Security Magazine logo
  • Sign In
  • Create Account
  • Sign Out
  • My Account
  • NEWS
  • MANAGEMENT
  • PHYSICAL
  • CYBER
  • BLOG
  • COLUMNS
  • EXCLUSIVES
  • SECTORS
  • EVENTS
  • MEDIA
  • MORE
  • EMAG
  • SIGN UP!
cart
facebook twitter linkedin youtube
  • NEWS
  • Security Newswire
  • Technologies & Solutions
  • MANAGEMENT
  • Leadership Management
  • Enterprise Services
  • Security Education & Training
  • Logical Security
  • Security & Business Resilience
  • Profiles in Excellence
  • PHYSICAL
  • Access Management
  • Fire & Life Safety
  • Identity Management
  • Physical Security
  • Video Surveillance
  • Case Studies (Physical)
  • CYBER
  • Cybersecurity News
  • More
  • COLUMNS
  • Cyber Tactics
  • Leadership & Management
  • Security Talk
  • Career Intelligence
  • Leader to Leader
  • Cybersecurity Education & Training
  • EXCLUSIVES
  • Annual Guarding Report
  • Most Influential People in Security
  • The Security Benchmark Report
  • The Security Leadership Issue
  • Top Guard and Security Officer Companies
  • Top Cybersecurity Leaders
  • Women in Security
  • SECTORS
  • Arenas / Stadiums / Leagues / Entertainment
  • Banking/Finance/Insurance
  • Construction, Real Estate, Property Management
  • Education: K-12
  • Education: University
  • Government: Federal, State and Local
  • Hospitality & Casinos
  • Hospitals & Medical Centers
  • Infrastructure:Electric,Gas & Water
  • Ports: Sea, Land, & Air
  • Retail/Restaurants/Convenience
  • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
  • Industry Events
  • Webinars
  • Solutions by Sector
  • Security 500 Conference
  • MEDIA
  • Videos
  • Podcasts
  • Polls
  • Photo Galleries
  • Videos
  • Cybersecurity & Geopolitical Discussion
  • Ask Me Anything (AMA) Series
  • MORE
  • Call for Entries
  • Classifieds & Job Listings
  • Continuing Education
  • Newsletter
  • Sponsor Insights
  • Store
  • White Papers
  • EMAG
  • eMagazine
  • This Month's Content
  • Advertise
Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
CybersecuritySecurity NewswireSecurity Leadership and ManagementSecurity Education & Training

Cybersecurity professionals to newcomers: Focus on vendor-neutral certifications

Cybersecurity certifications: what's the worth?
July 23, 2021

This preference suggests that even though current professionals followed a more traditional, vendor-specific path when gaining experience in the field (55% of current professionals entered cybersecurity from IT backgrounds), they see greater value in pursuing broader professional qualifications for people starting their careers now. This is a perspective that may be informed by their own lessons learned over the years.

Cybersecurity professionals also emphasize the importance of cloud security in recommending certifications for pursuers. This is smart, practical advice considering most IT environments are hybrids or increasingly cloud-first with multiple private and public clouds.

Pursuers Study

The Pursuers Study polled 2,034 cybersecurity professionals and cybersecurity jobseekers (pursuers) in the U.S. and Canada with the goal of advising organizations on developing effective recruitment and professional development strategies. Respondents were almost evenly divided between professionals (1,024) and pursuers (1,010).

Professionals tend to be highly educated: 73% hold a bachelor’s degree, including 40% with a master’s. Professionals with up to three years of cybersecurity experience have an average of five certifications or certificates from three organizations. In contrast, those with three to seven years of experience hold an average of nine certifications or certificates from four organizations.

Those credentials involve a wide variety of vendors and organizations, but the two vendors with the greatest reach are Cisco (39% of respondents) and Microsoft (37%). Amazon Web Services (AWS) and Google Cloud are tied for third place, at 22%, and closely followed by IBM (21%). The list also includes vendors Oracle, McAfee, Symantec and VMware, as well as organizations such as CSA (Cloud Security Alliance), ASIS International, CompTIA, ISACA and (ISC)².

Vendor-Neutral Preferred

Even though the vendor-specific credentials professionals have earned outnumber those from independent bodies, of the 200 credentials or professional designations respondents had to choose from, four of the top five they recommend for pursuers are vendor-neutral, including three from (ISC)²:

  1. Associate of (ISC)² (pursuing the CCSP) – (ISC)²
  2. Associate of (ISC)² (pursuing the CISSP) – (ISC)²
  3. CCSE Check Point Certified Security Expert – Check Point Software
  4. CCSP Certified Cloud Security Professional – (ISC)²
  5. CPP Associate Protection Professional – ASIS

Despite the strong showing of (ISC)² certifications and its Associate of (ISC)² designation, only 6% of professionals in the study hold a certification from the organization. This suggests that based on their own experience and observation, they see value in those certifications. Early in their careers, professionals likely were steered toward vendor-specific certificates to prove their expertise to support the systems and solutions deployed within their organizations. As the cybersecurity profession has evolved, it has largely been shaped by necessity rather than formal, standards-based education and career advancement pathways.

Recommendations to focus on vendor-neutral credentials suggest a new way of thinking for veteran professionals, with an “if they had to do it again” subtext. Further evidence is the fact that the certifications professionals are pursuing for themselves tend toward the vendor-neutral type, even though Check Point Certified Security Expert tops their list.

Cloud Gets Stronger

Professionals also expressed significant interest in cloud security skills – both for themselves and for those trying to get into the field. Cloud certifications and certificates account for one-third of the top 20 list of recommendations (bolded below) for pursuers, and appear in two of the top five slots:

Top 20 Certifications Cybersecurity Professionals Recommend for Pursuers

  1. Associate of (ISC)² (pursuing the CCSP, Certified Cloud Security Professional) – (ISC)²
  2. Associate of (ISC)² (pursuing the CISSP, Certified Information Systems Security Professional) –(ISC)²
  3. CCSE Check Point Certified Security Expert – Check Point Software
  4. CCSP Certified Cloud Security Professional – (ISC)²
  5. CPP Associate Protection Professional – ASIS
  6. Professional Cloud Security Engineer – Google Cloud
  7. AWS Certified Security - Specialty - AWS
  8. CISSP Certified Information Systems Security Professional - (ISC)²
  9. CCSA Check Point Certified Security Administrator - Check Point Software
  10. APP Certified Protection Professional - ASIS International
  11. Associate CSSLP Certified Secure Software Lifecycle Professional - (ISC)²
  12. PCI Professional Certified Investigator - ASIS
  13. CCSK Certificate of Cloud Security Knowledge – Cloud Security Alliance
  14. AWS Certified DevOps Engineer- Professional - AWS
  15. CCA-N Citrix Certified Associate - Networking - CITRIX
  16. CCIE Security - CISCO
  17. Associate SSCP Systems Security Certified Practitioner - (ISC)²
  18. CCAK Certificate of Cloud Auditing Knowledge – Cloud Security Alliance
  19. AWS Certified Cloud Practitioner – AWS
  20. Associate of (ISC)² (pursuing the HCISPP HealthCare Information Security and Privacy Practitioner) - (ISC)²

The cloud focus is a reflection on the reality of today’s IT environments. Nearly all organizations (96%) currently use the cloud, mostly in a combination of public and private clouds. Therefore, the need to acquire and prove cloud security skills is inevitable for anyone entering the industry. In planning their careers, it makes sense for newcomers to pursue cloud-related skills, especially security.

The cloud emphasis reflects earlier (ISC)² research. In the 2020 Cybersecurity Workforce Study, professionals across all roles, age brackets and organization sizes cited cloud security as a priority skill to acquire.

Conclusion

Professionals’ certification recommendations provide valuable clues for organizations in shaping their recruitment programs and preparing job descriptions. It’s clear that professionals are drawing on lessons learned early in their careers to provide meaningful advice to pursuers.

Employers would do well to heed that advice in building their cybersecurity teams, and that includes deciding what certifications to prioritize. Just as importantly, employers should recognize that new recruits are likely to hold no certifications and will need to earn them while on the job. Offering them a career path that includes help with earning certifications benefits both employee and employer, so that together they can build the best cybersecurity team possible.

KEYWORDS: cyber security cybersecurity careers cybersecurity leadership cybersecurity training

Share This Story

Blog Topics

Security Blog

On the Track of OSAC

Blog Roll

Security Industry Association

Security Magazine's Daily News

SIA FREE Email News

SDM Blog

Subscribe For Free!
  • Security eNewsletter & Other eNews Alerts
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

The Money Laundering Machine: Inside the global crime epidemic - Episode 24

The Money Laundering Machine: Inside the global crime epidemic - Episode 24

Middle East Escalation, Humanitarian Law and Disinformation – Episode 25

Middle East Escalation, Humanitarian Law and Disinformation – Episode 25

Security’s Top 5 – 2024 Year in Review

Security’s Top 5 – 2024 Year in Review

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • Crisis Response Team
    Sponsored byEverbridge

    Automate or Fall Behind – Crisis Response at the Speed of Risk

  • Perimeter security
    Sponsored byAMAROK

    Why Property Security is the New Competitive Advantage

  • Duty of Care
    Sponsored byAMAROK

    Integrating Technology and Physical Security to Advance Duty of Care

Popular Stories

Internal computer parts

Critical Software Vulnerabilities Rose 37% in 2024

Coding

AI Emerges as the Top Concern for Security Leaders

Half open laptop

“Luigi Was Right”: A Look at the Website Sharing Data on More Than 1,000 Executives

Person working on laptop

Governance in the Age of Citizen Developers and AI

patient at healthcare reception desk

Almost Half of Healthcare Breaches Involved Microsoft 365

2025 Security Benchmark banner

Events

June 24, 2025

Inside a Modern GSOC: How Anthropic Benchmarks Risk Detection Tools for Speed and Accuracy

For today's security teams, making informed decisions in the first moments of a crisis is critical.

August 27, 2025

Risk Mitigation as a Competitive Edge

In today’s volatile environment, a robust risk management strategy isn’t just a requirement—it’s a foundation for organizational resilience. From cyber threats to climate disruptions, the ability to anticipate, withstand, and adapt to disruption is becoming a hallmark of industry leaders.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • eNewsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing

Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!