Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
ColumnsManagementLeadership & ManagementSecurity Leadership and ManagementSecurity Education & Training

Leadership & Management

The Ego Trap

Security leaders share insights on how the most successful leaders inspire and motivate their people without gorging on power.

By Michael Gips
Chess pawn in a mirror reflecting himself as a king

Eoneren / E+ via Getty Images

June 16, 2025

It’s the paradox of power. People in democratic societies crave servant leaders — public officials with minimal egos. Yet the candidates who run for the highest positions in their lands have massive egos — and maybe they have to. It may take an enormous sense of self-regard to believe you can govern a nation and that millions of people will vote for you. 

On a smaller scale, that situation often plays out in the corporate world, including in the security and risk communities. Leadership requires confidence, which can mutate into cockiness and manifest as arrogance. How do the most successful leaders inspire and motivate their people without gorging on power? 

To get insight, I spoke to several security leaders, as well as executive coaches who work with security professionals. 

“We have all seen toxic leaders,” says Joe Rector, Director of Staff at HQ U.S. Air Force/Security Forces Directorate. “It is all about them. They constantly talk about themselves and consistently seek the spotlight. They take the credit of others. They abuse their authority and treat their subordinates badly. It doesn’t mean they don’t get the mission done, but it is usually at a cost of low organizational morale and low productivity. They are kind leader with who people do not want to work and avoid if they can.” 

As simple as it sounds, Rector avoids this trap by focusing on the golden rule. He actively encourages his staff’s wellbeing and professional development. He makes sure to credit them for their work, and he shares — or give them exclusively — the limelight.  

“Also, I try to prepare them for the next leadership level in their career, making sure they have the right training and give them assignments that prepare them for the future,” he says. By modeling that behavior, he avoids the ego trap and tacitly inculcates humility in his staff. 

Several security executives and coaches emphasized that the ego question comes down to your “why” for being a leader. “Is it for personal glory or mission success?” asks Lori Flor, Director of Safety and Security at the University of California San Diego. 

Executive Coach Alicia Rodriguez elaborates on that theme: “First, what drives a leader to lead? Is he or she committed to something so much so that they want to participate, influence, and change it for the better from a position of authority and power? Or are they primarily driven to lead because they desire status, power, and ways to feel worthy?” 

If it’s for power and glory, the task to quell the ego becomes dramatically more difficult. 

What about leaders who start out altruistic and noble but become intoxicated with power and removed from their reports as they climb the ladder? To prevent such hubris and self-satisfaction from taking root, Rodriguez recommends finding something outside of work that gives you meaning and purpose, be it family, faith, friendships, or otherwise. It’s critical to stay grounded and reflective, she says. Finally, leaders have to be brutally honest with themselves, she says: “Can you wake up every morning knowing and feeling you are doing the right thing, especially when no one is noticing, seeing, or affirming your actions?” 

Periodic self-evaluation is key. As JT Mendoza, Senior Director of Global Information Security at Marriott International puts it, “Great leaders have a high level of self-awareness — they know themselves, can take a look at themselves, but also understand their environment and dynamics at play.” 

Equally important is having people who will call you out. 

Mendoza says he learned a humbling lesson during his final years in the military, as he was transitioning to federal service. “I was called out for being a bad leader,” he recalls. But he used it as a learning experience. Undertaking a 360-leadership assessment, he swallowed his pride and sought out colleagues who he knew would score him harshly. He used the feedback to improve his leadership skills. 

I also asked these experts how far you can take your public persona before you come across as an egomaniac. There’s no pat answer. Some people can routinely keynote conferences, appear on podcasts, publish articles, and win awards — and document it all on LinkedIn — without coming across as self-centered. Others come across as narcissists in a single post. It all depends on what your message is and how you deliver it. 

As for accomplishments, “Think about whether you want to put it on LinkedIn,” advises UCSD’s Flor. “It’s fine if you’re not overwhelming people and the information is timely and valuable.” 

Instead of posting about your own reward, consider instead using your social media clout to praise someone on your team who has earned an achievement or gained recognition, such as obtaining a new certification, completing a course, or receiving a volunteer leadership role. 

Perhaps Simon Sinek puts it best, when comparing the ego-driven leader to the generous leader: “A star wants to see himself rise to the top. A leader wants to see those around him rise to the top.” 

KEYWORDS: corporate culture security career security leaders security leadership skills

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Michael gips headshot
Michael Gips is a Principal at Global Insights in Professional Security, LLC. He was previously an executive at ASIS International. Columnist image courtesy of Gips

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Security Leadership and Management
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
  • The Most Influential People in Security 2025

    Security’s Most Influential People in Security 2025

    Security Magazine’s 2025 Most Influential People in...
    Most Influential People in Security
    By: Security Staff
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

  • Charlotte Star Room
    Sponsored byAMAROK

    In an Uncertain Economy, Security Is a Necessity - Not an Afterthought

  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

Popular Stories

Cybersecurity trends of 2025

3 Top Cybersecurity Trends from 2025

Red laptop

Security Leaders Discuss SitusAMC Cyberattack

Green code

Logitech Confirms Data Breach, Security Leaders Respond

Neon human and android hands

65% of the Forbes AI 50 List Leaked Sensitive Information

The Louvre

After the Theft: Why Camera Upgrades Should Begin With a Risk Assessment

Top Cybersecurity Leaders

Events

September 18, 2025

Security Under Fire: Insights on Active Shooter Preparedness and Recovery

ON DEMAND: In today’s complex threat environment, active shooter incidents demand swift, coordinated and well-informed responses.

December 11, 2025

Responding to Evolving Threats in Retail Environments

Retail security professionals are facing an increasingly complex array of security challenges — everything from organized retail crime to evolving cyber-physical threats and public safety concerns.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • illustration of person at desk using computer for video call

    Commanding from the Cloud

    See More
  • Flat bike tire

    Mind the GAP

    See More
  • Going Down with the Ship

    Going Down with the Ship

    See More

Related Products

See More Products
  • Risk Analysis and the Security Survey, 4th Edition

  • The Database Hacker's Handboo

  • The Complete Guide to Physical Security

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing