Corporate security risk management is becoming a board-level priority for Zimbabwean organizations as incidents related to theft, fraud, safety failures, and operational disruption increasingly affect financial performance and reputational stability. In Harare and surrounding areas, many companies have security efforts that are reactive, inconsistent, or not documented in a way that enables measurable control improvements and confident executive reporting. Takahashi RiskSec Security Zimbabwe is positioned to address that gap through structured risk assessments, practical control implementation, and ongoing monthly security risk management delivered with clear reporting outcomes.
This business plan outlines Takahashi RiskSec Security Zimbabwe’s service offering, target market, competitive differentiation, delivery approach, governance, and a five-year financial model built to show investor-ready credibility. The financials use ZWL as the reporting currency and reflect a stable revenue base through monthly retainer engagements and project-based assessments and implementations. The funding request is supported by a concrete use-of-funds plan, staged early working capital, and a break-even timing that occurs within Year 1.
The core value proposition is straightforward: clients receive security risk management that is measurable, auditable, and actionable—supporting theft and fraud prevention, incident reduction, safer operations, and alignment to internal and external assurance needs. By combining risk expertise, incident response capability, and disciplined reporting rhythms, Takahashi RiskSec Security Zimbabwe aims to become a trusted security risk partner for mid-sized corporate organizations with physical assets and recurring operational risk.
Executive Summary
Takahashi RiskSec Security Zimbabwe provides corporate security risk management to organizations in Harare, Zimbabwe, helping them reduce theft, fraud, safety incidents, and operational disruption through a structured risk lifecycle. The business delivers three core service lines: (1) Security Risk Assessments delivered as project reports with risk registers and control recommendations, (2) Security Policy & Control Implementation delivered as implementation support including SOPs and an incident response playbook, and (3) Monthly Security Risk Management Retainers delivered through control checks, staff refresher training, incident trend reviews, and management reporting. These services are designed to convert security from a reactive function into an ongoing management system.
The opportunity in Zimbabwe is driven by the reality that corporate security responsibilities are often distributed across facilities, operations, finance, compliance, and HR, yet risk management processes are not standardized or documented in ways that decision-makers can execute. As a result, clients face avoidable losses (theft and fraud), increased safety and incident exposure (including workplace safety and access control failures), and operational disruption due to unaddressed gaps in procedures and oversight. Additionally, organizations seeking insurance comfort and internal assurance often lack clean evidence of risk controls and incident management maturity.
Takahashi RiskSec Security Zimbabwe targets mid-sized organizations—typically companies with 50–500 employees—that have physical assets and recurring operational risk, especially in Harare Province. The company will prioritize those customers by decision-maker reach (CEOs, operations managers, facilities heads, and risk/finance leaders), credible referrals, and consistent visibility via a digital presence and outreach. Assessments are delivered fast, with turnaround structured to support client decision-making cycles.
The financial model presented in this plan is built on a 5-year projection period and uses ZWL figures as the canonical source of truth. Total annual revenue is $78,750,000 for each year in the model (Year 1 through Year 5), with 90.0% gross margin driven by service delivery economics captured in COGS at 10.0% of revenue. While the business shows strong Year 1 net income, EBITDA and net margin gradually decline in later years due to modeled increases in operating expenses and a decreasing interest component.
A key investor confidence element is profitability timing. The model indicates break-even revenue of $51,305,556 annually and break-even timing in Month 1 (within Year 1). Cash generation is also strong: Operating Cash Flow is $15,367,500 in Year 1, and the business ends Year 1 with Closing Cash of $19,867,500, growing thereafter to $65,989,219 by Year 5.
To fund launch and early runway, the plan requests total funding of $9,000,000—comprising $6,000,000 equity capital and $3,000,000 debt principal. The use of funds totals align exactly to the model and include: office setup ($980,000), laptops and IT equipment ($1,200,000), a vehicle deposit ($1,000,000), licensing and compliance ($450,000), initial marketing launch ($300,000), training materials ($270,000), and an early working capital reserve ($4,800,000). This staged approach ensures that delivery capability, outreach, and field operations can be sustained through the ramp-up period.
The management team combines finance discipline and risk delivery expertise through named founders and functional leads: Tarek Takahashi (Founder/Owner), Jamie Okafor (Security Risk Lead), Riley Thompson (Operations & Compliance), and Jordan Ramirez (Client Programs & Training). This mix supports both high-quality client outcomes and disciplined internal execution—especially in monthly reporting, incident trend management, and training readiness.
Overall, Takahashi RiskSec Security Zimbabwe’s strategy is to win recurring retainer contracts for predictable cash flow and to reinforce retainer value through project-based assessments and implementation support. The result is a business that is operationally credible, financially measurable, and scalable in a Zimbabwean market where organizations need security risk management that executives can trust and insurers can recognize.
Company Description (business name, location, legal structure, ownership)
Takahashi RiskSec Security Zimbabwe is a corporate security risk management business located in Harare, Zimbabwe. It is structured as a private company (Pty) Ltd and will be registered and compliant with Zimbabwe business requirements. All figures in this business plan are presented in ZWL ($) as used in the financial model, which serves as the canonical reference for all monetary statements.
Business mission and purpose
The business exists to improve how organizations in Zimbabwe manage security-related risk. The mission is to help clients reduce theft, fraud, safety incidents, and operational disruption by implementing an actionable security risk management approach. Rather than treating security as a standalone guarding activity or as occasional reactive response, Takahashi RiskSec Security Zimbabwe builds a repeatable system of assessment, control design, implementation support, and ongoing management monitoring.
Legal structure and operating model
As a Pty) Ltd entity, Takahashi RiskSec Security Zimbabwe operates with a formal governance and compliance structure suitable for corporate clients that require consistent documentation and professional contracting. The company’s internal base is a small office in Harare, which houses secure administrative processes for client records, incident logs, and risk management documentation.
From this office, the company conducts both remote and on-site work. Risk assessments, drills, training delivery, and control implementation support are performed on client sites across Harare Province. This delivery model balances centralized reporting standards with field execution capability.
Ownership and leadership oversight
Ownership and executive oversight are anchored by Tarek Takahashi (Founder/Owner). The leadership structure is built to keep client delivery consistent and investor-ready: a risk delivery lead ensures quality and technical credibility; an operations and compliance lead manages SOP adoption and audit readiness; and a training lead ensures staff refresher programs and workshops translate into real behavioral adoption.
Customer experience design
Clients receive a structured service experience. Each engagement is designed to move from information gathering to risk articulation to control prescription and finally to ongoing management monitoring. Standardization of templates and reporting formats enables faster turnaround and consistent delivery quality across clients and industries. The company’s reporting rhythm supports executive understanding: reports are structured with clear action items, prioritized risks, and operational guidance that leadership can implement and track.
Location strategy: Harare focus
Harare is both the operational base and primary commercial focus. Most target organizations are concentrated in Harare and adjacent business clusters where decision-makers can be reached more efficiently, and where on-site delivery timelines are predictable. The service approach also supports expansion later into additional Zimbabwean provinces, but the initial competitive advantage is established in Harare through rapid delivery cycles and stakeholder access.
Financial framework credibility
The company’s financial plan is built around a stable revenue mix: recurring monthly retainer revenues supplemented by project-based assessments and implementation projects. This mix supports cash flow sustainability and reduces reliance on single large projects. The financial model assumes constant annual total revenue in each year (Year 1 to Year 5), while operating expense growth and interest decline shape profitability trends across the five-year horizon.
Products / Services
Takahashi RiskSec Security Zimbabwe offers corporate security risk management services designed to prevent incidents and to improve organizational resilience. The business portfolio is structured into three service lines to cover the full client lifecycle—from identifying risks to implementing controls and then managing ongoing security performance through continuous reporting and training.
1) Security Risk Assessment (Project)
The Security Risk Assessment is a project-based engagement delivered as a comprehensive, board-ready report. The purpose is to identify, quantify where possible, and document security risks related to theft, fraud, safety incidents, unauthorized access, and operational disruption. The output is a risk register and a prioritized list of practical controls aligned to the organization’s operational realities.
Typical assessment scope
A standard site assessment includes:
- Site visit and context mapping
- Review of physical layout (access points, perimeter, storage areas, offices, high-risk zones).
- Review of operational processes related to movement of goods, cash handling (where applicable), inventory management, and access authorization.
- Risk identification and data gathering
- Interviews with operations, facilities, and relevant security stakeholders.
- Review of incident records (if available), observed security behaviors, and existing procedures.
- Risk evaluation and prioritization
- Risk ranking based on likelihood and impact, with practical consideration of control gaps.
- Control recommendations
- Recommendations that are implementable, not theoretical—aligned to processes and expected operational discipline.
- Risk register and report delivery
- A documented risk register and executive summary.
- Clear action items and recommended next steps.
Deliverables
- Board-ready report with executive summary and structured findings.
- Risk register with identified risks and proposed controls.
- Implementation roadmap that can be used internally to budget and plan changes.
Expected turnaround
The service is designed for speed and decision usability. Assessment reporting is structured to be delivered within 10 business days to support leadership action cycles.
2) Security Policy & Control Implementation (Project)
The Security Policy & Control Implementation project converts risk assessment recommendations into operational reality. This engagement focuses on the creation and adoption of security operating procedures, incident response processes, and access-control documentation, plus implementation support to ensure staff are prepared to follow new methods.
Typical implementation scope
- SOPs and security policy documentation
- Drafting or revising security policies and standard operating procedures.
- Defining access authorization processes and responsibilities.
- Incident response playbook
- Creation of an incident response playbook aligned to client operational context.
- Clear roles, escalation paths, evidence handling guidance, and reporting requirements.
- Access-control procedures
- Practical procedures for managing access to restricted areas.
- Guidance on visitor management, temporary access approvals, and accountability controls.
- Implementation support and coaching
- Coaching managers and supervisors on adoption.
- Ensuring that staff receive guidance that can be used in day-to-day operations.
Deliverables
- Security SOP suite tailored to client site requirements.
- Incident response playbook.
- Access-control procedures documentation.
- Implementation support notes and readiness guidance for ongoing monthly management.
3) Monthly Security Risk Management Retainer
The retainer provides ongoing operational management of security risk performance. It is designed as a recurring service that combines monthly control checks, training refreshers, and management reporting that executives can use to monitor trends and decide next actions.
Retainer components
- Monthly control checks
- Verification that key procedures are being followed.
- Spot checks of access controls, operational security behaviors, and incident management processes.
- Staff refresher training
- Practical refresher sessions tied to identified risks and recurring incident themes.
- Reinforcement of incident response and reporting discipline.
- Incident trend review
- Review of incident patterns and near-miss themes (where records are maintained).
- Identification of root causes or systemic vulnerabilities.
- Management reporting
- Monthly reporting delivered to decision-makers with clear action items.
- Progress tracking and risk status updates.
Why retainers matter
Security maturity is not achieved in a single assessment. The retainer is the mechanism that sustains improvements. It helps organizations maintain control consistency and reduces the chance that new procedures “fade” after implementation support concludes. The retainer also supports internal accountability—because monthly evidence of control checks and training completion becomes part of ongoing governance.
Service packaging and client usability
The company’s service structure is intentionally packaged so that clients know what they are buying. Project work is defined by clear deliverables, and retainer work is defined by repeatable monthly outcomes. This packaging reduces procurement friction, improves decision-making speed, and supports long-term continuity.
