Engineering and cybersecurity are two distinct disciplines, each demanding its own rigorous education and training. But should there be crossover? Should engineers or engineering students invest in cybersecurity education as well? What are the opportunities for engineers to gain expertise in protecting against threat actors in the software realm?

As the world becomes more complex and the use of cyberattacks grows, the world of cybersecurity benefits more and more from engineering expertise, and vice versa. Here’s why.

Cybersecurity Education Leads to Options and Job Security

The world of cybersecurity suffers from a skills gap. Businesses, non-profits, schools, government agencies — every sector needs more security experts. And there just aren’t enough to go around. By getting a background from cybersecurity education, engineers open themselves up to a new world of job opportunities. In the job market, security-savvy engineers and engineer-trained security specialists have far more options for career advancement. And, of course, the role of cybersecurity engineer is a great specialty.

Partnerships on Cybersecurity Initiatives

Engineers make great partners for cybersecurity professionals to troubleshoot complex system vulnerabilities and design system-wide strategies for protecting an organization. Adding cybersecurity education to the engineering track just makes that easier.

Engineers get training on, and may have solid knowledge of, many elements present in both fields. Look at numerical methods, simulation, statistical probability, process flow and diagraming and even cost estimation. All of these can be very valuable in developing cybersecurity strategies, methods and plans of action. The complex tasks done in the course of high-level security work benefit from an engineering mindset in a big way.

Build Better Products with Cybersecurity Education

One of the reasons threat actors are able to breach defenses, steal data, destroy reputations and extort money is that the hardware and software products everyone uses aren’t always as secure as they could be. Case in point: many IoT devices ship with insecure default passwords or settings, creating an enormous burden on security people as these devices become more common in the workplace and the home.

Product designers add breadth to their skills if they have a grasp of the basics of cyber engineering and cybersecurity. For example, software engineer training should include a thorough knowledge of cybersecurity topics. And even if the formal training is lacking, a software developer’s career path will be enhanced and boosted by security knowledge. For many software developer specialties, certifications and training in cybersecurity are gold on resumes.

The world needs far more secure software development. If more engineers were required to consider the realities of cybersecurity, we might end up with products that are more secure by design.

Cybersecurity Education and Future Leadership Training

As careers advance, just about any person can advance to a leadership position. While cybersecurity training is lacking in engineering education in general, it’s also lacking in the c-suite. Engineers who evolve from team leaders to department heads to leadership would bring a lot more to the table if they arrived with a solid grasp of cybersecurity to inform their decisions.

The truth is that cybersecurity training for engineers is a great idea at the university level and as a mid-career enhancement.

This industry is rapidly changing, hand in hand with the tech it works with. But one thing that is certain is that training and education in cybersecurity will always be worth it for engineers.

More from Risk Management

Back to basics: Better security in the AI era

4 min read - The rise of artificial intelligence (AI), large language models (LLM) and IoT solutions has created a new security landscape. From generative AI tools that can be taught to create malicious code to the exploitation of connected devices as a way for attackers to move laterally across networks, enterprise IT teams find themselves constantly running to catch up. According to the Google Cloud Cybersecurity Forecast 2024 report, companies should anticipate a surge in attacks powered by generative AI tools and LLMs…

Mapping attacks on generative AI to business impact

5 min read - In recent months, we’ve seen government and business leaders put an increased focus on securing AI models. If generative AI is the next big platform to transform the services and functions on which society as a whole depends, ensuring that technology is trusted and secure must be businesses’ top priority. While generative AI adoption is in its nascent stages, we must establish effective strategies to secure it from the onset. The IBM Institute for Business Value found that despite 64%…

Ermac malware: The other side of the code

6 min read - When the Cerberus code was leaked in late 2020, IBM Trusteer researchers projected that a new Cerberus mutation was just a matter of time. Multiple actors used the leaked Cerberus code but without significant changes to the malware. However, the MalwareHunterTeam discovered a new variant of Cerberus — known as Ermac (also known as Hook) — in late September of 2022.To better understand the new version of Cerberus, we can attempt to shed light on the behind-the-scenes operations of the…

Topic updates

Get email updates and stay ahead of the latest threats to the security landscape, thought leadership and research.
Subscribe today