Top In-Demand Cybersecurity Skills in the Upcoming Years

Security Matthias Maier

Hey there,

We recently ran a series of webinars* on how different-sized cybersecurity teams modernized their security operations and embedded polling questions within the webinars to gather some feedback. A set of possible answers was selected based on the ENISA NIS Investments report. In this blog post I’d like to share the results of the polls and the conclusions we can draw from them.

The Right Skills, Processes and Technology with the Right Data

When establishing or modernizing security operations across an organization to make it become more resilient, two important elements are needed:

  1. People with the right skills
  2. Processes and technology with the right data

Skills Decreasing in Value

Skills that have been in high demand in recent years are now decreasing in value. They include:

Skills Increasing in Value

With many traditional cybersecurity tasks giving way to automation, what know-how still makes cybersecurity professionals indispensable in their field? Fortunately, there is still plenty according to ENISA. I have personally enjoyed many of them for years and they are also a reflection of our security strategy here at Splunk. The key cybersecurity competencies ENISA identified as the winners in the years ahead are:

What is the Number One Cybersecurity Skill that any Security Department will need?

When deciding to advance your skill set you may be confronted with a choice between the ISACA CISM Course (Risk Management), the Splunk Developing SOAR Playbooks Course (Incident Response) and the Splunk For Data Analytics and Data Science Training (Data Science and Analysis).

Let’s take a look at the results of our poll, listing the focus skills by priority.:

In-demand cybersecurity skills

Insights into the Security Operations Maturity

In order to dive deeper into maturity levels we asked two additional questions. These questions were aligned with two modernization stories we talked about in our webinar 5 Security Modernization Stories: What Our Customers Taught Us In 2020.

In the first story, Skyscanner shared how crucial it was for them to enrich their data with context such as “To which project belongs an EC2 instance on AWS”, ”What is the criticality of an IP Address” or “Is a highly privileged user behind a certain username”. It is not a big surprise that most participants of our poll considered enriching data and adding context to security alerts to be very important. Fortunately, these best practise enrichment concepts are built into Splunk Enterprise Security.

In the second modernization story Norlys talked about how they increased efficiency with Splunk Phantom and their playbooks. They shared how they measured their improvements with different KPIs such as Mean Time to Detect, Respond, Contain, Recover and Closure. The poll also revealed that the majority of organizations measure more than 5 KPIs in security operations.

Top In-demand cybersecurity skills

Hope this gave you some valuable insight to help you plan and take your security operations to the next level.

Cheers,

Matthias

*The majority of webinar attendees had job titles such as CISO, Head of Information Security, SOC Product Owner or Cyber Security Team Lead.

Related Articles

Splunk SOAR 6.2 Introduces New Automation Features, Workload Migration, and Firewall Integrations
Security
3 Minute Read

Splunk SOAR 6.2 Introduces New Automation Features, Workload Migration, and Firewall Integrations

Announcing the release of Splunk SOAR 6.2 with features like logic loops for playbooks, integrations with CyberArk, two new firewall apps, and a new conversion option for classic playbooks.
Delivering the Ultimate SOC Analyst Experience: Ending Fatigue with Splunk Enterprise Security
Security
5 Minute Read

Delivering the Ultimate SOC Analyst Experience: Ending Fatigue with Splunk Enterprise Security

End SOC analyst fatigue with Splunk Enterprise Security. Discover how unified TDIR, Agentic AI, and automation transform security operations, streamline investigations, and empower your team.
From Registry With Love: Malware Registry Abuses
Security
13 Minute Read

From Registry With Love: Malware Registry Abuses

The Splunk Threat Research Team explores the common Windows Registry abuses leveraged by current and relevant malware families in the wild and how to detect them.