Skip to content
Jason McQueen Image 2

Jason McQueen is a freelance security & training management consultant with over 35 years’ experience working in the most complex and often contested environments. He is a serving Senior Officer within the Royal Naval Reserve and has advised, trained and consulted military & government officials across the globe, focusing on strategic communication, countering hybrid warfare and multi-agency coordination.                

CNI Product Library

Foundational training for all employees

  • Cyber security essentials (Phishing, handling data, passwords, clear desk, reporting)
  • Risks and threats (Phishing, social engineering, fake websites, malware)
  • Social engineering – how do I protect my identity? (Digital footprint, accounts, devices)
  • Protecting personal and company information (Data protection principles and special category data)
  • Working securely wherever I am (Clear desk, passwords, Wi-Fi)
  • Cyber security essentials (2-minute animated infographic)
  • Phishing (2-minute animated infographic)
  • Password Panther (A game against the clock, challenging players to spot the strongest passwords)
  • Phishing with remediation training
  • Vishing with remediation training
  • Smishing with remediation training

Enhanced learning

Core training (all employees)

  • Protecting our premises (Tailgating, ID passes, unauthorised access, reporting)
  • Working with third parties (Know your supplier, phishing, reporting)
  • Telephone-orientated attack delivery (TOAD) (Voice cloning, social engineering)

Role-specific training

  • High-risk user – finance (Phishing, BEC, separation of privileges, passwords, access control, third party)
  • High-risk user – human resources (Spear phishing, separation of privileges, passwords, recruitment, access control, third party)

Additional awareness resources (all employees)

  • Working with third parties (2-minute animated infographic)
  • Who wants to be a winner (Ransomware edition digital game)

Simulations (all employees)

  • Callback with remediation training
  • Smishing with remediation training

Emerging risks training

Core training (all employees)

  • Generative AI including ChatGPT
  • What on earth is AI?

Role-specific training

  • High-risk user – all employees (Spear phishing, separation of privileges, passwords, joiners and movers, access control, third party)
  • IT service desk (Specialised training for technical staff, prime targets for attackers)

Additional awareness resources (all employees)

  • Social engineering (2-minute animated infographic)
  • Deepfakes (2-minute animated infographic)
  • Who wants to be a winner (Deepfakes edition digital game)

Simulations (all employees)

  • High-risk user targeted phishing with remediation training
  • High-risk user targeted vishing with remediation training
  • High-risk user targeted callback with remediation training
  • Quishing with remediation training
CNI Whitepaper Cover

WHITEPAPER

Cyber Security in Utilities & Critical National Infrastructure

From energy grids to water treatment plants, utilities are being persistently probed by cybercriminals, state-backed actors, and supply chain threats. As attackers evolve, so too must our defences, starting with the humans at the heart of infrastructure. 

Download our whitepaper now to find out:
  • How geopolitical conflict is fuelling sophisticated attacks on CNI

  • Why Behavioural Threat Intelligence is critical for identifying frontline risk

  • The rise of the Distributed Human Perimeter (DHP) and why your people are the firewall

  • The role of Scenario-Driven Learning and Culture-as-a-Control in long-term defence

  • Real-world examples of CNI breaches—and how better training could have prevented them