Ask McConnell has reviewed over 100 marketing claims from security firms and committed to transparency about how these terms are used. The definitions below reflect Jim McConnell’s perspective — your organization may scope them differently based on your mission, industry, or regulatory environment. This glossary will grow over time.
Primary Definitions
These three terms form the foundation of a converged security program. Using them precisely — and consistently — separates serious programs from marketing language.
Security
The prevention, detection, and response to a crime or a violation of an organization’s rules/policies.
Safety
The prevention, detection, and response to an accident. (think spilled milk, broken glass, etc.)
Converged Security
The integration of physical security, cybersecurity, executive protection, and related disciplines — personnel security, supply chain, insider threat, fraud — under a unified strategy, governance model, and metrics program. Converged Security treats these as interdependent functions, not separate silos.
Safe
The feeling by an individual in an environment where they believe the security and safety controls are adequate for them to be at peace to enter, enjoy, or use the environment. Note: “Safe” is a perception — security and safety are measurable programs. A location can be secure without feeling safe, and vice versa.
Language Matters
These terms show up frequently in vendor claims and RFP responses. Precision here protects your organization.
All
“All in every language means All.” Your organization’s use of “All” must mean every element under ownership, control, or that impacts your ability to carry out your mission safely. When a vendor claims to cover “all threats” or “all vectors” — hold them to it.
Totally Secure
Does not exist. Any vendor, product, or consultant claiming to make you “totally secure” or “100% secure” is either uninformed or misleading you. Security is a continuous program of risk reduction — not a destination. See the Versus Docs for honest comparisons.
This glossary is a living document. Additional definitions covering physical security, cybersecurity, executive protection, supply chain, insider threat, and M&A security will be added over time. Have a term you’d like defined? Contact Jim.
