SlideShare a Scribd company logo
1 of 21
Download to read offline
Identify & Transform Risk
Nastec excels at understanding the client’s security needs and works in partnership with them, providing a wide range of
solution-based security consulting and applications to eliminate risk and improve efficiency in their operations.
BY: Robert C. Ferguson

1
Who we are
Nastec is one of the top private security companies in the world. We work with our clients to make them feel safe. Our
protection comes through services that inform, empower, and inspire certainty.
Unrestricted access to our most trustworthy security consultants allows us to transform risk into opportunity. When clients
are kept in the know with crucial information and vital insights, they feel secure in making strategic decisions.
Our commitment is to safeguard your lifestyle and defend your freedom. It's what enables us to feel worthy of the trust and
confidence we’€™ve instilled in our clients for over 20 years.
2
The Four Core Pillars of Nastec
3
SECURITY SERVICES &
MANAGEMENT
• Risk Consulting
• Security Program Development
• Physical Security Services
• Executive Protection
• Cybersecurity
INVESTIGATIONS
• Fraud & Financial Investigations
• Internal Investigations
• Due Diligence & Background
Investigations
• Litigation Support Services
• Social Media Intelligence
• Asset Search & Recovery
PROCUREMENT & ACQUISITION
• Munitions & ammunitions
• Big Data Solutions
• Radiation Monitoring Technology
• Combat Ready (Armored) Vehicles
• Airplane & Port Scanners
• DNA CSI Technology
FAMILY OFFICE MANAGEMENT
• Staffing & HR Management
• Pet Logistics
• Executive Protection
• Property Management
• Lifestyle Management
Security Services & Management
4
NASTEC leverages its team’s unrivaled experience as operators and managers in both the government and corporate world by offering appropriately scaled
security advisory and management services to government, private sector, individual and family clients. We help clients maximize their security, safety, and
organizational effectiveness through a comprehensive package of services.
• Threat, Vulnerability, and Risk Assessments
• Security Posture Evaluations and Organizational Capacity Improvements
• Needs Definition Studies and Sourcing of Technology and Equipment Solutions
• Personnel Training and Management Development
• Infrastructure Design, Development, and Maintenance
• Emergency Preparedness and Response Programs
• Continuity of Operations Planning
• Concepts of Operations
• Integrity, Anti-Corruption, and Insider Threat Mitigation Programs
• Cyber Security Audits, Post Event Forensics, and System Improvements
Risk Consulting
NASTEC was contracted recently by the country of Panama to assist
with the overall security planning and logistics for the Summit of the
Americas. Working closely with the Panamanian Government, Panama
SPI, the National Police, and 37 participating countries, Nastec is
pleased to report that our experience in major event security planning
was well received and the Summit was a huge success with no security
incidents.
5
Physical Security
6
NASTEC employs a team of highly
trained and qualified security officers.
Trained to be proactive and quick to
respond to any incidents, our people
are equipped to provide excellent
customer service.
NASTEC is committed to providing
the best in physical security
protection. Our rigid personnel
standards and extensive
experience gives us the edge in
designing the right balance of
security controls and risk for you
and your organization.
Every NASTEC officer completes
rigorous training in emergency
and security procedures while
working under the close
supervision of NASTEC
management. All are screened
prior to hiring, tested, and
reevaluated regularly to maintain
the high standard of excellence
that NASTEC requires.
Event Security
7
Nastec has A SOLID HISTORY of providing security
management and service for the entertainment industry.
Recently, we had the honor of providing our security
support at the premiere of the film "UNITY" at the
Directors Guild of America (DGA) in Los Angeles.
Providing security services in a discreet and
unobtrusive manner for a “World Premier”
movie event is a daunting task.
The process of developing a strategic security
plan involves the coordination of resources,
personnel and information.
Our experienced Executive Protection teams
utilize specific checklists, along with carefully
vetted intelligence.
These, combined with current validated
intelligence allows our protection teams to
formulate contingent responses and
strategies which significantly reduced risk.
Security Program Development
Nastec has had the opportunity to design, develop and build both
temporary and permanent Special Forces Training Bases including
doctrine, tactics, techniques and procedures for all special
operations.
• Conduct specialized courses of instruction for all Special
Operations Forces.
• Train assigned forces and ensure interoperability of equipment
and forces.
• Monitor the preparedness of its forces assigned to other unified
commands.
• Develop and acquire unique Special Forces equipment,
materials, supplies and services.
8
SF Training
9
Highlights of the SF Training Program Development
• Threat Assessment
• Workplace Violence Prevention
• Facility Security Assessment
• Guard force training
• Background Investigations
• Security Consulting & Management Services
10
Plant / Facility
Security Management
Maritime Security
The very factors that permit maritime transport to contribute to
economic prosperity also leave it uniquely vulnerable to attack from
terrorism and crime. In full compliance with all national and
international standards – including the International Maritime
Organization's ISPS code – NASTEC provides in-depth Port Facility
Security Assessments (PFSA) and Port Facility Security Plans (PFSP).
In order to offer comprehensive and tailor made service for clients,
security solutions are broken down into stages, carried out in the
following order:
• Port Facility Security Assessment (PFSA)
• Port Facility Security Plan (PFSP)
• Port Facility Security Implementation (PFSI)
11
Integrated Trade & Supply
Chain Services
12
NASTEC, being C-TPAT compliant is positioned to provide current and
innovative solutions to dynamic challenges of cross-border movement and
to promote economic prosperity in the global supply chain.
Cybersecurity
13
NASTEC delivers realistic training that
demonstrates measurable results and
helps its customers confidently
implement secured platforms and
technologies that can improve
operations and reduce costs.
Knowledge is power, and
information leaks can be
disastrous to any business. By
applying a synergistic set of
technological solutions,
articulated procedures, and
personnel coaching techniques,
we eliminate the undesired
outcomes resulting from
information loss and leaks.
By visualizing threats and helping
ensure data integrity through
advanced network security
operations, we provide customers
with the expertise needed to
effectively address operational
needs. This results in balanced
risk management, in adherence to
the compliance requirements.
Investigations
14
Friendly, Professional & Discreet - Based in Los Angeles, we cater to clients both nationally and internationally and can meet face-to-face or make arrangements
online. You may be nervous about your first call or enquiry to a private investigator – but there’s no need to be. We are friendly, professional, discreet experts in our
field who are sensitive towards the needs of our extremely valued clients.
• Civil Investigations
• Domestic Investigations
• Personnel and Business Background Investigations
• Polygraph Testing and Analysis
• Major Crime Investigations
• Medical Malpractice
• Electronic Debugging
• Undercover Tracking
• Insurance Fraud
• Missing Persons
• Industrial Espionage
• Counter Intelligence
International Child
Abduction
15
IDENTIFY
RECOVER
LOCATE
This investigation detail includes gathering information from
guardians to identify facets of information that can be used /to
pursue the return of their abducted children
Nastec will assist parents and guardians in every step of the way.
Nastec also works closely and cooperatively with a wide range of US
and foreign entities including law enforcement, non-Governmental
organizations and foreign governments.
Nastec may not only assist with the recovery of an abducted child but
we may also provide a key role in preventing an attempted abduction.
Under this circumstance, Nastec will work with parents and guardians
without delay to provide consulting, as well as surveillance and
physical security assistance.
DNA-CSI
16
Our clients are looking for solutions to apply the use of CSI
technology and DNA forensics to solve critical issues in health and
security. The rapid development of DNA technologies has made it
possible to identify all types of living things. We have relationships
in over 40 countries that are committed to using DNA technology and
expanding its capabilities. The cost of profiling the entire genome is
decreasing each year. Issues for privacy and management of big
data are increasingly a concern among governments and private
citizens.
Procurement & Acquisition
17
Nastec is your portal to an efficient and quality procurement service for government acquisition of equipment and various products for military, law enforcement,
emergency and disaster management needs. Nastec provides our clients access to our wide array of geographical networks along with best prices from
international vendors, manufacturers and suppliers.
• Munitions and weapons of various calibers
• Combat ready (armored) vehicles
• Explosive Detection Dogs
• Airplane & Port Scanners (Roboscan)
• Big Data Solutions
• DNA –CSI laboratory, and secure data storage
• Radiation Monitoring Technology
• Mobile attack vehicles of various types and configurations
• Advanced Radar systems
The following are a few examples of what we offer:
Procurement & Acquisition
18
From Emergency Preparedness, Corporate to Law Enforcement,
Military and Government requirements, Nastec is ahead of the game.
Family Office Management
19
The world today raises much concern for the safety and personal security of leaders of industry, high-profile personalities and foreign dignitaries.
Nastec supports Family Offices and Ultra High Net Worth (UHNW) individuals by ensuring that their security and staffing needs,
(to include estates and homes and yachts) are managed by discreet professionalism with the highest integrity.
Family Office Management
20
Nastec specializes in providing urgent and immediate security
management support to meet the demands of the business or
government while we help them meet long-term strategic security
planning and security program development priorities.
21
Thank you!
NASTEC INTERNATIONAL, INC.
PI # 20740 | PPO # 11103
23945 Calabasas Rd, Suite 208
Calabasas CA 91302 USA
www.nastec.com
marketing@nastec.com
+1.818.222.0322
ADDRESS:
WEBSITE:
EMAIL:
PHONE:

More Related Content

What's hot

Data Breach Brochure
Data Breach BrochureData Breach Brochure
Data Breach Brochuretonycord01
 
ISF Congress 2016 - Session 7.2_Kukreja
ISF Congress 2016 - Session 7.2_KukrejaISF Congress 2016 - Session 7.2_Kukreja
ISF Congress 2016 - Session 7.2_KukrejaPuneet Kukreja
 
Cyber security incidents implications in business continuity planning
Cyber security incidents implications in business continuity planningCyber security incidents implications in business continuity planning
Cyber security incidents implications in business continuity planningPECB
 
Vendor Cybersecurity Governance: Scaling the risk
Vendor Cybersecurity Governance: Scaling the riskVendor Cybersecurity Governance: Scaling the risk
Vendor Cybersecurity Governance: Scaling the riskSarah Clarke
 
Today's Breach Reality, The IR Imperative, And What You Can Do About It
Today's Breach Reality, The IR Imperative, And What You Can Do About ItToday's Breach Reality, The IR Imperative, And What You Can Do About It
Today's Breach Reality, The IR Imperative, And What You Can Do About ItResilient Systems
 
Bridging the Gap Between Threat Intelligence and Risk Management
Bridging the Gap Between Threat Intelligence and Risk ManagementBridging the Gap Between Threat Intelligence and Risk Management
Bridging the Gap Between Threat Intelligence and Risk ManagementPriyanka Aash
 
Brier & Thorn Corporate Brochure
Brier & Thorn Corporate BrochureBrier & Thorn Corporate Brochure
Brier & Thorn Corporate BrochureAlissa Knight
 
Fns Incident Management Powered By En Case
Fns Incident Management Powered By En CaseFns Incident Management Powered By En Case
Fns Incident Management Powered By En Casetbeckwith
 
Cissp exam outline 121417- final (2)
Cissp exam outline 121417- final (2)Cissp exam outline 121417- final (2)
Cissp exam outline 121417- final (2)Joshua Fonseca
 
Connection can help keep your business secure!
Connection can help keep your business secure!Connection can help keep your business secure!
Connection can help keep your business secure!Heather Salmons Newswanger
 
Facilities Management Security solution
Facilities Management Security solutionFacilities Management Security solution
Facilities Management Security solutionSsgstubbs
 
Iso27001 Risk Assessment Approach
Iso27001   Risk Assessment ApproachIso27001   Risk Assessment Approach
Iso27001 Risk Assessment Approachtschraider
 
2012 Reenergize the Americas 3B: Charles Hamilton
2012 Reenergize the Americas 3B: Charles Hamilton2012 Reenergize the Americas 3B: Charles Hamilton
2012 Reenergize the Americas 3B: Charles HamiltonReenergize
 
Introduction to Cyber Resilience
Introduction to Cyber ResilienceIntroduction to Cyber Resilience
Introduction to Cyber ResiliencePeter Wood
 
Critical Capabilities for MDR Services - What to Know Before You Buy
Critical Capabilities for MDR Services - What to Know Before You BuyCritical Capabilities for MDR Services - What to Know Before You Buy
Critical Capabilities for MDR Services - What to Know Before You BuyFidelis Cybersecurity
 
Connecting the Dots Between Your Threat Tntelligence Tradecraft and Business ...
Connecting the Dots Between Your Threat Tntelligence Tradecraft and Business ...Connecting the Dots Between Your Threat Tntelligence Tradecraft and Business ...
Connecting the Dots Between Your Threat Tntelligence Tradecraft and Business ...SurfWatch Labs
 
DHS Cybersecurity Services for Building Cyber Resilience
DHS Cybersecurity Services for Building Cyber ResilienceDHS Cybersecurity Services for Building Cyber Resilience
DHS Cybersecurity Services for Building Cyber ResilienceDawn Yankeelov
 

What's hot (20)

Data Breach Brochure
Data Breach BrochureData Breach Brochure
Data Breach Brochure
 
ISF Congress 2016 - Session 7.2_Kukreja
ISF Congress 2016 - Session 7.2_KukrejaISF Congress 2016 - Session 7.2_Kukreja
ISF Congress 2016 - Session 7.2_Kukreja
 
Cyber security incidents implications in business continuity planning
Cyber security incidents implications in business continuity planningCyber security incidents implications in business continuity planning
Cyber security incidents implications in business continuity planning
 
Vendor Cybersecurity Governance: Scaling the risk
Vendor Cybersecurity Governance: Scaling the riskVendor Cybersecurity Governance: Scaling the risk
Vendor Cybersecurity Governance: Scaling the risk
 
Today's Breach Reality, The IR Imperative, And What You Can Do About It
Today's Breach Reality, The IR Imperative, And What You Can Do About ItToday's Breach Reality, The IR Imperative, And What You Can Do About It
Today's Breach Reality, The IR Imperative, And What You Can Do About It
 
Bridging the Gap Between Threat Intelligence and Risk Management
Bridging the Gap Between Threat Intelligence and Risk ManagementBridging the Gap Between Threat Intelligence and Risk Management
Bridging the Gap Between Threat Intelligence and Risk Management
 
Brier & Thorn Corporate Brochure
Brier & Thorn Corporate BrochureBrier & Thorn Corporate Brochure
Brier & Thorn Corporate Brochure
 
Fns Incident Management Powered By En Case
Fns Incident Management Powered By En CaseFns Incident Management Powered By En Case
Fns Incident Management Powered By En Case
 
Cissp exam outline 121417- final (2)
Cissp exam outline 121417- final (2)Cissp exam outline 121417- final (2)
Cissp exam outline 121417- final (2)
 
Connection can help keep your business secure!
Connection can help keep your business secure!Connection can help keep your business secure!
Connection can help keep your business secure!
 
Facilities Management Security solution
Facilities Management Security solutionFacilities Management Security solution
Facilities Management Security solution
 
Iso27001 Risk Assessment Approach
Iso27001   Risk Assessment ApproachIso27001   Risk Assessment Approach
Iso27001 Risk Assessment Approach
 
CSIRT_16_Jun
CSIRT_16_JunCSIRT_16_Jun
CSIRT_16_Jun
 
2012 Reenergize the Americas 3B: Charles Hamilton
2012 Reenergize the Americas 3B: Charles Hamilton2012 Reenergize the Americas 3B: Charles Hamilton
2012 Reenergize the Americas 3B: Charles Hamilton
 
Introduction to Cyber Resilience
Introduction to Cyber ResilienceIntroduction to Cyber Resilience
Introduction to Cyber Resilience
 
Critical Capabilities for MDR Services - What to Know Before You Buy
Critical Capabilities for MDR Services - What to Know Before You BuyCritical Capabilities for MDR Services - What to Know Before You Buy
Critical Capabilities for MDR Services - What to Know Before You Buy
 
A case for Managed Detection and Response
A case for Managed Detection and ResponseA case for Managed Detection and Response
A case for Managed Detection and Response
 
Connecting the Dots Between Your Threat Tntelligence Tradecraft and Business ...
Connecting the Dots Between Your Threat Tntelligence Tradecraft and Business ...Connecting the Dots Between Your Threat Tntelligence Tradecraft and Business ...
Connecting the Dots Between Your Threat Tntelligence Tradecraft and Business ...
 
DHS Cybersecurity Services for Building Cyber Resilience
DHS Cybersecurity Services for Building Cyber ResilienceDHS Cybersecurity Services for Building Cyber Resilience
DHS Cybersecurity Services for Building Cyber Resilience
 
Security-Brochure
Security-BrochureSecurity-Brochure
Security-Brochure
 

Viewers also liked

Uwwm when to use mediation 7 2016
Uwwm when to use mediation 7 2016Uwwm when to use mediation 7 2016
Uwwm when to use mediation 7 2016Al Tetrault
 
Sistemas operativos Mario Mejias
Sistemas operativos Mario MejiasSistemas operativos Mario Mejias
Sistemas operativos Mario Mejiasmario mejias
 
Sistemas operativos maria fernanda marchan
Sistemas operativos maria fernanda marchanSistemas operativos maria fernanda marchan
Sistemas operativos maria fernanda marchanMaria Marchan
 
Landlord_Pack-Brochure_AW_0106
Landlord_Pack-Brochure_AW_0106Landlord_Pack-Brochure_AW_0106
Landlord_Pack-Brochure_AW_0106Stephen Potter
 
강남오피,청주오피걸 사이트〃OpHoLic5.Com〃 일산오피 오산오피
강남오피,청주오피걸 사이트〃OpHoLic5.Com〃 일산오피 오산오피강남오피,청주오피걸 사이트〃OpHoLic5.Com〃 일산오피 오산오피
강남오피,청주오피걸 사이트〃OpHoLic5.Com〃 일산오피 오산오피zfzep34fb
 
Current and Emerging Topics in Mass Torts
Current and Emerging Topics in Mass Torts Current and Emerging Topics in Mass Torts
Current and Emerging Topics in Mass Torts Sarai Natalie Mora
 
ประวัติส่วนตัว
ประวัติส่วนตัวประวัติส่วนตัว
ประวัติส่วนตัวannworalak
 
Trabajo de ley de compañia
Trabajo de ley de compañiaTrabajo de ley de compañia
Trabajo de ley de compañiaYR69ChM
 
Control difuso y concentrado
Control difuso y concentradoControl difuso y concentrado
Control difuso y concentradoPaola Perez
 
EXTINCION DE LA ACCION PENAL
EXTINCION DE LA ACCION PENALEXTINCION DE LA ACCION PENAL
EXTINCION DE LA ACCION PENALMarilinUramis
 
History of the Iphone
History of the IphoneHistory of the Iphone
History of the Iphonescienceiscool
 

Viewers also liked (13)

Uwwm when to use mediation 7 2016
Uwwm when to use mediation 7 2016Uwwm when to use mediation 7 2016
Uwwm when to use mediation 7 2016
 
Wearables en la comunicación
Wearables en la comunicaciónWearables en la comunicación
Wearables en la comunicación
 
Rådets årsrapport 2015
Rådets årsrapport 2015Rådets årsrapport 2015
Rådets årsrapport 2015
 
Sistemas operativos Mario Mejias
Sistemas operativos Mario MejiasSistemas operativos Mario Mejias
Sistemas operativos Mario Mejias
 
Sistemas operativos maria fernanda marchan
Sistemas operativos maria fernanda marchanSistemas operativos maria fernanda marchan
Sistemas operativos maria fernanda marchan
 
Landlord_Pack-Brochure_AW_0106
Landlord_Pack-Brochure_AW_0106Landlord_Pack-Brochure_AW_0106
Landlord_Pack-Brochure_AW_0106
 
강남오피,청주오피걸 사이트〃OpHoLic5.Com〃 일산오피 오산오피
강남오피,청주오피걸 사이트〃OpHoLic5.Com〃 일산오피 오산오피강남오피,청주오피걸 사이트〃OpHoLic5.Com〃 일산오피 오산오피
강남오피,청주오피걸 사이트〃OpHoLic5.Com〃 일산오피 오산오피
 
Current and Emerging Topics in Mass Torts
Current and Emerging Topics in Mass Torts Current and Emerging Topics in Mass Torts
Current and Emerging Topics in Mass Torts
 
ประวัติส่วนตัว
ประวัติส่วนตัวประวัติส่วนตัว
ประวัติส่วนตัว
 
Trabajo de ley de compañia
Trabajo de ley de compañiaTrabajo de ley de compañia
Trabajo de ley de compañia
 
Control difuso y concentrado
Control difuso y concentradoControl difuso y concentrado
Control difuso y concentrado
 
EXTINCION DE LA ACCION PENAL
EXTINCION DE LA ACCION PENALEXTINCION DE LA ACCION PENAL
EXTINCION DE LA ACCION PENAL
 
History of the Iphone
History of the IphoneHistory of the Iphone
History of the Iphone
 

Similar to Nastec Corporate Profile

Accuvant Intro
Accuvant IntroAccuvant Intro
Accuvant Introdchadwick
 
HSCG Overview 2010
HSCG Overview 2010HSCG Overview 2010
HSCG Overview 2010Tom_McElroy
 
Information Security vs IT - Key Roles & Responsibilities
Information Security vs IT - Key Roles & ResponsibilitiesInformation Security vs IT - Key Roles & Responsibilities
Information Security vs IT - Key Roles & ResponsibilitiesKroll
 
Corporate Security Intelligence Just Got Smarter All Courses Linkedin
Corporate Security Intelligence Just Got Smarter   All Courses   LinkedinCorporate Security Intelligence Just Got Smarter   All Courses   Linkedin
Corporate Security Intelligence Just Got Smarter All Courses LinkedinSteve Phelps
 
RonaldG.MillerCISSPv2
RonaldG.MillerCISSPv2RonaldG.MillerCISSPv2
RonaldG.MillerCISSPv2Ron Miller
 
Understanding the Importance of Security Testing in Safeguarding Your Digital...
Understanding the Importance of Security Testing in Safeguarding Your Digital...Understanding the Importance of Security Testing in Safeguarding Your Digital...
Understanding the Importance of Security Testing in Safeguarding Your Digital...Afour tech
 
Virtual Chief Information Security Officer | VCISO | Cyber Security
Virtual Chief Information Security Officer | VCISO | Cyber SecurityVirtual Chief Information Security Officer | VCISO | Cyber Security
Virtual Chief Information Security Officer | VCISO | Cyber SecurityCyber Security Experts
 
CyberMaryland Job Fair Job Seeker Handbook December 5, 2019 Baltimore
CyberMaryland Job Fair Job Seeker Handbook December 5, 2019 BaltimoreCyberMaryland Job Fair Job Seeker Handbook December 5, 2019 Baltimore
CyberMaryland Job Fair Job Seeker Handbook December 5, 2019 BaltimoreClearedJobs.Net
 
OpenText Cyber Resilience Fastrak
OpenText Cyber Resilience FastrakOpenText Cyber Resilience Fastrak
OpenText Cyber Resilience FastrakMarc St-Pierre
 
MCGlobalTech Service Presentation
MCGlobalTech Service PresentationMCGlobalTech Service Presentation
MCGlobalTech Service PresentationWilliam McBorrough
 
Company profile Nov 2015 with the team
Company profile Nov 2015 with the teamCompany profile Nov 2015 with the team
Company profile Nov 2015 with the teamtrevorshaff
 
Information Assurance/USTRANSCOM’s Information Assurance Fusion Center
Information Assurance/USTRANSCOM’s Information Assurance Fusion CenterInformation Assurance/USTRANSCOM’s Information Assurance Fusion Center
Information Assurance/USTRANSCOM’s Information Assurance Fusion CenterNCI Information Systems, Reston, VA.
 

Similar to Nastec Corporate Profile (20)

Nuclear Industry Resilience
Nuclear Industry ResilienceNuclear Industry Resilience
Nuclear Industry Resilience
 
CSCSS / DEFENCE INTELLIGENCE GROUP
CSCSS / DEFENCE INTELLIGENCE GROUPCSCSS / DEFENCE INTELLIGENCE GROUP
CSCSS / DEFENCE INTELLIGENCE GROUP
 
Accuvant Intro
Accuvant IntroAccuvant Intro
Accuvant Intro
 
Security-Brochure
Security-BrochureSecurity-Brochure
Security-Brochure
 
HSCG Overview 2010
HSCG Overview 2010HSCG Overview 2010
HSCG Overview 2010
 
Information Security vs IT - Key Roles & Responsibilities
Information Security vs IT - Key Roles & ResponsibilitiesInformation Security vs IT - Key Roles & Responsibilities
Information Security vs IT - Key Roles & Responsibilities
 
Corporate Security Intelligence Just Got Smarter All Courses Linkedin
Corporate Security Intelligence Just Got Smarter   All Courses   LinkedinCorporate Security Intelligence Just Got Smarter   All Courses   Linkedin
Corporate Security Intelligence Just Got Smarter All Courses Linkedin
 
ABANACLE_5x8_brochure - USA
ABANACLE_5x8_brochure - USAABANACLE_5x8_brochure - USA
ABANACLE_5x8_brochure - USA
 
White paper
White paperWhite paper
White paper
 
RonaldG.MillerCISSPv2
RonaldG.MillerCISSPv2RonaldG.MillerCISSPv2
RonaldG.MillerCISSPv2
 
Understanding the Importance of Security Testing in Safeguarding Your Digital...
Understanding the Importance of Security Testing in Safeguarding Your Digital...Understanding the Importance of Security Testing in Safeguarding Your Digital...
Understanding the Importance of Security Testing in Safeguarding Your Digital...
 
Virtual Chief Information Security Officer | VCISO | Cyber Security
Virtual Chief Information Security Officer | VCISO | Cyber SecurityVirtual Chief Information Security Officer | VCISO | Cyber Security
Virtual Chief Information Security Officer | VCISO | Cyber Security
 
CyberMaryland Job Fair Job Seeker Handbook December 5, 2019 Baltimore
CyberMaryland Job Fair Job Seeker Handbook December 5, 2019 BaltimoreCyberMaryland Job Fair Job Seeker Handbook December 5, 2019 Baltimore
CyberMaryland Job Fair Job Seeker Handbook December 5, 2019 Baltimore
 
Brochure - About Rook
Brochure - About RookBrochure - About Rook
Brochure - About Rook
 
Titas Global Ltd
Titas Global LtdTitas Global Ltd
Titas Global Ltd
 
OpenText Cyber Resilience Fastrak
OpenText Cyber Resilience FastrakOpenText Cyber Resilience Fastrak
OpenText Cyber Resilience Fastrak
 
MCGlobalTech Service Presentation
MCGlobalTech Service PresentationMCGlobalTech Service Presentation
MCGlobalTech Service Presentation
 
Company profile Nov 2015 with the team
Company profile Nov 2015 with the teamCompany profile Nov 2015 with the team
Company profile Nov 2015 with the team
 
Maritime Cyber Security
Maritime Cyber SecurityMaritime Cyber Security
Maritime Cyber Security
 
Information Assurance/USTRANSCOM’s Information Assurance Fusion Center
Information Assurance/USTRANSCOM’s Information Assurance Fusion CenterInformation Assurance/USTRANSCOM’s Information Assurance Fusion Center
Information Assurance/USTRANSCOM’s Information Assurance Fusion Center
 

Nastec Corporate Profile

  • 1. Identify & Transform Risk Nastec excels at understanding the client’s security needs and works in partnership with them, providing a wide range of solution-based security consulting and applications to eliminate risk and improve efficiency in their operations. BY: Robert C. Ferguson  1
  • 2. Who we are Nastec is one of the top private security companies in the world. We work with our clients to make them feel safe. Our protection comes through services that inform, empower, and inspire certainty. Unrestricted access to our most trustworthy security consultants allows us to transform risk into opportunity. When clients are kept in the know with crucial information and vital insights, they feel secure in making strategic decisions. Our commitment is to safeguard your lifestyle and defend your freedom. It's what enables us to feel worthy of the trust and confidence we’€™ve instilled in our clients for over 20 years. 2
  • 3. The Four Core Pillars of Nastec 3 SECURITY SERVICES & MANAGEMENT • Risk Consulting • Security Program Development • Physical Security Services • Executive Protection • Cybersecurity INVESTIGATIONS • Fraud & Financial Investigations • Internal Investigations • Due Diligence & Background Investigations • Litigation Support Services • Social Media Intelligence • Asset Search & Recovery PROCUREMENT & ACQUISITION • Munitions & ammunitions • Big Data Solutions • Radiation Monitoring Technology • Combat Ready (Armored) Vehicles • Airplane & Port Scanners • DNA CSI Technology FAMILY OFFICE MANAGEMENT • Staffing & HR Management • Pet Logistics • Executive Protection • Property Management • Lifestyle Management
  • 4. Security Services & Management 4 NASTEC leverages its team’s unrivaled experience as operators and managers in both the government and corporate world by offering appropriately scaled security advisory and management services to government, private sector, individual and family clients. We help clients maximize their security, safety, and organizational effectiveness through a comprehensive package of services. • Threat, Vulnerability, and Risk Assessments • Security Posture Evaluations and Organizational Capacity Improvements • Needs Definition Studies and Sourcing of Technology and Equipment Solutions • Personnel Training and Management Development • Infrastructure Design, Development, and Maintenance • Emergency Preparedness and Response Programs • Continuity of Operations Planning • Concepts of Operations • Integrity, Anti-Corruption, and Insider Threat Mitigation Programs • Cyber Security Audits, Post Event Forensics, and System Improvements
  • 5. Risk Consulting NASTEC was contracted recently by the country of Panama to assist with the overall security planning and logistics for the Summit of the Americas. Working closely with the Panamanian Government, Panama SPI, the National Police, and 37 participating countries, Nastec is pleased to report that our experience in major event security planning was well received and the Summit was a huge success with no security incidents. 5
  • 6. Physical Security 6 NASTEC employs a team of highly trained and qualified security officers. Trained to be proactive and quick to respond to any incidents, our people are equipped to provide excellent customer service. NASTEC is committed to providing the best in physical security protection. Our rigid personnel standards and extensive experience gives us the edge in designing the right balance of security controls and risk for you and your organization. Every NASTEC officer completes rigorous training in emergency and security procedures while working under the close supervision of NASTEC management. All are screened prior to hiring, tested, and reevaluated regularly to maintain the high standard of excellence that NASTEC requires.
  • 7. Event Security 7 Nastec has A SOLID HISTORY of providing security management and service for the entertainment industry. Recently, we had the honor of providing our security support at the premiere of the film "UNITY" at the Directors Guild of America (DGA) in Los Angeles. Providing security services in a discreet and unobtrusive manner for a “World Premier” movie event is a daunting task. The process of developing a strategic security plan involves the coordination of resources, personnel and information. Our experienced Executive Protection teams utilize specific checklists, along with carefully vetted intelligence. These, combined with current validated intelligence allows our protection teams to formulate contingent responses and strategies which significantly reduced risk.
  • 8. Security Program Development Nastec has had the opportunity to design, develop and build both temporary and permanent Special Forces Training Bases including doctrine, tactics, techniques and procedures for all special operations. • Conduct specialized courses of instruction for all Special Operations Forces. • Train assigned forces and ensure interoperability of equipment and forces. • Monitor the preparedness of its forces assigned to other unified commands. • Develop and acquire unique Special Forces equipment, materials, supplies and services. 8
  • 9. SF Training 9 Highlights of the SF Training Program Development
  • 10. • Threat Assessment • Workplace Violence Prevention • Facility Security Assessment • Guard force training • Background Investigations • Security Consulting & Management Services 10 Plant / Facility Security Management
