About
We build programs,
not dependencies.
Protection Architects exists because most companies don't need a security consultant. They need a security program.
The problem we solve.
A company reaches $100M in revenue. The CEO starts getting threats. Someone on the executive team hires a bodyguard. That bodyguard becomes "the security program." Two years later, the company is at $500M, the board is asking about duty of care, and there's still no documented security policy, no threat assessment framework, and no program architecture.
This is the story of most mid-market companies. They don't have a security problem — they have a security architecture problem. They need someone to build the system, not just stand a post.
That's what we do. We assess the threat landscape, design the program, help implement it, and stay on retainer to make sure it evolves as the company grows.
What makes us different.
Practitioner-built methodology
Our processes come from building real programs at the highest levels — not from academic frameworks or generic templates.
Process over personality
Our methodology is documented and repeatable. The quality of your program doesn't depend on which practitioner leads the engagement.
You own the program
We build systems your organization can operate independently. We stay on retainer by choice, not because you can't function without us.
Mid-market focus
We work with companies $50M–$2B in revenue — large enough to need a program, agile enough to implement one quickly.
Leadership
Our team.
Pete Dach
Founder & Principal
Former Gavin de Becker & Associates. Managed protective operations through G-7, G-20, UN General Assembly, and World Economic Forum. Built and scaled a 44-person EP program for a major technology company.
Senior Practitioner
Joining 2027
We're selectively growing our team with practitioners who share our methodology-first approach to security program design.
Operations Director
Joining 2027
Program delivery, client coordination, and quality assurance across all active engagements.
How we operate.
These aren't aspirational values. They're operating constraints we hold ourselves to on every engagement.
Candor over comfort
If your security posture has problems, we'll tell you directly. You're paying for the truth, not reassurance.
Systems over heroes
A good security program works because the system works — not because one person is exceptional.
Documentation as deliverable
Every engagement produces documented SOPs, frameworks, and playbooks your team can execute without us.
Right-sized solutions
We recommend what you need, not what maximizes our engagement. Sometimes the answer is simpler than you think.
Let's talk about your security program.
No pitch deck, no pressure. Just a conversation about where you are and where you need to be.
Start a Conversation