Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
ColumnsCareer IntelligenceSecurity Leadership and ManagementSecurity Education & Training

Navigating Behavioral Obstacles in Security Team Recruitment

What factors should be considered when adding senior security professionals for your team.

By Jerry J. Brennan, Joanne R. Pollock
Emotion management and control
sesame / DigitalVision Vectors via Getty Images

sesame / DigitalVision Vectors via Getty Images

July 25, 2025

There are many factors to consider when hiring senior security professionals for your team. Evaluation of education and experience is obvious. Assessing the potential risk for failure in the role or the organization is equally important.

Countless articles and studies confirm that most terminations at management and executive levels result from behavior issues as opposed to a lack of relevant knowledge or operational skills. Having worked with hundreds of organizations, we can attest that the security profession is not immune to this phenomenon.

A 2022 Society for Human Resource Management (SHRM) study found 83% of managers felt unprepared to address behavioral challenges. Some HR organizations put that number closer to 90%. Persistent, unaddressed behavioral problems involving conduct, ethics, lack of civility and respect, and authoritative abrasiveness are issues that can affect both your hiring decisions and what types of work issues you will be asked to address within your organization.

These traits are strong predictors of individual challenges with both emotional and cognitive intelligence. Not screening for these issues during your hiring process can cause disruption and performance issues within your team and will have a direct impact on decision-making within your group. They can also become security-related risks to your organization.

The precursors to these traits did not surface a month post-hire. Many organizations and security professionals recognize this and put processes in place to conduct due diligence. This has been effective in the past. However, issues facing hiring authorities today are unprecedented.

As an example, recent survey data suggests that 40% of Americans are susceptible to authoritative appeals and behaviors. People who are more susceptible to authoritarian managers are statistically more likely to have lower cognitive skills in decision-making, both at work and in personal matters.

Research also shows that individuals with lower cognitive abilities (i.e., reasoning, comprehension, and processing speed) are more likely to manage with authoritarian attitudes. Emotional intelligence is also a key factor; those with lower emotional abilities are even more strongly predisposed to authoritarian beliefs and are less adept at navigating complex social or work situations.

This combination of lower cognitive and emotional skills can lead to poorer decision-making, greater reliance on heuristics (mental shortcuts), and a tendency to defer to authority rather than critically evaluate information or alternatives. In organizational and security team settings, these individuals may underperform, feel more stressed, and be more vulnerable to manipulation or burnout.

Given the nature of today’s security-related risk programs that are increasingly driven by intelligence gathering and assessments, the security profession needs to be extremely vigilant in assessing existing and incoming staff for critical thinking and emotional intelligence.

Individuals with low emotional intelligence (EI) and low cognitive intelligence (CI) often struggle to process, correlate, or even seek out information that challenges their existing viewpoints.

Several factors contribute to this pattern:

  • Confirmation Bias: People with lower CI are more prone to cognitive biases like confirmation bias, which leads them to favor information that supports their beliefs and ignore or dismiss contradictory evidence.
  • Low EI Behaviors: Those with low EI tend to dismiss others’ viewpoints, avoid sensitive or challenging information, and struggle with self-awareness and empathy. They often prioritize their feelings and perspectives, making them less likely to engage with information that could create discomfort or cognitive dissonance.
  • Accountability and Blame: Low EI is also linked to a tendency to avoid personal responsibility and to blame others for negative outcomes, further reducing the likelihood of self-reflection or openness to new information.
  • Cycle Reinforcement: Because these individuals do not recognize or address the effects of their actions and avoid challenging situations, their biases and limited perspectives are continually reinforced, perpetuating the cycle.

In summary, low EI and CI cause people to be less likely to correlate or seek out conflicting information. This sustains a self-reinforcing loop of narrow viewpoints and resistance to change. This behavior is contradictory to building and supporting an effective, functioning security organization that can align with and support your organization’s success.

KEYWORDS: career development security career security career planning

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Brennan 2016 200px

Jerry Brennan is co-founder and Chief Executive of the Security Management Resources Group of Companies (www.smrgroup.com), the leading global executive search practice focused exclusively on corporate and information security positions.

Pollock 2016 200px

Joanne R. Pollock is the co-founder and President of Security Management Resources.  Previous to SMR, she had a 20-year career at leading global corporations, working across diverse functional areas including human resources, sales and marketing, and information technology services.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Security Leadership and Management
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
  • The Most Influential People in Security 2025

    Security’s Most Influential People in Security 2025

    Security Magazine’s 2025 Most Influential People in...
    Most Influential People in Security
    By: Security Staff
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

  • Charlotte Star Room
    Sponsored byAMAROK

    In an Uncertain Economy, Security Is a Necessity - Not an Afterthought

  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

Popular Stories

Red laptop

Security Leaders Discuss SitusAMC Cyberattack

Cybersecurity trends of 2025

3 Top Cybersecurity Trends from 2025

Green code

Logitech Confirms Data Breach, Security Leaders Respond

Neon human and android hands

65% of the Forbes AI 50 List Leaked Sensitive Information

The Louvre

After the Theft: Why Camera Upgrades Should Begin With a Risk Assessment

Top Cybersecurity Leaders

Events

September 18, 2025

Security Under Fire: Insights on Active Shooter Preparedness and Recovery

ON DEMAND: In today’s complex threat environment, active shooter incidents demand swift, coordinated and well-informed responses.

December 11, 2025

Responding to Evolving Threats in Retail Environments

Retail security professionals are facing an increasingly complex array of security challenges — everything from organized retail crime to evolving cyber-physical threats and public safety concerns.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • security recruitment

    What can a security recruitment firm do for your career?

    See More
  • corporate security recruitment

    Understand security recruitment to advance your career

    See More
  • Glass piggy pank with coins

    Security Job Postings and Pay Transparency Laws

    See More

Related Products

See More Products
  • security culture.webp

    Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

  • Hospitality Security: Managing Security in Today's Hotel, Lodging, Entertainment, and Tourism Environment

  • CASP.jpg.jpg

    CASP+ CompTIA Advanced Security Practitioner Certification All-In-One Exam Guide...

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing