Cybersecurity Skills Update for 2020
For those gaining skills to work in the industry for the first time, the challenge remains to hit the ground running with a position and, better, with a career path. Yet no career path in this industry will sidestep an ongoing foothold in the classroom — onsite or virtual.
January 30, 2020 at 07:00 AM
8 minute read
This article appeared in Cybersecurity Law & Strategy, an ALM publication for privacy and security professionals, Chief Information Security Officers, Chief Information Officers, Chief Technology Officers, Corporate Counsel, Internet and Tech Practitioners, In-House Counsel. Visit the website to learn more.
As the New Year quickly tumbles into our laps, schools and other educational programs begin to offer new programs, classes, certifications, and degrees for January enrollments. Many seem to claim a guarantee that they can offer a new or enhanced career.
For those who seek to upgrade their skills or acquire new ones, it has become difficult to differentiate among programs with similar names offered at different institutions — in class settings and online — at not inconsequential prices. Will certification achieve your goals? Will it address the needs of your next employer? Decisions about career enhancement in Information Security is tough, not just for the student or professional, but for the employer and recruiter as well.
It is familiar to people working in the information security industry that the demand for capable skilled professionals and team players is increasing. For those gaining skills to work in the industry for the first time, the challenge remains to hit the ground running with a position and, better, with a career path. Yet no career path in this industry will sidestep an ongoing foothold in the classroom — onsite or virtual. And while employers and recruiters spin within the chaos of job titles and descriptions, they must assume a discrete understanding of the nuances of each role as performed or required to be performed in each independent workplace.
This year, Cisco reports that those in greatest demand must bridge the divide between networking and software development. Almost contradicting themselves, they suggest that security professionals will need broader skills but also more specialization. Recruiters also will need to become quick studies to evaluate the varied backgrounds and levels of experience of security personnel available, especially if they are going to manage a search for leadership in the industry. At one and the same time, CEOs recognize they don't have the skills within their companies to enable a defensive posture, and professionals say they lack the necessary skills for current — much less future — jobs. Trying to prepare for jobs we only anticipate can be disheartening to the point of disabling. Executives want employees trained and fully equipped, so training has become a regular and routine part of doing the job.
The role of Information Security Analyst appears to be very basic. But this is a good place to start unlocking the high level of skills necessary to work in this industry. At the same time, skills of the superior analyst must include training others. They must have a polished management style, the ability to read and understand the workforce and new demands in the space of many related professionals. Cisco aptly noted that the complexity of the IT enterprise is disrupting the workplace.
At Balance Careers, Alison Doyle writes that to be an Information Security Analyst, a bachelor's degree in computer science, programming, or engineering is a minimal requirement, while many companies require a master's degree and many years' network experience.
Information security analysts work with various members of an organization and must be able to communicate security measures and threats to people from a wide variety of technical and non-technical backgrounds. In addition to the technical networking and software development tools that must fire up on the job, the list of other skills includes desirable character traits and work habits that are developed over time.
Some skills understood as soft skills are those difficult to define or become defined differently depending on the workplace. Time management is an important skill, but time management is easily thwarted when a firm is subjected to a security infraction or responses to emergencies must be made in systems attacks. Evaluating claims that an individual has reached the proper level of achievement in a skill of this soft type is very difficult. Perhaps they have mastered time management software. That may or may not be enough. Customer service and leadership skills are very much the same. It might be a good idea to study job descriptions to see how many of them get to the true nature of the role and a tangible definition of the skills required. It is much easier to identify with a piece of equipment or software than to assess the corporate culture that gave rise to an individual's time management experience.
In Dark Reading, Curtis Franklin, Jr. writes about the top non-technical degrees for entry into cybersecurity. He adds that a computer science degree is not necessarily a requirement; that requirements may hang on the soft skills often described as the employment gap between available skilled personnel and existing demand for skilled workers, now cited as more than four million people. That's a huge demand for the training organizations as well as the placement industry.
The big question Curtis asks is, what degree programs are worthy of consideration? Having looked at many of these programs myself, I also wonder where the lines are drawn between serious programs and those that skirt the edges of the requirements. Many of us faced these questions in our own education. What criteria should we use? One agreement is that the industry needs individuals with diverse experience in observing risk and handling the threat environment. Curtis's list focuses on diversity of experience and problem-solving skills, which are probably essential, but it is hard to assess where one can readily acquire these deeper learning traits.
For the latest training information reflecting the IT job market and, in this case, news on the demand for talent in the information security industry, the latest certifications offered with CompTIA can be informative. Their training is pointed, no-nonsense, task-oriented and favorably priced for ordinary people who do not have a lot of time to sacrifice to any specific program when training is an essential part of their job description. The certificate also counts.
CompTIA is largely critical of the contemporary approach to education and teaching to the test. Too little attention is paid to critical thinking, problem-solving, and initiative. Even after an employee is hired, the fast pace of technological innovation makes it difficult for employees to keep up with the changes. Employers naturally struggle to provide the continuing education and professional development that their employees require. CompTIA has sought to fill this gap for both the employer and the employee or job seeker. Its Creating IT Futures program works to invent a better route to IT careers, then look for the best way to collaborate to identify the best outcomes on a national scale based upon their program content.
CompTIA explains the importance of including training in the soft skills. Holding an advanced degree before training for a technical specialty helps ensure successful application of new skills in the currently demanding environment. Before the introduction of IT-Ready, the workforce development program incorporated a mainly online education model. They say that while appropriate for some individuals who were able to springboard into their first paid IT role, that program failed to lead to IT work for most participants. The online program lacked coaching in job-seeking skills and was missing an employer component. Creating IT Futures was more successful when coaching in the soft skills was introduced.
While it may be easy to summarize that the future of the information security industry is growing and remains brighter than ever, the future of training in information security is scattered, chaotic, and likely to experience pressure as security professionals and those preparing for careers from other IT sectors try to sort out a direction for healthy career growth.
Many employers in the field, such as Cisco, and many other industry leaders have in-house programs in line with their own career paths. Other certifications come from corporate or government agencies or professional organizations providing certification. Still others provide training offered by outsourcing certification programs to a firm such as CompTIA. They can design a custom program or adapt a program to meet an employer's needs. And where training has become part of the job description, it is possible to imagine an employer who distributes training vouchers as a routine employee benefit. So much the better. In the meantime, we should look for more uniformity among programs and more cooperation among course providers to reduce chaos. But in this piece of the industry, we are always playing chess with grand schemers from the hacking universe. They thrive on chaos.
Nina Cunningham, Ph.D., is a member of the Board of Editors of Cybersecurity Law & Strategy, an affiliate of Altman Weil, Inc., and president and CEO of Quidlibet Research Inc., a global strategic planning and cost management firm founded in 1983.
This content has been archived. It is available through our partners, LexisNexis® and Bloomberg Law.
To view this content, please continue to their sites.
Not a Lexis Subscriber?
Subscribe Now
Not a Bloomberg Law Subscriber?
Subscribe Now
NOT FOR REPRINT
© 2025 ALM Global, LLC, All Rights Reserved. Request academic re-use from www.copyright.com. All other uses, submit a request to [email protected]. For more information visit Asset & Logo Licensing.
You Might Like
View AllTrending Stories
- 1States Accuse Trump of Thwarting Court's Funding Restoration Order
- 2Microsoft Becomes Latest Tech Company to Face Claims of Stealing Marketing Commissions From Influencers
- 3Coral Gables Attorney Busted for Stalking Lawyer
- 4Trump's DOJ Delays Releasing Jan. 6 FBI Agents List Under Consent Order
- 5Securities Report Says That 2024 Settlements Passed a Total of $5.2B
Who Got The Work
J. Brugh Lower of Gibbons has entered an appearance for industrial equipment supplier Devco Corporation in a pending trademark infringement lawsuit. The suit, accusing the defendant of selling knock-off Graco products, was filed Dec. 18 in New Jersey District Court by Rivkin Radler on behalf of Graco Inc. and Graco Minnesota. The case, assigned to U.S. District Judge Zahid N. Quraishi, is 3:24-cv-11294, Graco Inc. et al v. Devco Corporation.
Who Got The Work
Rebecca Maller-Stein and Kent A. Yalowitz of Arnold & Porter Kaye Scholer have entered their appearances for Hanaco Venture Capital and its executives, Lior Prosor and David Frankel, in a pending securities lawsuit. The action, filed on Dec. 24 in New York Southern District Court by Zell, Aron & Co. on behalf of Goldeneye Advisors, accuses the defendants of negligently and fraudulently managing the plaintiff's $1 million investment. The case, assigned to U.S. District Judge Vernon S. Broderick, is 1:24-cv-09918, Goldeneye Advisors, LLC v. Hanaco Venture Capital, Ltd. et al.
Who Got The Work
Attorneys from A&O Shearman has stepped in as defense counsel for Toronto-Dominion Bank and other defendants in a pending securities class action. The suit, filed Dec. 11 in New York Southern District Court by Bleichmar Fonti & Auld, accuses the defendants of concealing the bank's 'pervasive' deficiencies in regards to its compliance with the Bank Secrecy Act and the quality of its anti-money laundering controls. The case, assigned to U.S. District Judge Arun Subramanian, is 1:24-cv-09445, Gonzalez v. The Toronto-Dominion Bank et al.
Who Got The Work
Crown Castle International, a Pennsylvania company providing shared communications infrastructure, has turned to Luke D. Wolf of Gordon Rees Scully Mansukhani to fend off a pending breach-of-contract lawsuit. The court action, filed Nov. 25 in Michigan Eastern District Court by Hooper Hathaway PC on behalf of The Town Residences LLC, accuses Crown Castle of failing to transfer approximately $30,000 in utility payments from T-Mobile in breach of a roof-top lease and assignment agreement. The case, assigned to U.S. District Judge Susan K. Declercq, is 2:24-cv-13131, The Town Residences LLC v. T-Mobile US, Inc. et al.
Who Got The Work
Wilfred P. Coronato and Daniel M. Schwartz of McCarter & English have stepped in as defense counsel to Electrolux Home Products Inc. in a pending product liability lawsuit. The court action, filed Nov. 26 in New York Eastern District Court by Poulos Lopiccolo PC and Nagel Rice LLP on behalf of David Stern, alleges that the defendant's refrigerators’ drawers and shelving repeatedly break and fall apart within months after purchase. The case, assigned to U.S. District Judge Joan M. Azrack, is 2:24-cv-08204, Stern v. Electrolux Home Products, Inc.
Featured Firms
Law Offices of Gary Martin Hays & Associates, P.C.
(470) 294-1674
Law Offices of Mark E. Salomone
(857) 444-6468
Smith & Hassler
(713) 739-1250