Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
Career IntelligenceSecurity Enterprise ServicesSecurity Leadership and ManagementLogical SecuritySecurity & Business ResilienceSecurity Education & Training

Guilt by Association – Public References and Their Impact on Your Security Career

By Jerry J. Brennan
Career Intelligence Jerry Brennan
Career Column February
Career Intelligence Jerry Brennan
Career Column February
February 2, 2020

Critical steps in security recruitment for both employers and candidates are background or reference checks. Protection of personal or sensitive personal data is at the forefront of both parties’ minds in today’s data-driven environment. Vetting a candidate’s professional and personal references is typically done with permission and in a professional manner outside the public eye.

But what about the references you yourself may casually toss out in public social media forums, at conferences or networking events? They may seem authentic at the time but can have an unintentional negative impact on your personal brand depending on the level of due diligence you have done before conferring them and how regularly you monitor how your comments are being used.

In today’s environment of global internet, instant communication and leveraged social media, you must consider rapidly emerging risks and unintentional consequences surrounding the endorsement of individuals or companies without first doing your own reference check.

Comments in public forums are often edited and repurposed out of context. They can be portrayed as a positive reference or support of a person, product or company when that was not the original intent. Despite a hyper-focus on protection of data, instances of this continue to occur with what can only be described as complete disregard for privacy and intellectual property rights.

Candidates work to ensure their references are impeccable, yet they often neglect to monitor easily found information about themselves that may or may not be what they intended when they originally commented. It is especially surprising to see this happen so often to the security community, given the investigative background of many within in the profession and the overall nature of our work.

Examples can be quickly found through a search of the websites of small to midsize companies around the world who provide services to the security profession. With minimal effort, you will find company names, logos and service marks used to commercially promote that organization. You will also often find glowing quotations with an attribution to specific individuals listing their title and organization’s name.

Next, go to their associated social media platforms. Social media by its nature encourages interaction, comments, “likes” and reviews.  While this can a useful tool often those remarks are extracted and utilized for individual self-promotion or commercial marketing and you should view them with skepticism. Unless you personally are a highly recognized and sought-after brand, do you really think your name is carrying the market effect they are seeking?

If you have been quoted on a website with your company’s name or logo associated with it, odds are your organization’s legal department will view that as a violation of company policy. If you run across a website that features a long string of client names, logos or endorsements, that should be a flag.

This practice is especially common given the expansive growth on a global scale of conferences, seminars and training programs put on by marketing companies, associations and individuals. Publicizing your comments, company affiliation or fake video interviews to be utilized for furthering their commercial profit is likely not something your legal department would sign off on either.

Within some organizations there is a growing trend that even doing a pro bono speaking engagement for a for-profit program requires some level of scrutiny by either public relations or legal because of the recognition that everything you do has a reputational attachment to the organization. In the case of these programs, I would also encourage deeper due diligence relating to actual ownership and business relationships, and not just relying on a surface perusal of claimed content or attendees.

How does this potentially impact your reputation with colleagues or potential employers? As you may have heard, the internet is forever. While there are emerging laws regarding an individual’s rights to be forgotten, you are likely left with requests to specific organizations to remove your comments or – in the case of search engines – to be removed from their indexes. It is very risky to believe it will be effective across news outlets, public records and forums.

You do not have control over the past conduct or current reputation of the individual and/or organization benefiting from your public comments, nor how they are perceived by other readers. I recently spoke to several prospective candidates who were surprised to learn that their public references of individuals from years earlier that related to work those individuals had done for completely different employers had been repurposed and published in a manner supporting the individuals new business endeavors. In addition to the misrepresentation, it also puts on public display the individual’s misappropriation of their former employer’s data.

A key factor in advancing your security career is the management of your personal brand, one aspect of which is how those things found attached to your name or the organizations who you represent are perceived. You do not have control over who may see what you have written and what their perception and experience with the subject of your reference may be.

If you do choose to provide an endorsement or reference, there should be a mutually specific understanding as to its intended purpose and control exercised over how it is utilized, provided that doing so is in keeping with your company’s legal position.

Ethically, you would not expect a professional acquaintance to provide you as a reference for a background without first contacting you and obtaining your permission. You should demand and expect the same ethical standards in public settings to protect your personal brand and reputation as organizations enact to protect theirs.

KEYWORDS: background check social media

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Brennan 2016 200px

Jerry Brennan is co-founder and Chief Executive of the Security Management Resources Group of Companies (www.smrgroup.com), the leading global executive search practice focused exclusively on corporate and information security positions.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Security's Top Cybersecurity Leaders 2024

    Security's Top Cybersecurity Leaders 2024

    Security magazine's Top Cybersecurity Leaders 2024 award...
    Top Cybersecurity Leaders
    By: Security Staff
  • cyber brain

    The intersection of cybersecurity and artificial intelligence

    Artificial intelligence (AI) is a valuable cybersecurity...
    Cybersecurity
    By: Pam Nigro
  • artificial intelligence AI graphic

    Assessing the pros and cons of AI for cybersecurity

    Artificial intelligence (AI) has significant implications...
    Logical Security
    By: Charles Denyer
Subscribe For Free!
  • Security eNewsletter & Other eNews Alerts
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • Crisis Response Team
    Sponsored byEverbridge

    Automate or Fall Behind – Crisis Response at the Speed of Risk

  • Perimeter security
    Sponsored byAMAROK

    Why Property Security is the New Competitive Advantage

  • Duty of Care
    Sponsored byAMAROK

    Integrating Technology and Physical Security to Advance Duty of Care

Popular Stories

Internal computer parts

Critical Software Vulnerabilities Rose 37% in 2024

Coding

AI Emerges as the Top Concern for Security Leaders

Person working on laptop

Governance in the Age of Citizen Developers and AI

Half open laptop

“Luigi Was Right”: A Look at the Website Sharing Data on More Than 1,000 Executives

patient at healthcare reception desk

Almost Half of Healthcare Breaches Involved Microsoft 365

2025 Security Benchmark banner

Events

June 24, 2025

Inside a Modern GSOC: How Anthropic Benchmarks Risk Detection Tools for Speed and Accuracy

For today's security teams, making informed decisions in the first moments of a crisis is critical.

August 27, 2025

Risk Mitigation as a Competitive Edge

In today’s volatile environment, a robust risk management strategy isn’t just a requirement—it’s a foundation for organizational resilience. From cyber threats to climate disruptions, the ability to anticipate, withstand, and adapt to disruption is becoming a hallmark of industry leaders.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • earth

    The impact of diversity, equity and inclusion on your security career

    See More
  • SEC0921-career-Feat-slide1_900px

    Public engagement’s influence on your security career

    See More
  • Gavel on a keyboard

    Security regulations and standards can impact your security career

    See More
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • eNewsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing