Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
ColumnsManagementPhysicalCareer IntelligenceSecurity Enterprise ServicesSecurity Leadership and ManagementSecurity & Business Resilience

Career Intelligence

Are awards valuable to your security career?

Everyone enjoys a trophy but it’s important for security professionals to do their due diligence before accepting.

By Joanne R. Pollock, Jerry J. Brennan
trophy

Liudmila Chernetska / iStock / Getty Images Plus via Getty Images

career intelligence 2022
trophy
career intelligence 2022
September 7, 2022

Everyone enjoys the positive recognition that comes from winning an award for a job well done. To security professionals seeking to advance their career, there is value in being recognized for achievements like this within your organization.

This is also true for being recognized as a noteworthy contributor who has positively impacted the profession. Awards that are external to your organization can impact your career, and some of these security industry awards are more universally recognized than others.

Award schemes have exploded in the past five years, though. The number of trophies one can win seems endless. Substantially more awards across many more categories are finding their way onto security professionals’ resumes and social media profiles. As a result, it is becoming more difficult to track those that are meaningful, significant and descriptive of someone’s skills, capabilities and achievements.

We wanted to better understand the agenda of these some of these newcomers to the security awards business. We started with a 30,000-foot view and then took an in-depth look at several that are trying hard to create buzz in the security community.

We learned that many of these programs are simply monetizing the awards circuit. They are aggressive promoters of their own business interests and target award winners who they perceive are security industry influencers. The goal is to appear to have an affiliation with the individual and the individual’s organization in the hope it lends an air of legitimacy to their awards business. This practice takes unfair advantage of security professionals who are seeking credible differentiators for their resume or social media profile.

This is a global problem not only for individuals, but for companies of all sizes. We receive at least one solicitation each week claiming we have been selected, nominated or chosen for some sort of award — sometimes asking for money in exchange for being featured.

Candidates we talked to report being solicited for money in exchange for an award, to be put on a ranked list or gain exposure via newsletters claiming thousands of readers or subscribers. Also common is the use of highly respected or high-profile public figures in the name of the award or recognition, regardless of whether that individual is actually affiliated with the program or even has knowledge that their name is being used in marketing.

While some of these may well fall into the scam category, they may not cross the line into criminality, tort or statutory issues. However, adding them to your resume or internet public persona in the hope they will advance your career may not achieve the results you are seeking. Consider your audience, even for recognition given to you by well-known and respected organizations in the security field.

If you or your organization is approached and the award is not widely known, respected or admired, consider due diligence steps such as:

  • Check the URL, ownership, registration, country location, length of time in business and any company involvement.
  • If you do not know exactly who they are and what their business is, research public filings as well as the principals.
  • Research them on social media platforms and do not ignore watchdogs such as the Better Business Bureau.
  • Ask specific questions about the award. How long has it been in existence, what is the scope of the award and why is it being given out? Why you were selected and who nominated you? Is there a fee to be recognized for the award?
  • Find out who else has been given the award/recognition. Consider any potential association issues from a reputational perspective.
  • Look into your organization’s internal practices and policies to ensure they allow this. You may be able to accept personally, but not use your organizational affiliation.

On another note, it’s worth considering that there are businesses that troll legitimate award lists and recognition programs and contact recipients aiming to resell plaques or reprints of the award. In many cases, they make it appear that they are affiliated with the original organization. When in doubt, always ask the original notifier of the recognition if this is a sanctioned company or affiliate.

All security practitioners appreciate being noticed for hard work and professional and volunteer achievements. There are, indeed, a number of legitimate programs that aim to recognize and elevate the security industry and security professionals doing great things. It is unfortunate that what was once just a small number of well-respected acknowledgements has grown exponentially to a level that ensures everyone gets a trophy.

KEYWORDS: business continuity enterprise security risk management safety and security security management security technology

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Pollock 2016 200px

Joanne R. Pollock is the co-founder and President of Security Management Resources.  Previous to SMR, she had a 20-year career at leading global corporations, working across diverse functional areas including human resources, sales and marketing, and information technology services.

Brennan 2016 200px

Jerry Brennan is co-founder and Chief Executive of the Security Management Resources Group of Companies (www.smrgroup.com), the leading global executive search practice focused exclusively on corporate and information security positions.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Security Education & Training
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
  • The Most Influential People in Security 2025

    Security’s Most Influential People in Security 2025

    Security Magazine’s 2025 Most Influential People in...
    Most Influential People in Security
    By: Security Staff
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

  • Charlotte Star Room
    Sponsored byAMAROK

    In an Uncertain Economy, Security Is a Necessity - Not an Afterthought

  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

Popular Stories

Cybersecurity trends of 2025

3 Top Cybersecurity Trends from 2025

Red laptop

Security Leaders Discuss SitusAMC Cyberattack

Green code

Logitech Confirms Data Breach, Security Leaders Respond

Neon human and android hands

65% of the Forbes AI 50 List Leaked Sensitive Information

The Louvre

After the Theft: Why Camera Upgrades Should Begin With a Risk Assessment

Top Cybersecurity Leaders

Events

September 18, 2025

Security Under Fire: Insights on Active Shooter Preparedness and Recovery

ON DEMAND: In today’s complex threat environment, active shooter incidents demand swift, coordinated and well-informed responses.

December 11, 2025

Responding to Evolving Threats in Retail Environments

Retail security professionals are facing an increasingly complex array of security challenges — everything from organized retail crime to evolving cyber-physical threats and public safety concerns.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • Person Traveling

    Press pause to advance your security career

    See More
  • Relocating to Advance Your Security Career

    Relocating to advance your security career

    See More
  • corporate security recruitment

    Understand security recruitment to advance your career

    See More

Related Products

See More Products
  • security culture.webp

    Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

  • physical security.webp

    Physical Security Assessment Handbook An Insider’s Guide to Securing a Business

  • Career Network (60 days)

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing