Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
ColumnsCareer IntelligenceSecurity Leadership and ManagementSecurity Education & Training

Career Intelligence

The security career impact of personal reputation and ethics

Security leaders must plan for how their personal reputation will affect their professional career.

By Jerry J. Brennan, Joanne R. Pollock
Business ethics guidelines

ijeab / iStock / Getty Images Plus via Getty Images

career intelligence
Business ethics guidelines
career intelligence
September 13, 2023

A majority of security professionals report ethics and values, or integrity and trust, to be one of their top five competencies. This is unsurprising as these are expected traits given the nature of the security profession. Interestingly, a minority place business acumen in their top five.

Similarly, companies that weave strong ethics and integrity policies into their core values tend to financially outperform other corporations over time. Key elements of these programs are a code of expected conduct surrounding behavior of employees including corporate leadership, suppliers and potential vendors.

Business ethics guidelines often include policy standards addressing prohibitions of behaviors that, while not criminal in nature, are viewed by the corporation as unacceptable. Companies recognize the negative reputational significance of actions that can project the appearance of impropriety or a lack of transparency.

The security function is often charged with administration of ethics programs within organizations. Activities can include awareness training, reporting and investigative efforts. As a result, there is higher visibility associated with the conduct of security leaders. Great care must be taken by those who manage these programs to ensure that internal and external dealings do not damage either the practitioner’s, or the company’s, credibility. While actions often have the best of intentions, consider the perception others may have because of your behavior.

Below are several examples of what we have seen over time. Any of these has the potential to damage your reputation should they become either internal or external public knowledge.

  • A for-profit organization using individual names and organization affiliations to promote their sales and marketing activities. Most companies have strict guidelines about use of service and trademarks by anyone other than their corporation. Utilize the processes they have in place to obtain their permission.
  • Attendance fees or expenses waived or offset by a scheme through the originating organization or supporting sponsors. Though perhaps well-intended, if your manager would not approve the item or activity as a budget expense, it is not a clever idea. It also likely exceeds your agency or company’s gift policy limit.
  • Serving as an advisory board member for one of your suppliers or potential suppliers. This sets up awkward relationships with other vendors. It also infers that your company is endorsing the product or service the supplier or potential supplier provides.

    “Just as an organization’s executive leadership is always under a microscope, so are security professionals.”


    There is an increase in security professionals falling for this tactic. An example would be Vendor “X” announces that CSO “Y” is now on their advisory board, promoting the practitioner’s name and title as associated with the vendor. The CSO is then invited to one or more promotional meetings masquerading as feedback sessions.

    Both companies and government agencies have strict policies against this. There are similar restrictions against pay-to-play publications.
  • Manipulating supplier invoice amounts through adjustment or added billings to create a set aside for travel and/or entertainment for you and/or your staff. While there are great business reasons for team building social events, this circumvents and likely violates your organization’s reimbursement policies. It is a career killer.
  • Hosting events, meetings or entertainment and having one or more subordinates pay the expenses to allow you to approve the expense report. While these may well be within your authorized budget planning, if you feel the need to hide the details from your manager or break up to expense to reflect your limits of authority, this is not considered by any organization as within their ethics standards.

Just as an organization’s executive leadership is always under a microscope, so are security professionals. This is especially true for those charged with administration of ethics programs.

Your actions, words and behavior are constantly being judged even when you are among colleagues. Do not believe for one minute that stories and assumptions based on observations, or even partial facts, are not repeated and passed along. They are. It is important that you stay above reproach and ensure that you and your teams lead by example.

Organizations and the security profession in general leaks information and shares it at lightning speed. The avoidance of reputational concerns and the foreseeable damage they can cause is not about political correctness. If you hide facts or convince yourself and your colleagues of spurious justifications for your actions during your professional life, your ethical reputation is at risk.

KEYWORDS: career development ethics security career security career planning security leaders

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Brennan 2016 200px

Jerry Brennan is co-founder and Chief Executive of the Security Management Resources Group of Companies (www.smrgroup.com), the leading global executive search practice focused exclusively on corporate and information security positions.

Pollock 2016 200px

Joanne R. Pollock is the co-founder and President of Security Management Resources.  Previous to SMR, she had a 20-year career at leading global corporations, working across diverse functional areas including human resources, sales and marketing, and information technology services.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Security Education & Training
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
  • The Most Influential People in Security 2025

    Security’s Most Influential People in Security 2025

    Security Magazine’s 2025 Most Influential People in...
    Most Influential People in Security
    By: Security Staff
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

  • Charlotte Star Room
    Sponsored byAMAROK

    In an Uncertain Economy, Security Is a Necessity - Not an Afterthought

  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

Popular Stories

Cybersecurity trends of 2025

3 Top Cybersecurity Trends from 2025

Red laptop

Security Leaders Discuss SitusAMC Cyberattack

Green code

Logitech Confirms Data Breach, Security Leaders Respond

Neon human and android hands

65% of the Forbes AI 50 List Leaked Sensitive Information

The Louvre

After the Theft: Why Camera Upgrades Should Begin With a Risk Assessment

Top Cybersecurity Leaders

Events

September 18, 2025

Security Under Fire: Insights on Active Shooter Preparedness and Recovery

ON DEMAND: In today’s complex threat environment, active shooter incidents demand swift, coordinated and well-informed responses.

December 11, 2025

Responding to Evolving Threats in Retail Environments

Retail security professionals are facing an increasingly complex array of security challenges — everything from organized retail crime to evolving cyber-physical threats and public safety concerns.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • earth

    The impact of diversity, equity and inclusion on your security career

    See More
  • Gavel on a keyboard

    Security regulations and standards can impact your security career

    See More
  • SEC0421-Career-Feat-Slide1-900px

    Positive brand reputation will advance your security career

    See More

Related Products

See More Products
  • 9780367030407.jpg

    National Security, Personal Privacy and the Law

  • Career Network (60 days)

  • Career Network (30 days)

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing