How CNI should respond to the new cyber threat landscape - video series with Jason McQueen

Jason McQueen is a freelance security & training management consultant with over 35 years’ experience working in the most complex and often contested environments. He is a serving Senior Officer within the Royal Naval Reserve and has advised, trained and consulted military & government officials across the globe, focusing on strategic communication, countering hybrid warfare and multi-agency coordination.





CNI Product Library
Foundational training for all employees
- Cyber security essentials (Phishing, handling data, passwords, clear desk, reporting)
- Risks and threats (Phishing, social engineering, fake websites, malware)
- Social engineering – how do I protect my identity? (Digital footprint, accounts, devices)
- Protecting personal and company information (Data protection principles and special category data)
- Working securely wherever I am (Clear desk, passwords, Wi-Fi)
- Cyber security essentials (2-minute animated infographic)
- Phishing (2-minute animated infographic)
- Password Panther (A game against the clock, challenging players to spot the strongest passwords)
- Phishing with remediation training
- Vishing with remediation training
- Smishing with remediation training
Enhanced learning
Core training (all employees)
- Protecting our premises (Tailgating, ID passes, unauthorised access, reporting)
- Working with third parties (Know your supplier, phishing, reporting)
- Telephone-orientated attack delivery (TOAD) (Voice cloning, social engineering)
Role-specific training
- High-risk user – finance (Phishing, BEC, separation of privileges, passwords, access control, third party)
- High-risk user – human resources (Spear phishing, separation of privileges, passwords, recruitment, access control, third party)
Additional awareness resources (all employees)
- Working with third parties (2-minute animated infographic)
- Who wants to be a winner (Ransomware edition digital game)
Simulations (all employees)
- Callback with remediation training
- Smishing with remediation training
Emerging risks training
Core training (all employees)
- Generative AI including ChatGPT
- What on earth is AI?
Role-specific training
- High-risk user – all employees (Spear phishing, separation of privileges, passwords, joiners and movers, access control, third party)
- IT service desk (Specialised training for technical staff, prime targets for attackers)
Additional awareness resources (all employees)
- Social engineering (2-minute animated infographic)
- Deepfakes (2-minute animated infographic)
- Who wants to be a winner (Deepfakes edition digital game)
Simulations (all employees)
- High-risk user targeted phishing with remediation training
- High-risk user targeted vishing with remediation training
- High-risk user targeted callback with remediation training
- Quishing with remediation training

WHITEPAPER
Cyber Security in Utilities & Critical National Infrastructure
From energy grids to water treatment plants, utilities are being persistently probed by cybercriminals, state-backed actors, and supply chain threats. As attackers evolve, so too must our defences, starting with the humans at the heart of infrastructure.
Download our whitepaper now to find out:
-
How geopolitical conflict is fuelling sophisticated attacks on CNI
-
Why Behavioural Threat Intelligence is critical for identifying frontline risk
-
The rise of the Distributed Human Perimeter (DHP) and why your people are the firewall
-
The role of Scenario-Driven Learning and Culture-as-a-Control in long-term defence
-
Real-world examples of CNI breaches—and how better training could have prevented them