Learning from Verizon 2017 Data Breach Investigations Report – The New Targets
Learning from Verizon 2017 Data Breach Investigations Report – The New TargetsLearning from Verizon 2017 Data Breach Investigations Report – The New Targets
Learning from Verizon 2017 Data Breach Investigations Report – The New Targets
 
Practical approach to combating cyber crimes
Practical approach to combating cyber crimesPractical approach to combating cyber crimes
Practical approach to combating cyber crimes
 
Aceds 2015 Cyberseucity and the Legal Profession - NYC - April 7, 2015
Aceds 2015 Cyberseucity and the Legal Profession - NYC - April 7, 2015Aceds 2015 Cyberseucity and the Legal Profession - NYC - April 7, 2015
Aceds 2015 Cyberseucity and the Legal Profession - NYC - April 7, 2015
 
Leveraging Board Governance for Cybersecurity
Leveraging Board Governance for CybersecurityLeveraging Board Governance for Cybersecurity
Leveraging Board Governance for Cybersecurity
 
Preserving the Privilege during Breach Response
Preserving the Privilege during Breach ResponsePreserving the Privilege during Breach Response
Preserving the Privilege during Breach Response
 
Defending Critical Infrastructure Against Cyber Attacks
Defending Critical Infrastructure Against Cyber AttacksDefending Critical Infrastructure Against Cyber Attacks
Defending Critical Infrastructure Against Cyber Attacks
 
Cyber Security Planning: Preparing for a Data Breach
Cyber Security Planning: Preparing for a Data BreachCyber Security Planning: Preparing for a Data Breach
Cyber Security Planning: Preparing for a Data Breach
 

En vedette

APPNATION IV - SAP / Sanjay Poonen Keynote
APPNATION IV - SAP / Sanjay Poonen KeynoteAPPNATION IV - SAP / Sanjay Poonen Keynote
APPNATION IV - SAP / Sanjay Poonen KeynoteMasha Geller
 
Product work log
Product work logProduct work log
Product work logtravisball
 
9 principles of_brandingdxdd
9 principles of_brandingdxdd9 principles of_brandingdxdd
9 principles of_brandingdxddzishu1234
 
H-E-B Employee Communications
H-E-B Employee CommunicationsH-E-B Employee Communications
H-E-B Employee CommunicationsIABC Houston
 
The Reality Behind Your Webpresence
The Reality Behind Your WebpresenceThe Reality Behind Your Webpresence
The Reality Behind Your Webpresencecdoval
 
Julia Parra Research for VSS 2009
Julia Parra Research for VSS 2009Julia Parra Research for VSS 2009
Julia Parra Research for VSS 2009Julia Parra
 

En vedette (6)

APPNATION IV - SAP / Sanjay Poonen Keynote
APPNATION IV - SAP / Sanjay Poonen KeynoteAPPNATION IV - SAP / Sanjay Poonen Keynote
APPNATION IV - SAP / Sanjay Poonen Keynote
 
Product work log
Product work logProduct work log
Product work log
 
9 principles of_brandingdxdd
9 principles of_brandingdxdd9 principles of_brandingdxdd
9 principles of_brandingdxdd
 
H-E-B Employee Communications
H-E-B Employee CommunicationsH-E-B Employee Communications
H-E-B Employee Communications
 
The Reality Behind Your Webpresence
The Reality Behind Your WebpresenceThe Reality Behind Your Webpresence
The Reality Behind Your Webpresence
 
Julia Parra Research for VSS 2009
Julia Parra Research for VSS 2009Julia Parra Research for VSS 2009
Julia Parra Research for VSS 2009
 

Similaire à Alliance Group Research (AGR) Corporate Presentation

IT Security Services
IT Security ServicesIT Security Services
IT Security ServicesOmar Toor
 
The Legal Case for Cybersecurity - SecureWorld Denver 2017 (Lunch Keynote)
The Legal Case for Cybersecurity - SecureWorld Denver 2017 (Lunch Keynote)The Legal Case for Cybersecurity - SecureWorld Denver 2017 (Lunch Keynote)
The Legal Case for Cybersecurity - SecureWorld Denver 2017 (Lunch Keynote)Shawn Tuma
 
Protecting Law Firms and their Clients: The Role of the Virtual Chief Securit...
Protecting Law Firms and their Clients: The Role of the Virtual Chief Securit...Protecting Law Firms and their Clients: The Role of the Virtual Chief Securit...
Protecting Law Firms and their Clients: The Role of the Virtual Chief Securit...Eric Vanderburg
 
ION-E Defense In Depth Presentation for The Institiute of Internal Auditors
ION-E Defense In Depth Presentation for The Institiute of Internal AuditorsION-E Defense In Depth Presentation for The Institiute of Internal Auditors
ION-E Defense In Depth Presentation for The Institiute of Internal Auditorsmdagrossa
 
The Legal Case for Cybersecurity - SecureWorld Dallas 2017 (Lunch Keynote)
The Legal Case for Cybersecurity - SecureWorld Dallas 2017 (Lunch Keynote)The Legal Case for Cybersecurity - SecureWorld Dallas 2017 (Lunch Keynote)
The Legal Case for Cybersecurity - SecureWorld Dallas 2017 (Lunch Keynote)Shawn Tuma
 
InfraGard Webinar March 2016 033016 A
InfraGard Webinar March 2016 033016 AInfraGard Webinar March 2016 033016 A
InfraGard Webinar March 2016 033016 AWard Pyles
 
RiskWatch for Physical & Homeland Security™
RiskWatch for Physical & Homeland Security™RiskWatch for Physical & Homeland Security™
RiskWatch for Physical & Homeland Security™CPaschal
 
Protecting Accounting Firms and their Clients - Eric Vanderburg - JurInnov
Protecting Accounting Firms and their Clients - Eric Vanderburg - JurInnovProtecting Accounting Firms and their Clients - Eric Vanderburg - JurInnov
Protecting Accounting Firms and their Clients - Eric Vanderburg - JurInnovEric Vanderburg
 
The Legal Case for Cybersecurity
The Legal Case for CybersecurityThe Legal Case for Cybersecurity
The Legal Case for CybersecurityShawn Tuma
 
Incident Response
Incident Response Incident Response
Incident Response InnoTech
 
Cyber Six: Managing Security in Internet
Cyber Six: Managing Security in InternetCyber Six: Managing Security in Internet
Cyber Six: Managing Security in InternetRichardus Indrajit
 
Intelligence Analytics eBook: How DHS & the DOD are Leveraging Intelligence A...
Intelligence Analytics eBook: How DHS & the DOD are Leveraging Intelligence A...Intelligence Analytics eBook: How DHS & the DOD are Leveraging Intelligence A...
Intelligence Analytics eBook: How DHS & the DOD are Leveraging Intelligence A...Elizabeth Mixson
 
Information+security rutgers(final)
Information+security rutgers(final)Information+security rutgers(final)
Information+security rutgers(final)Amy Stowers
 
Bug Bounties, Ransomware, and Other Cyber Hype for Legal Counsel
Bug Bounties, Ransomware, and Other Cyber Hype for Legal CounselBug Bounties, Ransomware, and Other Cyber Hype for Legal Counsel
Bug Bounties, Ransomware, and Other Cyber Hype for Legal CounselCasey Ellis
 
Bug Bounties, Ransomware, and Other Cyber Hype for Legal Counsel
Bug Bounties, Ransomware, and Other Cyber Hype for Legal CounselBug Bounties, Ransomware, and Other Cyber Hype for Legal Counsel
Bug Bounties, Ransomware, and Other Cyber Hype for Legal Counselbugcrowd
 

Similaire à Alliance Group Research (AGR) Corporate Presentation (20)

IT Security Services
IT Security ServicesIT Security Services
IT Security Services
 
Cybersecurity - Sam Maccherola
Cybersecurity - Sam MaccherolaCybersecurity - Sam Maccherola
Cybersecurity - Sam Maccherola
 
The Legal Case for Cybersecurity - SecureWorld Denver 2017 (Lunch Keynote)
The Legal Case for Cybersecurity - SecureWorld Denver 2017 (Lunch Keynote)The Legal Case for Cybersecurity - SecureWorld Denver 2017 (Lunch Keynote)
The Legal Case for Cybersecurity - SecureWorld Denver 2017 (Lunch Keynote)
 
Protecting Law Firms and their Clients: The Role of the Virtual Chief Securit...
Protecting Law Firms and their Clients: The Role of the Virtual Chief Securit...Protecting Law Firms and their Clients: The Role of the Virtual Chief Securit...
Protecting Law Firms and their Clients: The Role of the Virtual Chief Securit...
 
ION-E Defense In Depth Presentation for The Institiute of Internal Auditors
ION-E Defense In Depth Presentation for The Institiute of Internal AuditorsION-E Defense In Depth Presentation for The Institiute of Internal Auditors
ION-E Defense In Depth Presentation for The Institiute of Internal Auditors
 
The Legal Case for Cybersecurity - SecureWorld Dallas 2017 (Lunch Keynote)
The Legal Case for Cybersecurity - SecureWorld Dallas 2017 (Lunch Keynote)The Legal Case for Cybersecurity - SecureWorld Dallas 2017 (Lunch Keynote)
The Legal Case for Cybersecurity - SecureWorld Dallas 2017 (Lunch Keynote)
 
InfraGard Webinar March 2016 033016 A
InfraGard Webinar March 2016 033016 AInfraGard Webinar March 2016 033016 A
InfraGard Webinar March 2016 033016 A
 
RiskWatch for Physical & Homeland Security™
RiskWatch for Physical & Homeland Security™RiskWatch for Physical & Homeland Security™
RiskWatch for Physical & Homeland Security™
 
Riverside Healthcare Accelerate Tech 2016 presentation
Riverside Healthcare Accelerate Tech 2016 presentationRiverside Healthcare Accelerate Tech 2016 presentation
Riverside Healthcare Accelerate Tech 2016 presentation
 
Protecting Accounting Firms and their Clients - Eric Vanderburg - JurInnov
Protecting Accounting Firms and their Clients - Eric Vanderburg - JurInnovProtecting Accounting Firms and their Clients - Eric Vanderburg - JurInnov
Protecting Accounting Firms and their Clients - Eric Vanderburg - JurInnov
 
The Legal Case for Cybersecurity
The Legal Case for CybersecurityThe Legal Case for Cybersecurity
The Legal Case for Cybersecurity
 
Incident Response
Incident Response Incident Response
Incident Response
 
Wilson Consulting Group
Wilson Consulting GroupWilson Consulting Group
Wilson Consulting Group
 
PDS_CSIRP_PRC
PDS_CSIRP_PRCPDS_CSIRP_PRC
PDS_CSIRP_PRC
 
Insider threat kill chain
Insider threat   kill chainInsider threat   kill chain
Insider threat kill chain
 
Cyber Six: Managing Security in Internet
Cyber Six: Managing Security in InternetCyber Six: Managing Security in Internet
Cyber Six: Managing Security in Internet
 
Intelligence Analytics eBook: How DHS & the DOD are Leveraging Intelligence A...
Intelligence Analytics eBook: How DHS & the DOD are Leveraging Intelligence A...Intelligence Analytics eBook: How DHS & the DOD are Leveraging Intelligence A...
Intelligence Analytics eBook: How DHS & the DOD are Leveraging Intelligence A...
 
Information+security rutgers(final)
Information+security rutgers(final)Information+security rutgers(final)
Information+security rutgers(final)
 
Bug Bounties, Ransomware, and Other Cyber Hype for Legal Counsel
Bug Bounties, Ransomware, and Other Cyber Hype for Legal CounselBug Bounties, Ransomware, and Other Cyber Hype for Legal Counsel
Bug Bounties, Ransomware, and Other Cyber Hype for Legal Counsel
 
Bug Bounties, Ransomware, and Other Cyber Hype for Legal Counsel
Bug Bounties, Ransomware, and Other Cyber Hype for Legal CounselBug Bounties, Ransomware, and Other Cyber Hype for Legal Counsel
Bug Bounties, Ransomware, and Other Cyber Hype for Legal Counsel
 

Plus de Richard Cole

Richard Cole Professional Portfolio
Richard Cole Professional PortfolioRichard Cole Professional Portfolio
Richard Cole Professional PortfolioRichard Cole
 
Richard B Cole Biography
Richard B Cole BiographyRichard B Cole Biography
Richard B Cole BiographyRichard Cole
 
Richard Cole Résumé
Richard Cole RésuméRichard Cole Résumé
Richard Cole RésuméRichard Cole
 
IT Security for Oil and Gas Companies
IT Security for Oil and Gas CompaniesIT Security for Oil and Gas Companies
IT Security for Oil and Gas CompaniesRichard Cole
 
Internet-based business model revs up savings for auto dealers
Internet-based business model revs up savings for auto dealersInternet-based business model revs up savings for auto dealers
Internet-based business model revs up savings for auto dealersRichard Cole
 
Technology boosts health care compliance, training systems
Technology boosts health care compliance, training systemsTechnology boosts health care compliance, training systems
Technology boosts health care compliance, training systemsRichard Cole
 

Plus de Richard Cole (7)

Richard Cole Professional Portfolio
Richard Cole Professional PortfolioRichard Cole Professional Portfolio
Richard Cole Professional Portfolio
 
Richard B Cole Biography
Richard B Cole BiographyRichard B Cole Biography
Richard B Cole Biography
 
Richard Cole Résumé
Richard Cole RésuméRichard Cole Résumé
Richard Cole Résumé
 
IT Security for Oil and Gas Companies
IT Security for Oil and Gas CompaniesIT Security for Oil and Gas Companies
IT Security for Oil and Gas Companies
 
Internet-based business model revs up savings for auto dealers
Internet-based business model revs up savings for auto dealersInternet-based business model revs up savings for auto dealers
Internet-based business model revs up savings for auto dealers
 
Technology boosts health care compliance, training systems
Technology boosts health care compliance, training systemsTechnology boosts health care compliance, training systems
Technology boosts health care compliance, training systems
 
Richard Cole SoQ
Richard Cole SoQRichard Cole SoQ
Richard Cole SoQ
 

Dernier

Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...
Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...
Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...Dipal Arora
 
Call Girls Pune Just Call 9907093804 Top Class Call Girl Service Available
Call Girls Pune Just Call 9907093804 Top Class Call Girl Service AvailableCall Girls Pune Just Call 9907093804 Top Class Call Girl Service Available
Call Girls Pune Just Call 9907093804 Top Class Call Girl Service AvailableDipal Arora
 
John Halpern sued for sexual assault.pdf
John Halpern sued for sexual assault.pdfJohn Halpern sued for sexual assault.pdf
John Halpern sued for sexual assault.pdfAmzadHosen3
 
Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...
Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...
Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...amitlee9823
 
👉Chandigarh Call Girls 👉9878799926👉Just Call👉Chandigarh Call Girl In Chandiga...
👉Chandigarh Call Girls 👉9878799926👉Just Call👉Chandigarh Call Girl In Chandiga...👉Chandigarh Call Girls 👉9878799926👉Just Call👉Chandigarh Call Girl In Chandiga...
👉Chandigarh Call Girls 👉9878799926👉Just Call👉Chandigarh Call Girl In Chandiga...rajveerescorts2022
 
Russian Call Girls In Gurgaon ❤️8448577510 ⊹Best Escorts Service In 24/7 Delh...
Russian Call Girls In Gurgaon ❤️8448577510 ⊹Best Escorts Service In 24/7 Delh...Russian Call Girls In Gurgaon ❤️8448577510 ⊹Best Escorts Service In 24/7 Delh...
Russian Call Girls In Gurgaon ❤️8448577510 ⊹Best Escorts Service In 24/7 Delh...lizamodels9
 
Boost the utilization of your HCL environment by reevaluating use cases and f...
Boost the utilization of your HCL environment by reevaluating use cases and f...Boost the utilization of your HCL environment by reevaluating use cases and f...
Boost the utilization of your HCL environment by reevaluating use cases and f...Roland Driesen
 
Cracking the Cultural Competence Code.pptx
Cracking the Cultural Competence Code.pptxCracking the Cultural Competence Code.pptx
Cracking the Cultural Competence Code.pptxWorkforce Group
 
Ensure the security of your HCL environment by applying the Zero Trust princi...
Ensure the security of your HCL environment by applying the Zero Trust princi...Ensure the security of your HCL environment by applying the Zero Trust princi...
Ensure the security of your HCL environment by applying the Zero Trust princi...Roland Driesen
 
Insurers' journeys to build a mastery in the IoT usage
Insurers' journeys to build a mastery in the IoT usageInsurers' journeys to build a mastery in the IoT usage
Insurers' journeys to build a mastery in the IoT usageMatteo Carbone
 
Call Girls in Gomti Nagar - 7388211116 - With room Service
Call Girls in Gomti Nagar - 7388211116  - With room ServiceCall Girls in Gomti Nagar - 7388211116  - With room Service
Call Girls in Gomti Nagar - 7388211116 - With room Servicediscovermytutordmt
 
The Coffee Bean & Tea Leaf(CBTL), Business strategy case study
The Coffee Bean & Tea Leaf(CBTL), Business strategy case studyThe Coffee Bean & Tea Leaf(CBTL), Business strategy case study
The Coffee Bean & Tea Leaf(CBTL), Business strategy case studyEthan lee
 
HONOR Veterans Event Keynote by Michael Hawkins
HONOR Veterans Event Keynote by Michael HawkinsHONOR Veterans Event Keynote by Michael Hawkins
HONOR Veterans Event Keynote by Michael HawkinsMichael W. Hawkins
 
B.COM Unit – 4 ( CORPORATE SOCIAL RESPONSIBILITY ( CSR ).pptx
B.COM Unit – 4 ( CORPORATE SOCIAL RESPONSIBILITY ( CSR ).pptxB.COM Unit – 4 ( CORPORATE SOCIAL RESPONSIBILITY ( CSR ).pptx
B.COM Unit – 4 ( CORPORATE SOCIAL RESPONSIBILITY ( CSR ).pptxpriyanshujha201
 
0183760ssssssssssssssssssssssssssss00101011 (27).pdf
0183760ssssssssssssssssssssssssssss00101011 (27).pdf0183760ssssssssssssssssssssssssssss00101011 (27).pdf
0183760ssssssssssssssssssssssssssss00101011 (27).pdfRenandantas16
 
7.pdf This presentation captures many uses and the significance of the number...
7.pdf This presentation captures many uses and the significance of the number...7.pdf This presentation captures many uses and the significance of the number...
7.pdf This presentation captures many uses and the significance of the number...Paul Menig
 
RSA Conference Exhibitor List 2024 - Exhibitors Data
RSA Conference Exhibitor List 2024 - Exhibitors DataRSA Conference Exhibitor List 2024 - Exhibitors Data
RSA Conference Exhibitor List 2024 - Exhibitors DataExhibitors Data
 
VIP Call Girls In Saharaganj ( Lucknow ) 🔝 8923113531 🔝 Cash Payment (COD) 👒
VIP Call Girls In Saharaganj ( Lucknow  ) 🔝 8923113531 🔝  Cash Payment (COD) 👒VIP Call Girls In Saharaganj ( Lucknow  ) 🔝 8923113531 🔝  Cash Payment (COD) 👒
VIP Call Girls In Saharaganj ( Lucknow ) 🔝 8923113531 🔝 Cash Payment (COD) 👒anilsa9823
 

Dernier (20)

Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...
Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...
Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...
 
Call Girls Pune Just Call 9907093804 Top Class Call Girl Service Available
Call Girls Pune Just Call 9907093804 Top Class Call Girl Service AvailableCall Girls Pune Just Call 9907093804 Top Class Call Girl Service Available
Call Girls Pune Just Call 9907093804 Top Class Call Girl Service Available
 
John Halpern sued for sexual assault.pdf
John Halpern sued for sexual assault.pdfJohn Halpern sued for sexual assault.pdf
John Halpern sued for sexual assault.pdf
 
Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...
Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...
Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...
 
👉Chandigarh Call Girls 👉9878799926👉Just Call👉Chandigarh Call Girl In Chandiga...
👉Chandigarh Call Girls 👉9878799926👉Just Call👉Chandigarh Call Girl In Chandiga...👉Chandigarh Call Girls 👉9878799926👉Just Call👉Chandigarh Call Girl In Chandiga...
👉Chandigarh Call Girls 👉9878799926👉Just Call👉Chandigarh Call Girl In Chandiga...
 
Russian Call Girls In Gurgaon ❤️8448577510 ⊹Best Escorts Service In 24/7 Delh...
Russian Call Girls In Gurgaon ❤️8448577510 ⊹Best Escorts Service In 24/7 Delh...Russian Call Girls In Gurgaon ❤️8448577510 ⊹Best Escorts Service In 24/7 Delh...
Russian Call Girls In Gurgaon ❤️8448577510 ⊹Best Escorts Service In 24/7 Delh...
 
Boost the utilization of your HCL environment by reevaluating use cases and f...
Boost the utilization of your HCL environment by reevaluating use cases and f...Boost the utilization of your HCL environment by reevaluating use cases and f...
Boost the utilization of your HCL environment by reevaluating use cases and f...
 
Cracking the Cultural Competence Code.pptx
Cracking the Cultural Competence Code.pptxCracking the Cultural Competence Code.pptx
Cracking the Cultural Competence Code.pptx
 
Ensure the security of your HCL environment by applying the Zero Trust princi...
Ensure the security of your HCL environment by applying the Zero Trust princi...Ensure the security of your HCL environment by applying the Zero Trust princi...
Ensure the security of your HCL environment by applying the Zero Trust princi...
 
Insurers' journeys to build a mastery in the IoT usage
Insurers' journeys to build a mastery in the IoT usageInsurers' journeys to build a mastery in the IoT usage
Insurers' journeys to build a mastery in the IoT usage
 
Call Girls in Gomti Nagar - 7388211116 - With room Service
Call Girls in Gomti Nagar - 7388211116  - With room ServiceCall Girls in Gomti Nagar - 7388211116  - With room Service
Call Girls in Gomti Nagar - 7388211116 - With room Service
 
The Coffee Bean & Tea Leaf(CBTL), Business strategy case study
The Coffee Bean & Tea Leaf(CBTL), Business strategy case studyThe Coffee Bean & Tea Leaf(CBTL), Business strategy case study
The Coffee Bean & Tea Leaf(CBTL), Business strategy case study
 
VVVIP Call Girls In Greater Kailash ➡️ Delhi ➡️ 9999965857 🚀 No Advance 24HRS...
VVVIP Call Girls In Greater Kailash ➡️ Delhi ➡️ 9999965857 🚀 No Advance 24HRS...VVVIP Call Girls In Greater Kailash ➡️ Delhi ➡️ 9999965857 🚀 No Advance 24HRS...
VVVIP Call Girls In Greater Kailash ➡️ Delhi ➡️ 9999965857 🚀 No Advance 24HRS...
 
HONOR Veterans Event Keynote by Michael Hawkins
HONOR Veterans Event Keynote by Michael HawkinsHONOR Veterans Event Keynote by Michael Hawkins
HONOR Veterans Event Keynote by Michael Hawkins
 
B.COM Unit – 4 ( CORPORATE SOCIAL RESPONSIBILITY ( CSR ).pptx
B.COM Unit – 4 ( CORPORATE SOCIAL RESPONSIBILITY ( CSR ).pptxB.COM Unit – 4 ( CORPORATE SOCIAL RESPONSIBILITY ( CSR ).pptx
B.COM Unit – 4 ( CORPORATE SOCIAL RESPONSIBILITY ( CSR ).pptx
 
0183760ssssssssssssssssssssssssssss00101011 (27).pdf
0183760ssssssssssssssssssssssssssss00101011 (27).pdf0183760ssssssssssssssssssssssssssss00101011 (27).pdf
0183760ssssssssssssssssssssssssssss00101011 (27).pdf
 
7.pdf This presentation captures many uses and the significance of the number...
7.pdf This presentation captures many uses and the significance of the number...7.pdf This presentation captures many uses and the significance of the number...
7.pdf This presentation captures many uses and the significance of the number...
 
RSA Conference Exhibitor List 2024 - Exhibitors Data
RSA Conference Exhibitor List 2024 - Exhibitors DataRSA Conference Exhibitor List 2024 - Exhibitors Data
RSA Conference Exhibitor List 2024 - Exhibitors Data
 
VIP Call Girls In Saharaganj ( Lucknow ) 🔝 8923113531 🔝 Cash Payment (COD) 👒
VIP Call Girls In Saharaganj ( Lucknow  ) 🔝 8923113531 🔝  Cash Payment (COD) 👒VIP Call Girls In Saharaganj ( Lucknow  ) 🔝 8923113531 🔝  Cash Payment (COD) 👒
VIP Call Girls In Saharaganj ( Lucknow ) 🔝 8923113531 🔝 Cash Payment (COD) 👒
 
unwanted pregnancy Kit [+918133066128] Abortion Pills IN Dubai UAE Abudhabi
unwanted pregnancy Kit [+918133066128] Abortion Pills IN Dubai UAE Abudhabiunwanted pregnancy Kit [+918133066128] Abortion Pills IN Dubai UAE Abudhabi
unwanted pregnancy Kit [+918133066128] Abortion Pills IN Dubai UAE Abudhabi
 

