Updated: 28 May 2025
Looking for fun, real-world, real training solutions, whether through a Keynote Speaker, Panelist, or Trainer?
We’re glad you’re here. Since 1995, we’ve delivered expert training and keynotes across 12 countries and multiple industries. Our first session was at ISACA. Since then, we’ve taught in Canada, India, the UK, Mexico, and more. We’ve also spoken at universities and schools throughout the U.S. and India. Currently, we serve as an Adjunct Instructor with Texas A&M TEEX.
From the start, our mission stays the same: deliver practical tools you can use the next business day. Whether it’s a boardroom or a global webinar, we tailor each session with real-world context and current trends.
If you need a topic not listed below, contact us—we may have it or can recommend one. Planning a custom team training day? Let’s connect and build something that fits your goals.
Helping our students feel a little safer today and give them tools to use, when they don’t.
Jim McConnell
info@askmcconnell.com
Ask McConnell, LLC
https://askmcconnell.com

Some of Jim’s Training Clients / Sponsors
Corporations / Industry
ASIS | ISACA | ACFE | Several Fortune 500 Corporations / Tolleson University | University of North Texas | NCCPP | IPSB | Countless Critical Infrastructure Company
Government
DHS | FBI | USSS | Trophy Club MUD | DoD | CTCP | UK CPNI | Chennai Law Enforcement
NGO / Community / Faith-Based
The Church Network | Rotary Club | Citizens’ Academy | Lions Club | Multi-Site Church | Chambers of Commerce | School Career Days
Converged Security Training

Insider Threat Introduction and Program Management
This training class introduces the basics of insider threats and how to manage a strong program to reduce risk. Additionally, it explains who insider threats are, why they happen, and how to spot warning signs early. You’ll learn simple steps to build a program that protects people, data, and systems. With real examples and clear guidance, this course gives you the tools to understand, detect, and respond to insider threats in any small business or organization.

Supply Chain Security Introduction and Program Management
This training class introduces the key ideas of supply chain security and how to manage a program that protects your business. It explains common risks, how they affect operations, and ways to reduce them. Furthermore, you’ll learn how to spot weak points, work with trusted partners, and build a plan that keeps goods and data safe. With simple steps and real-world examples, this course helps you create a stronger, safer supply chain from end to end.

Converged Security Metrics Program Management
This training class teaches how to build and manage a converged security metrics program that covers physical, cyber, and personnel security. In addition, you’ll learn how to choose the right metrics, track performance, and use data to improve security across your organization. The course uses clear examples and simple tools to help you measure what matters. It’s designed to give you the skills to create a strong, data-driven security program that supports smart decisions and long-term success.

Mergers & Acquisitions Converged Security Program Management
This training class focuses on managing converged security during mergers and acquisitions, bringing together physical, cyber, and personnel security into one clear plan. What’s more you’ll learn how to identify risks, align security efforts, and protect assets, people, and data throughout the deal process. With real-world examples and practical tools, the course helps security and business leaders support smooth transitions, reduce threats, and ensure both companies stay secure and resilient during and after the merger or acquisition.

Supply Chain Security Investigations
This training class teaches how to conduct effective supply chain security investigations to find and fix risks. Therefore, you’ll learn how to spot red flags, gather facts, and work with partners to protect goods, data, and people. The course uses real cases and simple steps to show how to respond to theft, fraud, or other threats. It’s designed to help security teams and managers keep the supply chain safe, clear, and running smoothly.

Converged Security Governance Management
This training class explains how to manage converged security governance by uniting physical, cyber, and personnel security under clear policies and leadership. Additionally, you’ll learn how to create strong rules, assign responsibilities, and ensure everyone follows the plan. Using easy-to-understand examples, the course helps you build a solid framework that keeps your organization safe, compliant, and ready to face security challenges across all areas.

Small Business Converged Security 101
This practical training class helps small business owners understand and apply converged security by combining physical, cyber, and personnel protection into one clear plan. It covers how to identify risks, set up simple safeguards, and track how well your security works. Using real examples and easy steps, the course gives you the tools to protect your business, your people, and your data—helping you stay safe and ready for whatever comes your way.

Converged Security “One Pager” Policy Program Management
This training teaches how to build and manage clear “One Pager” security policies for all security domains. Participants learn to match each policy to risk, use simple language, and keep content strict but readable. Additionally, the course shows how to support audits, guide behavior, and adjust policies as needs change.

Physical, Cyber, Personnel Table Top Exercise
Whether it is design, facilitation, coaching, or as an (good or bad) actor, this capability provides a powerful awareness tool to all participants. Additionally, being an observer can just be as supportive to your program as running the tabletop.

Supply Chain Security Due Diligence
This training class teaches how to perform supply chain security due diligence to spot risks and protect your business. You’ll learn how to assess suppliers, identify vulnerabilities, and ensure safety across all parts of the supply chain. With easy-to-follow steps and real examples, the course helps you build trust with partners and create a secure, reliable supply chain that keeps goods, data, and people safe from start to finish.

Cyber Security of Physical Security Technology Standard
This training class covers the cybersecurity risks related to physical security technology and how to protect these systems. You’ll learn how to secure devices like cameras, access controls, and alarms from cyber threats. The course offers clear steps and real examples to help you create strong standards that keep your physical security technology safe, reliable, and effective—ensuring your entire security system works together to protect people and assets.

Lessons Learned From Security Table Top Exercises
This training class explores lessons learned from security tabletop exercises and how to use them to improve your security program. You’ll discover how these practice sessions reveal gaps, test responses, and build teamwork. With clear examples and practical tips, the course helps you turn exercise insights into stronger plans and better readiness, so your organization can respond quickly and confidently to real security incidents.

Interviewing Skills for Auditors
This training class teaches auditors how to conduct effective interviews to gather accurate and useful information. You’ll learn techniques for asking clear questions, building trust, and handling difficult conversations. The course uses practical examples and easy tips to help you improve your communication skills, ensuring audits are thorough and reliable while keeping the process smooth and professional.

Security Team Go Bag and Gear Management
This training class teaches how to prepare and manage security team go bags and gear for quick and effective response. You’ll learn what essential items to include, how to organize equipment, and tips for regular checks and updates. With practical advice and real examples, the course helps ensure your team is always ready with the right tools to handle emergencies and keep people and property safe.

Security Audit / Assessment Scope Development
This training class guides you in creating clear and effective scopes for security audits and assessments. You’ll learn how to define goals, identify key areas to review, and set boundaries to ensure thorough and focused evaluations. Using practical examples and easy steps, the course helps you design audits that provide valuable insights, improve security, and support better decision-making across your organization.

Metrics and Analytics 101
This training class introduces the basics of metrics and analytics for security programs. You’ll learn how to collect, understand, and use data to measure performance and improve security efforts. The course explains key concepts in simple terms and shows practical ways to track progress, identify trends, and make smarter decisions that strengthen your organization’s security.

Intro to Tableau 101
This training class introduces the basics of Tableau, a powerful tool for data visualization and analysis. You’ll learn how to connect data sources, create clear charts and dashboards, and share insights easily. With simple steps and hands-on examples, the course helps you turn complex data into visual stories that support better decisions and improve how your team understands information.

Getting Security, a Seat at the Table
This training class teaches how to earn a strong role for security within your organization’s leadership. You’ll learn ways to communicate security’s value, build trust with decision-makers, and align security goals with business priorities. Using clear examples and practical tips, the course helps you gain influence, secure support, and ensure security is part of important conversations that shape your organization’s success.

Executive Protection Go Bag Management
This training class covers how to prepare and manage executive protection go bags to ensure quick access to essential gear. You’ll learn what items to include, how to organize equipment efficiently, and tips for regular maintenance and updates. With practical advice and real examples, the course helps protection teams stay ready to respond swiftly and keep executives safe in any situation.

Executive Protection Training Program Management
This training class teaches how to develop and manage an effective executive protection training program. You’ll learn how to create clear training goals, organize courses, and track progress to ensure your team is prepared for any situation. Using practical steps and real examples, the course helps you build a strong, consistent program that improves skills, boosts confidence, and keeps executives safe and secure.

Executive Protection Program Management
This training class focuses on managing a comprehensive executive protection program (the back-in-the-office stuff) that keeps clients safe and secure. You’ll learn how to plan operations, coordinate teams, and handle risks effectively. The course offers practical tools and real-world examples to help you build a strong program that adapts to changing threats, ensures clear communication, and delivers reliable protection for executives in any environment.

Introduction to Confidentiality & Export Control for Executive Protection Teams
This training class introduces executive protection teams to the basics of confidentiality and export control. You’ll learn why protecting sensitive information and following legal rules matter, especially when working across borders. The course covers clear steps to handle classified data, avoid risks, and ensure compliance. Using real examples, it helps teams understand how to keep information secure and protect their clients while meeting important legal requirements.

Global Cultural Roadblocks to Improving Security
This training class explores common cultural challenges that can slow down or block security improvements around the world. You’ll learn how different beliefs, values, and practices affect security efforts and communication. The course offers practical tips and real examples to help you recognize these roadblocks, adapt your approach, and work effectively with diverse teams to build stronger, more successful security programs across cultures.

Working with IT to Detect Fraud
This training class teaches how to collaborate effectively with IT teams to detect and prevent fraud. You’ll learn how to share information, use technology tools, and spot suspicious activity early. The course offers practical steps and real examples to help security and IT professionals work together, strengthen defenses, and protect your organization from financial loss and reputational damage.
Law Enforcement / Military Training

“I Want To Get Into Security” – A Class for Transitioning Law Enforcement and Military Personnel
This training class is designed for law enforcement and military personnel transitioning into security careers. You’ll learn how to apply your skills in new roles, understand key security concepts, and navigate the job market. The course offers practical advice, real-world examples, and tips to help you build a strong foundation and confidently start your journey into the security field.

TCOLE Compliant Class on introducing a “Street Cop to Cyber Cop”
This TCOLE-compliant class guides law enforcement officers transitioning from traditional patrol to cybercrime roles. You’ll learn foundational cyber concepts, key investigation techniques, and how to apply your street skills in the digital world. The course offers clear, practical training designed to meet TCOLE standards while helping you confidently expand your expertise and protect your community from online threats.

Cultural/Supply Chain, Due Diligence, Link Analysis and Exploitation Training
This is a set of unique law enforcement / military only training focus on exploitation.
Safety Training

Converged Safety Metrics Program Management
This training class teaches how to build and manage a converged safety metrics program that integrates physical, cyber, and personnel safety. You’ll learn how to select meaningful metrics, track performance, and use data to improve safety across your organization. With practical examples and easy steps, the course helps you create a clear, data-driven program that supports better decisions and strengthens overall safety and well-being for people and assets.

Converged Safety Governance Program Management
This training class covers how to manage converged safety governance by uniting physical, cyber, and personnel safety under clear policies and leadership. You’ll learn how to develop strong guidelines, assign roles, and ensure compliance across all safety areas. Using practical examples and simple steps, the course helps you build a solid framework that promotes a safe, healthy environment and supports your organization’s overall safety goals.

ACS Stop The Bleed(r) Training
This training class teaches the essential skills of the ACS Stop The Bleed® program to help save lives during emergencies. You’ll learn how to recognize life-threatening bleeding, apply pressure, use tourniquets, and pack wounds effectively. Through hands-on practice and clear instruction, the course prepares you to act quickly and confidently, providing critical care before professional help arrives.
Human Resources / Career / Job Seeker Training

Job Seeker / HR Recruiter Fraud / Scam Training
This training class helps job seekers and HR recruiters recognize and avoid common frauds and scams in the hiring process. You’ll learn how to spot red flags, protect personal information, and verify job offers. The course offers practical tips and real examples to keep you safe, build trust, and make smarter decisions when looking for or filling jobs.

Job Seeker / HR Recruiter Fraud / Scam Training for HR Teams
This training class teaches HR teams how to identify and prevent fraud and scams during recruitment. You’ll learn to spot suspicious resumes, detect fake job offers, and protect sensitive information. The course offers practical strategies and real examples to help your team build safer hiring processes, reduce risks, and maintain trust throughout the recruitment journey.

Loss Prevention Career Paths
This training class explores various career paths in loss prevention, highlighting opportunities across retail, corporate, and security sectors. You’ll learn about key roles, required skills, and ways to advance your career. The course offers practical advice and real-world examples to help you plan your journey, develop your expertise, and succeed in protecting assets and reducing losses.

Converged Security Career Paths
This training class explores career paths in converged security, where physical, cyber, and personnel security work together. You’ll learn about key roles, necessary skills, and opportunities for growth in this evolving field. The course provides practical guidance and real examples to help you plan your career, build your expertise, and succeed in protecting organizations from a wide range of threats.

Under Development

Under Development
Faith-Based Training

Church Converged Security (Church Safety) 101 – Need and Governance
This training class introduces church leaders to the basics of converged security, combining physical, cyber, and personnel safety to protect their community. You’ll learn why security matters, how to assess risks, and ways to create strong governance policies that fit your church’s unique needs. Using clear examples and simple steps, the course helps build a safe, welcoming environment where people can worship with confidence and peace of mind.

Church Converged Security (Church Safety) 201 – Security Domains and Baselines
This training class builds on the basics to explore key security domains and baselines for churches. You’ll learn how to apply physical, cyber, and personnel security measures tailored to your church’s needs. The course offers practical guidance on setting standards, assessing risks, and creating a balanced security program that protects people, property, and information while supporting a welcoming community environment.

Church Converged Security 301 – Security, Safety, Medical Response Policies
This advanced training class focuses on developing clear security, safety, and medical response policies for churches. You’ll learn how to create effective plans that protect your community during emergencies, including threats, accidents, and health incidents. The course provides practical tools and real examples to help you build strong, coordinated policies that ensure a safe environment and a quick, confident response when it matters most.

Church Security / Crisis Governance
This training class teaches church leaders how to establish strong security and crisis governance to protect their community. You’ll learn how to create clear policies, assign roles, and coordinate responses for emergencies and everyday safety. Using practical examples and simple steps, the course helps build a solid framework that ensures your church stays prepared, safe, and able to respond effectively to any crisis.

Guns in Houses of Worship Evaluation Model
This training class introduces a practical model for evaluating policies and risks related to guns in houses of worship. You’ll learn how to assess safety concerns, community views, and legal factors to make informed decisions. The course provides clear steps and real examples to help leaders balance security needs with respect for their congregation’s values, creating a safer and more welcoming environment.

Physical, Cyber, Personnel Table Top Exercise
Whether it is design, facilitation, coaching, or as an (good or bad) actor, this capability provides a powerful awareness tool to all participants.

Church Converged Security Incident Resposne
This training class teaches church leaders how to develop and manage effective incident response plans within a converged security framework. You’ll learn how to prepare for, respond to, and recover from security, safety, and medical emergencies. The course offers practical steps and real examples to help your church act quickly and confidently, protecting your community and restoring calm during critical situations.

Trust Models vs. Ministry and Culture vs Security vs. Safety
This training class explores the balance between trust models, ministry culture, security, and safety in faith communities. You’ll learn how different levels of trust and cultural values impact security and safety decisions. The course offers clear insights and examples to help leaders create approaches that respect ministry goals while protecting people and property, fostering a secure environment without compromising the community’s spirit and mission.Under Development

Under Development
Community Training

Community Family Emergency Go Bag
This training class teaches families how to prepare a community emergency go bag with essential items for safety and survival. You’ll learn what to include, how to organize supplies, and tips for regular updates. Using simple steps and real examples, the course helps families stay ready to respond quickly and confidently during emergencies, ensuring everyone’s safety and well-being.

Small Business / Single Parent / Senior Citizen Identity Theft Prevention
This training class helps small business owners, single parents, and senior citizens protect themselves from identity theft. You’ll learn simple, practical steps to spot scams, secure personal information, and avoid common risks. The course uses clear examples and easy tips to empower you to stay safe, protect your finances, and keep your identity secure in everyday life.

