DCS offers project management services for security service RFPs. We have the security consultants available to:
John Saunders, CPP CISSP MA is an unparalleled security professional on the DCS team.
John received his Bachelor of Arts in Political Science at Acadia University in 1980. He has also received his Masters of Arts (Hons) in Diplomacy, with core work in International Terrorism, from Norwich University. He is a Certified Protection Professional (CPP) with the American Society for Industrial Security and a Certified Information Systems Security Professional (CISSP). He is the holder of certification for several courses in the field of security convergence (IT and Physical Security) and is qualified in the Sandia Labs Risk Assessment Methodology for infrastructure and the J100/RAMCAP Risk Assessment methodology.
Mr. Saunders career includes eleven years in the Royal Canadian Mounted Police followed by a successful tenure as General Manager of a Vancouver based electronic security integrator. He subsequently opened his own Security Consulting business in 2003, and has successfully built the business with clients throughout western Canada and a large exposure in the southwest United States. As the Owner and President of Enterprise Protection Associates he has experience working with large Engineering Consultants, as well as extensive telecommunications industry experience. He has been responsible for completion of numerous threat risk assessments for government and private enterprise. Additionally, he has developed Security Master Plans, including policy and procedure development, as well as many projects involving security design and development and delivery of employee security training and corporate security exercises and drills. He has lectured to security professionals and end users at various trade shows and conferences on a number of security issues, ranging from electronic security system design to implementation of Security Programming. He provides a unique range of knowledge, from threat risk assessment and conceptual policy and procedures through creation of design specifications in both the physical and information security realms.