Alliance Group Research (AGR) Corporate Presentation

  • 1. 2437 Bay Area Blvd., Suite 140 Houston, Texas 77058 Phone: 832-588-5362
  • 2. You are on the top of the world! Because you have just closed the largest overseas deal ever for your company.
  • 3. Suddenly you hear gunshots - And the next thing that you see is
  • 4.  
  • 5. You Are In Shock – What Just Happened?
  • 6. You have just been kidnapped!
  • 7. There are only two possible outcomes - Which outcome would you prefer?
  • 8.
  • 9. Following The 6 P’s P rior P roper P lanning P revents P oor P erformance Waterborne Operations Aviation Operations Intelligence Operations Center Protective Details P&I Tactical Training
  • 10. People take hostages all over the world Sometimes it’s purely terror and intimidation, sometimes it is just about money They make a demand AGR starts negotiating This is just one thing that we do the world over and we are very good at what we do
  • 11. The world is full of threats which change daily from city to city and country to country. Making the world safer for you to do business. A crisis can erupt at anytime in any place 24 hours a day 365 days a year.
  • 12. Global Threats Kidnappings Terrorism Major Financial Crimes Drug Offences Hazardous Environments Source: NationMaster.com 1 2 6 3 4 8 9 5 10 7
  • 13. The War on Terror
  • 14. Who is Alliance Group Research (AGR)? We are many things to many people, some even compare us to -
  • 15.  
  • 16.
  • 17.
  • 18.
  • 19. Operational Expertise Richard B. Cole , President and Chief Executive Officer Member ­ Information Systems Security Association Member – Federal Bureau of Investigation (FBI) Infragard Houston Members Alliance Experience and Expertise includes – Sales and Marketing Startup Ventures Sales Force Development Sales Organization Capital Formation Reorganizations Strategic Analysis Strategic Partnerships High Profile Client Relations Product Line Launch Product Development Distribution Line Development Market Analysis Financial Analysis Operational Budgets Forecasting Cash Management Business Strategies Public Relations Contract Negotiations Human Resources Financial Oversight Legal Oversight Board Organization
  • 20. Technical Expertise Ross A. Leo, President – Technology Services Division CISSP – Certified Information Security Systems Professional CISM - Certified Information Systems Manager ABCP - Associate Business Continuity Planner CHS III – Certified Homeland Security Technical Expertise Systems Analysis and Design Information Security Program Development and Execution Risk Management Programs Design and Implementation Site Planning and Installation Disaster Recovery/Contingency Planning Configuration Management and Control Network Analysis, Planning, and Installation Information Systems Auditing Information Technology Assessment and Impact Analysis Facilities Management and Maintenance (Centralized)
  • 21. Protection and Intelligence Expertise Wolfgang W. Ziegler , President - Protection and Intelligence Division Chief Security Officer CPP - Certified Protection Professional PCI - Professional Certified Investigator CHS-III – Certified Homeland Security Certified Hostage Negotiator Protection/Intelligence Expertise includes - Complex Investigations Organized Crime Computer Crimes Racketeering Fraud Embezzlement Narcotics Smuggling Homicides Surveillance Drug Enforcement Sex Crimes Counter Surveillance Conspiracies Money Laundering Interrogation Search and Seizure Hazardous Environments Survival Training Smuggling Trends Violator Identification Threat Assessment Electronic Crimes Advanced Explosives HAZMAT Security Awareness Dignitary Protection Mobility Licensed Airline Transport Pilot, Fixed Wing Aircraft including Single Engine, Multi-engine, Executive and Boeing Jets
  • 22. Service Offerings AGR delivers interwoven reliable options and advanced technologies to safeguard information, human and physical assets. Our options create an agile yet highly secure operational environment necessary for today’s ever changing threats. Litigation Support Human Asset Protection Knowledge Transfer Information Systems Security Physical Asset Protection Alliance Group Research
  • 23.
  • 24. Providing Global Coverage 1 2 6 3 4 8 9 5 10 7   Corporate Headquarters Areas of Operation
  • 25.
  • 26. Interesting Kidnapping Statistics* Less than 30% of all kidnappings are reported and involved - 23% Business People 27% Dependents of Business People i.e., Spouse, Children, Parents 14% Non-professional Employees 8% Journalists 8% Government Officials 3% Project Engineers Kidnappings occurred in – 73% Latin America 15% Asia Pacific 9% former Eastern Block and Soviet Union and Africa 3% North America * Source KR&E Insurance
  • 27. Breaking Headline News Bomb explosion kills man in Vegas outside Luxor hotel You never know – Who, Where, When, Why or How 6 Bomb-Plot Suspects Have Medical Ties Men drive blazing jeep into Glasgow airport in new attack Mexican politician slain in city as he drove down a main city road in Monterrey Mexico suspends almost 300 high-ranking Federal police officers for corruption London Bombing London Bomber Neurosurgeon Luxor Hotel – Las Vegas Mexico Federal Police Corruption
  • 28. Some Relate AGR and The Services We Perform To -
  • 29. By Taking Risk Seriously Makes The World Safer For You To Do Business.