First Responder – Bad Actor, Victim, Secondary Trainer, PIO Reporter Actor for Exercises (Moulage Acceptable)
Whether it is design, facilitation, coaching, or as an (good or bad) actor, this capability provides a powerful awareness tool to all participants. As a first responder (SAR, FAST, ICS, Wildland), I can integrate and understand the many elements of participating in these exercises.
Other Topics / Multiple Industry Training

Security Advertising Integrity (Marketing, Product Mgmt) Possible Ice Breaker
This fun Ice Breaker covers the importance of advertising integrity and how to create honest, trustworthy marketing messages. You’ll learn how to avoid misleading claims, comply with laws, and build customer trust. Using clear but funny examples and practical tips, the session helps you promote your products or services ethically while protecting your brand’s reputation and connecting authentically with your audience.

A Chat During Tea Time – Social Engineering Introduction – Possible Ice Breaker
This Ice Breaker covers the importance of understanding Social Engineering on all parts of society, community, and business. This introduces the audience to a fun but scary chat with two actual fraudsters trying to steal money from its victim aka Me.

Under Development
FREE Texas A&M TEEX Security Training Classes that I (co-)teach

Cyber Security Risk Awareness for Officials and Senior Management
This is a non-technical course meant to develop awareness of cybersecurity risks so that elected officials, appointed officials, and other senior managers are better informed to properly protect the jurisdiction/organization during a cybersecurity incident. It is designed to help officials and senior management work more effectively with their Information Technology (IT) departments to mitigate cyber threats. The training is tailored to government, critical infrastructure, and private sector personnel who have the responsibility for directing and developing policy within their organization.

Demystifying Cyber Attacks
Through discussion, pre-recorded attacks, and live example attacks, Demystifying Cyber Attacks will explain and demonstrate common cyber attacks for non-technical participants. Participants will also learn how common cyber attacks can be disrupted at various points of the cyber kill chain using mitigation and response strategies.

Cybersecurity Resiliency in Industrial Control Systems
The Cybersecurity Resiliency in Industrial Control Systems course is designed to enhance understanding of the critical nature of Industrial Control System environments and the associated risks, threats, and defenses within an organization, business, or government entity. This course will introduce the convergence of physical security with cybersecurity, supervisory control and data acquisition (SCADA), and Industrial Control Systems security, increase awareness of the Internet of Things and Industrial Control Systems, and examine the threat landscape within Industrial Control Systems. Cyber threat mitigation techniques will be examined as well as methods of identifying cyber attacks and vulnerabilities. Tools to respond to and recover from cyber attacks on Industrial Control Systems will be addressed. State, local, regional, tribal, and territorial government officials; owners and operators of businesses and non-profits; and community members and other individuals interested in developing a greater understanding of developing cybersecurity resiliency in ICS.

Recovering from Cybersecurity Incidents
This course is designed to provide guidance for the implementation of an effective cybersecurity incident recovery program from a pre-incident and post-incident perspective. The training focuses on connecting IT with emergency management and is intended for government, critical infrastructure, and private sector personnel who have the responsibility for recovering after a cyber incident. Short term tactical and long-term strategic activities are discussed culminating in the development of an action plan.

Cybersecurity Vulnerability Assessment
The Cybersecurity Vulnerability Assessment course is designed to address specific technical and professional skills needed to assess, document, remediate, and report on cybersecurity vulnerability assessments within organizations through a series of lectures and hands-on activities. Activities include examining, analyzing, and prioritizing assets, risks, and vulnerabilities to develop a vulnerability assessment report that could be delivered to organizational leadership. This course utilizes active discussions and activities to extend the participant’s understanding of vulnerability assessments.

Cybersecurity Incident Response and Management
The Cybersecurity Incident Response and Management course utilizes NIST 800-61r2 to introduce participants to the cyber incident lifecycle. Through the use of a cyber range, participants will acquire hands-on experience responding to simulated, real-world cyber attacks and gain a better understanding of the importance of information sharing during cyber incidents.