Engineering and cybersecurity are two distinct disciplines, each demanding its own rigorous education and training. But should there be crossover? Should engineers or engineering students invest in cybersecurity education as well? What are the opportunities for engineers to gain expertise in protecting against threat actors in the software realm?

As the world becomes more complex and the use of cyberattacks grows, the world of cybersecurity benefits more and more from engineering expertise, and vice versa. Here’s why.

Cybersecurity Education Leads to Options and Job Security

The world of cybersecurity suffers from a skills gap. Businesses, non-profits, schools, government agencies — every sector needs more security experts. And there just aren’t enough to go around. By getting a background from cybersecurity education, engineers open themselves up to a new world of job opportunities. In the job market, security-savvy engineers and engineer-trained security specialists have far more options for career advancement. And, of course, the role of cybersecurity engineer is a great specialty.

Partnerships on Cybersecurity Initiatives

Engineers make great partners for cybersecurity professionals to troubleshoot complex system vulnerabilities and design system-wide strategies for protecting an organization. Adding cybersecurity education to the engineering track just makes that easier.

Engineers get training on, and may have solid knowledge of, many elements present in both fields. Look at numerical methods, simulation, statistical probability, process flow and diagraming and even cost estimation. All of these can be very valuable in developing cybersecurity strategies, methods and plans of action. The complex tasks done in the course of high-level security work benefit from an engineering mindset in a big way.

Build Better Products with Cybersecurity Education

One of the reasons threat actors are able to breach defenses, steal data, destroy reputations and extort money is that the hardware and software products everyone uses aren’t always as secure as they could be. Case in point: many IoT devices ship with insecure default passwords or settings, creating an enormous burden on security people as these devices become more common in the workplace and the home.

Product designers add breadth to their skills if they have a grasp of the basics of cyber engineering and cybersecurity. For example, software engineer training should include a thorough knowledge of cybersecurity topics. And even if the formal training is lacking, a software developer’s career path will be enhanced and boosted by security knowledge. For many software developer specialties, certifications and training in cybersecurity are gold on resumes.

The world needs far more secure software development. If more engineers were required to consider the realities of cybersecurity, we might end up with products that are more secure by design.

Cybersecurity Education and Future Leadership Training

As careers advance, just about any person can advance to a leadership position. While cybersecurity training is lacking in engineering education in general, it’s also lacking in the c-suite. Engineers who evolve from team leaders to department heads to leadership would bring a lot more to the table if they arrived with a solid grasp of cybersecurity to inform their decisions.

The truth is that cybersecurity training for engineers is a great idea at the university level and as a mid-career enhancement.

This industry is rapidly changing, hand in hand with the tech it works with. But one thing that is certain is that training and education in cybersecurity will always be worth it for engineers.

More from Risk Management

What should Security Operations teams take away from the IBM X-Force 2024 Threat Intelligence Index?

3 min read - The IBM X-Force 2024 Threat Intelligence Index has been released. The headlines are in and among them are the fact that a global identity crisis is emerging. X-Force noted a 71% increase year-to-year in attacks using valid credentials.In this blog post, I’ll explore three cybersecurity recommendations from the Threat Intelligence Index, and define a checklist your Security Operations Center (SOC) should consider as you help your organization manage identity risk.The report identified six action items:Remove identity silosReduce the risk of…

Obtaining security clearance: Hurdles and requirements

3 min read - As security moves closer to the top of the operational priority list for private and public organizations, needing to obtain a security clearance for jobs is more commonplace. Security clearance is a prerequisite for a wide range of roles, especially those related to national security and defense.Obtaining that clearance, however, is far from simple. The process often involves scrutinizing one’s background, financial history and even personal character. Let’s briefly explore some of the hurdles, expectations and requirements of obtaining a…

Ransomware payouts hit all-time high, but that’s not the whole story

3 min read - Ransomware payments hit an all-time high of $1.1 billion in 2023, following a steep drop in total payouts in 2022. Some factors that may have contributed to the decline in 2022 were the Ukraine conflict, fewer victims paying ransoms and cyber group takedowns by legal authorities.In 2023, however, ransomware payouts came roaring back to set a new all-time record. During 2023, nefarious actors targeted high-profile institutions and critical infrastructure, including hospitals, schools and government agencies.Still, it’s not all roses for…

Topic updates

Get email updates and stay ahead of the latest threats to the security landscape, thought leadership and research.
Subscribe today