Professional Documents
Culture Documents
Proposal For Consulting Services For: Campus Security Analysis (RFP 638)
Proposal For Consulting Services For: Campus Security Analysis (RFP 638)
Proposal For Consulting Services For: Campus Security Analysis (RFP 638)
for
Campus Security Analysis (RFP 638)
Prepared for:
Routt County, Colorado
Prepared by:
Ron Bundy, ron.bundy@tncg.com, (651) 705-1241
140 Third Street South, Stillwater, Minnesota 55082
888.650.4580 651.430.2772 www.tncg.com
SECTION D: KNOWLEDGE OF LOCAL CONDITIONS AND PHYSICAL PROXIMITY TO THE PROJECT .......... 28
SECTION E: REFERENCES..................................................................................................................... 29
3
Page
TNCG understands the importance and challenges of this project. We have a reputation for bringing
projects in on time and under budget. We will use all necessary resources and staff to meet or exceed
the completion dates agreed to with County Leadership.
Scope of Work
TNCG understands the scope of work will include (but may not be limited to):
• Conduct Project Kick-Off Meeting to review scope and present schedule.
• Conduct onsite security risk assessment for buildings/sites (during and after hours of operation)
resulting in a comprehensive security risk report including:
o Detailed assessment of employee security
o Detailed assessment of physical security including access control
o Assessment of emergency response, policies, processes, and procedures
o Review of security staffing models and levels
o Review existing training in place for training of staff and faculty
• Develop and deliver a draft Security Risk Assessment Report including cost estimates for
recommendations including:
o Post-assessment findings
o Technical and physical security measures to mitigate threats
o Policies, processes, and procedures
• Conduct findings and recommendations review meeting.
• Update and deliver final Security Risk Assessment Report including cost estimates to the
Routt County Board of County Commissioners.
4
Page
This matrix is being used not only to assess the current risk based on identified deficiencies but also to
provide POST implementation risk rate, i.e., after implementing our recommended mitigating measures.
We can also provide a method for tracking implementation of measures included in the comprehensive
safety and security plan and the impact of the implementation on the County’s overall level of risk.
6
Page
TASK 1- Our work would begin with a Project Initiation Meeting with the following subtasks:
A. Introduce TNCG team members and County key personnel and reiterate their roles.
B. Review the Scope of Work with the County to ensure a full and mutual understanding.
C. Discuss and present schedule of project.
D. Set up periodic progress meetings (or communication procedure), and determine who
should attend, how long meetings should be, and what is expected from attendees.
TASK 2- Formulate checklists of needed information and provide those to the County for completion.
(We realize that this information may not exist.) Checklists may include requests such as:
A. Organizational policies
B. Written security policies and procedures
C. Existing emergency management plans
D. Existing security mechanisms
E. Crime reports and incident reports
F. Listings of key contact personnel
G. Building floor plans
H. Description of existing security infrastructure by building and location/area
TASK 3- Work with key County personnel to review current policies, processes, and procedures
and identify security objectives for each building type and for the County.
A. Assess current readiness levels.
B. Identify and classify violence risks.
C. Define triggers.
D. Analyze gaps.
TASK 5- Clarify and redefine security objectives as appropriate for the individual locations as
Page
TASK 6- Conduct stakeholder discussions to update them on the current industry standards, best
practices, policies, and available system functionality. Based on the outcome of these
meetings, TNCG will develop a list of the stakeholders, desired system performance
requirements, and functional expectations.
TASK 7- Conduct staff interviews with key stakeholders.
TASK 8- Create and finalize a customized, quantifiable risk metric for the County security risk
assessment process based on the data collection and interview process as well as the
initial site analysis.
TASK 9- Conduct on-site security risk assessment. This assessment will include observation (both
during hours of operation and after hours of operation), data collection, and interviews
with necessary staff for physical security for locations:
A. Visit sites to examine and document existing conditions, equipment, and
infrastructure, and determine device locations. Observations will include, but not be
limited to:
i. Description of site
ii. Description of the physical properties
iii. Description of the surrounding area (neighborhood, adjacent structures, local
businesses)
iv. Pertinent crime data for surrounding area
v. Historical data concerning behavioral trends at each location, if available.
B. Conduct assessment of the general security for the buildings, including door lock
mechanisms, lock & key control, P.A., access control, cameras, intrusion detection,
fire detection systems, and other security equipment or systems.
C. Discuss recent security incidents, and identify threats, risks, and the likelihood of
future security incidents based on input from the County and local law enforcement
personnel.
D. Identify security-related threats from internal and external sources.
E. Identify critical assets to pair most likely threats to most likely security scenarios.
TASK 10- Conduct assessment of existing network connectivity for security systems.
A. Review communications and security systems and configuration.
B. Assess capability to handle additional security systems.
8
TASK 12- Identify existing Crime Prevention through Environmental Design (CPTED) and provide
alternatives, as necessary.
TASK 13- As part of the security systems assessment, provide recommendations to replace,
repurpose, or enhance existing systems.
TASK 16- Review the Security Risk Assessment Report and recommendations with the County.
TASK 17- Revise the Security Risk Assessment Report and recommendations as needed and
prepare cost estimates for solution(s).
TASK 18- Present the final Security Risk Assessment Report and recommendations to the
Routt County Board of County Commissioners.
11
Page
SIRA® THREAT INFORMATION PROTECTION SYSTEM (TIPSsm) is a proprietary software system that
provides organizations with the tools and capabilities necessary to proactively handle threat
information. This unique system conducts real-time trend analysis and generates an immediate alert on
possible connections between current and previously reported suspicious activities, regardless of where,
when, and by whom these activities were reported. This collaborative system enables the reporting field
officer, management, and Analyst, to “connect the dots” between past and new suspicious activities
across all clients’ locations thus increasing the ability to identify and address evolving threats in real
time.
In addition to its analytical and alert features, TIPS provides subscribers with a comprehensive tool to
report, log, track, and manage observed suspicious activities, threats, and other types of cases.
12
Page
Office Locations: Minnesota, Texas, South Carolina, Connecticut, Florida, Illinois, Iowa, Tennessee
From security assessments and technology systems, to design, bid, and implementation, TNCG works
with you to develop and implement a comprehensive security program and supporting systems. Our
Crime Prevention Through Environmental Design (CPTED) expert co-authored the original CPTED
concept. TNCG has continually updated and improved our CPTED approach, spanning over a decade of
work with government agencies. TNCG has a working knowledge of DHS/FEMA guidelines and
regulations. TNCG has worked with multiple cities and counties throughout the country and has
provided security assessments to the City of Santa Cruz (CA), Anoka County (MN), Denver Public Schools
(CO), and Colorado Mountain College. TNCG has also provided security consulting services to state and
regional agencies, including the State of Minnesota, the Chicago Office of Emergency Management and
Communication, and the City of St. Paul as well as private entities such as U.S. Bank Stadium.
13
Page
Lighting Assessments True North can assess outside lighting levels for facilities and sites to
ensure adequate levels of lighting for both prevention of threats as well
Page
2. We sell no hardware or software or any tangible products, including but not limited to locks,
alarms, fencing, bollards, doors, window coverings, security systems, networking devices,
wireless equipment, telecommunications equipment, cabling, multimedia displays or projection
systems/devices.
3. We are not aligned with any manufacturers of the above-listed products or any products.
4. We are not aligned with any vendors, or distributors, or representative firms who sell, market,
install, program or subcontract work for the above-listed products, or any products or services.
5. We are paid only on a fee (hourly) basis by our clients for whom we are contractually committed
to providing independent consulting and design engineering services.
6. We receive no commissions, salaries, or payoffs of any kind from any business entity for services
we perform on behalf of our clients, or for products that we may from time to time recommend
to our clients on their behalf.
17
Page
Personnel
∙ Tony Chojnowski, COO, Project Executive
• Annual ISC West Annual Security • ASIS International (American Society for Industrial Security)
Participant • IPVM (IP Video Management & Access Control)
Experience
2014 – Present True North Consulting Group
• Contributing Security Consultant
2013 – 2014 Rozin Security Consulting
• Security Consultant
2006 – 2007 Acxiom / Harbinger Airport Technologies Group Inc.
• Director of Strategic Initiatives, Senior Consultant
2001 – 2005 Huntleigh / ICTS USA
22
• Security Manager
Certificates
• Executive Strategies Management
• Northwestern University, Traffic Police
Administration Training Program
• Certificate of Appreciation, Logan Square
Lions
• Chicago Police Department Youth Division
Role Model Recognition Award
• 2 Chicago Police Department Unit
Meritorious Awards
• 2 Chicago Police Department
Commendations
24
Page
Mr. Greves participated in two Persian Gulf deployments, and one counter-
narcotic deployment to Central and South America. His early experience is
derived from his installation and maintenance of shipboard RADAR and RF
Communications systems. He has served as flight deck fire-fighter/medical
corpsman during helicopter evolutions. He gained extensive experience in the
design, installation and maintenance of integrated security systems while
Education employed by large security contractors, end-users, and independent
Bellevue University, Bellevue, Nebraska consulting firms.
• Bachelor of Science in
Significant Projects
Security Management
Bates University – Lewiston, Maine
Lead a security assessment effort of Campus Facilities and Off-Campus Housing
Areas of Expertise
facilities. Provided technology consulting, design and management to deploy
• Public Safety
enterprise security systems on and off campus.
• 2-Way Radio Systems
• Physical Security Systems;
Raleigh-Durham International Airport – Cary, North Carolina
o Video Management
Terminal A, Terminal C, General Aviation
o Electronic Access Control
o Intrusion Detection
Provided consulting services for comprehensive hot-redundant premise access
• Emergency Mass Notification control system upgrade and initial deployment of an enterprise video
o Public Marquee Display surveillance system.
o Workstation, Social Media, Text,
Email notification Federal Reserve Bank - Districts 11 & 12
o Fire Alarm Integration System Design and Implementation
• Technology Consulting
• Masterkey Systems – Facility Keying District 11: Provided consulting services to upgrade FRB Dallas cash vault
• Emergency Management solution. Subsequent projects included an upgrade to District 11’s premise
• Emergency Response access control, video surveillance, and intercom systems.
• Business Continuity
• Risk Assessment District 12: Provided security consulting, design and implementation oversight
• Central Station Design services to expand and enhance a multi-phase security program.
• Security Control Room Design
Sowwah Square Hotel – Al Maryah Island, Abu Dhabi, UAE
Training and Certifications Provided consulting and design services for hotel operations and premiere
• ASIS International Certified Protection guest accommodations. Coordinated security interface requirements with
Professional (CPP) Ministry of Information.
• Software House C-Cure – Enterprise
Access Control Experience
• Salient CompleteView – Enterprise Video 2018 – Present True North Consulting Group
Surveillance • Senior Technology Consultant
• Morsewatchman Keywatcher 2009 – 2018 Austin Community College – Austin, Texas
• Homeland Security Threat Liaison • Director of Security
Officer 2001– 2009 Various Consulting
• Annual ASIS Security Conference • Senior Security Consultant
25
True North Consulting Group, LLC strives to understand your organization and its mission fully, and what
is most important to you. We believe that for a comprehensive safety and security plan to be successful,
we must have in-depth knowledge of your operations, systems and personnel, environment and culture,
and stakeholders. This approach allows our team to deliver tailored security solutions to your
organization that leverages your existent resources and support your cultural and operational strengths
while meeting nationally-accepted best practices. Our recommendations have proven effective and will
create stronger security operations meeting the required level of protection for your organization. Our
master security plans include recommendations for all aspects of a security program in the three
domains of security: physical security, security technology, and human factor/operations.
True North has extensive experience in providing phased implementation plans with cost estimates for
recommendations included in the plan based on our knowledge of systems and installation costs
typically charged by vendors in the geographic area. Because we are involved with the bidding and
negotiation process for many of our clients, we have current, up-to-date market costs for items included
in security program recommendations. Our cost estimates include item, system, and maintenance costs
as appropriate.
Our name is only as good as what our clients say. The overwhelming majority of our clients become our
biggest advocates and repeat customers, which we feel is a tribute to our reputation of providing the
highest quality of service in all aspects of what we do. TNCG considers all current operations, future
growth, blended academic content delivery, and alignment of information technology resources with
the overall teaching and learning goals of the institution.
We have successfully completed security and technology assessments throughout our 35 years without
any complications. We encourage the County to check our references.
27
Page
True North Consulting Group, LLC has worked with clients from coast to coast in the U.S. Our
consultants prepare for each project by reviewing all pertinent data and geographic data as thoroughly
as possible to ensure we are familiar with local conditions.
TNCG has worked with many clients in Colorado including the City of Arvada, Colorado Mountain
College, Denver Public Schools, and both the City and School District of Durango.
28
Page
Contact: Mr. Kim Vagher, Manager of City Facilities, (720) 898-7681, kvagher@arvada.org
Page
____________________________________________________________________________________
Carlisle, Pennsylvania
Newton, Iowa
Morris, Minnesota
35
Page
True North Consulting Group, LLC agrees to use the Routt County Contract Agreement as is.
36
Page
The team members for True North Consulting Group will be ready to begin this project two weeks after
execution of the contract. Our current resources are able to handle this new project. We stand by the
team’s ability to meet or exceed the completion dates for the proposed services outlined in this RFP.
With a variety of expertise in professional technology and security consulting services and over 35 years’
experience, we are well equipped to handle a project of this magnitude.
After careful consideration of our current obligations, TNCG states that we are capable of handling this
project with the resources and staff we included in this response.
37
Page
Comprehensive, risk-based threat and vulnerability assessments for all facilities listed below:
Facility
Historic Courthouse
Annex
*Expenses $4,000
Total: $29,200
*Expenses - All travel, lodging, and meal expenses incurred by consultants will be billed at actual cost.
38
Page