Security Magazine logo
  • Sign In
  • Create Account
  • Sign Out
  • My Account
  • NEWS
  • MANAGEMENT
  • PHYSICAL
  • CYBER
  • BLOG
  • COLUMNS
  • EXCLUSIVES
  • SECTORS
  • EVENTS
  • MEDIA
  • MORE
  • EMAG
  • SIGN UP!
cart
facebook twitter linkedin youtube
  • NEWS
  • Security Newswire
  • Technologies & Solutions
  • MANAGEMENT
  • Leadership Management
  • Enterprise Services
  • Security Education & Training
  • Logical Security
  • Security & Business Resilience
  • Profiles in Excellence
  • PHYSICAL
  • Access Management
  • Fire & Life Safety
  • Identity Management
  • Physical Security
  • Video Surveillance
  • Case Studies (Physical)
  • CYBER
  • Cybersecurity News
  • More
  • COLUMNS
  • Cyber Tactics
  • Leadership & Management
  • Security Talk
  • Career Intelligence
  • Leader to Leader
  • Cybersecurity Education & Training
  • EXCLUSIVES
  • Annual Guarding Report
  • Most Influential People in Security
  • The Security Benchmark Report
  • The Security Leadership Issue
  • Top Guard and Security Officer Companies
  • Top Cybersecurity Leaders
  • Women in Security
  • SECTORS
  • Arenas / Stadiums / Leagues / Entertainment
  • Banking/Finance/Insurance
  • Construction, Real Estate, Property Management
  • Education: K-12
  • Education: University
  • Government: Federal, State and Local
  • Hospitality & Casinos
  • Hospitals & Medical Centers
  • Infrastructure:Electric,Gas & Water
  • Ports: Sea, Land, & Air
  • Retail/Restaurants/Convenience
  • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
  • Industry Events
  • Webinars
  • Solutions by Sector
  • Security 500 Conference
  • MEDIA
  • Videos
  • Podcasts
  • Polls
  • Photo Galleries
  • Videos
  • Cybersecurity & Geopolitical Discussion
  • Ask Me Anything (AMA) Series
  • MORE
  • Call for Entries
  • Classifieds & Job Listings
  • Continuing Education
  • Newsletter
  • Sponsor Insights
  • Store
  • White Papers
  • EMAG
  • eMagazine
  • This Month's Content
  • Advertise
Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
CybersecurityManagementSectorsSecurity Leadership and ManagementCybersecurity NewsEducation:University

Cybersecurity Education Goes Broad

Future cybersecurity leaders need a wider set of skills and knowledge.

By Adam Stone
SEC0119-degree-Feat-slide1_900px
SEC0119-degree-slide2_900px

Juniper Networks CISO and IT Vice President Sherry Ryan attributes her success in security in part to her early experience on the marketing side. “It’s important to understand your organization’s business and its processes, priorities and dependencies,” she says. “This knowledge enables CISOs to make relevant, prioritized recommendations to protect what matters most to the organization.”

Photo courtesy of Sherry Ryan

SEC0119-degree-slide3_900px

“There is an element in cyber that scoffs at the idea for formal education, but the fact is there is value in these programs,” says ISC2 Director of Cybersecurity Advocacy for North America John McCumber.

Photo courtesy of John McCumber

SEC0119-degree-slide4_900px

Training is going to teach you the technical skills you need, but employers also want to see somebody who has problem-solving skills, who has good communication skills,” says Kathleen Hyde, who chairs Cybersecurity Programs at Champlain College Online.

Photo courtesy of Kathleen Hyde

SEC0119-degree-Feat-slide1_900px
SEC0119-degree-slide2_900px
SEC0119-degree-slide3_900px
SEC0119-degree-slide4_900px
January 4, 2019

When Kathleen Hyde talks about cybersecurity leadership, she talks about breadth. “Training is going to teach you the technical skills you need, but employers also want to see somebody who has problem-solving skills, who has good communication skills,” says Hyde, who chairs Cybersecurity Programs at Champlain College Online.

In a recent national survey, Hyde’s team found strong support for cyber education: 68 percent of adults said that colleges and universities are well-placed to create solutions that address cyber threats. While much of that training will focus on specific cyber skills, Hyde says, educators and employers also need to train cyber leaders in the soft skills.

This theme is gaining traction among corporate IT leaders and those responsible for education and training. Cyber leadership increasingly requires going broad: Building a diversified set of technical skills and augmenting this with a solid grounding in general education and business topics.

“A couple years ago, cyber was all about certifications; it was all about the technical training. There seems to be a growing conversation about the non-technical training,” Hyde says. This may be a result of the evolving role of the cyber leader. “Today you have to be able to translate. You have to be able to talk to the employee who opened that email and shouldn’t have, and then you also have to be able to answer to your board.”

Corporate cyber leaders echo these themes.

“We want well-rounded professionals who understand a broad range of cybersecurity disciplines and who also understand the business side,” says Paige Adams, Group Chief Information Security Officer at Zurich Insurance.

Students in a newly-launched cyber internship program between Zurich and Harper College get technical training, but they also attend business and insurance classes alongside other apprentices participating in the general insurance career track.

                                                                                

Going Wide

Cybersecurity executives looking to develop their teams may face a high hurdle in trying to meet this accelerating call for greater well-roundedness.

Career progress, after all, typically is measured at least in part by the number of technical certifications one accumulates. Cyber degree tracks and professional training opportunities likewise are structured around the accumulation of additional technical skills and credentials.

How to broaden that experience? For those looking to climb the career ladder in cyber, and for cyber chiefs looking to build more effective teams, some say a possible fix lies in the liberal arts. Even leaders at certification body ISC2 suggest that a solid undergrad experience can do much to augment one’s cyber capabilities.

“There is an element in cyber that scoffs at the idea for formal education, but the fact is there is value in these programs,” says ISC2 Director of Cybersecurity Advocacy for North America John McCumber.

 “Not everything can be solved with an algorithm. Rather than scoff at people who have taken liberal arts classes, we need to reevaluate the role of that kind of education. People need to build up their knowledge. Philosophy, art, the ability to understand the sweep and impact of history: Technology changes, but the problems mankind has to deal with pretty much remain the same,” he says.

It’s this same logic that drives Zurich to insist that interns experience multiple aspects of the business, beyond just the IT shop. “Cyber isn’t just a technology challenge, it’s also a business challenge, and people need to understand how our security decisions can have broader implications in a business context,” Adams says.

Juniper Networks CISO and IT Vice President Sherry Ryan attributes her success in security in part to her early experience on the marketing side. “It’s important to understand your organization’s business and its processes, priorities and dependencies,” she says. “This knowledge enables CISOs to make relevant, prioritized recommendations to protect what matters most to the organization.”

At the same time, top cyber players also need a broader understanding of the computer systems to whose care and feeding they daily attend. Colleges and universities can help with that.

“Before you can learn about security you have to know about operating systems, programming, distributed systems, networking,” says Dr. Giovanni Vigna, director of UC Santa Barbara’s Center for Cybersecurity.

                “These things are not necessarily related to security, but they provide you with building blocks for addressing new security challenges as they arise,” he says. “More than just skills, we want you to have the meta-skill of being able to acquire new knowledge. Without that, you are just someone who uses tools, who knows what to click.”

This wide-reaching technical understanding is critical for those who manage IT security, says Dana Simberkoff, Chief Risk, Privacy and Information Security Officer at IT provider AvePoint. “Understanding the intersecting and sometimes opposing obligations you may have, along with what can and cannot be automated, is incredibly important to not only cyber leaders’ organizations, but also to their own professional development,” Simberkoff says. “Regulators require that companies say what they do, do what they say and be able to prove it. If a company is writing policies that don’t reflect its reality, it is putting itself at risk.”

 

Workforce Diversity

Just as individual cyber leaders must possess a diverse set of skills and experiences, the cyber workforce overall also needs to become more diverse. The narrative of breadth in cyber includes broadening the workforce as a whole.

ISC2 reports only 14 percent of cybersecurity professionals in North America are women, and many IT leaders see room for improvement.

Simberkoff suggests companies could enhance cyber training and education by implementing an internal social media platform where women in cyber can network. “Such systems are a great avenue for women to give and receive recognition for the value they add to their companies. Women should be proud to promote the importance of their roles and ensure leadership is aware of their work, as well as the work of their female peers,” she says.

Ryan likewise stresses the value of interpersonal relationships in helping to diversify the top tiers in cyber. “Staying connected to my network of cybersecurity professionals and engaging up-and-coming talent is another way I can help advance and promote our industry while getting fresh thinking on issues we’re all facing,” she says.

Hyde says educators also can help to move the needle.

“I find in talking with some of my students who are women that they lack confidence,” she says. Because many have been discouraged from pursuing technical careers, “they might not think they have what it takes. I think the biggest thing is to encourage them. I know it sounds very simplistic, but I really think that a lot of it comes down to encouraging women to just do it.”

KEYWORDS: cybersecurity education security career security degrees security leaders

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Adam Stone is a contributing writer for Security magazine. He has covered IT issues in the public and private sectors for more than 20 years. In addition to following security trends, he writes on military technology, education-tech, government IT and diverse others issues.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Security's Top Cybersecurity Leaders 2024

    Security's Top Cybersecurity Leaders 2024

    Security magazine's Top Cybersecurity Leaders 2024 award...
    Security Leadership and Management
    By: Security Staff
  • cyber brain

    The intersection of cybersecurity and artificial intelligence

    Artificial intelligence (AI) is a valuable cybersecurity...
    Columns
    By: Pam Nigro
  • artificial intelligence AI graphic

    Assessing the pros and cons of AI for cybersecurity

    Artificial intelligence (AI) has significant implications...
    Technologies & Solutions
    By: Charles Denyer
Subscribe For Free!
  • Security eNewsletter & Other eNews Alerts
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

The Money Laundering Machine: Inside the global crime epidemic - Episode 24

The Money Laundering Machine: Inside the global crime epidemic - Episode 24

Middle East Escalation, Humanitarian Law and Disinformation – Episode 25

Middle East Escalation, Humanitarian Law and Disinformation – Episode 25

Security’s Top 5 – 2024 Year in Review

Security’s Top 5 – 2024 Year in Review

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • Crisis Response Team
    Sponsored byEverbridge

    Automate or Fall Behind – Crisis Response at the Speed of Risk

  • Perimeter security
    Sponsored byAMAROK

    Why Property Security is the New Competitive Advantage

  • Duty of Care
    Sponsored byAMAROK

    Integrating Technology and Physical Security to Advance Duty of Care

Popular Stories

Internal computer parts

Critical Software Vulnerabilities Rose 37% in 2024

Coding

AI Emerges as the Top Concern for Security Leaders

Half open laptop

“Luigi Was Right”: A Look at the Website Sharing Data on More Than 1,000 Executives

Person working on laptop

Governance in the Age of Citizen Developers and AI

patient at healthcare reception desk

Almost Half of Healthcare Breaches Involved Microsoft 365

2025 Security Benchmark banner

Events

June 24, 2025

Inside a Modern GSOC: How Anthropic Benchmarks Risk Detection Tools for Speed and Accuracy

For today's security teams, making informed decisions in the first moments of a crisis is critical.

August 27, 2025

Risk Mitigation as a Competitive Edge

In today’s volatile environment, a robust risk management strategy isn’t just a requirement—it’s a foundation for organizational resilience. From cyber threats to climate disruptions, the ability to anticipate, withstand, and adapt to disruption is becoming a hallmark of industry leaders.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • SEC0719-Profile-Feat-slide1_900px

    Safeguarding Security and Loss Prevention at Gap Inc.

    See More
  • SEC0918-video-feature-slide1_900px

    Cyber-Securing Video Cameras

    See More
  • SEC0419-recruit-feat-slide1_900px

    How to Find Talent in a Tough Job Market

    See More
×
Juniper Networks CISO and IT Vice President Sherry Ryan attributes her success in security in part to her early experience on the marketing side. “It’s important to understand your organization’s business and its processes, priorities and dependencies,” she says. “This knowledge enables CISOs to make relevant, prioritized recommendations to protect what matters most to the organization.” Photo courtesy of Sherry Ryan
“There is an element in cyber that scoffs at the idea for formal education, but the fact is there is value in these programs,” says ISC2 Director of Cybersecurity Advocacy for North America John McCumber. Photo courtesy of John McCumber
Training is going to teach you the technical skills you need, but employers also want to see somebody who has problem-solving skills, who has good communication skills,” says Kathleen Hyde, who chairs Cybersecurity Programs at Champlain College Online. Photo courtesy of Kathleen Hyde

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • eNewsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing

Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!