Survey: More Soft Skills Needed for Security Field

Soft skills are more important than ever when it comes to cybersecurity, according to a recent survey of IT security professionals conducted by Dimensional Research for security and compliance provider Tripwire. Seventy-two percent of respondents in the 2017 Cybersecurity Skills Gap Survey said the need for soft skills has increased over the last two years, and 21 percent went so far as to say that soft skills are more important than technical skills when hiring staff.

The survey broke down five specific soft skills considered most important by respondents:

  • Analytical thinker (cited by 65 percent of respondents);
  • Good communicator (60 percent);
  • Troubleshooter (59 percent);
  • Strong integrity and ethical behavior (58 percent); and
  • Ability to work under pressure (58 percent).

"The cybersecurity industry should not overlook the soft skills that are needed to build a strong security program," said Tim Erlin, vice president of product management and strategy at Tripwire, in a statement. "The reality is that today's security pros need to go beyond technical expertise. Security practitioners need to be good communicators who can connect cybersecurity issues to business priorities, rally the rest of the organization to get involved, solve tough problems and handle sensitive issues with integrity."

The survey respondents also stressed that non-security functions need to participate more in cybersecurity in the future. Among the areas they would like to see more involved:

  • IT operations (cited by 74 percent of respondents);
  • Risk management (60 percent);
  • Compliance (53 percent);
  • Legal (45 percent);
  • Human resources (32 percent); and
  • Marketing (11 percent).

"It's become increasingly apparent that security is a shared responsibility, even for those without any technical cybersecurity experience," commented Erlin. "Employees from other functions can partner with their security teams to help them look at issues from different perspectives, help further the broader organization's understanding of cybersecurity, and help enforce best security practices across the organization."

For more information and an infographic on the survey findings, visit the Tripwire site.

About the Author

Rhea Kelly is editor in chief for Campus Technology, THE Journal, and Spaces4Learning. She can be reached at [email protected].

Featured

  • Analyst or Scientist uses a computer and dashboard for analysis of information on complex data sets on computer.

    Anthropic Study Tracks AI Adoption Across Countries, Industries

    Adoption of AI tools is growing quickly but remains uneven across countries and industries, with higher-income economies using them far more per person and companies favoring automated deployments over collaborative ones, according to a recent study released by Anthropic.

  • businessmen shaking hands behind digital technology imagery

    Microsoft, OpenAI Restructure AI Partnership

    Microsoft and OpenAI announced they are redefining their partnership as part of a major recapitalization effort aimed at preparing for the arrival of artificial general intelligence (AGI).

  • computer monitor displaying a collage of AI-related icons

    Google Advances AI Image Generation with Multi-Modal Capabilities

    Google has introduced Gemini 2.5 Flash Image, marking a significant advancement in artificial intelligence systems that can understand and manipulate visual content through natural language processing.

  • Hand holding a stylus over a tablet with futuristic risk management icons

    Why Universities Are Ransomware's Easy Target: Lessons from the 23% Surge

    Academic environments face heightened risk because their collaboration-driven environments are inherently open, making them more susceptible to attack, while the high-value research data they hold makes them an especially attractive target. The question is not if this data will be targeted, but whether universities can defend it swiftly enough against increasingly AI-powered threats.