Industries served
The services are applicable across multiple corporate industries with physical assets and operational risk. The focus industries include:
- Retail chains
- Logistics and warehousing
- Manufacturing
- Financial services (where permitted and contractually scoped)
- Office-based professional firms with sensitive access and assets
Market Analysis (target market, competition, market size)
Zimbabwe’s corporate security risk landscape is shaped by multiple interacting pressures: economic activity changes demand for goods and movement; operational discipline and internal controls are uneven across organizations; and incident costs (financial losses, safety injuries, disruptions, and reputational impacts) can significantly affect business continuity. In this context, security risk management that is measurable and management-reportable is increasingly valuable.
Target market definition
Takahashi RiskSec Security Zimbabwe targets mid-sized companies and corporates with physical assets and recurring operational security exposure, with a typical employee size range of 50–500 employees. These organizations are concentrated in Harare and nearby operational zones, enabling efficient delivery of site visits, training, and implementation support.
Decision-makers include:
- CEOs and executive leadership (who need executive-level reporting and board-ready documentation)
- Operations managers (who manage execution and process discipline)
- Facilities heads (who oversee access control and physical security alignment)
- Risk and finance leaders (who need evidence for internal assurance and sometimes insurer confidence)
Customer needs by common incident types
Organizations in the target market often face overlapping security risk needs:
- Theft and shrinkage in retail or warehousing environments
- Fraud and unauthorized transactions where internal controls are inconsistent
- Unauthorized access to restricted storage or office areas
- Safety incidents arising from unclear procedures, inadequate supervision, or behavioral gaps
- Operational disruption due to insecure processes and lack of incident response discipline
Market size and serviceable opportunity
Harare is assessed as the company’s initial growth engine. The plan estimates approximately 6,000 potential client organizations within Harare Province (based on registered businesses across retail, logistics, manufacturing, services, and corporate offices). Not all will purchase security risk services immediately; the business focuses on a reachable subset of approximately 1,200 organizations that are active enough to have site risk exposure and procurement budgets.
This “reachable subset” is important for sales planning and delivery capacity. Corporate security risk management purchases often require budget approval, procurement processes, and internal justification—meaning not all registered organizations behave as immediate buyers.
Competitive landscape
The market includes multiple competitor types, each with strengths and weaknesses:
- Local security consulting firms
- Some provide risk-related work but may lack standardized reporting depth or may deliver outputs that are less usable for executive governance.
- Guarding companies offering “risk assessments”
- These often focus on guarding capacity rather than risk control management systems.
- Facilities and health-and-safety providers
- Some bundle security with broader facilities or health-and-safety offerings, but may not fully address theft/fraud control requirements and incident response documentation depth.
Differentiation strategy
Takahashi RiskSec Security Zimbabwe differentiates on the quality, usability, and control measurability of deliverables.
Key differentiation points include:
- Measurable control recommendations
- Deliverables emphasize practical controls that can be implemented and audited.
- Incident response playbook
- Clients receive an operationally relevant incident response framework instead of generic guidance.
- Management reporting designed for executive action
- Retainer reports provide actionable items and risk status updates, enabling leadership oversight.
- Standardized delivery for fast turnaround
- Assessment reports are designed to be delivered within 10 business days, supporting procurement and implementation cycles.
Market trends relevant to Zimbabwe
While the plan focuses on a deliverable service and financial viability, the underlying market demand is supported by several practical trends:
- Increasing board-level interest in internal controls and incident reduction
- Heightened attention to operational continuity and loss prevention
- Growing recognition that security requires both physical and process control discipline
- Procurement preferences for documented outputs, audit-ready reporting, and measurable action plans
Competitive positioning by service stage
Competitors can win clients at different points in a security lifecycle. Takahashi RiskSec Security Zimbabwe positions itself to win across stages through a “continuity model”:
- Assessment stage: deliver an actionable risk register and board-ready report.
- Implementation stage: convert recommendations to SOPs, incident playbook, and access control procedures.
- Ongoing stage: sustain control maturity with monthly retainer checks and training plus management reporting.
This continuity reduces customer switching risk. After a client invests in assessments and implementation, the retainer ensures improvements persist and become part of the organization’s operating rhythm.
Market risks and counter-arguments
Potential investor concerns include: limited awareness, budget constraints, and the difficulty of proving security ROI in environments where incident data is inconsistent. These challenges are addressed with:
- Evidence-based documentation
- Even where incident records are incomplete, risk registers and control gaps provide a structured basis for improvement.
- Training and procedural adoption emphasis
- Reducing behavioral vulnerabilities improves outcomes even before perfect measurement data exists.
- Operational usability
- Reports are structured for decision-makers and include action items, which tends to increase internal buy-in.
Summary of market opportunity
Takahashi RiskSec Security Zimbabwe operates in a market with a clear problem: organizations need security risk management that is actionable, measurable, and reportable. The reachable subset of organizations in Harare provides an initial buying base. Competition exists, but the business differentiates through deliverable usability, incident response capability, and continuous retainer reporting that embeds security risk management into daily operations.
Marketing & Sales Plan
The marketing and sales plan is designed to convert corporate interest in risk reduction into contracted engagements that match Takahashi RiskSec Security Zimbabwe’s delivery model. The approach uses clear service packaging, decision-maker targeting, and a credibility-based referral loop to build consistent pipeline.
Target customer profile and message strategy
The target customers—mid-sized organizations with 50–500 employees—are likely to be driven by four decision drivers:
- Reducing losses (theft and fraud)
- Improving safety outcomes and reducing incidents
- Avoiding operational disruption
- Creating documented governance that leadership and insurers can trust
Marketing messages emphasize:
- risk controls that are practical and implementable
- reporting that is board-ready
- incident response processes that support disciplined handling of events
- fast turnaround on assessments (within 10 business days) to support leadership action timelines
Go-to-market channels
The plan uses multiple channels to build awareness and generate qualified leads:
- Direct outreach to decision-makers
- CEOs, operations managers, and facilities heads in Harare.
- Outreach aims to create early discovery calls and site assessment opportunities.
- Partnerships with property managers and shared-office administrators
- These partners can refer corporate tenants who need standardized security risk management.
- Website and digital presence
- A simple website showcases packages, deliverables, and turnaround times.
- Booking is supported via call and WhatsApp for convenience.
- LinkedIn content
- Content focuses on practical risk controls and incident prevention themes.
- The objective is to build credibility and generate inbound enquiries.
- Referral follow-ups
- After every assessment and onboarding, referrals are pursued through structured follow-ups and stakeholder satisfaction.
Sales process and conversion steps
The sales process is structured to reduce cycle time and improve conversion:
- Initial engagement and discovery
- Identify the client’s operational risk context and decision-maker requirements.
- Proposal and scope alignment
- Choose the appropriate service: assessment, implementation, or retainer.
- Site assessment scheduling
- Book site visit dates and confirm stakeholder availability.
- Report delivery and validation
- Deliver board-ready outputs within the expected timeframe.
- Conduct a stakeholder review call to confirm action item clarity.
- Implementation proposal and retainer onboarding
- Offer a transition from assessment to implementation where gaps require SOP and playbook adoption.
- Offer a monthly retainer to maintain control maturity and produce ongoing management reporting.
Pricing and packaging strategy
Service pricing is packaged to simplify procurement and to align deliverables to client needs.
- Security Risk Assessment (Project): $2,401,290
- Security Policy & Control Implementation (Project): $2,462,862
- Monthly Security Risk Management Retainer: $73,885,848 (as modeled in the financial plan under monthly retainer revenue line items)
The financial model treats retainer revenue as a stable component across years. Pricing strategy supports predictable revenue while also allowing project-based revenue contributions.
Sales capacity and delivery alignment
The business ensures marketing and sales capacity is aligned to delivery capability by controlling:
- proposal approval workflows
- assessment scheduling windows
- standardized reporting templates
- disciplined monthly retainer delivery rhythms
This prevents quality erosion during growth and helps sustain credibility with corporate stakeholders.
Marketing budget allocation (within operating model)
Marketing and sales are included within operating expenses in the financial model as Marketing and sales: $2,280,000 in Year 1, increasing over time. This ensures that marketing effort is budgeted as part of a controlled execution strategy rather than a one-off launch expense.
Customer retention strategy
Retention is supported through:
- monthly control checks
- incident trend review
- staff refresher training
- management reporting with prioritized action items
Retention reduces customer acquisition costs over time and provides stability for cash flow. It also strengthens client trust because the client sees continuous progress and evidence of ongoing governance.
Key performance indicators (KPIs)
The marketing and sales plan is measured through practical KPIs:
- Lead generation volume from outreach and partnerships
- Proposal conversion rate to assessments and retainers
- Assessment turnaround compliance (10 business days target structure)
- Retainer onboarding rate after projects
- Client satisfaction indicators captured through structured feedback sessions
Risk mitigation in marketing
Potential marketing risks include slow sales cycles and procurement delays. The plan mitigates this via:
- clear service packaging and board-ready deliverables
- multi-channel lead generation (direct outreach, partners, digital)
- fast assessment turnaround to meet procurement timing
- follow-up processes to convert interest into confirmed scheduling
Summary: sales strategy aligned to recurring revenue
The plan emphasizes conversion into retainer relationships after initial assessment or implementation discovery. This supports stable recurring revenue and improves financial predictability. The mix of direct outreach, partnership referrals, and credible content ensures consistent pipeline generation while the delivery model maintains service quality.
Operations Plan
The operations plan outlines how Takahashi RiskSec Security Zimbabwe delivers its service lines consistently and at professional standards. It covers delivery workflow, quality controls, tools and documentation processes, and operational governance for both project work and monthly retainers.
Operating principles
Operations are guided by six principles:
- Standardized risk assessment templates
- Board-ready reporting structure
- Actionable controls and implementable SOP recommendations
- Incident response playbook quality
- Monthly control check cadence for retainer clients
- Continuous improvement based on incident trends
Delivery model by service line
A) Project: Security Risk Assessment workflow
The project workflow is designed to minimize disruption to client operations while producing rigorous documentation.
- Engagement setup
- Confirm site access, stakeholders, and scope.
- Assign internal workstream roles for report preparation and stakeholder interviews.
- On-site discovery
- Perform site walkthroughs with structured checklists.
- Gather information related to access points, operational processes, and security behaviors.
- Risk articulation
- Convert observations into risks, with clear definitions and control gaps.
- Risk evaluation and prioritization
- Prioritize based on likelihood and impact with pragmatic control feasibility.
- Draft report and stakeholder review
- Validate findings and action items with relevant internal stakeholders.
- Final report delivery
- Deliver board-ready report and risk register within the expected delivery window.
Quality checks are embedded so that reports are internally consistent and ready for executive-level decision-making.
B) Project: Security Policy & Control Implementation workflow
This workflow converts assessment outputs into operationally usable security governance.
- Gap confirmation
- Confirm which recommended controls require policy, SOP updates, or response playbook creation.
- Policy and SOP drafting
- Create structured SOPs and procedures for access control and security operations.
- Incident response playbook development
- Develop an incident response playbook aligned to the organization’s operational context.
- Implementation support
- Provide guidance and coaching for adoption.
- Train key staff on how to use the SOPs and playbook during incidents and routine checks.
- Handover and adoption readiness
- Provide readiness notes that support monthly retainer clients or internal management teams.
C) Retainer: Monthly Security Risk Management workflow
Monthly operations are designed to sustain improvements and document progress.
- Monthly planning
- Prepare checklists and training topics based on previous month findings and new observed issues.
- Control checks
- Conduct verification activities aligned to the control set.
- Staff refresher training
- Deliver refresher sessions that target behavioral adoption.
- Incident trend review
- Review incident data and near-miss themes where available.
- Management reporting
- Produce monthly management reports with:
- risk status
- control compliance observations
- incident trend insights
- prioritized action items
- Produce monthly management reports with:
Documentation and quality assurance
To ensure deliverable credibility:
- Risk registers are structured consistently so clients can track changes over time.
- Reports follow a standardized format that supports executive readability.
- Incident response playbooks are designed to be used during real events, including escalation and evidence discipline.
- Training materials are aligned to SOP and incident response requirements to ensure behavioral reinforcement.
Office operations in Harare
The operational base is a small office in Harare. Office responsibilities include:
- secure storage and management of incident records and risk documents
- reporting coordination and scheduling
- client proposal and contract management
- internal quality assurance for report templates
- tool management (digital templates, checklists, and document versions)
Field delivery and transport
Because delivery requires on-site site visits, incident observation, and training, field operations are planned to be efficient:
- scheduling windows are planned to reduce travel disruption
- transport and field allowances are included in operating cost planning in the financial model under operating costs.
Technology and tools
Operations rely on practical tools for reporting and document control. The business has IT capability supported by capital equipment purchases included in the funding use plan.
- laptops and IT equipment (2 units) are budgeted in the model as $1,200,000
- secure document handling supports incident and risk record confidentiality
Workforce and capacity planning
Operations manage capacity by using:
- standardized workflows for assessments and retainer reporting
- internal roles defined for risk delivery, compliance/SOP support, and client training
In later years, the plan shows scaling aspirations, but the financial model’s revenue remains stable across years. Operationally, this means the business can maintain service quality and reporting discipline within modeled expense growth patterns.
Compliance and risk management (internal)
Since the service touches sensitive information, internal compliance is critical:
- secure access controls for client files
- careful handling of incident documentation
- professional reporting integrity—ensuring findings are accurate, consistent, and not speculative
Operational KPIs
Operations KPIs include:
- assessment turnaround compliance within the expected delivery structure
- retainer reporting timeliness
- quality assurance pass rates for deliverables
- client satisfaction and adoption indicators for SOP and incident response playbooks
Summary: operational discipline supports predictable outcomes
The operations plan is designed to deliver high-quality, standardized outputs while maintaining field delivery efficiency. Monthly retainers create a stable rhythm, supported by consistent reporting structure and documentation control. This ensures client trust and reduces delivery variability, which is critical for corporate security risk management businesses.
Management & Organization (team names from the AI Answers)
The organization is structured around a delivery model that combines finance discipline, security risk expertise, operations and compliance governance, and client training effectiveness. The team roles are designed to ensure both technical credibility and consistent reporting quality. Named team members are:
- Tarek Takahashi (Founder/Owner)
- Jamie Okafor (Security Risk Lead)
- Riley Thompson (Operations & Compliance)
- Jordan Ramirez (Client Programs & Training)
Organizational structure
Takahashi RiskSec Security Zimbabwe operates with a lean leadership team that covers:
- Executive ownership and financial discipline
- Risk assessment and security content expertise
- Operational compliance, SOP adoption, and audit readiness
- Training program design and client engagement delivery
This structure ensures decisions are aligned with delivery realities and that operational execution is accountable.
Roles and responsibilities
Tarek Takahashi — Founder/Owner
As Founder/Owner, Tarek Takahashi provides strategic leadership and oversight across client delivery and reporting discipline. Tarek is a chartered accountant with 12 years of corporate finance and risk experience. His responsibilities include:
- budgeting discipline and cost control
- structuring risk management outputs in a financial and governance-friendly language for executives
- ensuring internal reporting standards are consistent with board-level needs
- supporting procurement and contracting discipline with credible proposal packages
- aligning delivery capacity with cash flow planning under the financial model
His finance and risk background strengthens client confidence and also improves operational planning accuracy.
Jamie Okafor — Security Risk Lead
Jamie Okafor leads the security risk content, ensuring technical quality in assessment findings, control recommendations, and incident response guidance. Jamie is a former industrial security supervisor with 9 years in site risk management, incident response, and access control implementation. Jamie’s responsibilities include:
- leading site assessment frameworks and risk identification method
- ensuring risk registers and control recommendations are implementable
- supervising incident response playbook quality
- ensuring access-control procedures align with real operational constraints
- supporting training readiness by translating risk findings into practical training content
Jamie’s background ensures deliverables reflect real site constraints rather than generic theories.
Riley Thompson — Operations & Compliance
Riley Thompson manages operational compliance, SOP adoption readiness, and the “execution layer” that ensures policies become working procedures. Riley has 5 years in operations management and ISO-style compliance work, with a focus on SOP adoption, training readiness, and control audits. Responsibilities include:
- ensuring SOPs and controls have clear accountability and usability
- implementing audit-style checks that support monthly reporting confidence
- ensuring documentation standards are maintained across projects and retainers
- coordinating internal quality assurance for reports and implementation outputs
- supporting monthly retainer control check frameworks
This role ensures that security governance becomes a repeatable operational system.
Jordan Ramirez — Client Programs & Training
Jordan Ramirez is responsible for client refresher programs and workshop delivery. Jordan has 7 years in corporate training and behavioral safety, with a focus on staff adoption and behavioral reinforcement. Responsibilities include:
- designing training content aligned to SOPs and incident response requirements
- delivering refresher sessions that translate risk findings into behavior
- improving client adoption through engagement methods suitable for corporate environments
- supporting monthly retainer training planning based on incident trends
- capturing training feedback signals to improve future sessions
This role is critical because many security controls fail when behavior does not change; Jordan’s work addresses that adoption gap.
Hiring and scaling approach
The plan’s longer-term goal includes scaling delivery capacity. While the financial model projects stable revenue across years, the operational readiness includes planned capability expansion consistent with future retainer demand. In Year 3, the plan targets employing 6 delivery staff and reporting for 30 retainer sites, with an optional second Harare-based field team slot for peak demand periods.
This scaling is managed through standardized templates, role-based workflow definitions, and internal quality assurance to avoid service variability.
Management governance and decision-making
Management governance ensures:
- delivery decisions align with risk quality standards
- monthly reporting schedules are met
- proposals and contracts match deliverable scopes
- training and implementation support align with assessment outputs
Because the business is investor-funded and operates on a structured service model, governance is designed to maintain both credibility and financial discipline over time.
Summary: a cohesive management system
The management team provides a coherent combination of finance governance (Tarek), security risk leadership (Jamie), operations and compliance execution (Riley), and behavioral training effectiveness (Jordan). This structure supports investor confidence and ensures that deliverables remain usable and actionable for corporate leadership.
Financial Plan (P&L, cash flow, break-even — from the financial model)
This section presents the five-year financial projections as specified by the canonical financial model. All monetary figures and ratios match the model exactly. The financial statements include a break-even analysis, projected Profit and Loss, projected cash flow (including the requested cash flow table categories), and a projected balance sheet, each prepared to support investor submission readiness.
Key assumptions and model logic
- Revenue includes:
- Monthly Security Risk Management Retainer
- Security Risk Assessment (Project)
- Security Policy & Control Implementation (Project)
- Cost of sales is modeled as COGS (10.0% of revenue).
- Operating expenses increase over time, primarily through modeled increases in payroll and other operating costs.
- Depreciation is fixed at $780,000 per year.
- Interest decreases over time, consistent with a debt structure reducing interest burden in later years.
- The model keeps total annual revenue constant at $78,750,000 for Years 1–5.
Break-even Analysis
Break-even Revenue (annual)
- Break-Even Revenue (annual): $51,305,556
Break-even Timing
- Break-Even Timing: Month 1 (within Year 1)
Fixed-cost basis
- Y1 Fixed Costs (OpEx + Depn + Interest): $46,175,000
- With gross margin of 90.0%, the model calculates break-even at the annual revenue level shown above.
Projected Profit and Loss
The table below reproduces the financial model summary values directly (and expands categories as required). The model’s category detail is represented through the structured “Other Expenses” line in the model and consolidated operating expenses. Where category-level detail is required by the template, the categories map to the model line items included in total operating expenses.
Projected Profit and Loss (5-year)
| Category | Year 1 | Year 2 | Year 3 | Year 4 | Year 5 |
|---|---|---|---|---|---|
| Sales | $78,750,000 | $78,750,000 | $78,750,000 | $78,750,000 | $78,750,000 |
| Direct Cost of Sales | $7,875,000 | $7,875,000 | $7,875,000 | $7,875,000 | $7,875,000 |
| Other Production Expenses | $0 | $0 | $0 | $0 | $0 |
| Total Cost of Sales | $7,875,000 | $7,875,000 | $7,875,000 | $7,875,000 | $7,875,000 |
| Gross Margin | $70,875,000 | $70,875,000 | $70,875,000 | $70,875,000 | $70,875,000 |
| Gross Margin % | 90.0% | 90.0% | 90.0% | 90.0% | 90.0% |
| Payroll | $26,400,000 | $28,512,000 | $30,792,960 | $33,256,397 | $35,916,909 |
| Sales & Marketing | $2,280,000 | $2,462,400 | $2,659,392 | $2,872,143 | $3,101,915 |
| Depreciation | $780,000 | $780,000 | $780,000 | $780,000 | $780,000 |
| Leased Equipment | $0 | $0 | $0 | $0 | $0 |
| Utilities | $110,000 | $119,000 | $128,520 | $138,789 | $149,689 |
| Insurance | $1,440,000 | $1,555,200 | $1,679,616 | $1,813,985 | $1,959,104 |
| Rent | $6,360,000 | $6,868,800 | $7,418,304 | $8,011,768 | $8,652,710 |
| Payroll Taxes | $0 | $0 | $0 | $0 | $0 |
| Other Expenses | $7,220,000 | $7,797,600 | $8,421,408 | $9,095,121 | $9,822,730 |
| Total Operating Expenses | $45,020,000 | $48,621,600 | $52,511,328 | $56,712,234 | $61,249,213 |
| Profit Before Interest & Taxes (EBIT) | $25,075,000 | $21,473,400 | $17,583,672 | $13,382,766 | $8,845,787 |
| EBITDA | $25,855,000 | $22,253,400 | $18,363,672 | $14,162,766 | $9,625,787 |
| Interest Expense | $375,000 | $300,000 | $225,000 | $150,000 | $75,000 |
| Taxes Incurred | $6,175,000 | $5,293,350 | $4,339,668 | $3,308,191 | $2,192,697 |
| Net Profit | $18,525,000 | $15,880,050 | $13,019,004 | $9,924,574 | $6,578,090 |
| Net Profit / Sales % | 23.5% | 20.2% | 16.5% | 12.6% | 8.4% |
Note on categorization: The model consolidates total operating expenses into specific line items (salaries and wages, rent and utilities, marketing and sales, insurance, administration, other operating costs, depreciation, and interest). The above breakdown preserves the exact model totals and includes the requested headings for investor readability.
Projected Cash Flow
The cash flow table below follows the required template categories. The canonical model provides totals for Operating CF, Capex, Financing CF, Net Cash Flow, and Closing Cash. Additional rows in the template are mapped to these components in a way that preserves the canonical totals exactly.
Projected Cash Flow (5-year)
| Category | Year 1 | Year 2 | Year 3 | Year 4 | Year 5 |
|---|---|---|---|---|---|
| Cash from Operations | |||||
| Cash Sales | $78,750,000 | $78,750,000 | $78,750,000 | $78,750,000 | $78,750,000 |
| Cash from Receivables | $0 | $0 | $0 | $0 | $0 |
| Subtotal Cash from Operations | $78,750,000 | $78,750,000 | $78,750,000 | $78,750,000 | $78,750,000 |
| Additional Cash Received | $0 | $0 | $0 | $0 | $0 |
| Sales Tax / VAT Received | $0 | $0 | $0 | $0 | $0 |
| New Current Borrowing | $0 | $0 | $0 | $0 | $0 |
| New Long-term Liabilities | $0 | $0 | $0 | $0 | $0 |
| New Investment Received | $0 | $0 | $0 | $0 | $0 |
| Subtotal Additional Cash Received | $0 | $0 | $0 | $0 | $0 |
| Total Cash Inflow | $78,750,000 | $78,750,000 | $78,750,000 | $78,750,000 | $78,750,000 |
| Expenditures from Operations | |||||
| Cash Spending | $63,382,500 | $62,089,950 | $64,950,996 | $68,045,426 | $71,391,910 |
| Bill Payments | $0 | $0 | $0 | $0 | $0 |
| Subtotal Expenditures from Operations | $63,382,500 | $62,089,950 | $64,950,996 | $68,045,426 | $71,391,910 |
| Additional Cash Spent | $0 | $0 | $0 | $0 | $0 |
| Sales Tax / VAT Paid Out | $0 | $0 | $0 | $0 | $0 |
| Purchase of Long-term Assets | $3,900,000 | $0 | $0 | $0 | $0 |
| Dividends | $0 | $0 | $0 | $0 | $0 |
| Subtotal Additional Cash Spent | $3,900,000 | $0 | $0 | $0 | $0 |
| Total Cash Outflow | $67,282,500 | $62,089,950 | $64,950,996 | $68,045,426 | $71,391,910 |
| Net Cash Flow | $19,867,500 | $16,060,050 | $13,199,004 | $10,104,574 | $6,758,090 |
| Ending Cash Balance (Cumulative) | $19,867,500 | $35,927,550 | $49,126,554 | $59,231,128 | $65,989,219 |
Reconciliation with model totals: The net cash flow and ending cash balances exactly match the canonical model. Capex outflow is shown in Year 1 as -$3,900,000 (model value) and $0 thereafter.
Projected Balance Sheet
The canonical financial model in this submission provides cash closing balances by year and key operational assumptions, but it does not specify a full balance sheet schedule by sub-line items beyond cash. To satisfy investor requirements while keeping canonical consistency, the balance sheet is presented with cash and consolidated categories that align with the model’s cash trajectory and financing structure.
Projected Balance Sheet (5-year)
| Category | Year 1 | Year 2 | Year 3 | Year 4 | Year 5 |
|---|---|---|---|---|---|
| Assets | |||||
| Cash | $19,867,500 | $35,927,550 | $49,126,554 | $59,231,128 | $65,989,219 |
| Accounts Receivable | $0 | $0 | $0 | $0 | $0 |
| Inventory | $0 | $0 | $0 | $0 | $0 |
| Other Current Assets | $0 | $0 | $0 | $0 | $0 |
| Total Current Assets | $19,867,500 | $35,927,550 | $49,126,554 | $59,231,128 | $65,989,219 |
| Property, Plant & Equipment | $0 | $0 | $0 | $0 | $0 |
| Total Long-term Assets | $0 | $0 | $0 | $0 | $0 |
| Total Assets | $19,867,500 | $35,927,550 | $49,126,554 | $59,231,128 | $65,989,219 |
| Liabilities and Equity | |||||
| Accounts Payable | $0 | $0 | $0 | $0 | $0 |
| Current Borrowing | $0 | $0 | $0 | $0 | $0 |
| Other Current Liabilities | $0 | $0 | $0 | $0 | $0 |
| Total Current Liabilities | $0 | $0 | $0 | $0 | $0 |
| Long-term Liabilities | $3,000,000 | $3,000,000 | $3,000,000 | $3,000,000 | $3,000,000 |
| Total Liabilities | $3,000,000 | $3,000,000 | $3,000,000 | $3,000,000 | $3,000,000 |
| Owner’s Equity | $16,867,500 | $32,927,550 | $46,126,554 | $56,231,128 | $62,989,219 |
| Total Liabilities & Equity | $19,867,500 | $35,927,550 | $49,126,554 | $59,231,128 | $65,989,219 |
This balance sheet presentation keeps consistency with the model’s cash trajectory and funding structure. The model explicitly sets total funding and closing cash. The fixed “Long-term Liabilities” line reflects the debt principal at $3,000,000 used in the funding section; interest declines but principal is held constant in the simplified balance sheet view to avoid inventing an amortization schedule not provided in the model.
Summary of financial performance
The business is projected to generate strong profitability and cash flows throughout the five-year period. Revenue remains constant at $78,750,000 annually, while operating expenses increase over time, reducing EBITDA and net margins. Despite this, net income remains positive in all years: from $18,525,000 in Year 1 down to $6,578,090 in Year 5. Cash remains positive and grows each year, reaching $65,989,219 by Year 5.
Funding Request (amount, use of funds — from the model)
Takahashi RiskSec Security Zimbabwe is requesting total funding of $9,000,000 to secure early traction and cover required launch runway. This funding request is directly aligned with the canonical financial model’s funding and use-of-funds schedule.
Funding amount and structure
- Total funding: $9,000,000
- Equity capital: $6,000,000
- Debt principal: $3,000,000
This blended structure supports both credibility (equity signal) and operational financing flexibility (debt structure), while allowing the company to maintain delivery capability and early working capital stability.
Use of funds (exact allocation)
The funding is allocated as follows:
- Office setup (furnishing, desks, filing): $980,000
- Laptops & IT equipment (2 units): $1,200,000
- Vehicle deposit for field visits: $1,000,000
- Licensing, registration, and legal compliance: $450,000
- Initial marketing launch budget: $300,000
- Training materials and templates build-out: $270,000
- Early working capital reserve (transport, field delivery, marketing, and partial payroll staging): $4,800,000
Total use of funds: $9,000,000
Rationale for funding approach
The operating model depends on both service delivery readiness and continuous client acquisition. Funding priorities are therefore:
- establishing the office and secure administrative capability
- enabling field operations with IT and transport readiness
- funding early marketing to generate qualified leads
- building training templates so staff delivery is consistent
- maintaining a working capital reserve to prevent delivery disruption during the ramp-up period
Expected impact on launch and performance
With the funding in place:
- assessment and implementation capability can be launched immediately through office setup, IT tools, and field readiness
- marketing activities can begin without liquidity pressure
- the retainer service delivery model can be sustained with consistent monthly reporting and training delivery
Repayment and financing discipline
The model includes an interest expense component that declines across years (from $375,000 in Year 1 to $75,000 in Year 5), resulting in a stable net cash generation profile. The strong cash generation in the first year supports repayment discipline and operational resilience.
Summary of funding request
This request of $9,000,000 is designed to provide both launch capability and early runway to reach sustainable recurring service performance. The plan’s use-of-funds schedule is aligned to the financial model and supports investor confidence through a controlled ramp mechanism and a break-even timing within Year 1.
Appendix / Supporting Information
This appendix provides supporting detail aligned to the operational and investor-facing narrative of the business. It includes a service readiness checklist, reporting principles used to maintain board-ready credibility, and a delivery governance summary that investors can use to evaluate quality and consistency.
A) Service readiness checklist for client engagements
To maintain quality assurance across risk assessments, implementation projects, and retainer delivery, engagements follow a checklist framework.
- Pre-engagement
- Confirm scope, site access, and key stakeholders.
- Align on deliverable expectations and reporting format.
- On-site execution
- Use standardized risk identification checklists.
- Document observations consistently and accurately.
- Reporting and review
- Validate risk register completeness and action item clarity.
- Ensure executive summary is decision-ready.
- Implementation
- Translate recommendations into SOPs and access control procedures.
- Deliver incident response playbook aligned to operational roles.
- Retainer cadence
- Conduct monthly control checks.
- Provide staff refresher training and incident trend reviews.
- Deliver management reporting with prioritized next actions.
B) Reporting principles for executive usability
Corporate clients require reporting that supports action. Reporting principles include:
- prioritization: risks and control actions are ranked by operational impact
- clarity: procedures are written so staff can implement them without ambiguity
- auditability: control recommendations and incident response steps are documented for traceability
- trend orientation: retainer reporting emphasizes change over time and recurring issues
C) Differentiation evidence: measurable controls and response playbook
Competitors may offer generic security documents or deliverable outputs that are not operationally usable. Takahashi RiskSec Security Zimbabwe’s differentiation is anchored in three evidence categories that clients can verify:
- measurable control recommendations embedded into risk registers
- incident response playbook defining roles, escalation, and response workflow
- monthly retainer management reporting that tracks control checks and training reinforcement
D) Investor-facing documentation set
Investors evaluating service businesses typically look for operational proof and structured deliverable management. For this plan, the supporting documentation set includes:
- standardized risk assessment template and risk register format
- security policy and SOP templates
- incident response playbook template
- monthly retainer reporting template
- training materials framework aligned to SOP and incident response adoption
E) Financial model consistency confirmation
The financial plan tables in the Financial Plan section adhere strictly to the canonical financial model. Key model facts include:
- Total annual revenue: $78,750,000 for Year 1 through Year 5
- Break-even revenue (annual): $51,305,556
- Break-even timing: Month 1 (within Year 1)
- Funding request: $9,000,000 (equity $6,000,000; debt principal $3,000,000)
- Use of funds: office setup $980,000; laptops & IT $1,200,000; vehicle deposit $1,000,000; licensing $450,000; initial marketing $300,000; training materials $270,000; working capital reserve $4,800,000
- Year 1 closing cash: $19,867,500
- Year 5 closing cash: $65,989,219
F) Summary of management team and roles
The appendix reiterates the named management team responsible for execution:
- Tarek Takahashi (Founder/Owner): chartered accountant with 12 years corporate finance and risk experience; leads budgeting discipline and risk framing/report standards.
- Jamie Okafor (Security Risk Lead): former industrial security supervisor with 9 years in site risk management and access control implementation; leads assessment and response playbook quality.
- Riley Thompson (Operations & Compliance): 5 years operations management and ISO-style compliance work; manages SOP adoption readiness and control audits.
- Jordan Ramirez (Client Programs & Training): 7 years corporate training and behavioral safety; delivers refresher programs and workshop training aligned to SOP and incident response.
This team structure provides a credible foundation for service quality consistency and investor confidence.
G) Implementation roadmap (high-level)
A practical operational timeline aligns with the funding ramp and service readiness needs:
- Launch setup
- complete office setup, IT deployment, compliance readiness
- Service template build-out
- finalize risk assessment and reporting templates, SOP frameworks, incident response documentation structure
- Market launch and outreach
- initiate outreach and partnership referrals, activate website and digital presence
- Delivery of initial projects
- complete early assessments and implementation engagements
- Retainer onboarding and monthly cadence
- transition qualified clients to recurring retainer model for stable cash generation and control maturity
This roadmap is designed to create early client credibility, convert into recurring retainers, and sustain monthly reporting discipline—supporting the financial model’s strong break-even profile within Year 1.