This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more.
This Website Uses Cookies
By closing this message or continuing to use our site, you agree to our cookie policy. Learn More
This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more.
Security Magazine logo
search
cart
facebook twitter linkedin youtube
Security Magazine logo
  • MAGAZINE
    • Digital Edition
    • This Month's Issue
    • Archives
  • NEWS
    • Security Newswire
    • COVID-19
    • Technologies
    • Security Blog
    • Newsletter
    • Web Exclusives
  • COLUMNS
    • Career Intelligence
    • Security Talk
    • The Corner Office
    • Leadership & Management
    • Cyber Tactics
    • Overseas and Secure
    • The Risk Matrix
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • More
  • PHYSICAL
    • Access Management
    • Video Surveillance
    • Identity Management
    • More
  • CYBER
  • SECTORS
    • Education: University
    • Hospitals & Medical Centers
    • Critical Infrastructure
    • More
  • EXCLUSIVES
    • Security 500 Report
    • Most Influential People in Security
    • Top Guard and Security Officer Companies
    • The Security Leadership Issue
    • Annual Innovations, Technology, & Services Report
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MORE
    • Videos
      • ISC West 2019
    • Photo Galleries
    • Polls
    • Classifieds & Job Listings
    • White Papers
    • Mobile App
    • Store
    • Sponsor Insights
    • Continuing Education
    • Call for Entries
  • CONTACT
    • Advertise
    • Editorial Guidelines
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Home » Authors » Jerry J Brennan
Jerry J Brennan

Jerry J Brennan

Jerry Brennan is CEO of the Security Management Resources Group of Companies (www.smrgroup.com), the leading global executive search practice focused exclusively on corporate and information security positions.

Articles

ARTICLES

SEC0918-career-feature-slide1_900px

Personal Branding and Your Career, Part 3

Brennan 2016 200px
Jerry J Brennan
September 1, 2018

While nothing can completely supplant face-to-face meetings, it's imperative to cultivate a strong online brand when advancing your security career. 


Read More
How to Create an Effective Security Job Description - Security Magazine

How to Create an Effective Security Job Description

Brennan 2016 200px
Jerry J Brennan
June 1, 2018
Development of a compelling job description is the first challenge to hiring the right candidate for any security job.
Read More
How to Evaluate a Candidate’s Resume - Security Magazine

How to Evaluate a Candidate's Resume

Brennan 2016 200px
Jerry J Brennan
May 1, 2018
Many of today’s job descriptions are very different from those from the past. How does a hiring manager evaluate potential candidates in this fast-moving environment?
Read More
The Role of Intelligence in Corporate Security - Security Magazine

The Role of Intelligence in Corporate Security

Brennan 2016 200px
Jerry J Brennan
April 1, 2018
Diligently gathering intelligence and correctly analyzing it is a route to clear decision making in both business and hiring choices.
Read More
Ethical Considerations When Leaving Your Job - Security Magazine

Ethical Considerations When Leaving Your Job

Brennan 2016 200px
Jerry J Brennan
February 1, 2018
Aside from your good name, what should you bring with you to your new employer? In today’s climate, the answer is adamantly not someone else’s intellectual property.
Read More
The 10 Common Failure Points of the Hiring Process - Career Intelligence - Security Magazine

The 10 Common Failure Points of the Hiring Process

Brennan 2016 200px
Jerry J Brennan
January 1, 2018
A well thought-out strategy is the best approach for both security job seekers and hiring companies.
Read More
Evolving Challenges Mean New Security Career Opportunities - Security Magazine

Evolving Challenges Mean New Security Career Opportunities

Brennan 2016 200px
Jerry J Brennan
December 1, 2017
Contrary to what you read in the press, cyber and IT security are not the only growing areas for careers in security.
Read More
Personal Introspection and Career Planning Security Magazine November 2017

Personal Introspection and Career Planning

Brennan 2016 200px
Jerry J Brennan
November 1, 2017
Without question a realistic and self-aware approach is of tremendous value in everything from resume and personal brand development to interviews and successful onboarding in a new role.
Read More
Are Degrees What They Seem?, Security Magazine October 2017 Career Intelligence

Are Security Degrees What They Seem?

Brennan 2016 200px
Jerry J Brennan
October 1, 2017
Acquiring a higher-level education is time consuming and expensive, and fraudsters have long been marketing fast-track ways to obtain what appears to be an impressive diploma, at least on the surface. These programs and methods have been around for many years; therefore, it is not always easy to identify what is real and what is a wasted investment of your money and time.
Read More
Recruiting for Security Leadership Success

Recruiting for Security Leadership Success

Brennan 2016 200px
Jerry J Brennan
September 1, 2017
Companies increasingly want a better understanding of what contributes to predicting performance in possible new hires. They want to better understand a candidate’s motivation, values, beliefs and goals in addition to their competencies. This allows the hiring organization to better assess whether there are personality characteristics and traits that, when pushed to extremes, will impede the individual’s ability to be effective in executing the responsibilities of the position.
Read More
View All Articles by Jerry J Brennan
Subscribe For Free!
  • Digital Edition Subscriptions
  • Security eNewsletter & Other eNews Alerts
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company. Interested in participating in our Sponsored Content section? Contact your local rep.

close
  • sponsored-content-BNP-covid__3J9FMQPY3I__
    Sponsored bySureView Operations

    How command centers are responding to COVID-19

Popular Stories

ransomware - cyber

Kia Motors allegedly suffers ransomware attack; cybercriminals demand $20 million to recover sensitive data

Potawatomi Casino implements temp detection and touchless weapons detection for improved safety and security

Milwaukee-based Potawatomi Hotel & Casino implements touchless screening for guests

Security guards Allied, gardaworld and G4S

GardaWorld and Allied Universal to enter bidding war over G4S

SEC0321-Cover-Feat-slide1_900px

The 2021 Top Cybersecurity Leaders

water utilities security

Hacker breaks into Florida water treatment facility, changes chemical levels

2.16_SEC_SBS_REV_360X180_customcontent

Events

September 24, 2020

Pandemics, Recessions and Disasters: Insider Threats During Troubling Times

ON DEMAND: The insider threat—consisting of scores of different types of crimes and incidents—is a scourge even during the best of times. But the chaos, instability and desperation that characterize crises also catalyze both intentional and unwitting insider attacks. Learn how your workers, contractors, volunteers and partners are exploiting the dislocation caused by today's climate of Coronavirus, unemployment, disinformation and social unrest.

October 28, 2020

Industrial Cybersecurity: What Every Food & Bev Executive Needs to Know

ON DEMAND: There's a lot at stake when it comes to cybersecurity. Reputation, productivity, quality. Join us to discuss the future of your global security strategy and a path forward with trusted partners Cisco and Rockwell Automation, and turn your Food & Bev security challenges into strategic advantages that drive business value.

View All Submit An Event

Poll

Who has ownership or primary responsibility of video surveillance at your enterprise?

Who has ownership or primary responsibility of video surveillance at your enterprise?
View Results Poll Archive

Products

Effective Security Management, 7th Edition

Effective Security Management, 7th Edition

 Effective Security Management, 5e, teaches practicing security professionals how to build their careers by mastering the fundamentals of good management. Charles Sennewald brings a time-tested blend of common sense, wisdom, and humor to this bestselling introduction to workplace dynamics. 

See More Products
Security 500 360

The latest news and information

Content written for business-minded executives who manage enterprise risk and security

REGISTER TODAY
  • More
    • Market Research
    • Custom Content & Marketing Services
    • Security Group
    • Editorial Guidelines
    • Privacy Policy
    • Survey And Sample
  • Want More
    • Subscribe
    • Connect
    • Partners
  • Privacy
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2021. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing