A computer science degree isn’t the only path into a cybersecurity career.
Degrees for Cybersecurity- The gap between trained cybersecurity professionals and need is on the order of 4 million people worldwide, and yet not nearly enough students are in computer science and cybersecurity university programs around the world to bridge that gap. One solution, some say, is to look beyond the traditional computer science/cybersecurity academic pipeline for entry-level professionals.
In fact, “About 58% of cybersecurity professionals come from fields outside technology,” says Wesley Simpson, COO of ISC(2). “Cast a big net. We need people from all different backgrounds and degrees.”
The big question is: Which degree programs are worthy of consideration?
For practical reasons, Simpson points to the liberal arts. The frequent stories of cybersecurity teams not getting management support for the tools and personnel they need comes down to not effectively telling the cybersecurity story, he says. That’s where liberal arts grads can help.
“The liberal arts people are better at telling the story, crafting the story, and talking to all the people they need to talk with to build the story,” Simpson says. “We need people from all over the spectrum to tell the story.”
Beyond the budget story, individuals from different academic and personal backgrounds can bring critical new perspectives to cybersecurity, which is “key to forming a concrete and inclusive analysis,” says Harrison Van Riper, strategy and research analyst at Digital Shadows. “Whether you’re conducting an investigation of a threat actor or performing incident response, it’s important to understand all of the different views and perspectives that may be impacted.”
Dan Basile, executive director of the security operations center at Texas A&M University, agrees. “We all need a greater diversity of thought and background, in addition to traditional diversity concerns, in order to attack the complex problems we face,” he explains. “All nontechnical majors have something that is of value to the cybersecurity field.”