  • 11. Maritime Security The very factors that permit maritime transport to contribute to economic prosperity also leave it uniquely vulnerable to attack from terrorism and crime. In full compliance with all national and international standards – including the International Maritime Organization's ISPS code – NASTEC provides in-depth Port Facility Security Assessments (PFSA) and Port Facility Security Plans (PFSP). In order to offer comprehensive and tailor made service for clients, security solutions are broken down into stages, carried out in the following order: • Port Facility Security Assessment (PFSA) • Port Facility Security Plan (PFSP) • Port Facility Security Implementation (PFSI) 11
  • 12. Integrated Trade & Supply Chain Services 12 NASTEC, being C-TPAT compliant is positioned to provide current and innovative solutions to dynamic challenges of cross-border movement and to promote economic prosperity in the global supply chain.
  • 13. Cybersecurity 13 NASTEC delivers realistic training that demonstrates measurable results and helps its customers confidently implement secured platforms and technologies that can improve operations and reduce costs. Knowledge is power, and information leaks can be disastrous to any business. By applying a synergistic set of technological solutions, articulated procedures, and personnel coaching techniques, we eliminate the undesired outcomes resulting from information loss and leaks. By visualizing threats and helping ensure data integrity through advanced network security operations, we provide customers with the expertise needed to effectively address operational needs. This results in balanced risk management, in adherence to the compliance requirements.
  • 14. Investigations 14 Friendly, Professional & Discreet - Based in Los Angeles, we cater to clients both nationally and internationally and can meet face-to-face or make arrangements online. You may be nervous about your first call or enquiry to a private investigator – but there’s no need to be. We are friendly, professional, discreet experts in our field who are sensitive towards the needs of our extremely valued clients. • Civil Investigations • Domestic Investigations • Personnel and Business Background Investigations • Polygraph Testing and Analysis • Major Crime Investigations • Medical Malpractice • Electronic Debugging • Undercover Tracking • Insurance Fraud • Missing Persons • Industrial Espionage • Counter Intelligence
  • 15. International Child Abduction 15 IDENTIFY RECOVER LOCATE This investigation detail includes gathering information from guardians to identify facets of information that can be used /to pursue the return of their abducted children Nastec will assist parents and guardians in every step of the way. Nastec also works closely and cooperatively with a wide range of US and foreign entities including law enforcement, non-Governmental organizations and foreign governments. Nastec may not only assist with the recovery of an abducted child but we may also provide a key role in preventing an attempted abduction. Under this circumstance, Nastec will work with parents and guardians without delay to provide consulting, as well as surveillance and physical security assistance.
  • 16. DNA-CSI 16 Our clients are looking for solutions to apply the use of CSI technology and DNA forensics to solve critical issues in health and security. The rapid development of DNA technologies has made it possible to identify all types of living things. We have relationships in over 40 countries that are committed to using DNA technology and expanding its capabilities. The cost of profiling the entire genome is decreasing each year. Issues for privacy and management of big data are increasingly a concern among governments and private citizens.
  • 17. Procurement & Acquisition 17 Nastec is your portal to an efficient and quality procurement service for government acquisition of equipment and various products for military, law enforcement, emergency and disaster management needs. Nastec provides our clients access to our wide array of geographical networks along with best prices from international vendors, manufacturers and suppliers. • Munitions and weapons of various calibers • Combat ready (armored) vehicles • Explosive Detection Dogs • Airplane & Port Scanners (Roboscan) • Big Data Solutions • DNA –CSI laboratory, and secure data storage • Radiation Monitoring Technology • Mobile attack vehicles of various types and configurations • Advanced Radar systems The following are a few examples of what we offer:
  • 18. Procurement & Acquisition 18 From Emergency Preparedness, Corporate to Law Enforcement, Military and Government requirements, Nastec is ahead of the game.
  • 19. Family Office Management 19 The world today raises much concern for the safety and personal security of leaders of industry, high-profile personalities and foreign dignitaries. Nastec supports Family Offices and Ultra High Net Worth (UHNW) individuals by ensuring that their security and staffing needs, (to include estates and homes and yachts) are managed by discreet professionalism with the highest integrity.
  • 20. Family Office Management 20 Nastec specializes in providing urgent and immediate security management support to meet the demands of the business or government while we help them meet long-term strategic security planning and security program development priorities.
  • 21. 21 Thank you! NASTEC INTERNATIONAL, INC. PI # 20740 | PPO # 11103 23945 Calabasas Rd, Suite 208 Calabasas CA 91302 USA www.nastec.com marketing@nastec.com +1.818.222.0322 ADDRESS: WEBSITE: EMAIL: PHONE: