Professional Documents
Culture Documents
01 EB2 Business Plan Sample IT Security and Consulting Flatten 150dpi Watermark Compress
01 EB2 Business Plan Sample IT Security and Consulting Flatten 150dpi Watermark Compress
SAMPLE
COMPAN
Y
Mr. John Doe
Chief Executive
Officer
Contents
1 JeCUtrVe MMMZID/ . ...............................................................................................,....,....,....,.........,........................................-3
J.1 Introduction
Mr. John Doe (hereafter also referred to as Mr. Doe) will operate an IT company in the
U.S., focused on providing a variety of services and products to businesses operating in
multiple industries.
Mr. Doe will pursue his endeavor through SAMPLE COMPANY (hereafter also referred to as
the Company). SAMPLE COMPANY was formed on Month XX, 20XX in Sample State.
The Company will provide safety and cybersecurity solutions, security system
engineering services, forensic analysis system s, biometr ic solutions, consulting services for
risk mitigation, software, and more.
In addition, SAMPLE COMPANY will also offer training courses, workshops, conferences
and seminars, focused on cybersecurity, information security awareness, and more. Some of
these programs will be aimed at children, in order to help them avoid threats caused
bycybercriminals.
By operating in the IT, consulting, and information security fields, Mr. Doe’s Company will
contribute to the development of an area that is recognized by the U.S. government as
being of vital importance to the country.
SAMPLE COMPANY’s office will be based in Sample City, Sample State. However, SAMPLE
COMPANY will serve clients throughout the entirety of the U.S. and internationally, Upon
receiving his visa approval, Mr. Doe will start serving as the Chief Executive Officer of the
Company. His business vision, strong motivation, and acquired experience, knowledge,
and professional skills will allow him to direct the Company, forge relationships with
prospective clients, establish business networks easily, and build a lasting client
base.
Business
As mentioned in Section 6.1, Mr. Doe is well-positioned to advance his proposed endeavor as
the Chief Executive Officer of SAMPLE COMPANY. His academic credentials include a
Bachelor‘s
Business
Degree in Computer Systems Engineering, a Master of Science Degree, and an
Honorary Doctorate from Sample University, for his contributions to the development of
innovation and educational technology.
Over the last XX years, Mr. Doe has been serving as the Founder and President of
Sample Company, Sample Country. Sample Company is a business group with leading
business units in different Segments, making use of innovation and technological trends to
obtain better results in an increasingly digital world, The company‘s operations fall within
three categories of services:
Under the leadership of Mr. Doe, Sample Company achieved excellence in the areas of
cybersecurity, identity, software development, education, and technological innovation, and
its business units have been certified and awarded by different institutionsworldwide.
Mr. Doe’s main goal is to expand the operations of Sample Company to the United States
through SAMPLE COMPANY and collaborate with the country by offering so(utions that
improve the security of organizations in the modern business environment, while
fostering technological innovation. With multiple awards earned due to his unrivalled skills,
and an impressive number of patents registered, Mr. Doe will contribute to the
development of areas that are widely- recognized as being of high importance to the
United States.
Business
1.2 Nature and Scope of the Business
SAMPLE COMPANY will conduct business as an IT and cybersecurity consulting company. Mr.
Doe will develop the Company’s operations, including the services and products provided,
based on the successful business model of his Sample Countr v- based company,
Sample Company.
The Company‘s technology will allow for both offline and online verification, and will not
require the creation of a database, as the technology operates without the need for
retaining biographical data. The Company’s business model will allow SAMPLE COMPANY
to successfully organize a wide range of products and services offered, and will enable the
Company to plan the independent development of each business segment. This business
model will also enable SAMPLE COMPANY to concentrate on the continuous development
of the Company’s strengths with regards to each specific target sector, as well as to develop
unique missions and visions for each business segment.
Business
and applying the policies, laws, and regulations necessary to support the safe operations of a
digital
Business
society. When it comes to digital security, SAMPLE COMPANY will specialize in the prevention,
detection, correction, recovery, and defense against cybercrime.
Additionally, the Company will develop and implement technological products and services
offering them to clients in Sample State and Sample State 1 in the first year of business
operations. As the business develops, SAMPLE COMPANY will gradually expand its target area
to include states such as Sample State 3, Sample State 4, Sample State 5, and Sample State 6,
before eventually expanding across the entirety of the U.S. and other countries
worldwide.
SAMPLE COMPANY will provide customized technological solutions in accordance with each
client’s needs. The Company will thoroughly analyze the specific requirements of each project
in order to develop solutions that will enable each client to use the latest technologies in a
creative, efficient, and functional manner. SAMPLE COMPANY will operate in accordance
with Sample Company’s and its partner companies’ certifications, including: Sample
Certification, Sample Certification 1, and Sample Certification 2.
Sample Company and its suppliers have been certified and awarded by different
institutions worldwide. Sample Company has successfully provided its products and services
to hundreds of clients in Sample Country and worldwide, including: Some Company, Some
Company 1, Some Company 2, Sample Country Ministry of Education, Sample Co untry
Ministry of Justice, Some Company 3, Some Company 4, and Some Company S. The U.S.
Company will benefit from these existing client relationships and the Sample Country
company’s market reputation, as well as from its relationships with allies and strategic
partners, such as Some Company 6, Some Company 7, Some Company 8, Some Company
9, Some Company 10, Some Company 11, Some Company
12, and Some Company 13.
Business
SAMPLE COMPANY will also act as a sales representative for these companies’ products
end brand’s in the U.S. market.
SAMPLE COMPANY will also offer educational solutions developed by Company 4, which
offers programs that support the education of children in the area of personal
improvement.
SAMPLE COMPANY will distinguish itself from the competition by offering a diverse
range of customizable services and solutions. The Company will be dedicated to providing
exceptional customer service, coupled with a focus on meeting clients' specific IT, digital
Business
identity, and cybersecurity requirements. SAMPLE COMPANY’s competitiveness will be
enhanced by the
Business
Sample Country company’s established reputation and support, s well developed
network of business contacts, a strong marketing strategy, and Mr. Doe’s personal
expertise.
Mr. Doe will ensure that SAMPLE COMPAN Y will be a customer-oriented company,
placing clients’ needs at the core of its operations. In addition to listening and fully
understandingdients’ requirements, the Company’s approach will be to ensure that all
solutions it offers have optimal time-to-market, in accordance with clients’ demands.
Mr. Doe is conscientious of the ethical issues surrounding computer data and
product admissibility in security proceedings. Under Mr. Doe’ direction, SAMPLE COMPANY
will strive to achieve a sound reputation in the U.S., as a reliable and ethical service
provider.
A solution-based, client-centric approach and Mr. Doe’s exceptional credentials are some of
the factors that will lead his Company to successfully establish operations in the U.S.
Moreover, supported by Mr. Doe’s entrepreneurial experience and his unrivalled
skills in the field of information security, SAMPLE COMPANY will grow rapidly and
contribute positively to the U.S. economy as a whole.
2 Industry and Market Analysis
The increasing use of mobile devices and cloud-based servers to store sensitive data
and the subsequent rise in technologically sophisticat ed cyber criminals threatening to
steal that data have accelerated groMh in the IT Security Consulting Industry. Benefiting
from the increasing adoption of e-commerce, social networking and cloud computing,
industry revenue grew at an annualized rate of X.X%to $XX.X billion over the X years to
20XX. The growing prevalence ofhigh- profile cybersecurity attacks and risks associated
with potential data breaches continued to propel the industry forward, with revenue
rising by X.X% in 20XX alone.
Business
Source
Business
Over the past X years, the increasing number of broadband connections and rapid growth in
the number of mobile connections have contributed to rising demand for IT security and
systems integration Solutions. IT security consultants have benefited from these trends, as
they increase the amount of data stored in cloud servers that require protection.
Furthermore, the rise of software as a service (SaaS), a model of software deployment in
which a provider licenses an application to customers for use as a
service on demand, has helped raise
the percentage of services conducted
online. In 20XX, XX.X% of all
services were conducted online, up
from XX.X% in 20XX. As consumers
and companies rely more on online
networks to conduct business, industry
operators indirectly benefit from the
growing risk of potential security
breaches. Addi tional!v, government
agencies, which currently generate an
estimated XX.X% of revenue, have
also shown their vulnerability to
security breaches, as anti-censorship
organizations have leaked classified
information to the public.
Business Plan J 0
Industry profit, measured as earnings before interest and taxes, is expected to decrease
during the current period, but will likely increase over the X years to 20XX. The industry is
likely to perform well as downstream markets across all sectors, including banking and
financial services, telecommunications, and retail, continue to react proactively to the risk
of high -profile, reputation-threatening breaches. Furthermore, government agencies
contending with high - stake security issues are expected to increase their IT security
investments significantly over the next X years. As these positive trends continue, industry
revenue is expected to grow at an annualized rate of X.X% to $XX billion over the X
years to 20XX.
2. .1.3 Healthcare
The healthcare sector accounts for XX.X% of revenue. Healthcare operators use fraud
detection software to lower the risk of improper payments, eligibility fraud, and case
management. This segment will grow significantly over the next X years, as healthcare
companies conti nue to integrate big data solutions and predictive analytics throughout their
operations.Additionally, a growing strain on healthcare resources will push operators in the
sector to seek novel and creative solutions to problems relating to patient data and
information.
Business Plan J 2
2.1.1 ,4 Education
The education sector accounts for XX.X% of industry revenue. This sector, which
encompasses private and public educational institutions for all age levels, collects large
swaths of confidential data from both students and employees. C onsequently,
organizations within this sector are prone to outside h ackers and even potential leaks
from within their ranks, which makes information and data security an imperative. As the
population continues to grow and more students continue to enroll in the education system,
this segmen t will increase as a percentage of revenue over the X years to 20XX.
Business
2.1.2.2 Business Profit
Demand for IT Security consulting services benefits from higher corporate profit and
business sentiment levels. Businesses are more likelv to invest in new comp uting
infrastructure when profit is high. Higher corporate profit, in addition to the growing
importance of network security has encouraged businesses across all sectors to continue
investing in IT security solutions.
Business
2.1.3 Business Locations
The Southeast accounts for the greatest share of IT security consulting revenue and
employment, including XX.X% of the country’s IT consulting establishments. This region is a
popular destination for industry operators due to the proximity to the industry’s largest
government clients. Sample State accounts for X.X% of the industry's establishments.
Sample State is one of the largest manufacturers of computer chips and also now hosts
software, communication technology, and several defense contracting companies. Sample
State also contains a relatively high proportion of data centers compared to the overall
population.
The West is another prominent center fo r IT security consulting firms. The region contains
Business
XIX°/a of industry establishments. Among these states, Sample State produces the greatest
share of IT
Business
consulting revenue, establishments, and employment of any state, primarily because of
the concentration of technology and software firms located in Sample Area.
The Mid-Atlantic has the third-largest share of industry establishments, with the region’s
share of industry firms exceeding its population levels. XX.X% of industry establishments are
estimatecl to be located in the Mid-Atlantic region. Many major firms in the financial
service sector have headquarters in Sample State 2. Consulting services in Sample State 2
(X,X%) and Sample State 3 (X.X%) cater to the industry’s largest and highest-value
corporate and institutional clients. In addition, X.X% of industry establishments are
located in Sample City, due to several large telecommunications companies in the
state.
Business
2.2 IT Consulting Industry in the U.S.
According to Sample Source,* the IT Consulting Industry includes firms that provide the
following services to client companies: writing, testing and supporting custom software,
planning and designing integrated hardware, software and communication infrastructure,
and on-site management of computer systems and data processing facilities.
The IT Consulting Industry comprises companies that help businesses design and implement
information technology (IT) systems and infrastructure. Due to the low capital
requirements of this industry, a modest number of operators are small nonemployers or
independent contractors. Over the X years to 20XX, shifting technological trends toward
cloud computing and data analytics have caused larger operators to acquire smaller
companies and develop new products to stay relevant. For example, Accenture PLC
(Accenture) completed its acquisition of Orbium, a technology consultancy for financial
services providers, in Month 20XX. Similarly, International
Business J
Source
Business J
Business Machines Corp. (IBM) completed its
largest acquisition in company history in Month
20XX with the purchase of open software company
“Company Name” for $XX.X billion, signaling the
company's rising interest in developing hybrid
cloud systems.
Over the X years to 20XX, as the coronavirus pandemic gives way to an economic
recovery, corporate profit is expected to rebound and support increased investment in
computers and software. The continued shift to cloud computing and the rising use of data
analytics will heighten security concerns for businesses, precipitating increased demand for
industry services. As a result of revived downstream demand, Sample Source expects
industry revenue to rise at an annualized rate of X.X% to $XXX.X billion over the X years
to 20XX.
Business J
2.2.1 Major Markets
cloud, which ensures industry operators a steady stream of reven ue from software users.
Similarly, SaaS benefits businesses by minimizing initial setup, hardware and technical
support costs. Over the X years to 20XX, this segment has increased slightly as a
percentage of revenue.
Business J
unauthorized access and
Business J
includes sub-functions such as authorizing subscriber access and controlling the distribution
of cryptographic keying material.
Business 2
2.2.I .6 Other Serv ices
All other IT services account for the remaining XX.X% of revenue for the industry. This
miscellaneous category includes domain name registration, custom database design and
development, website design and development, temporary technical staffing, disaster
data recovery, licensing rights, and resale of computer hardware and software, among
other services.
Business 2
rapidly assess the relevance of innovations, or they will not remain as competitive as
more technologically savvy Companies. Over the past X years, rapid adoption of third-
platform IT solutions, which include big data analytics and Cloud computing, has
increased the need for IT consulting in these areas. Over the next X years, demand for
industry services will likely remain strong as digital technology continues to drive the
global economy forward.
Business 2
2.2.3 Business Locotions
The Southeast contains the largest concentration of IT consulting firms, holding an expected
XX.X% of industry establishments. This region is a popular destination for IT consultants
because of its high concentration of the industry's key client markets. Financial services
companies, including banks, capital markets and insurance companies, represent the largest
downstream market for the IT Consulting Industry. The Southeast regions contains the largest
number of commercial banks, with XX.X% of the total, as well as insurance agencies and brokers
with XX.X°/«. By positioning themselves in the Southeast, IT consulting firms improve their
ability to capitalize on these key downstream markets.
Business 2
The Western region is also a prominent location for IT consulting companies, containing
an estimated XX.Xi of industry establishments in 20XX. Sample State is home to Sample
Area, whit is one of the largest centers of high technology companies. According!v, Sample
State represents XX.X% of industry establishments. The region is also home to XX.Xi of the
U.S. population, which provides operators to access to a large supply of skilled labor.
The Mid-Atlantic region similarly contains a high concentration of industry locations, In 20XX,
an estimated XX.Xi of industry establishments are located in the Mid -Atlantic. A significant
volume of IT consultants is concentrated within this region due to the large number of
financial services companies located in Sample State, which accounts for an estimated
XX.X% of total establishments. Sample State also contains XX.X% of wireless
telecommunication carriers. Communications, media, and technology companies represent
another key downstream market for industry operators.
Business 2
3 Services and Products
SAMPLE COMPANY will offer high -quality, reliable, and state-of-the-art cybersecurity
services, cybersecurity products, identity services, identity products, educational programs for
children, and other IT-related services and solutions.
The Company will provide security solutions aimed at preventing cyberattacks related to
electronic banking, ATMs, electronic transactions, and e-commerce. These solutions will
be aimed at ensuring security in data transfer, multimedia platforms, and emails. The
Company will develop internal and external perimeter penetration tests and develop
solution to prevent attacking of digital and perimeter media.
SAMPLE COMPANY will provide consulting services related to information security and
risk processes in accordance with standards such as Sample Standard, Sample
Standard 1, and Sample Standard 2. The Company will conduct training, courses, and
workshops aimed at expanding clients’ knowledge and awareness of cybersecurity risks.
Cybersecurity-related
Business 2
consulting services will include consultations regarding citizen contact centers, network
monitoring and operations centers, security operation centers, cyber incident
responsecenters, surveillance and communication centers, and datacenters. The Company
will advise clients on cyber defense and resilience through cyber surveillance, cognitive and
predictive security, threat intelligence, predictive analytics, and cyber intelligence engines.
SAMPLE COMPANY’s scope of service5 will include aeronautical and aerospace
cybersecurity, cybersecurity in the value chain and supply, hospital cybersecurity, industrial
cyber security, the implementation of security control systems, maritime cybersecurity, land
cybersecurity, and hydroelectric cybersecurity.
SAMPLE COMPANY will help clients operating in a variety of industries prevent, detect,
recover, and defend against cybercrime. The Company will investigate and respond to
cyber incidents, detect cyber-attacks, and diagnose intrusions. Cybersecurity services will also
inclu de advanced threat hunting, threat triage, and monitoring and analysis of viruses,
malware, and ransomware. The Company will conduct compliance audits and verifications . It
will an a lyze dients’ information security compliance, cloud security compliance, process and
SAMPLE COMPANY will design, develop, implement, and configure digital and electronic
signatures, biometric identity and digital banking, public key infrastructure, Electronic Data
Interchange, Electronic Funds Transfer, digital vaults, and other processes and systems as
required by the Company’s clients. SAMPLE COMPANY will provide engineering services
related to application security, and provide business continuity and disaster recovery
services. The Company will help clients p rotect their businesses from ab use of corporate
identity and brand, and prevent information leakage. SAMPLE COMPANY will also set
up data recovery, log management, and reporting processes. The Company will provide
cybersecurity consulting services for digital and smart cities, cyber police implementation,
virtual patrol development, security and cybersecurity infrastructure development, tactical and
mission-critical infrastructure development, and prison surveillance systems development
services.
Business 2
All of the Company’s cybersecurity services will cover data, application, server, data network,
perimeter, cloud, and mobile protection. SAMPLE COMPANY’s security services will also indude
Business 2
VOIP security, Internet of Things security, security in virtual environments, data network
and telecommunications security, and privileged user management.
SAMPLE COMPANY will provide advisory services related to computing, process redesign,
automation, process systematization, training, and implementation.
3.2.2Identity Solut‹ nS
The Company will offer digital identity products developed by Company 1. The Company 1
digital identity solutions include the storage, compre5sion, and assurance of data that
allows fo r the recognition of a person or an object based on asymmetric cryptography and
biometrics. These solutions use a two-dimensional QR code pair to provide a high degree
of security and prevent forgery and identity theft.
The Company 1 QR codes store and encrypt information such as photos, biographical
data, fingerprints, and facial biometry. The Company’s digital identity products will solve
forgery and alteration of documents, impersonation, and dara mining, and guarantee
Business 2
document validation,
Business 2
effective use on mobile devices, extended document files, data protection, and military-
level security.
The Company will provide Company 1’s integral digital identity solution, Sample Solution,
which consists of a binary sequence of data that securely contains the identity of a
person, thing or process (biographical data, photography, biometrics, PIN or password,
secret questions, etc.)and can be verified by a third party without requiring connectivity /
internet or consulting a database.
3.2.4Education Products
SAMPLE COMPANY will offer educational products and programs developed by Company 4.
These products will include:
• Sample Product 1, which encourages the development of ski(Is for children to decide
and act on improving their lifestyle, care for their own health and the
development of a healthy future.
• Sample Product 2, which promotes activities for children that identify, reflect, and
solve problems, by assuming an active role in the search for adequate strategies, in
the exercise of their own rights, and to enjoy a dignified childhood.
• Sample Product 3, which is endorsed by the National Center for Disaster
Prevention (CENAPRED) and attached to the UN Sendai Framework (20XX-20XX).
Company 4 fosters a culture of prevention, safety, and assistance for disaster
risk reduction.
• Sample Product 4, which generates a teaching of norms, customs, behavior manners,
roles, ways of acting, and living.
Business 3
4 SAMPLE CONJPANY’s Strengths
Business 3
4.2 Superior and Unique Services and Products
SAMPLE COMPANY will offer services and products that are not currently provided by
other companies operating in the digital, security, and education markets. Some of these
unique solutions include:
• Sample Product: an integral digital identity solution, the Sample Product avoids
falsification and alteration of documents by using asymmetric cryptography. In
addition, this solution allows for the identification of potential thefts by using
multifactor biometrics. The generation process is protected by blockch ain and
validation involves the integration of pa ssive and active safety.
• Company 2. the solutions comprised in this line of business include a highly
specialized infrastructure with components such as 7/24/365 monitoring, help desk,
prevention, detection, and response, vulnerability man agement, security correlation,
intrusion detection, behavior monitoring, asset discovery, analysis on internet and
deep networks for brand protection, security governance, information security
analyzes, among others. Such services cater to private companies, as well as
government bodies.
• Educational Services: SAMPLE COMPANY will offer a comprehensive set of eduNational
programs d eveloped by its business unit Company 4. These services are aimed at
promoting awareness about critical themes such as children’s rights and safety, civil
protection, and more. In addition, through a platform called “Sample Name”, the
Company will provide users with functionalities such as team building, a special
module for the detection of training needs, a special module for satisfaction surveys,
group automation, invitation and self-registration system to courses, dynamic report
system, and an internal messaging module.
Business 3
personalized, client-oriented approach, and will work to provide services in line with the
Istest industry trends.
4.5 OptimaITime-to-Market
Time-to-market, or speed to market, is the length of time it takes for a product or service
to go from being conceived to being available for sale. It helps measure the scope of a
business’s abilities to innovate. SAMPLE COMPANY will always strive to control its
operational processes in order to be able to predict accurate time -to-market, in
accordance with clients’ demands. By employing efficient managerial practices, SAMPLE
COMPANY will be highly responsive to dients’ needs, which will lead the Company to
increased revenues in the future through word of mouth recommendations.
Business
service quality and on a business’s reputation. Once Mr. Doe starts serving as the Chief
Executive Officer of SAMPLE
Business
COMPANY, he will personally transfer his knowledge to staff, and incentivize employees to be
open-minded, data-driven, and client-oriented.
The website will be continuously optimized for better search engine rankings. Search
engine optimization will ensure that proper titles, meta descriptions, and keywords, both short
and long- tailed, are present on all pages of the website. The Company will also con duct
advertising campaigns on social media, such as Instagram, to drive visitors and potential
clients to its website. Proper search engine optimization and successful social media
campaigns will be among the key growth and development factors of the Company. Online
marketing and promotional efforts will help the Company rank higher in search engine result
pages, and will lead to an increased number of visitors and, consequently, clients.
Business 3
According to Sample Source, 3 Linked In is the most-used social media platform
amongst companies, a segment that corresponds to SAMPLE COMPANY’s targets.
According to the same source, XX million Linkedln users are senior level influencers and
XX million are in decision- making positions. Establishing connections with these
professionals will be one of the Company’s main priorities. SAMPLE COMPANY will also
advertise its services on Linkedln. Linkedln will help the Company generate new leads,
drive website traffic, and build brand awareness.
and referrals.
Business
Source
Business
6 Key Management and Personnel
6.1.1 Education
• Since his early years, Mr. Doe stood out as a student - achieving the best results
in eaCh school in which he studied. During his educational path, he was able develop
exceptional skills in science, mathematics and physics, which was a trigger for him to
choose pursuing a career in the field of engineering.
• Mr. Doe holds a Master of Science Degree from the Sample Center of the Sample Institute.
Business
6.1.2 Awards, Degrees. and Acknowledgements
Throughout his career, Mr. Doe has received numerous awards, including the following:
• Sample Business Association. World Leader Business Person Recognition, Month 20XX
• Sample Business Association: The Bizz World Leader Business Person Recognition, Month
20XX
• Recognition for participation as guest speaker about the theme “Social Responsibility
with Children”, Month 20XX
Business
• Sample Country Association of Transportation and Mobility: Recognition for event
participation, Month 20XX
• National Center for Disaster Prevention of the Ministry of the Interior and the
Ministry of Civil Protection of Sample State: Recognition for participation as a
speaker in the commemorative event of World Tsunami Awareness Day,
Month 20XX
Business
6.1.3Patents and lntellec tual Rights
The following table presents the patents/trademarks obtained by the multiple enterprises
Mr. Doe participates in. All of them were registered at the Sample Country institute:
D Tr T °r
SAMPLE NAME Month XX, Capacitation
20XX
SAMPLE NAME Month XX, Education, Capacitation, and Entertainment and
20XX Cultural Activities
SAMPLE NAME Month XX, Software
SAMPLE NAME 20XX Webcasts and Virtua Meetings
SAMPLE NAME Month XX, Administration of Web Content
20XX Month
XX, 20XX
SAMPLE NAME Month XX, Internet TV and Radio Broadcasting
20XX
SAMPLE NAME Month XX, Quality Contro| (ISO 9001)
SAMPLE NAME 20XX Educational Services via Internet
SAMPLE NAME Month XX, Software
20XX Month
XX, 20XX
SAMPLE NAME Month XX, Software
SAMPLE NAME 20XX Software
Month XX,
20XX
SAMPLE NAME Month XX, Software
SAMPLE NAME 20XX Month Design and Development of IT Equipment and
XX, 20XX Software
SAMPLE NAME Construction Services
Month XX,
20XX
SAMPLE NAME Month XX, Design and Development of 1T Equipment and
20XX Software
SAMPLE NAME Scientific and Technologic Services
Month XX,
20XX
SAMPLE NAME Month XX, Educational Services via Internet
20XX
SAMPLE NAME Month XX, Software
20XX
SAMPLE NAME Month XX, Education, Capacitation, and Entertainment and
20XX Cultural Activities
SAMPLE NAME Educational Services
Month XX,
20XX
SAMPLE NAME Month XX, Educational Services
20XX
SAMPLE NAME Month XX, Education, Capacitation, and Entertainment and
20XX
Cultural Activities
Business 3
SAMPLE NAME Month XX, IT System Analysis and Net Safety
20XX
SAMPLE NAME Month XX, Energy Audit and Investigation
SAMPLE NAME 20XX Educational Services, Teaching, and Tutoring Services
Month XX,
20XX
SAMPLE NAME Month XX, Software Installation, Development, and Maintenance
SAMPLE NAME 20XX Month Educational Software for Children
XX, 20XX
Business 3
The following table presents the intellectual rights obtained by the multiple enterprises Mr.
Doe participates in. All of them were registered at Sample Institute, Sample Country:
Company
Sample 1 Month XX, 20XX Computer Program
Name Month XX, 20XX Computer Programs/Certified Version
Sample Name Month XX, 20XX Computer Programs/Certified Version
Sample Name
Sample Month XX, 20XX Computer Programs/Certified Version
Name Month XX, 20XX Comp uter Programs/Certified
Sample Name Month XX, Version Computer
Sample Name 20XX Programs/Certified Version
Sample Name Month XX, 20XX Computer Programs/Certified Version
Sample Name Month XX, 20XX Computer Programs/Certified Version
Sample Name Month XX, 20XX Computer Programs/Certified Version
Sample Name Month XX, 20XX Computer Programs/Certified Version
Sample Name Month XX, 20XX Computer Programs/Certified
Sample Name Month XX, Version Computer
Sample 20XX Month Programs/Certified Version Design
Name XX, 20XX Computer Programs/Certified Version
Sample Month XX, Design
Name Sample 20XX Month
Name XX, 20XX Computer Programs/Certified
Version Computer
Sample Name Month XX, 20XX Programs/Certified Version
Sample Name Month XX, 20XX Computer Programs/Certified
Sample Name Month XX, Version Computer
Sample Name 20XX Month Programs/Certified Version
XX, 20XX
Sample Name Literary/Collection
Sample Month XX, Design/Collection
Name 20XX Month Broadcast via Computer Networks
Sample XX, 20XX Data Compilation/Database
Name Sample Month XX,
Name 20XX Month
XX, 20XX
Sample Name Month XX, Audiovtisual C° ! ection
20XX
Sample Name Sample Name Sample Month XX, 20XX
Name Name Sample Name Sample Month XX, 20XX
Sample Name Sample Name Month XX, 20XX
Name Month XX, 20XX Month
Sample XX, 20XX Month XX, 20XX
Name Month XX, 20XX Month XX,
Sample 20XX Month XX, 20XX
Name Month XX, 20XX Month XX,
Sample 20XX Month XX, 20XX
Name Sample
Name Sample
Business 3
A ual Design/Collection
u Collection Literary/Collection
d Audiovisua Design/Collection
i l Collection Cartoon/Collection
o Design/C Cartoon/Collection
v ollection Cartoon/Collection
i Design/C Cartoon/Collection
s ollection Cartoon/Correction
Sample Name Month XX, 20XX Literary/Collection
Sample Month XX, Computer Programs/Collection/Oesign
Name 20XX Month Design
Sample XX, 20XX Literary /CoIIection (Marginal Annotation)
Name Sample Month XX, Design
Name Sample 20XX Month Design/Collection
Name XX, 20XX
Sample Month XX,
Name 20XX
Business 4
Sample Name
Month XX, Computer Program
Sample Name
20XX Month Computer Program
Sample Name
XX, 20XX Computer Program
Sample Name
Month XX, Computer Program
20XX Month XX,
20XX
5ample Name Month XX, 20XX Computer Program
Sample Name Month XX, Computer Program
Sample Name 20XX Month Computer Program
xX, 20XX
In addition, Mr. Doe has started the process to have the patent of Sample Product
Technology (www.Company5.com) registered in Sample State. In this process, Mr. Doe is
being assisted by the Sample Law Group, P.A.
In th e near future, Mr. Doe will have additional technologies patented in the U.S.
• Mr. Doe is the Founder of Sample Company, Sample Country, and has served as
the President of the company for over XX years.
As the Chief Executive Officer of the Company, Mr. Doe will be primarily responsible for
coordinating the operational, commercial, and financial strategies of SAMPLE COMPANY.
Mr. Doe will be responsible for setting the Company’s strategies and goals. He will
coordinate and supervise business activities to ensure they produce the desired results, and
are consistent with the overall strategies of the Company. He will forecast demand for
services and products in the short-, medium-, and long-term. He will be responsible for
ensuring organizational compliance with regulations, laws, procedures, and policies. Mr.
Doe will monitor the Company’s revenue and profits. He will review financial and non-
Business 4
financial reports to devise solutions and improvements. Mr. Ooe will be responsible for
managing SAMPLE COMPANY’s costs, and will strive to maintain operations at cost-
effective levels. He will analyze the Companys expenditures
Business 4
and other financial information in order to develop plans, policies, and budgets. Mr. Doe
will manage performance to measure how efficiently the Company achieves its goals.
Upon the approval of his visa, Mr. Doe will oversee the recruitment and hiring of
personnel. He will continuously work with the Company’s staff to ensure employees
know the direction and expectations of SAMPLE COMPANY, and work toward achieving
these goals. He will continuously evaluate the Company’s success, and track changing
trends in the market in order to develop new busin ess approaches. Mr. Ooe will
maintain enduring relationships with SAMPLE COMPANY’s main stakeholders - such as
business partners, clients, and employees. He will look for growth opportunities and expand
SAMPLE COMPANY’s operations, by offering high- qualit v services and products,
thereby establishing a positive reputation in the market.
The Operations Manager will provide technical direction and guidance to the Company’s
staff and partners regarding processes, tools, technology, and skills for projects. The
Operations Manager will generate requirements and analyze technical approaches and
statementsofwork, labor, and deliverables for projects to ensure high level of services.
This employee will interact with clients to understand s clients’ needs and specific
requirements and customize deliverables. Together with the Chief Executive Officer, this
employee will communicate with clients to receive feedback that can be used in improving
services and products, assisting clients in solving problems, and providing assistance to
create brand loyalty and lasting relationships. The Operations Manager will manage
subordinate staff, forecast resource needs, and communicate hiring needs to the Chief
Executive Officer. This employee will mentor and provide job assignments to enhance
staff performance and expand capabilities. This employee will provide ongoing
developmental feedback to the Company’s staff.
Business 4
6.3 Sales Executives
The Company will hire two full-time Sales Executives in Year 2. These professionals will
be required to have experience and expertise in software development, cybersecurity, and
identity. In Year 3, the Company will hire one part-time Sales Executive, who will be
required to have expertise in Education.
The Sales Executives will develop business plan and sales strategies for the market that
ensure the attainment of the Company’s sales goals and profitability. These employees
will define and execute territory / vertical / sales plans for assigned fields (cybersecurity,
identity, and education solutions) and then meet and exceed sales goals (quotas) through
prospecting, qualifying, managing, and closing sales opportunities. The Sales Executives will
be required to have practical experience and a comprehensive knowledge and understanding
of the industry landscape and associated business processes of potential customers. These
employees will be responsible for developing and managing the sales pipeline, prospecting
and assessing sales, and moving transactions simultaneously through the sales pipeline.
The Sales Executives will develop and manage partner relationships with clients. These
employees will manage and track customer and transactional information using
appropriated systems. The Sales Executives will coordinate resources throughout the
sales cycle, including presales, service support, etc. These employees will promote
demonstrations and provide general support to prospective customers. The Sales Executives
will provide regular reporting of pipeline projects and forecasts to the Operations
Manager. These employees will be required to keep abreast of competition, competitive
issues and services. The Sales Executives wil( practice effective, excellent communication
with members of the management team, clients, and other stakeholders.
The Sales Coordinator will develop an annual sales plan in support of the organization’s
Business 4
strategy and objectives. This employee will direct the implementation and execution of sales
policies and
Business 4
practices. The Sales Coordinator will ensure communications are coordinated, support sales
plan objectives, and meet organizational expenditure requirements in marketing. This
employee will recommend sales strategies for improvement based on market research
and competitor analyses. The Sales Coordinator will implement approved commercial
strategies. This employee will manage multiple-channel selling strategies. The Sales
Coordinator will provide assistance to the sales team to ensure it is capable of carrying out
needed sales and service initiatives. This employee will also be required to perform other
related duties, as assigned by the ChiefExecutive Officer and the Operations Manager.
The Public Relations and Ke v Accounts Representative will be responsible for managing
the portfolio of the Company’s accounts. This employee will provide strategic
counsel to the management of the Company to aid public relations and wider marketing
campaigns. The Public Relations and Key Accounts Representative will provide
commentators and Company information to the media (newspapers, magazines, radio,
television, and online news sites).This employee will build relationships with existing and new
clients as well as with key media contacts. The Public Relations and Key Accounts
Representative will liaise with the media, speaking to journalists and other members of the
press. This employee will be required to provide innovative and creative ideas to the
management of the Company. The Public Relations and Key Accounts Representative will
communicate effectively with a range of stakeholders.
The Graphic Designer and Marketing Specialist will be responsible for creating
visual communications to convey messages in an effective and aestheticall v pleasing
manner. This incorporates several tasks and responsibilities. Thts employee will design web
p ages, brochures, logos, signs, advertisements, and other communication materials. The
Business 4
Graphic Designer and
Business 4
Marketing Specialist will produce drafts for review by the management and make revisions
based on the feedback received. This employee will produce valuable and engaging
content for the website that attracts and converts target groups. The Graphic Designer and
Marketing Specialist will measure and report on the performance of marketing campaigns,
gain insight, and assess against goals. This employee will analyze consumer behavior and
adjust email and advertising campaigns accordingly.
The Customer Service Representative will improve customer service experien ce, create
engaged customers, and facilitate organic growth. This employee will help manage
clients’ issues and follow problems through to resolution. while developing service
procedures, policies, and standards. The Customer Service Representative be responsible
for managing incomingcalls and customer service inquiries. This employee will also be
responsible for identifying and assessing customers’ needs to achieve satisfaction. The
Customer Service Representative will be required to manage large amounts of incoming calls
and provide accurate, valid, and complete information by using the right methods and tools.
This employee will keep records of customer interactions, process customer accounts,
and file documents.
Business 4
and via telephone/email. This employee will update calendars, schedule meetings, and
arrange travel and accommodations.
Business 4
The Administrative Assistant/Secretary Assistant will also attend meetings in order to
keep minutes. This employee will keep updated records of office expenses and
costs. The Administrative Assistant/Secretary will perform other clerical duties such as filing
photocopying, transcribing, and faxing.
X
X
X
X
Chief Executive Office r: Mr. Doe $XX,xXX $XXk,XXX SXXk,XXX $XkX,kXk SXXX,XXX
Administrative Assistant/Secretary
Chief Executive Officer: Mr. Doe $XX,XXX
$XXX,XXX $XX,XXX
$XXX,XXX" $XX,XXX
$XXX,XXX S++,X++
$XXX,XXX , $XX,XXX
$XO,OX I
Sales Coordinator
Administrative Assistant/Secretary 50
$XX,XXX $XX,XXX
SxX,XXX $XX,XXX
SXX,XM Sxx,XXx
$XX,XXX $XX,XXX
$XX,kXX
Sales
SalesExecutives
Coordinator $0
f0 $XX,XXX
SXX,XXX $XX,XXX
S¥X,XXX $XX,XXX
$XX,XXX $XX,XXX
$XX,XXX
Operations Manager
Sales Executives $0
$0 $0
$XX,XXX $XX,XXX
$XX,XXX $XX,XXX
$XX,XXX $XX,XXX
$XX,XXX
SalesOperations
Executive Manager
(part-time) _ $0
$0 $0
$0 $XX,XXX
$XX,XXX $XX,XXX
$XX,XXX $XX,XXX
$XX,XXX I
Public RelationsSales
and Key Accoum(part-time)
Executive Specialist (part-time) So$D $0
$0 SXX,XXX
$XX,XM $XX,XXX
$XX,XXX SXX,XXX
$XX,XXX I
Graphic
Publ ic Designer
Relationsand
andMarketing Specialist
Key Account (part-time
Speciallst (part- ) _ SO$0 _ I _ SO$0 " RX,XXX
$XX,XXX SXX,XXX
$XX,XXX $XX,XXX
$XX,XXX
Customer Service Representative (part-time)
time) @ SO SXX,XXX SXX,XXX $XX,XXX
Graphic Designer and Marketing Spedalis (part- SO SO $xx,xXX $XX,XxX SXX,XxX I
time)
Customer Service Representative (part-time) $0 SD SXX,XXX fXX,XXX $M,XXX
Business 4
6.J J Personnel Summory
The Company will reach a total of nine in-house employees in Year S. The Company expects
its payroll expenses to rise from $XXX,XXX in Year 1 to $XM,XXX in Year 5.
In addition to the in-house personnel, the Company collaborates with independent contractors
for legal and accounting purposes, as previously mentioned in Section 6.9. These
additional personnel costs are presented as operating expenses in the Profit and Loss
Table(Section 9.2).
Cu Stome r Se rvice
Repesen tatve
Independentcontractors
Business 4
7 Need for the Company’s Services
Digital transformation is disrupting entrenched incumbents, and even whole industries as
the pace of change impacts the performance of traditional business models for
creatingvaIue.As the combination of high-speed, ever-connected networks and maturing
digital technologies enhances ties between organizations and their various stakeholders,
opportunities to innovate processes, products, and services emerge that were
unthinkable a few years ago.
However, for most organizations, innovation has been opportunistic and ad hoc. In this
context, the collaboration and support provided by companies such as SAMPLE COMPANY
become essential. Sample Source° claims that a growing number of companies are finding
their service businesses under threat. While few organizations have mastered the new
environment, challenges remain critical, especially those related to security.
Cyber security is one of those words that is now casually bandied about in most
conversations relating to the ongoing digital revolution. As businesses, individuals,
and governments increasingly adopt and leverage technology, the threat stemming from
cybersecurity is becoming more real. It has now become imperative that businesses
ensure cybersecurity in order to maintain the sanctity of the vast amounts of data they
collect in the process of applying and delivering tech powered solutions. However, this is
ea5ier said than done. Ensuringcybersecurity is becoming progressively tougher as
cybercriminals stay a step ahead of the existing firewalls - exploiting n ew vulnerabilities and
constantly executing attacks. They continue to persist, even as regulatory institutions put
together a framework to change and improve standards. In this context, when it comes to
mitigating cyber security risks, it is better to be proactive rather than reactive.
In 20XX, the White House5 relea sed the U.S. National Cyber strategy. The strategy stated
that critical infrastructure, national defense, and the daily lives of Americans relv on computer-
driven
Business 4
4
Source
" Source
Business 4
and interconnected information technologies. As all facets of American life have become
more dependent on a secure cyberspace, n ew vulnerabilities have been revealed and new
threats continue to emerge. Therefore, new threats and a new era of strategic competition
demand a new cyber strategy that responds to new realities, reduces vulne rabilities, deters
adversaries, and safeguards opportunities fo r the American people to thrive. According to
the White House statement, securing cyberspace is fundamental to our strategy and
According to Sample Source, 6 our society is more tech nologically-reliant than ever befo re, and
there is no sign that this trend will slow. Personal data that could result in identity theft is
now posted to the public on our social media accounts. Sensitive information such as social
security numbers, credit card information, and bank account details are now stored in cloud
storage services like Dropbox or Google Drive. While there are no national laws
overseeing d ata breach disclosure in the U.S. on a federal level, there are data breach laws
in all 50states. Commonalities include:
• The requirement to notify those affect as soon as possible
• Let the government know as soon as possible
• Pay some sort of fine
Business 4
* Source
Business 4
Information theft is the fastest growing segment of cybercrime, largely driven by the
increasing exposure of identity information to the web, via cloud services - but it is
not the only target. Industrial controls that manage power grids and other
infrastructure can be disrupted or destroyed. Identity theft is not the only goal as cyber-
attacks may aim to compromise data integrity(destroy or change data) to breed
distrust in an organization or government.
However, the demand for professionals is outstripping the supply of skilled workers, while
demand is growing faster as cybersecurity is now considered mission critical in most
organizations. Cybersecurity will continue to grow as technology becomes digitally connected.
Sample Sources carried out research that showed the talent gap in the cybersecurity field inthe
U.S. Cybersecurity talent gaps exist across the country. The following map provides a
snapshot of demand and supply for cybersecurity jobs in the U.S. and demonstrates the
challenges facing the U.S. cybersecurity workforce.
Sample Magazine’ published an article claiming that the cybersecurity talent crunch will create
X.X million unfilled jobs globally by 20XX - up from X million positions in 20XX. The cyber
7
Source
Source
Business 5
Source
Business 5
employment figure has been corroborated by hundreds of media outlets, including the
world’s largest, as well as industry associations, universities, governments, vendors,
recruitment firms, and security experts. Research carried by Sample MopOz/ne found that
the U.S. has a total employed cybersecurity workforce consisting of XXX,XXX people, and there
are currentIyXXX,XXX unfilled positions. The cybersecurity unemployment rate was at X
percent in 20XX, where it has been since 20XX. The U.S. Bureau of Labor and Statistics*'
projects that employment for information security analysts will grow at XXI between 20XX
and 20XX, which is significantly higher than the average for all other occupations.
Mr. Doe’s Company will contribute towards the reduction of this talent and expertise
crunch. By following industry demands and newest developments, Mr. Doe will make
a significant Contribution to the U.S.
’° Source
Business 5
8 Mr. Doe's National Impact
Mr. Doe is a professional and entrepreneur with a long track-record of experience related
to technology, IT consulting, product and service development, and cybersecurity, among
many other fields. He will pursue his endeavor as the Chief Executive Officer of SAMPLE
COMPANY. The Company was formed on Month XX, 20XX in Sample State.
Under Mr. Doe’s guidance, SAMPLE COMPANY will successfully establish operations, acquire and
retain various clients, and build a strong reputation in the U.S. Mr. Doe will develop
client oriented, consulting services, offer easy-to-use software, and facilitate the process of
system implementation - providing clients with state of art, effective solutions. As an open-
minded professional, Mr. Doe will establish a business that will contribute to the U.S. by
operating in fields considered to be of national importance.
Although providing a myriad of services and products, cybersecurity and identity will be at
the co re of SAMPLE COMPANY’s operations. The need to shield information and identity
from malicious actors is a concern at the highest levels of business and government. State
secrets can be stolen from the other side of the worl d. Companies, whose entire business
models depend on control of customers’ data, can find their databases comp romised.
Cybercrimes have cost the world an estimated $X trillion so far in 20XX, according to recent
research carried out by Sample Source,** which predicted that damages would hit SX trillion
by 20XX, global spending in cyber- security measures to protect against catastrophic losses
will reach $XX billion by 20XX. Considering the increasing number of cyber-attacks,
employing active cybersecurity solutions - such as those provided by Mr. Ooe*s Company,
is of vital importance for most organizations, and is a matter of national interest.
The United States Senate * 2 claims that the importance of cybersecurity protocols has never
been greater, as millions of Americans cope with the exposure of personal information .
The White
Source
Business S
’ 2 Source
Business S
House * 3 reiterates this understanding by stating that a superior cybersecurity workforce
Will promote Americon prosperity and preserve peace. The White House further
emphasizes the importance of cybersecurity professionals as guardians of our national and
economic security. The White House also called on the federal government to better
facilitate the movement of cybersecurity professionals in order to maximize the
contributions made by their diverse skills, experience, and talents to the U.S.
There is no doubt that, by operating in a such critical field, Mr. Doe will pursue an endeavor
that is of high importance to the country. The services that SAMPLE COMPANY will provide
will offer the following benefits to U.S. organizations:
• Business protection: cyber security solutions provide digital protection b usinesses that
will ensure their employees are not at risk from a myriad of cyber threats.
• Increased productivity: viruses can slow down computer s to a crawl, making work
practically impossible. Effective cyber security eliminates this possibility, maximizing
businesses’ outp uts.
• Increased consumer confidence: if organizations can prove that their businesses
are effectively protected against all kinds of cyber breaches, they can insp ire trust in
customers that their personal data will not be compromised .
• Increased protection for customers: ensuring that a business is secure from cyber
threats also protects customers, who could be susceptible to a cyber breach by
proxy.
Source
Business S
Mr. Doe’s Company will contribute to the U.S. by creating jobs and raising tax revenue.
These funds could be used by state and the federal government to finance investments
in hospitals, schools, roads, and other essential services. Over the following five-year period,
the Compan v expects to make the following tax payments to the U.S. government:
Mr. Doe’s contribution to the U.S. is perfectly aligned the National Security Strategy to Advance
America’s Interests:L* The strategy identifies four vital n ational interests, or four pillars:
• Protect the homeland, the American people, and American way of life
• Promote American prosperity
• Preserve peace through strength
• Advance American influence
More precisely, Mr. Doe ’s professional experience and dedication will contribute to
promoting America’s prosperity. Innovation and entrepreneurship are crucial for long-term
economic development. Information technology enables innovation in a variety of policy
areas which are key to the country. It is also worth mentioning that in the education
area, better technology infrastructure enables personalized learning and real-time
assessment. By providing solutions tailored to foster the development of children, Mr. Doe
will help create a generation of qualified and conscious children who will be responsible
for ensuring the future success of the United States.
’° Source
Business S
Lastly, according to Sample Source," the U.S. faces one of the most alarming talent crunches
of any country worldwide. This is partly because America’s population is graying rapidly,
with XX,XXX baby boomers reaching retirement age each day for the next XX years. U.S. job
vacancies hit a record high last year, exceeding X million openings per month. Analysts
attributed the nation’s hiring crunch to a tight labor market and paucity of workers with
the right skills and experience. And as demand rises, supply will decline. The labor force
participation rate is expected to fall over the next decade, dipping from XX% in 20XX to XX%
in 20XX, By 20XX, the
U.S. could experience unrealized reven ue of $X.XXX trillion due to labor shortages,
equivalent to X% of its entire economy. This is the highest figure of all the markets examined
by Sample Source, and almost X of the total revenue shortage across all 20XX
economies.
The U.S. has an overall surplus of Level B (mid-skilled) and Level C (low-skilled) workers at
each of the three milestones. But the deficit of Level A (highly skilled) workers such as
Mr. Doe is expected to reach more than X.X million people by 20XX. The sizable demand for
that talent will be driven by the financial and business services sector, which accounts for
a quarter of the total unrealized output ($XXX.XX billion). Mr. Doe’s background and his
willingness to transfer and disseminate his skills and knowledge to the U.S. market will
help create a qualified workforce, therefore contributing to fulfill U.S. industry needs
and benefiting the U.S. economy.
Mr. Doe’s endeavor will result in significant benefits to the country. Mr. Doe is
perfectly positioned to implement SAMPLE COMPANY’s strategies by leading the Company
as its Chief Executive Officer. His proven academic and professional record and his
willingness to share his knowledge with U.S. professionals will also help to fill the previously
mentioned talent gap in the country. Therefore, it is clear that his proposed endeavor is
a matter of importance to the country, and that his business will have a positive
impact on the United States.
Business S
’^ Source
Business S
9 Financials
$x,,
Payroll
Marketing
Oepreciation
Rent
_
Professional Fees
Payioll Taxes
Profit Before Interest and Taxes XXX,XXX SXXX,XXX $XXX,XXX $XXX,XXX $XXX,XXX
EBITDA Sxxx,xxx cxxxix
Taxes Incurred SXX,XXX | $XX,BfX
Business 5
9.3 Balance Sheet
Prn F ‹› rm: RsIan ce Sheet Year 1 Yc ar 2|Yenr 3ear 4" Y ear 5
Asset s
Current Assets
Cash and Other Current Assets ff XX,XXX $XXX,XXX $XXX,XXX $XXX,XXX $X,XXX,XXX
Total Current Assets $XXX,XXX SXXX,XXX $XXX,XXX $XXX,XXX $X,XXX,XXX
Long-term Assets
Long-term Assets $XX,XXX SXXX,XXX $XX,XXX $XX,XXX $XX,XXX
Accumulated Depreciation Sx,xKx Sx,xxx Ox,xxx Sxx,xXX xxxxx
Total Long-term Assets 1X,XXX SXX,XXX SXX,XXX SXX,XXX $XX,XXX
Total Assets $XXX,XXX $XXX,XXX SXXX,XXX SXXX,XXX $X,XXX,XXX
Business PlonSS