Download as pdf or txt
Download as pdf or txt
You are on page 1of 13

Technology in Society 67 (2021) 101769

Contents lists available at ScienceDirect

Technology in Society
journal homepage: www.elsevier.com/locate/techsoc

The cybersecurity labour shortage in Europe: Moving to a new concept for


education and training☆
Borka Jerman Blažič
Laboratory for Open Systems and Network, Jožef Stefan Institute, Jamova 39, Ljubljana, Slovenia

A R T I C L E I N F O A B S T R A C T

Keywords: Recruiting, retaining and maintaining sufficient numbers of cybersecurity professionals in the workplace is a
Cybersecurity skills constant battle, not only for the technical side of cybersecurity, but also for the overlooked area of non-technical,
Cybersecurity knowledge managerial-related jobs in the cyber sector. This paper addresses the lack of cybersecurity skills in the European
Market skill shortage
labour force market and the actions taken to improve the education in cybersecurity for meeting the identified
Cybersecurity educational ecosystem in EU
Accreditation and certification
needs. The paper analyses what kind of topics are missing within the cybersecurity curricula of the high-level
educational institutions in Europe and in the courses provided by the cybersecurity trainers on the market.
The findings are based on the data collected by the surveys carried out by the European competence centres on
cybersecurity and the European CyberSecurity organization. These findings show that there are missing topics in
the context of higher education cybersecurity programmes and within the private courses offered on the market.
The problem of common programme accreditation of European higher education institutes (HEI) and the
competence certifications for different work profiles in the area of cybersecurity are briefly presented and dis­
cussed as well. The actions undertaken to improve the education in both sectors are presented and the emerging
educational landscape is proposed based on our findings. Recommendations to the stakeholders and scholars for
improving the current state of cybersecurity education and training are explained in the concluding section.

1. Introduction appears within the organizational, human and social aspects of the
business processes. This finding is now driving long-term changes in the
Cybersecurity has increasingly been a headline feature in news approach to how cybersecurity risk should be managed and by whom,
media in recent years, generally prompted by spectacular breaches of especially within SMEs. The importance of cybersecurity knowledge is
various information systems, including airlines, health organizations, now recognized widely, but the need for its widespread application
credit agencies, administrations, financial institutions, telecoms and depends on the cybersecurity skills possessed by the work force. The
many others [1]. Until recently, cybersecurity was viewed as an ICT main identified problem today is the lack of cybersecurity skills among
challenge, rather than a business risk. Cybersecurity is a part of the the work force, which is estimated globally to be about 3 million
management with a task to minimize the risk to an organization’s cy­ workers, according to cybersecurity workforce studies for the years
berspace and prevent any cybersecurity incident. Despite the warnings 2018 and 2019 [4,5]. In that context, skills are understood to represent a
by cybersecurity experts, it has taken many years of cyber-attacks and combination of abilities, knowledge, and experience that enable an in­
losses caused to many kinds of enterprises in different sectors this view dividual to complete a task well [6]. The identified extreme shortage of
to be changed. Many large, reputable companies have several times qualified cybersecurity professionals has had an impact on the market
announced huge losses arising from different incidents in various lag in meeting the demand that started to occur in the past decade
economies, including infrastructure sectors like traffic, health, energy following the intensive digitalisation of the society. Larger, wealthier
and water supply [2]. Although smaller companies (SMEs) have not organizations and service providers are able to attract talent and pay for
reported such incidents regularly, they are also frequently victims of external professional security support from cybersecurity experts and
cyber-attacks [3]. From being mainly a problem for ICT professionals, purchase the appropriate technology for protection of their digital as­
cybersecurity has today become an acknowledged business risk as it sets, infrastructure and business processes. This left the smaller


Position: full professor at International postgraduate school Jožef Stefan leading the program: Advanced internet technologies, member of the Laboratory for
Open system and Networks of Jožef Stefan Institute.
E-mail address: borka@e5.ijs.si.

https://doi.org/10.1016/j.techsoc.2021.101769
Received 4 July 2021; Received in revised form 15 September 2021; Accepted 23 September 2021
Available online 28 September 2021
0160-791X/© 2021 The Author(s). Published by Elsevier Ltd. This is an open access article under the CC BY license (http://creativecommons.org/licenses/by/4.0/).
B.J. Blažič Technology in Society 67 (2021) 101769

companies and non-profit organizations struggling to attract experts diverse needs in this field that have developed with the digitalisation,
with knowledge and skills that would allow them to run their businesses which should be used to shape the curriculum of cybersecurity educa­
safely. Their problem is in the shortage of cybersecurity skilled work­ tional programmes. The rapid evolution of cybersecurity attacks coupled
force on the market and the rise of the experts salary. These needs and with the static nature of academia has contributed to the emerging
findings are backed by the results of a large workforce study by the discrepancies between the knowledge taught in educational pro­
Cybersecurity Certification and Training Organization and other in­ grammes and the skills expected by employers, thereby contributing to
stitutions [7]. the growing gap in the skills of cybersecurity professionals [17,18]. The
Failure to address this problem impacts negatively on the capacity of need to build and upgrade the knowledge, skills and capacity in the area
the business sector and other parts of the modern, digitized society to of cybersecurity has led to the establishment of a number of strategic
successfully react to the rising number of cybercrime cases [8]. Cyber­ policy initiatives by several governments like by the UK Cabinet Office
security skills are becoming very important as the digital economy’s [19] ] along with the setting up of cybersecurity competence centres at
winners and losers will be determined by who has these skills. The Eu­ the European Union level. CEN (Comité Européen de Normalisation) has
ropean Union (EU) General Data Protection Regulation (GDPR) that provided recently in 2020 certification schemes for cybersecurity skills
came into effect in May 2018 requires much more attention to be paid to and competences based on the Role Profiles in the work place [20].
data security in every data-processing or information system, as before. Other international initiatives, such as the Information Assurance and
Due to the skills shortage many organizations find themselves unpre­ Security Program by the USA’s National Initiatives for Cybersecurity
pared for a compliance GDPR as the ICT practitioners are usually not Education - NICE [21,22] and the European Union Agency for Cyber­
aware about the GDPR requirements and how to apply them. Several security (ENISA) [23] launched as well actions with the tasks of col­
GDPR webinars conducted in the EU in 2019 have shown that 60% of lecting data about the existing cybersecurity educational offers and with
businesses are underprepared for GDPR, a figure which is low in com­ an aim to propose appropriate changes for improving the current state.
parison to research conducted in 2020 by computerweekly.com [9] This paper presents and discusses widely the actions undertaken to
which put the figure as high as 90%. support the development of a new cybersecurity educational landscape
Another problem in this area is that the skills required for security in the EU and aims as well to find out whether these actions help an
professionals are changing at a faster pace than usual within advanced- answer to the shortage of cybersecurity skills workforce to be found.
technology fields, due to the changes introduced by the new digital The paper is organized as follows. The next section provides a brief
technology and fast digitalisation of the society. The research into In­ overview of previous studies and theoretical approaches. The applied
formation communication technologies (ICT) skills conducted annually methodology is presented in Section 3. Short overview of the results are
by the Enterprise Strategy Group [9], has revealed that the skills gap in presented in Section 4. The same section introduces the actions of EU
cybersecurity continues to widen and has doubled in the past five years. industry gathered around the Concordia cybersecurity competence
The percentage of answers where organizations reported a shortage of centre from the European Program Horizon 2020 [24] and the ECSO
skills rose from 23% to 51% in just two years. This issue is being felt organization [13]. The analysis of the collected data about the pro­
across many industries and organizations, and concern extends much grammes of the EU HEIs in the area of cybersecurity and the proposed
beyond regular ICT education and skills building. What appears to be of recommendations are presented in Section 4.2. Findings about the cur­
even greater concern was revealed in a survey carried out by Tripware rent accreditation systems for cybersecurity educational programmes
[10]. This survey not only revealed that the skills gap is growing, but are presented in Section 5.1. Section 5.2 presents and discusses the
that it is getting harder for industry to find and then hire skilled certification schemes for cybersecurity competence. A discussion about
cybersecurity professionals. Cybersecurity Ventures [11] has also the findings is provided in Section 6. The process of building a new
reviewed and synthesized dozens of employment figures from the cybersecurity ecosystem in the EU is commented in Section 7. The paper
media, analysts, job boards, vendors, governments, and organizations ends with a concluding section.
around the world, with the aim to predict the number of cybersecurity
job openings over the next 5 years. Their prediction for 2021 is that 2. An overview of previous work
there will be 3.5 million unfilled cybersecurity positions on the world
labour market. These numbers indicate that cybersecurity job forecasts Cybersecurity encompasses a broad range of specialty areas and
have been unable to keep pace with the dramatic rise in cybercrime and working roles, and this is the reason that no single educational pro­
the need for more cybersecurity professionals. Cybersecurity Ventures gramme can cover all of the specialized skills and sector-specific
predicted that lost due to cybercrime would cost six USD trillion annu­ knowledge desired by each employer. However, there are certain
ally by 2021, up from three USD trillion in 2015 [11]. knowledge sets and skills that are essential for any new employee in his/
Similar numbers relating to the world’s cybersecurity skills gap were her critical technical working role, dealing with cybersecurity, regard­
reported by many familiar ICT industries (Telecom, Finance, Transport, less of the ICT field they are educated in or the cybersecurity special area
Defence, e-Health), and companies like Intel, Symantec and others [12]. they are or will adopt. This includes an understanding of basic computer
The problem is wide-ranging and clear, and it needs to be addressed. architectures, data, cryptography, networking, secure coding principles,
Both the higher-education institutions (HEIs) and the professional edu­ and operating system internals, as well as working proficiency with OSs,
cation providers are working to address the increased skills shortage, but fluency in low-level programming languages, and familiarity with
as reported by ECSO, the European CyberSecurity Organization paper common exploitation methods and mitigation techniques.
[13] and by other organizations [14,15], cybersecurity should be Having in mind the broad range of speciality areas, it is not sur­
viewed as an emerging meta-discipline that is not simply an ICT aca­ prising that cybersecurity education has been addressed differently by
demic area. This finding comes from the inspection [13] of the HEI the various countries building cybersecurity strategies with their
programmes contents for which was found to be focused mainly on the different emphases. The educational part of these strategies is mostly
traditional cybersecurity topics. Modern learning methodology with formulated as strategies for improving the general state of cybersecurity,
hands-on training and range platforms that build skills in HEI was left which also includes education. This includes the US Department of
behind [16]. Homeland Security, the US National Institute of Standards and Tech­
The demand for cybersecurity skills in the industry sectors also nology (NIST) [25], the US National Security Agency (NSA), the UK
makes it difficult for academia to attract academics to join the HEI, with Government Communications Headquarters (UK GCHQ), the United
knowledge, practical experience, a research background and academic Nations (UN), the European Union (EU) and think tanks from interna­
aspirations. Another problem that needs to be addressed in combating tional professional organizations like the Association for Computing
the current cybersecurity skills shortage is the understanding of the Machines (ACM), and the International Federation for Information

2
B.J. Blažič Technology in Society 67 (2021) 101769

Processing (IFIP). In the US, the National initiative for Cybersecurity defining courses for the market and the new developed certification
Education NICE was created with the aim to improve the long-term schemes specifying the competences for the work roles in the area of
cybersecurity position of the USA [21]. NICE addresses awareness, cybersecurity help the industry’s needs for cybersecurity skills to be met
formal education, professional training and workforce structure. How­ by the EU educational system?” In looking for answers to these ques­
ever, employers in the US are still finding that the graduates from US tions, the research presented in this paper is analysing the key missing
HEIs are lacking the NICE foundation. One recent response from a major items in the on-going cybersecurity educational programmes in both
corporation to a request for information issued by NICE indicated that sectors: the market-based education providers and the HEI programmes
“the current education environment does not provide a common base­ EU. The study presents the actions undertaken, the emerging results and
line set of skills from which to build the specific knowledge necessary for elaborate on the expectation the main goal to be met: improving the
meeting the employer’s workforce requirements”. Another body, NIST, cybersecurity education within the EU and narrowing the skill gap.
has developed a common language (lexicon and taxonomy) to be used
by academia, industry and government for dealing with cybersecurity 3. Methodology
content [26]. However, experts have found that the proposed terms are
tediously dense, making it difficult to apply the included guidelines from In order to build knowledge, skills and capacity in cybersecurity, as
the instructors and the instructional designers [27]. Despite that criti­ required by European employers in the area of cybersecurity, four
cism, the use of selected portions of the NIST framework has impacted competence centres were established in 2019 by the European Com­
on the way cybersecurity education is being conducted today in most of mission with the mission to provide leading research, technology, in­
the developed countries. The EU adopted a cybersecurity strategy in dustrial and public competences. Leaderships in technology, processes
2013 [28], where education was addressed as well. ENISA as the and services for establishing a user-centric EU-integrated cybersecurity
Cybersecurity Agency was set up a few years earlier with specific tasks to ecosystem for digital sovereignty in Europe are the main objectives of
be performed in the area, like enhancing awareness and providing in­ the competence centres’ work. Two of the established centres, Con­
formation and guidelines for an effective cybersecurity education. In cordia [24] and Cybersec4Europe [37], have also specified tasks that are
December 2019, ENISA delivered an exhaustive report describing the focussed on re-shaping the cybersecurity educational ecosystem in the
state of cyber-skills development in the EU [29] stressing the EU. There are 52 participating partners in the Concordia centre coming
ever-growing lack of cybersecurity skills and cybersecurity professionals from both sectors, industry is represented by 26 entities and HEIs by 21
in most of the EU’s Member States. In the second decade of 21st century universities with additional 5 research centres, from all over Europe and
enhancing the cybersecurity education and skills has become one the Israel. The focus of the educational tasks and efforts of Concordia team is
four main components of the UK’s national programme for ensuring a to develop a new cybersecurity educational ecosystem for industrial
secure cyberspace [19]. The current UK cyber policy is incorporating needs, while Cybersecurity4Europe, with 40 partners from industry, HEI
cybersecurity at all levels of education, starting at the age of 11 years and public institutions, where the number of European HEI is domi­
[30]. Other developed nations, like Australia and New Zealand, have nating, is focused to help in the restructuring of the EU’s HEI pro­
launched similar strategies and approaches [31]. However, most of the grammes. Both approaches are intended to contribute to the
EU countries were left behind due to the uneven distribution of educa­ development of a new cybersecurity educational landscape in Europe,
tional programmes in cybersecurity and the late restructuring of the with the main underlying goal being to narrow the cybersecurity skills
cybersecurity programmes’ content among the EU HEIs. gap and to answer to the needs of an increasingly digitized society.
Several researchers [32,33] have reported that the HEIs’ cyberse­ The starting points for identifying the problems and for collecting the
curity programmes in the EU, despite the adopted strategies, are relevant data were the surveys carried out by both competence centres
emphasizing cybersecurity-policy planning, compliance audits, and all over Europe. Intensive cooperation to identify the needs was set up
other skills, which ultimately have less impact on the security position of with ECSO where most of the cybersecurity competence centres partners
an organization than the tasks enabled by a deep technical background. are members and ENISA. The participating organizations provided in­
They also point out the lack of a faculty able to teach security and the puts for the final reports produced from the collected surveys’ results.
lack of teaching resources. The majority of studies have consistently The findings were then used to design the approaches for EU cyberse­
pointed out that some tasks, like penetration testing, secure system curity educational ecosystems’ re-shaping and for the preparation of
design, incident response, and tool development, represent the greatest recommendations for the development of more diverse curricula in HEI
need in terms of the knowledge required by the ICT employees of an oriented to answer identified needs. Special focus deserved the study of
organization [34]. These roles can only be filled by workers that have the emerging certification schemes in EU for competence and cyberse­
mastered computing fundamentals and have a detailed understanding of curity skills. Any findings from the exploratory research study such are
how an organization’s information systems operate [16]. How to pro­ the surveys carried by both centres and ECSO need to be compared with
vide effective cybersecurity education was also discussed by McGettrick the findings addressing the same topic in other part of the world, and
[18]. More recent works on the subject have been provided by Ackerman this approach is applied in Section 5 and 6. Section 7 discusses whether
[4], Catota [35] and Ruiz [30]. Conklin and collaborators [36]. They the current findings of the studies are promising and will probably lead
have as well identified that the biggest concerns in cybersecurity edu­ to the cybersecurity educational landscape in the EU to change.
cation are the students’ lack of hands-on experience, resulting in a skills Data for this paper was sourced through the work of the Concordia
mismatch between what industry would like to see in a candidate for project team. This survey provided data about the cybersecurity needs
employment and the skills that the candidates actually possess after within industrial sectors. It was carried out between April and October
graduating. 2019. European companies from the selected industry sectors (Telecom,
The recent actions launched by the European Commission to Finance, Transport, Defence, e-Health) within the LinkedIn network
improve the overall situation in cybersecurity labour market clearly were approached, with the inquiry addressing the type of cybersecurity
addresses the changes that should be made by the EU’s educational types/profiles of job openings they have and the needed cybersecurity
stakeholders for narrowing the gap in cybersecurity labour skills. The skills for building a career within different industrial sectors. In addi­
central theme of the efforts is how to combine the training with tion, a market search was made about the courses offering cybersecurity
appropriated educational curricula for provision of necessary skills and education by different professional education providers on the market.
competence. The research presented in the sections that follow is The outcomes were used to design the five pillars of cybersecurity areas
attempting to find answers to the following questions: “is the current EU with courses prepared for the selected industry sectors. Access to the
HEI system ready to provide graduate students with the required data collected by the Concordia team was based on partnership status
cybersecurity skills and competences?” and “if the new approach of and active participation in Task 3.4. dedicated to establishing European

3
B.J. Blažič Technology in Society 67 (2021) 101769

educational ecosystem for cybersecurity. The study about the existing was assessed as a potential trusted solution that connects supply and
certification schemes and the educational programme accreditation was demand for an applicable cyber-threat intelligence solution for educa­
carried out in from June to October 2020. Membership in ECSO enabled tion and training.
the access to other survey data addressing the necessary cybersecurity The development of the Concordia eco-education system started with
skills within the EU industrial sector carried by ECSO working group. building a portfolio of cybersecurity courses that are offered by different
The Cyber4Europe competence centre’s survey targeted MSc categories of industry addressing the education of cybersecurity pro­
educational programmes teaching cybersecurity in the EU Member fessionals, such as technologists, mid-level managers, and executives.
States. More than one hundred MSc programmes from 28 countries were The final goal of this activity was to prepare a cybersecurity-specific
inspected from the end of 2019 to January 2020. The survey’s questions methodology for the creation of new courses by using independent
were sent to HEI study heads, being part of the Cybersecurity4Europe modules of knowledge with a broad range of content as an answer to the
partnership network and the data from the HEI level educational map various industrial needs for cybersecurity skills. The methodology for
developed by ENISA were used as well. The goal of the survey was to developing courses was created to serve as a tool that enables a creation
find the set of cybersecurity knowledge areas and topics that are not of specific cybersecurity courses with typical cybersecurity topics and
sufficiently covered or are missing from the EU’s educational pro­ content for different types of cybersecurity experts. The course modules
grammes and in the existing cybersecurity curricula. Access to these can be combined in a course that cover the knowledge needs of different
data was based on cooperation with the Cyber4Europe partnership types of employees that have different roles. For example, for middle-
network and by participation in the survey. Accreditation and certifi­ managers leading ICT departments that need to know about the new
cation data were taken from available public sources as well from the practical techniques for attack prevention, and in the case of an attack,
ENISA portal. to get the capacity to react quickly and enable a rapid recovery are
allocated in the module prepared for them. Middle managers that are not
4. Results leading ICT departments need to understand the general risks and
methods that protect the company’s ICT and other facilities, so the
4.1. Cybersecurity education and training shaped according to the module dedicated to them is to teach how to recognize the risk and act in
industry needs the case of an incident. Executives are another group for which was
found to have a general understanding of the cybersecurity area and its
The need to match the cybersecurity candidates with the re­ impact on business, investment and insurance. Other findings from the
quirements for available jobs was put on the table few years earlier from survey data was that non-ICT employees are not very interested in
the competence centre’s actions by the leading European industry and in developing cybersecurity skills, although they are frequently asked by
other regions in the world. The investigation from PriceWaterhou­ the employers to have basic knowledge in the cybersecurity area in
seCoopers [38] on the studied subject disclosed that the failed hires for order to be able to understand the challenges and to react properly in the
cybersecurity jobs lowered the workforce’s moral and lengthened the case of an incident. General employer’s opinion was they also need to
hiring time lines, thereby introducing additional employer’s costs [39, attend specific courses that address cybersecurity. According to the
40]. One-third of surveyed executives revealed that the inefficient Concordia and ECSO survey data extracted from the industrial em­
skills-matching among the candidates was the leading cause of failed ployers answers the demand for experts has high numbers in the group
hires. Another pilot study was carried out in 2020 about the indusial of mid-senior manager level, associate technologist level and entry
needs by the European Cybersecurity Organization [41] where the expert level. Regarding the country demand the highest demand for
majority of the industrial partners of Concordia and Cybersec4Europe experts was found to be within the most developed countries in EU:
competence centres are members. Additional support was provided by Germany, UK, Netherlands, France, Spain, Ireland, Italy and Belgium.
the third competence centre in cybersecurity ECHO [42] from the EU The Concordia centre study revealed that there are a plethora of
H2020 program. The survey intended to discover what kinds of courses on the market addressing the cybersecurity professional. Most
competence and skills development are required by industry and known are the free courses offered within the MOOC platform [45]. For
whether these competences can be acquired through exercise and employees the offered courses are attractive, especially the on-line
cybersecurity ranges, offering a simulation of the real environment. courses, as they offer control over the time spent studying the material
Cybersecurity range in this context is understood as a platform for the and make it possible to accommodate the education according to the
development, delivery and use of interactive simulation environments professional business engagement. Face-to face courses for middle and
[41]. A simulation environment is a representation of an organisation’s senior managers or executives, or specific training within the cyber
ICT infrastructure that includes mobile and physical systems and ap­ ranges for technical experts, have been found in the study to be popular
plications. User activities and any other internet, public or third-party and frequently attended. The Concordia and ECSO surveys have iden­
services as well potential simulated attacks are part of the platform. tified several learning platforms on the market with cybersecurity con­
The technology areas identified by the participating industry sectors tent. Among them, the following are very popular:
where cybersecurity skills are most needed are presented in Fig. 1.
The responses from the surveys showed that cybersecurity is un­ - Coursera1 – has 33 million users and has in its portfolio about 50
derstood as an important part of the business. The results pointed also to courses on cybersecurity, with most of them addressing introductory
several gaps in the organizational capabilities and of the employee’s topics.
skills required for implementing cybersecurity rules and tools in - edX2 platform – has 14 million users, who are offered only around 30
everyday business life. In general, the preparedness and mitigation with cybersecurity-related courses
respect to cybersecurity threats were estimated to be as low as 39%. - LinkedIn Learning3 - a learning platform with 9.5 million users, hosts
Most of the responders reported that they have provided forms of in­ around 120 courses on cybersecurity, with half of them addressing
surance to cover the losses in the case of cyber-attacks. The surveys an intermediate skill level, closely followed by courses aimed at
confirmed that the required skills are not uniform, as different skills developing basic skills
requirements were identified by each sector and, as a consequence,
different approaches by the participating organizations to tackle them
were expected. One common feature was that the competence and skills 1
https://www.coursera.org/.
development can be achieved more successfully with use of the cyber 2
http://www.edx.org/.
range services. Some of these services are offered by the European 3
https://www.lynda.com/.
Cybersecurity Hub and the use of the Cyber Range Market Place, which

4
B.J. Blažič Technology in Society 67 (2021) 101769

Fig. 1. Technology areas where cybersecurity skills are most needed identified by the participating EU industry sectors.

- Cybrary platform4 offers to its 2 million users about 500 cyber- service dependencies. The network-security content refers to the trans­
specific video courses for professionals to develop their careers, portation of data as well as to data within the networking and the un­
but also for businesses in view of workforce development. derlying infrastructure. Data-application security addresses issues like
- IASACA5 [Information Systems Audit and Control Association] pro­ data visualization, while other topics range from DDoS (Denial of Ser­
vides online, offline and mixed courses at different levels [founda­ vice attacks) protection, to software-defined networking [SDN], and to
tion, practitioner] for both information security and cybersecurity, encrypted-traffic analyses. Security of applications like cloud services
including courses for cybersecurity auditors. The courses are sanc­ are also addressed. The device security deals mainly with data acquisi­
tioned by certifications. tion and the devices that produce raw data in embedded systems, by
- Udacity platform6 – has 8 million users, but has only a small number sensors, drones and other security-centric issues, such as IoT security.
of security/cybersecurity courses. User behaviour is the least-addressed topic that includes privacy, social
- Cyberwiser7 is offering the “Civil Cyber Range Platform as a novel networks, fake news, and identity management.
approach to Cybersecurity threats simulation and professional Most of the content reported by the education providers was
training”. It was launched at the end of 2018 and benefited from designed and selected to meet the needs of a corporate audience, mainly
H2020 funding. The platform aims to provide a set of innovative for the technical team members, but also for the managers of the non-IT
tools for highly detailed exercise scenarios, simulating ICT in­ departments and the senior management group. The courses are usually
frastructures intended for use in cybersecurity professional training, offered as a face-to-face model, but some time they are also dedicated to
together with tools and solutions that simulate cyberattacks and on-line delivery and as a blended format using cyber range environment.
defensive countermeasures. Later the initial set of courses was augmented and altogether, 70+
courses were published on the Concordia [42] interactive educational
Although the above listed cybersecurity educational platforms in EU map, which is available on the Concordia website [46]. The attempt to
are addressing the same market, it should be noted that each platform provide a roadmap resulted as a proposal for an educational ecosystem
has structured the content of the courses based on the education pro­ prepared for the five selected industry sectors. It is based on the iden­
vider model, and without having any reference to any common tified pillars and presented on Fig. 3.
competence or skill framework. Having this in mind, a comparison of the
different offers and their attractiveness becomes difficult. Some common
content was identified and it was presented by the Concordia team in the 4.2. The cybersecurity higher-level cybersecurity educational programmes
form of five cybersecurity pillars that emerged from the analysis of the and the missing topics
skills adoption that specific courses are providing for specific application
areas of the cybersecurity. The areas were defined according to the data According to ENISA and other stakeholders in the field, European
driven model [42]. The pillar’s content development has its source in the labour market needs to ensure a sufficient number of skilled engineers,
60 courses collected during the two-months study carried in 2020. The scientist and practitioners in all areas of cybersecurity. Most of these
identified five pillars are presented in Fig. 2. The pillars address the skills groups have to be educated by the HEI and are expected to support and
related to the following ICT areas: software, networks, data application, lead solutions to the current and future industrial, scientific, societal and
devices and user behaviour. political challenges in the area of cybersecurity. In a search to see
The software content within the five pillars is centred on topics such whether the current educational system is capable of providing graduate
as middleware, secure OSs and security by design, malware analysis, students at M.Sc. level with the required cybersecurity skills, two sur­
system-security validation, detection of zero-days and recognizing veys were organized to deliver an answer: one was launched by the
competence centre Cybersecurity4Europe [37] and the other by ENISA.
The Cybersecurity 4Europe survey has investigated the content provided
4
https://www.cybrary.it/. in the tertiary education level in EU awarding master degrees in
5
https://www.isaca.org/pages/default.aspx. cybersecurity [16]. M.Sc. educational level within the European HEI
6
https://www.udemy.com/. offers programmes dedicated to cybersecurity as the undergraduate
7
htttps://www.dpoconsultancy.com/. level in the Bologna educational system introduced in EU several years

5
B.J. Blažič Technology in Society 67 (2021) 101769

Fig. 2. The five pillars as identified by Concordia cybersecurity competence centre.

Fig. 3. The roadmap for the evolving cybersecurity education ecosystem where hats are representing the courses.

ago does not provide specific educational programmes in the cyberse­ included from the NICE framework for cybersecurity education [21].
curity, as some knowledge units belonging to cybersecurity areas are The final number of topics was extended with topics from the knowledge
thought within the computer science undergraduate level. The two area named “Customer Service and Technical Support” that was found to
surveys offered information about the kind of content present in the EU’s be missing from the ACM framework.
HEIs programmes and how this content is aligned with the much-needed The collected data from 104 educational programmes in most of the
cybersecurity skills and competence. The terminology used in the study EU member state universities with M.Cs programmes in cybersecurity
was based on the ACM Cybersecurity Curricula [48] and the one sug­ were then analysed to find out whether the required topics that build
gested by the National Initiative for Cybersecurity Education within the cybersecurity skills are sufficiently well or are not at all covered within
Cybersecurity Workforce Framework [26], but missing items were also the HEI programmes of a particular EU Member States. The number of

6
B.J. Blažič Technology in Society 67 (2021) 101769

HEI cybersecurity programs found in the large countries was smaller due degree becomes “out of date” after one year from the submission date as
to the presence of a large number of higher-level educational organi­ the submitter is responsible for updating the degree information each
zations, compared with the smaller countries there were just one or two year. The requirements for the inclusion of a programme in the database
programmes. are as follows: for a bachelor degree, at least 25% of the taught modules
In general, the analysis of the collected data showed that all have to be cybersecurity topics; and for a master degree, at least 40% of
knowledge units specified in the survey are covered in the mandatory the taught modules have to be cybersecurity topics. For a postgraduate
courses that were provided by the HEIs participating in the survey. The specialization programme, at least 40% of the taught modules must be in
higher frequency of present topics was shown by units belonging to data cybersecurity topics and the programme must have a minimum of 60
security (cryptography, digital forensic, data integrity and authentica­ ECTS. However, these requirements are just the basic information about
tion). These topics were present in 92% of the studied programmes that the cybersecurity educational programmes in the EU and EFTA countries
are mandatory and in 46% in courses that are not. 84% presence among and will not, on their own, solve the skills shortage in Europe.
the programmes was found for topics addressing connection security The major drawbacks regarding adequate education and training in
(hardware architecture, distributed systems, network architecture). cybersecurity is presented in an another ENISA report from 2020 year
System security was present in 75% of the studied program with topics [23]. The report points to the lack of strong interactions during the HEI
like common system architecture and system management. The main education with the industry. The identified barriers have mainly source
lack of sufficient coverage within the studied programmes was found in in the lack of technical support and funding availability. An important
the area of organizational, human, social, operate and maintain subjects finding in the report, is the poor understanding of the cybersecurity
which is reflected in the missing skills for managing and operating the labour market and the fact that EU HEIs do not understand correctly the
systems. This finding is in line with identified missing topics within the requests of employers for manpower with the necessary cybersecurity
courses offered to the industry that focus mainly on technical aspects. skills. A major factor that prevents good cybersecurity education is
Not sufficiently covered are the Customer Service and Technical Sup­ found to be the lack of specialization of the HEI teachers and the lack of
port, Organizational Security address Risk management, Policy and feedback from the cooperation with industry in cases when it is present.
Administration, Human and Social Security, Cybercrime, Privacy and The ECSO study from 2020 [13] clearly stresses that it is necessary the
Social engineering. The same applies to some topics of utmost impor­ cybersecurity professionals to understand all the disciplines that make
tance in areas like Privacy by design, which was found in only 30% of up the area of cybersecurity, ranging from more technical topics to the
the mandatory courses. Additional topics that are not well covered were subjects from social sciences. Most of these findings lead to the
also the Documentation area which is related to cybersecurity as it was conclusion that a sharper definition of the knowledge and skills a stu­
found to be present in only 15% of the programmes. The major concern dent graduating in cybersecurity should possess have to be specified
the study revealed was that the national coverage was that the offered more exactly and clearly. Activities like training and practice should
education in EU is not homogenous, as large countries have much more take place during and after a student’s graduation. One step towards that
programmes with more diverse content than the smaller ones. Large goal could be a common accreditation and educational standards that
countries show as well greater coverage of the required framework follow the knowledge specification within the certification schemes
knowledge units. For example, Spain, France, Germany and Italy cover being recently developed in EU. This may help the EU HEI current
75% of knowledge units specified in the survey by their mandatory educational programmes to be adopted in line with the labour market
courses. Countries with better coverage of the topics tend to have also a expectation.
more uniform distribution of each knowledge area, whereas countries
with lower coverage of the knowledge areas exhibit a more unbalanced 5. Accreditation and certifications
distribution of the topics in their programmes. For more details please
refer to the Cybersec4Europe Report [37]. 5.1. National accreditation schemes of the HEI programmes
ENISA produced in 2019 the Cybersecurity EU Educational Map with
the list of educational programmes in cybersecurity [29]. This version Studies presented in the previous chapters and the one by Dawenport
was renewed in 2020 with a description of the introduced user interface [48] and Malan [49], have shown that a degree in cybersecurity can
for more friendlier user interface. The main purpose of the map is its cover a wide spectrum of disciplines, depending on the area of emphasis
content to become the premiere source of information for EU citizens of the educational programme. Many substantially different degree
looking for updating of the cybersecurity knowledge and skills. In programmes all over the world are taking on the “cybersecurity” title or
following this goal, the map was designed as a tool providing links to another similarly generic name that may mislead the potential students.
qualitative educational programmes with degrees in cybersecurity and Due to the existing variety within the current programme and degree
therefore enabling better access to the available knowledge. The current names, distinguishing a cybersecurity programme using some scheme of
data collected in the database provides 105 programmes from 23 accreditation and certification appeared to be necessary in shaping the
countries. The map is available on-line on the ENISA portal. new educational eco-system. Such schemes helps in classifying the skills
The ENISA map lists cybersecurity programmes from EU, EFTA, and and the related competences. The latest studies from Dawson and
other European countries and is now considered as a point of reference Thomson [50] have also discussed different views on the cybersecurity
that allows talented young people to make informed decisions about the educational subject, like the impact of necessary skills beyond the
variety of possibilities offered by the EU higher education in cyberse­ technical area of cybersecurity that are expected to have a major impact
curity and helps the universities to attract high-quality students moti­ on the future workforce skills. Having this in mind, it is not surprising
vated to keep Europe cyber-secure. The map enables search by country that some large countries (Australia, USA, UK and France) have estab­
where the programme is held, by language used in the education of the lished accreditation schemes for their national cybersecurity degrees
programme, type of programme, e.g., master degree, postgraduate PhD that include items that are not directly technical. They award accredi­
course, the type of delivery method, e.g., classroom, blended or as on- tation by attesting whether the degree meets the standards and criteria
line course. The selection of programmes is supported as well with the that a group of experts have decided are necessary to obtain a degree
information about the requested fee. The list of educational programmes that focuses on cybersecurity. These accreditation are overseen by the
in the map is not closed, as a protocol is provided for further additions. countries’ main national cybersecurity institutions, i.e., the Agence
Any higher-education institution can submit a recognized (by an EU Nationale de la Sécurité des Systèmes d’Information (ANSSI) in France,
Member State or EFTA country) programme by submitting the degree’s the Department of Homeland Security (DHS) and the National Security
information with the dedicated ENISA template. If the programme meets Agency (NSA) in the United States, and the National Cyber Security
the basic quality-assurance parameters, the degree is accepted. Each Centre (NCSC) in the United Kingdom. The exception being Australia,

7
B.J. Blažič Technology in Society 67 (2021) 101769

where the process is supervised by the Department of Education [31]. Initiative for Cybersecurity Education [21]. This programme has a
In France, the cybersecurity degree programme is labelled according strong foundation in computer science, computer engineering and
to the SecNumedu committee that labels programmes according to the electrical engineering, and is particularly devoted to the study of tech­
rules maintained by ANSSI. The main purpose of such labelling is to nologies and tools enabling cyber operations such as collection,
inform students and employers that the university degree in cyberse­ exploitation and response [51]. The programme must include 100% of
curity meets the required criteria for teaching and training defined by the mandatory academic content of the cybersecurity knowledge unit
ANSSI’s experts. These criteria have been developed by ANSSI in part­ and 10 out of the 17 available optional content units. The curriculum
nership with industry, academia, professional associations and the must expose students to the policy, social, legal and ethical aspects of
Ministry of Education. The accredited accreditation lasts 3 years. The cyber operations and it can include courses from multiple colleges
programme is considered to be predominantly technical when more within the university. Currently there are 21 CAE-CO designated in­
than 50% of the course is dedicated to practical technical activities, and stitutions, 13 providing bachelor courses and 8 providing master cour­
when the practical technical activities account for less than 50% of the ses. Institutions can apply for accreditation either for the fundamental or
course, the programme is regarded as predominantly organisational. the advanced programme.
The higher proficiency levels require practical activities to be included A common property of the presented accreditations is that they are
in the programme, such as laboratory work, and this has to last for at awarded to degrees that provide an adequate number of taught courses
least 50% of the course. Training is considered predominantly technical and activities that are specific to cybersecurity area. Although the
when more than 50% of the training by the course is dedicated to accreditation schemes do not offer guidelines for changing the curricula
practical technical activities. If they are less, the course is allocated to for meeting the needs for better equipped graduated students with
the organizational group of courses. Currently, 13 master degree, 7 knowledge and practice, they are still considered as a framework that
master specialisations, 17 engineering (including one engineering provides an adequate number of high quality courses and activities that
specialist) are labelled in SecNumedu and published on ANSSI’s website. are specific to the cybersecurity area, even when a broader interdisci­
In the United Kingdom, the National Cyber Security Centre [52] and plinary focus in the programmes is maintained. Accreditation also en­
its experts certify bachelor, integrated master and master degrees, as ables, in great detail, visibility with regard to how the cybersecurity
well as apprenticeships. The NCSC provides either a provisional or a full education is provided and the quality of the faculty engaged in the ed­
accreditation, which is valid for 5 years. To receive it, the programmes ucation. Accredited programmes provide as well the competence that a
must be focused on the main cybersecurity domain, while emphasizing student adopt with graduation. However, the main problem in the EU
also the multidisciplinary scope of the programme. Furthermore, the educational ecosystem in cybersecurity is the lack of general accredi­
programme needs to be aligned with the United Kingdom’s cyberse­ tation scheme for the cybersecurity programmes like one developed in
curity needs. It should detail also how the admission process for students France, UK and USA and more even distribution of the accredited pro­
will take place and what kind of profiles meet the national cybersecurity grams among the member states.
strategy. Evidence is also desired for the successful delivery of a master
or a doctoral course and the production of scientific research, as well as 5.2. Skill and competence certification and in the area of cybersecurity
the provision of external training. Engagement with industry and users
should be part of the planned activities, together with dissemination Presenting certification schemes produced by standard organization
activities and outreach strategies. Besides NSCS, in UK other profes­ for defining the Roles and Role profiles in an organization for per­
sional bodies are developing certification schemes for cybersecurity in forming specific cybersecurity tasks and responsibility requires clear
the last decade. One of them, BCS, the Chartered Institute for IT and the definition of the used terms. Currently known adopted terms applied in
Institution of Engineering and Technology (IET) accredit programmes in the definitions of the cybersecurity Role profile are as follows:
the general area of computer science and the more specialist area of Competence is related to knowledge for achieving observable results;
cybersecurity disciplines [53]. The accreditations provided by these Skills are defined as ability to use know-how and expertise to complete
institutes are underpinned by international initiatives such as the tasks and solve problems, sometimes it is defined as competence to
Washington Accord [54], and the Seoul Accord [55]. These memoranda perform a learned psychomotor act; Knowledge is defined as body of
support the internationalising of the prepared curricula and promote facts, principles, theories and practices related to particular field of work
consistency and parity in computer-science education globally. or study; Role and Role profile is derived from an organisational
In the United States, the NSA and DHS jointly sponsor the Centres of assignment to an employee and its profile is related to specific activities
Academic Excellence (CAEs) in cybersecurity that started with activity or tasks; Task is a specific piece of work combined with other task
in 2019. Their experts and professionals provide opinions for each composing the work in a specific speciality area.
programme that seeks accreditation. There are two types of CAE: the In EU there are two adopted CEN (Committee European for Norms)
cyber defence (CAE-CD] and the cyber operations (CAE-CO) accredita­ documents in 2018 and 2020 that provide references and competences
tion. There are currently 272 institutions in the United States that are for the Role profiles in the ICT area. The first CEN standard document EN
recognized as CAEs-CD. Depending on the level of the programme, or­ 16234–1 (e-CF) [56] is implementing the European Qualification
ganizations must meet different criteria. For example, for a CAE-CDE Framework (EQF) for work place profiles in the ICT area. These profiles
bachelor, master, or doctoral designation an organisation should sub­ are based on 41 defined competences, skills and knowledge required for
mit documentation about the delivery of a cyber-defence curriculum performing jobs in the ICT sector. The second document, known as EN
over the previous three years from the application date, student skills 16458 is identifying the EU ICT Professional Role Profiles. The Incor­
development and assessment, details about how the development of poration of the competences defined by EQF produced 30 ICT profes­
scholarly skills are performed, information about the courses requiring sional Role Profiles descriptions. Among them there are only four Role
laboratory exercises/hands-on assignments, student’s participations in Profiles dedicated to the cybersecurity area. They are: Cybersecurity
cybersecurity competitions and how the programme facilitates in­ manager, System administrator, Network specialist and Cyber Security
teractions with cybersecurity practitioners. It is clear from the CAE Specialist. Another relevant document for the area was produced by EU
scheme that the cybersecurity should be taught in a multidisciplinary Commission and is known as ESCO document (European skills, Com­
manner and should be integrated into other degree programmes of the petences, Qualifications and Occupations). The document provides
academic institution. Outreach and collaboration activities that go multi-lingual classification of skills and competence which is of high
beyond the institution and the CAE community and industry should be importance for a multi-lingual EU for enabling easier workforce and job
provided as well. The CAE in cyber operations (CAE-CO) programmes is mobility. The document provides definitions for 2942 occupations and
complementary to the CAE-CD, with the aim of supporting the National 13.485 skills linked to these occupations. Occupations in the

8
B.J. Blažič Technology in Society 67 (2021) 101769

cybersecurity addressed are: ICT security administrator, ICT security 6. Discussion


consultant, Chief ICT security officer and ICT security manager, Director
of compliance and information security in gambling, ICT security The findings from the presented studies indicate that cybersecurity
technician. All essential skills and competences as well the knowledge encompasses a very broad range of specialty areas and work roles, and
required by any of the specified occupations are very clearly described. that no single educational programme can be expected to cover all of the
Competence and Role profiles in USA are addressed by the NICE specialized skills and sector-specific knowledge desired by each
initiative. NICE describes the workforce categories with the number of employer. However, the studies pointed clearly that there are certain
speciality areas each category should possess. There are seven specified knowledge sets and skills that are essential for any new employee per­
areas and their presence in particular category differ, e.g. from 2 areas to forming critical technical work where cybersecurity issues are present,
7 areas in particular category. The categories are classified according to regardless of the field they are in or the specialty they adopt. This in­
the description of the related tasks and the related responsibilities. NICE cludes an understanding of computer architecture, data, cryptography,
recognize the following categories within the Cybersecurity area: networking, secure-coding principles, and operating-system internals, as
Securely provision (SP), Operate and maintain (OM), Oversee and well as working some proficiency with Linux-based systems, fluency in
Govern (OV), Protect and Defend (PR), Analyse (AN), Collect and low-level programming languages, and familiarity with common
Operate (CO), Investigate (IN). The Work Roles in the Cybersecurity exploitation methods and mitigation techniques [25]. However, even in
areas are then defined by using the task to be performed in particular that aspect dealing with basic knowledge experts opinions differ, Martin
category and connecting them with the required skills and competences and Collier [57] claim that the mitigating current cybersecurity prob­
for each of the Work Roles. This approach produced 52 Work Roles. The lems mean that is more important countries and their education systems
NICE scheme enables a search of cybersecurity workers across USA with to adopt more interdisciplinary approaches in the educational pro­
the Jobs Heat Map from the Cyberseek tool prepared to tackle the grammes than very deep technical knowledge. They claim that the
increasingly critical problem of cybersecurity skill gaps and the cyber­ approach will allow a better integration of people with different tech­
security worker shortages in USA. The current interactive map of nical skill sets and a better comprehension of the cyber-security chal­
Cyberseek provides description of the following identified Work Roles: lenges. Similar opinion is provided in the paper of Dawson and
Cybersecurity Specialist, Cyber Crime analyst, Incident Analyst, IT Thompson [50], where by having in mind the highly complex and het­
Auditor, Cybersecurity Consultant, Penetration & Vulnerability tester, erogeneous cyber world, they claim that the social aspects should have
Cybersecurity Administrator, Cybersecurity Manager, Cybersecurity more important role in cybersecurity education and workforce devel­
Engineer, Cybersecurity Architect. opment. They have identified in their paper six traits for the future
In year 2020 additional certification schemes by several organiza­ cybersecurity professional: systematic thinking, collaboration, strong
tions appeared on the organization’s web platforms. They can be found communication, continuous learning and a sense of civic duty that
on the organisation’s web sites under the name Cyberseek website, should be a mix of technical and social skills. On other hand, Malan et al.
Cybrary website, Cyberdegrees website and the ECSO web site. The [49] and Cabaj et al. [58] argue that cybersecurity should be a very
Concordia feasibility study within task 4.3 has come to an identification technical subject requiring years of study and training. Other experts
of the existing Role Profiles on one side and the specification Cyberse­ also have claimed that the specific and purpose-driven cybersecurity
curity skills on the other side by considering all available sources of degrees at HEIs should better prepare the graduates for the labour
cybersecurity certification schemes [43]. The study provided the exis­ market as one of the biggest concerns in the cybersecurity education is
tence of 62 defined Work Profiles and 52 Cybersecurity Skills Certifi­ the students’ lack of hands-on experience, resulting in a skills mismatch
cation Schemes for these profiles, but most important findings from the between what industry would like to see in a candidate for employment
study was the missing certification schemes for 19 cybersecurity Work and the skills that they actually possess [59]. The central theme of this
Profiles. Among these missing certification schemes are for example the concern is the training in real environment provided by the cyber ranges
certification scheme for ICT Security consultant, Security architect, versus the traditional class education. Class education tends to focus on
Cyber instructional curriculum developer and others. the reasons, the theory and the mechanisms behind the material [60]
Taking in account the big shortage of cybersecurity skills among the and the hands-on training deserve less attention. The industry usually
world labour market, the emerging specification of the cybersecurity prefers workers who are ready to work from day one. On the other hand,
skills provided by the presented certification schemes are certainly a it is evident that the cyber technology changes very quickly and in that
step forward that will help the development of adequate education and case students need to learn transferable skills that can be used
training programmes within industry and HEI sector to happen. Certi­ throughout a lifelong career. Therefore, the following conclusion can be
fication schemes enable validation of the required skills, competences derived: the cybersecurity-degree providers should balance the
and knowledge of the job candidates and contribute the employment employability of the students with providing the foundations of the
process to become more tailored to the identified needs. The information cybersecurity science for future professionals to be capable of updating
provided within the formal Role profiles schemes helps as well in the their skills in the current dynamic environment. Following that
building of consistent professional profiles and verified quality levels of conclusion the market course providers should give in their courses
the employees skills and knowledge. However, the observation of the much more emphasis on practice and experience gathering.
presented findings about the current offer of the certification schemes On the other side, the survey among the EU HEIs found that the
for the cybersecurity Role profiles shows that the system is far away European education ecosystem with the development of the new
from to be completed and is not sufficiently adjusted to the existing cybersecurity courses is growing, but the main drawback is that they are
needs of many diverse roles and profiles in the cybersecurity area as unevenly spread up across Europe. In some countries there are only one
most of them are developed for performing technical tasks. Some pro­ or two programmes in cybersecurity. That contributes the shortage of
files in the studied sources of data have redundant number of certifi­ skilled workers to grow among the member states differently. The sit­
cation schemes (e.g. 16 schemes for ICT Security technician exist) and uation is worsened also due to the different conceptualisations of the
some profiles have been left without any certification scheme like the science of cybersecurity and, as a consequence, EU is facing currently
Cybercrime investigator, Data analyst, Security architecture, Informa­ with a variety of educational offerings that introduce obstacles to the
tion system security developer etc. This finding is in line with the results creation of a common cybersecurity educational framework and appli­
presented in Section 4. They suggest that the certification area should be cation of the developed certification schemes. Another problem that was
further developed, harmonized among actors and completed for a more noticed in some countries is the presence of constraints on students who
successful narrowing of the world cybersecurity skills labour gap with wish to acquire an all-round skill set in cybersecurity, but they are
appropriate education. pushed to specialise in either technical or societal cybersecurity issues,

9
B.J. Blažič Technology in Society 67 (2021) 101769

but not both [60]. Another challenge found is the low responsiveness of the EU and it has been a policy concern since the publication by the
the content of the cybersecurity curricula to the evolution of the field European Commission of the first EU cybersecurity strategy in 2013
itself as there is a lack of mechanisms for the rapid incorporation of [28]. This document invites the Member States to increase their edu­
material in the existing curricula addressing the new emerging threats or cation and training efforts around the network and information security
new skills, especially if the rapid digitalisation of the society and in­ (NIS) topics and to plan for a “NIS driving licence” as a voluntary cer­
dustry is considered. tification programme to promote the enhanced skills and competence of
In that context it is important to mention the work addressing the ICT professionals and cybersecurity people. One of the actions was the
future by the four international organizations, i.e., the Association for setting up of the four cybersecurity competence centres, with the aim to
Computing Machinery (ACM), IEEE Computer Society Association for develop the European Secure, Resilient and Trusted Ecosystem,
Information Systems Special Interest Group on Information Security and including the Education. In 2019, the four competence centres, Con­
Privacy, and the International Federation for Information Processing cordia, ECHO, SPARTA and CyberSec4Europe collected within the CCN
Technical, Committee on Information Security Education (IFIP WG cooperation network [44], were launched with tasks to establish and
11.8), that have written a report about the “Curriculum Guidelines for operate pilot projects with the goal to develop an innovation cyberse­
Post-Secondary Degree Programs in Cybersecurity from 2017” [47,61]. curity roadmap, including the development of a new educational
Later, the leading author of this study, Parriish with several other re­ ecosystem for cybersecurity. As a starting point about what is exactly
searchers [62] published a paper that discusses the global perspectives needed, the views of the main stakeholders were collected in surveys
on cybersecurity education for 2030, based on the study carried out carried out by the four competence centres within being CCN network
within the ACM group, known as Innovation and Technology in Com­ members [44]. The main message received from the industry partici­
puter Science Education – ITiCSE. Their study is based on the evaluation pating in the surveys was that the cybersecurity education and training
of all the educational institutions in the USA from the CAE group where in EU is still not sufficiently regarded as a factor that influences the
Europe was not present. The ITiCSE group has provided reports on the success of the digital market’s development. The main reason identified
subject of cybersecurity education for many consecutive years, starting was the lack of an even distribution of cybersecurity education in the EU
with year 2009. However, the main source of information used for member states, poor alignment between educational offers at HEIs and
developing educational prospects for 2030 was the USA based NICE the labour market’s demands, little paid emphasis on the multidisci­
approach and the competency levels defined by the ITiCSE initiative. plinary knowledge, and the prominence of theory-based education
Competences in cybersecurity in their study are understood as the ability rather than students hands-on training. All the collected comments
to perform work activities at a stated competency levels, which are revolved around the need to redefine the educational and training
denoted as roles like the ones for the technician, entry-level practitioner, pathways for achieving a more unified standard for the knowledge,
technical leader or senior software engineer, which is very close to the competence and skills that students should develop to meet the needs.
methods for course creation developed by Concordia centre [24]. Regarding the required competences, a concerted effort to define the
Competence itself in this scheme is recognized as the combination of competences needed to be jointly owned/developed by different Euro­
knowledge, skill and abilities. The authors suggest that cybersecurity pean actors playing a role in the cybersecurity market or impacted by it,
competence for the future, e.g., for 2030, can be constructed by devel­ was pursued in a collaboration with ECSO organization and its members
oping two models of education [62]. The first is an in year 2020. The contributions from the CCN network in building the
information-technology programme with a cybersecurity track for stu­ new educational ecosystem were welcomed as well but the CCN network
dents that are information-technology specialists with programme is addressing other important issues within the cybersecurity scene, and
topics like governance, risk management, constraints and control. The education is just one of the segments. Concordia, having specific task on
second model is cybersecurity bachelor programmes with students that education has provided a course map as an answer to the needs for
are cybersecurity specialists with a high level of expertise that should collaboration with the industrial partners that are mainly representa­
contain the same main topics as the first programme, but with a changed tives of the national and international corporate segment of some
focus, e.g., risk management should address threat modelling, asset important industry sectors. The produced map shows the available
evaluation and methods for vulnerability removal. Each of the topics courses and is periodically updated with new courses which number is
should be taught at different levels within the selected model. This type growing. The industry fields covered in the map are various, but the
of dichotomy, focusing on the needs of cybersecurity specialists, but also telecoms sector is the most addressed, although other sectors are also
on the ICT specialists that need to know some cybersecurity, is becoming covered, like the critical information infrastructure, IoT and cloud
part of many opinions, like the one suggested in the work of Moller and computing. This limitation should be removed and the map should be
Crick [63] and Davenport et al., [48]. However, some changes and the upgraded with new courses for covering the needs of other sectors of the
recent evolution of cybersecurity education shows that it has begun to society. Adding missing contents that address other aspects of cyberse­
take shape as a true academic field in form of a meta-science, as opposed curity is as well necessary. The map specify which industrial fields are
to previously used approach as being a technical training domain for addressed and the target audiences coming from the industrial sectors
certain specialized jobs [38]. Other proposals appeared recently with addressed, the learner entry requirements and the most important in­
suggestions the cybersecurity topics to be formally thought in the high formation is also provided, the type of certification given to the pro­
schools as a part of school-level education [63]. Regarding the education fessionals that have successfully passed some of the courses. However,
provided by the professional providers on the market it can be expected these certifications are not yet fully aligned with the EU EQF which can
that they will reshape their courses in line with the certification schemes become a source of confusedness. The other competence centre,
for Role Profiles recently developed by the state owned institutions and Cybersec4Europe is working on the educational programmes at Euro­
their emerging platforms on the market. Promotion of the cyber range pean HEIs and try to address the responsible bodies that manage the
usage as very useful tool in cybersecurity education is also on the way. educational institution in EU to take actions. The pilot project of the
Importantly, standard setting both through industry self-regulation and third competence centre ECHO [42] is looking to develop a cyber-skills
imposed governmental regulation will influence cybersecurity educa­ framework (E-CSF) to address the needs and skills gap of the cyberse­
tion in Europe and internationally [64]. curity professionals based on a mapping of the cybersecurity
multi-sector assessment framework developed by the centre in 2019. In
7. Building the new educational ecosystem in EU – will the new the first year of the cybersecurity centres network, the CCN Education
approach help the skilled labour shortage to be reduced? Cross-Pilots Group (covering all educational activities) defined the
content of the courses for four types of cybersecurity professionals by
Interest in cybersecurity education and skills is long standing within specifying their Role Profiles [43] which is certainly not sufficient for

10
B.J. Blažič Technology in Society 67 (2021) 101769

the complex field of cybersecurity Role profiles. The pilot is designing as shortage is present in the most part of the world. This situation is
well a general cybersecurity skills-certification scheme based on the demanding new pathways in the education to be developed and applied
current certification schemes for provision of examination mechanism of for provision of an increased number of cybersecurity workforce appli­
the acquired knowledge, skills and other competences for the defined cants. Another aspect to be considered is the socialization of the
profiles of cybersecurity professionals. The main aim of these efforts is cybersecurity industry and the expert career verticals. Actions and ini­
the proposals to be adopted at EU level, but how it will be aligned with tiatives are also expected as a remedy for the uneven distribution of
EQF and the individual organizational certification schemes that qualified cybersecurity educational programmes in the EU and the
emerged in 2020 is not evident. The European common and general training offers by the professional education providers.
accreditation scheme for HEI cybersecurity programmes in the member The lack of cybersecurity-skilled people has its source in the nature of
states is also missing. the new meta-science of cybersecurity, which is a rapidly changing
The outcomes of the four competence centres work and the CCN discipline that has been evolving since the creation of the educational
Education Pilot, the recent works within CEN and EQF promise a move frameworks for the cybersecurity are. The rapid development of the
towards an improved and re-shaped EU cybersecurity educational digital world and the needs for protection of digital assets is another
ecosystem consisting of more structured curricula with a practical/ factor that contributed to the big shortage of cybersecurity-skilled
training component, specific types of examinations, accreditation of HEI workforce all over the world. By taking this situation into account,
curricula, certification schemes for Role Profiles and additional activ­ integration of the new topics within the existing frameworks supported
ities such as cybersecurity competitions with serious games and wider by hands-on training should become a continuous practice for provision
use of cyber ranges. of a successful answer to the identified social and economic needs for
However, some elements of the accreditation schemes as is set in protection of digital assets and user identities. Mutual cooperation and
USA are still missing in the EU. Collaborations between the countries the exchange of information between both sectors, the education and the
that have set up the accreditation schemes for their HEI programmes and industry can lead to better understanding what is needed for improve­
those that do not have such a system and represent the majority in the ment of the current situation. The shortage of workforce with cyberse­
EU member states should be enhanced, but the timing of adoption of curity skills can be reduced by defining and introducing in the education
general applicable scheme’s remains still unknown. The cybersecurity programmes sharper set of knowledge and skills that learners should
knowledge topics proposed by the industry are in line with the ACM s possess and implementing regular training activities and use of modern
and the NICE framework, but topics to be included in the HEI curricula learning technology like cyber ranges and serious games. When major
are still missing like for example the topics addressing Organizational stakeholders from industry and other society sectors underline the poor
security, Anonymising data, Social Security, Physical interface and alignment between the educational outcomes provided by the HEI and
connectors. The later need special attention due to the expansion of IoT- the market demands and propose more multidisciplinary expertise to be
connected devices. In addition all programmes in cybersecurity educa­ acquired they actually point to the organizational and social challenges.
tion should acknowledge the importance of the human-centric factors, They are asking the educators, especially belonging to the EU HEIs, to
which include elements from sociology and psychology and are required include in the curricula a more practice and hands-on approach in the
due to the extensive digitalisation of the overall society. Similar atten­ education. This is one of the major challenges for the reshaping process
tion should be given to the areas of utmost importance, like Privacy by of the European cybersecurity education landscape.
design, which was found not to be sufficiently present in the EU HEI One way to circumvent the existing situation is the relevant stake­
educational programmes. The work on the expected changes is on the holders – namely academia, governments and employers – to regularly
way, but a guarantee that the expected implementations will come soon exchange information about the foundational knowledge and skills to be
is not yet visible. developed and the activities that should be undertaken the current
On the other hand, despite the innovations within the HEI pro­ cyber-skills workforce gap to be reduced. Another approach that may
grammes in cybersecurity being prepared, companies still continuously help is a provision of general European cybersecurity-degree accredi­
face the problem of filling their cybersecurity-related positions. The tation for courses that educate for different cybersecurity profiles. Cer­
total number of unfilled cybersecurity job openings in the 28 EU tification schemes should be further developed and the current list
Member States remains stable from one year to the next, and is around enlarged for covering the missing Role profiles certification schemes as
3500 a month. The fact that the total number remains almost the same identified by the industry and the cybersecurity competence centres.
suggests that the education is becoming more adjusted to the company This will allow an adequate number of taught courses and activities
needs for professionals, as the changes in the educational programmes specific to be further developed and offered on the market. Good ex­
provided by the professional providers are being developed by following amples and practices are available in the most developed countries in
the needs and the recommendation. All these developments will the EU, but their number is very small and an initiative for spreading
certainly have a positive impact on the current situation regarding the their experience in other member states should be welcomed and sup­
missing skilled work force in Europe, however, each transition needs ported by politics and HEI management. Most of the EU national au­
time the positive changes to be noticed. thorities in education are involved in collaboration with educational
Based on these facts the research questions from section 2. have in programmes implemented in other member states as it contributes to the
general positive answers, however the process of building new educa­ educational quality of the country, so cooperation and support in setting
tional eco system has just started and its full implementation will need national accreditation schemes of the cybersecurity programmes where
more time. they are not present will certainly contribute the relevant knowledge in
cybersecurity to be equally spread up within EU. Such action will
8. Conclusion and recommendation facilitate the exchange of experts and the mobility of the work force with
standardised levels of cybersecurity skills and knowledge.
The work presented in this paper is a step towards a better under­
standing of the changing landscape of the cybersecurity education in the Author statement
EU provided by recent results of surveys, studies and initiatives from
actors in both important fields: the high-level education and the in­ The paper was revised according to the requests issued by the re­
dustrial sector. Both sector have shown that they are aware of the great viewers. They are minor and marked » yellow« in the marked revised
demand for experts, professionals and other skilled people with relevant paper. The references were checked and corrected. Links to the web
competence in cybersecurity areas. The existing shortage of skilled la­ were also checked and updated. The details are provided in the file »
bour in the cybersecurity area is not typical for Europe only as the skill Answers to the reviewers«.

11
B.J. Blažič Technology in Society 67 (2021) 101769

Acknowledgment 2013. Retrieved March 2020, https://www.nist.gov/system/files/documents/


2017/08/04/t-mobile.pdf.
[27] CPHC, Cybersecurity Principles and Learning Outcomes for Computer Science and
This work was funded by Slovenian Research Agency based on the IT Related Degrees, 2015. Retrieved in June 2019 from, https://cphcuk.files.word
contract for P2 0037. The Laboratory for Open systems and networks is a press.com/2015/06/j0028-isc2-white-paper-a4-v5-260515lr.pdf.
member of ESCO and partner in Concordia competence centre. All [28] EU, European Commission, Policy, Cybersecurity Strategy of the European Union:
an Open, Safe and Secure Cyberspace, 2013. Retrieved in March 2021 from, http
support from both organizations is appreciated. s://digital-strategy.ec.europa.eu/en/policies/cybersecurity-policies.
[29] ENISA, Cybersecurity eHEI Data Base, 2019. Retrieved in April 2021 from, http
References s://www.enisa.europa.eu/about-enisa/data-protection/register_data_processin
g_activities/39-cybersecurity-higher-education-database.pdf/view.
[30] R. Ruiz, A study of the UK undergraduate computer science curriculum: a vision of
[1] EU, Resilience, Deterrence and Defence: Building Strong Cybersecurity for the EU, cybersecurity, IEEE international conference on global security, safety and
2017. https://eur-lex.europa.eu/legal-content/en/TXT/?uri=CELEX%3A52 sustainability (ICGS3), in: Proc. Of 12th IEEE Int. Conf. on Global Security, Safety
017JC0450. and Sustainability, IEEE, 2019, pp. 1–8.
[2] British Airways, Customer Data Theft, 2019. Retrieved January 2020 from, https [31] AUG, Australian Government, Update, Innovation, Growth & Prosperity, 2017.
://www.bbc.com/news/business-48905907. Retrieved September 2019 from, https://cybersecuritystrategy.pmc.gov.au/assets
[3] N. Vakakis, O. Nikolis, D. Ioannidis, K. Votis, D. Tzovaras, Cybersecurity in SMEs: /img/PMC-Cyber-Strategy.pdf, https://www.homeaffairs.gov.au/about-us/our
the smart-home/office use case, IEEE International Workshop on Computer-Aided -portfolios/cyber-security/strategy/. Retrieved August 2021 from.
Modeling, Analysis, and Design of Communication Links and Networks (2019), [32] A. Siraj, B. Taylor, S. Kaza, S. Ghafoor, Integrating security in the computer science
https://doi.org/10.1109/CAMAD.2019.8858471. curriculum, ACM Inroads 6 (2) (2015) 77–81.
[4] A. Ackerman, Too Few Cybersecurity Professionals Is a Gigantic Problem for 2019, [33] D. Rowe, B. Lunt, J. Ekstrom, The role of cyber-security in information technology
2019 retrieved July 2020 from, https://techcrunch.com/2019/01/27/too-few- education, in: Proceedings of the 2011 Conference on Information Technology
cybersecurity-professionals-is-a-gigantic-problem-for-2019/. Education - SIGITE, vol. 11, ACM Press, New York, New York, USA, 2011,
[5] B. Caulkins, T. Marlowe, A. Reardon, Cybersecurity skills to address Today’s pp. 113–121.
Threats, in: T. Ahram, D. Nicholson (Eds.), Advances in Human Factors in [34] C.M. LIibicki, D. Senty, J. Pollak, An Examination of the Cybersecurity Labour
Cybersecurity, AHFE 2018. Advances in Intelligent Systems and Computing, 2018, Market, RANDcorp, 2014. Retrieved in July 2020 from, https://www.rand.org/con
pp. 782–788. https://link.springer.com/chapter/10.1007/978-3-319-94782-2_18. tent/dam/rand/pubs/research_reports/RR400/RR430/RAND_RR430.pdf.
[6] M. Carlton, Y. Levy, Expert assessment of the top platform independent [35] M. Catota, M. Granger, D.C. Sicker, Cybersecurity education in a developing
cybersecurity skills for non-IT professionals, in: Proceedings of IEEE Southeast nation: the Ecuadorian environment, Journal of Cybersecurity (2) (2019) 1–19, 10-
Conference on Privacy, Fort Lauderdale, FL, USA, 2015. https://ieeexplore.ieee. 1093/cybsec/tyz001.
org/abstract/document/7132932. [36] W.A. Conklin, R.E. Cline, T. Roosa, Re-engineering Cybersecurity Education in the
[7] ISC2, Cybersecurity Workforce Study, 2018. Retrieved in July 2020 from, https:// US: an Analysis of the Critical Factors, 47th Hawaii International Conference on
www.isc2.org/-/media/7CC1598DE430469195F81017658B15D0.ashx. System Sciences, Waikoloa, HI, 2014, pp. 2006–2014, https://doi.org/10.1109/
[8] S. Mirza, M. Brown, Computer Weekly in April 2020, 2020. Retrieved in September HICSS.2014.254.
2020 from, https://computerweekly.com. [37] Cybersec4Europe, Report on the HEI Education in Cybersecurity. D 6.2, 2020.
[9] ESG, J. Oltisk, Enterprise strategy group. ESG Infographic: the Life and Times of Retrieved in March 2020 from, https://cybersec4europe.eu/publications/delivera
Cybersecurity Professionals 2021Cybersecurity Pending Trends, 2021. Retrieved bles/.
June 2021 from, https://www.esg-global.com/research/esg-infographic-the-life [38] PWC, Retrieved in January 2021 from, https://www.pwc.com/gx/en/issues/
-and-times-of-cybersecurity-professionals-2021. cybersecurity/digital-trust-insights/cyber-talent-workforce.html, 2021.
[10] Tripwire, The Experts’ Guide on Tackling the Cybersecurity Skills Gap, 2020. [39] J.S. Galliano, Improved Matching of Cybersecurity Professionals Skills to Job-
Retrieved in June 2020 from, https://www.tripwire.com/state-of-security/feature Related Competence: an Exploratory Study, PhD University of Fairfax, 2017.
d/expert-guide-tackling-cybersecurity-skills-gap/. Retrieved from, https://papers.ssrn.com/sol3/papers.cfm?abstract_id=3076897.
[11] Cybercrime Magazine, Page One for the Cybersecurity, July 2020. Retrieved from, [40] R. Omolohunnu, Cybersecurity: A Nonexperimental Correlational Study of
https://cybersecurityventures.com. Organizational Employees’ Security Perceptions and Vulnerabilities in Information
[12] T. Blair, Investigating the Cybersecurity Skills Gap, Utica College, ProQuest Technology Infrastructure, 2019. https://search.proquest.com/docview/23077850
Dissertations Publishing, 2017, 2017. Retrieved March 2021 from, https://search. 16?pq-origsite=gscholar&fromopenview=true.
proquest.com/docview/1989786177?pq-origsite=gscholar&fromopenview=true. [41] ECSO, Understanding Cyber Ranges: from Hype to Reality, 2020. Retrieved
[13] ECSO, Gaps in European Cyber Education and Professional Training, 2020. September 20th, 2020 from, https://ecs-org.eu/documents/publications/5fd
Retrieved in December 202 from, https://ecs-org.eu/documents/publications/5fd b291cdf5e7.pdf.
b282a4dcbd.pdf. [42] ECHO, Retrieved January 2021 from, https://echonetwork.eu, 2020.
[14] P. Michael, Closing the Information Security Skill Gap, 2018. Retrieved in [43] Concordia Report on Certification Schemes. D 7.1, 2020. Retrieved March 2021
September 2020 from, https://www.michaelpage.co.uk/our-expertise/techn from, https://echonetwork.eu/publications/.
ology/closing-information-security-skills-gap. [44] CCN – Comcordia, Cyber Competence Network– about, 2019. Retrieved July 2020
[15] C.M. LIibicki, D. Senty, J. Pollak, An Examination of the Cybersecurity Labour from, https://cybercompetencenetwork.eu/about.
Market, RANDcorp, 2014. Retrieved in July 2020 from, https://www.rand.org/con [45] MOOC, 20021. Learn with MOOCs about Cybersecurity | Free Online Courses,
tent/dam/rand/pubs/research_reports/RR400/RR430/RAND_RR430.pdf. March 2021. Retrieved from https://www.my-mooc.com 〉 categorie 〉
[16] N. Dragoni, A.L. Lafuente, F. Massacci, A. Schlichkrull, Are we preparing students cybersecurity.
to build security in? A Survey of European cybersecurity education programs, IEEE [46] Concordia report on Cybersecurity education, Deliverable 3.4, Establishing a
on security and privacy, IEEE Security and Privacy 19 (1) (2021) 81–88. https European Education Ecosystem for Cybersecurity, 2020. Retrieved in September
://backend.orbit.dtu.dk/ws/files/245510488/09336077.pdf. 2020 from, https://www.concordia-h2020.eu/concordia-reports/.
[17] M. Hentea, H.S. Dhillon, Towards changes in information security education, J. Inf. [47] IFIP, ACM/IEEE/AIS/IFIP Joint Task Force on Cybersecurity Education,
Technol. 5 (1) (2006) 221–233. Cybersecurity Curricula, 2017. https://cybered.hosting.acm.org/wp/.
[18] A. McGettrick, Towards effective cybersecurity education, IEEE Security and [48] J.H. Davenport, T. Crick, A.R. Hayes, R. Hourizi, The institute of coding:
Privacy 11 (6) (2013) 66–68. addressing the UK digital skills crisis, Proc. of 3rd Computing Education Practice
[19] Uk Cabinet Office, The UK Cybersecurity Strategy Protecting and Promoting the UK Conf. CEP 19 (10) (2019) 1–4, https://doi.org/10.1145/3294016.3298736.
in the Digital World, 2011. Retrieved in September 2019 from, https://connectio [49] J. Malan, E. Lale-Demoz, J. Rampton, Identifying the role of further and higher
ns-qj.org/article/uk-cyber-security-strategy-protecting-and-promoting-uk-digital- education in cyber security skills development. Skills mismatch: concepts,
world. measurement and policy, approaches, J. Econ. Surv. 32 (4) (2018) 985–992.
[20] CEN/TC 428, Role Profiles, 2020. https://www.ecompetences.eu/e-cf-overview/. [50] J. Dawson, R. Thomson, The future cybersecurity workforce: going beyond
[21] NICE, National Initiative for Cybersecurity Education . Cybersecurity Workforce technical skills for successful cyber performance, Front. Psychol. 12 (2018),
Framework, 2013. Retrieved September 2019 from, https://www.nist.gov/it https://doi.org/10.3389/fpsyg.2018.00744.
l/applied-cybersecurity/nice/nice-framework-resource-center. [51] Nsa-Dhs, National Centres of Academic Excellence in Cyber Defence Education
[22] W. Newhouse, S. Keith, B. Scribner, G. Witte, National initiative for cybersecurity Program (CAE-CDE) - Criteria for Measurement Bachelor, Master, and Doctoral
education (NICE), Retrieved October 2019 from, https://nvlpubs.nist.gov/nistpub Level, 2019. Retrieved in September 2020, https://www.ncyte.net/cae-program.
s/SpecialPublications/NIST.SP.800-181.pdf. [52] NCSC, UK National Cyber Security Centre. NCSC-Certified Degrees, 2017.
[23] ENISA, Cybersecurity Skills Development in the EU, 2020, 2020, https://www.eni https://www:ncsc:gov:uk/information/ncsc-certified-degrees/.
sa.europa.eu/publications/the-status-of-cyber-security-education-in-the-europe [53] BCS, The Chartered Institute for IT. Guidelines on Course Accreditation, 2018.
an-union/. Retrieved, September 2017 from, http://www:bcs:org/content/ConMediaFile/
[24] Concordia Competence Centre, 2019. Retrieved in February 2021 from, https 30202.
://www.concordia-h2020.eu/deliverables/. [54] USA accord, The international Washington accord, https://www.ieagreements.
[25] NIST, National Institute for Standard and Technology, Retrieved in March 2020, org/accords/washington/, 2019.
https://www.nist.gov/sites/default/files/documents/2017/08/04/t-mobile.pdf, [55] SAGM, Seul Accord, 2019 https://https://www.seoulaccord.org/.
2017. [56] CEN/TC 428, Methodology and Framework of the E-CF, 2020. Retrieved on March
[26] S. Sharkey, D. Morin, J. Hunter, Comment of T-Mobile USA. National Institute for 2021from https:/https://standards.iteh.ai/catalog/standards/cen/843eb75f-d024-
Standard and Technology ), The national cybersecurity workforce framework, 4a43-b274-073423eb0d8c/cen-tr-16234-2-2021/.

12
B.J. Blažič Technology in Society 67 (2021) 101769

[57] A. Martin, J. Collier, Beyond Awareness: the Breadth and Depth of the Cyber Skills [61] A. Parrish, J. Impagliazzo, K.R. Rajendra, H. Santos, M. Rizwan, Curriculum
Demand, Center for Technology and Global Affairs, Oxford University, 2019. guidelines for post-secondary degree programs in cybersecurity, in: A Report in the
Retrieved in July 2020 from, https://www.ctga.ox.ac.uk/article/beyond-awaren Computing Curricula Series, Joint Task Force on Cybersecurity Education, 2017.
ess-breadth-and-depth-cyber-skills-demand. https://www.acm.org/binaries/content/assets/education/curricula-recommenda
[58] l. Cabaj, D. Domingos, Z. Kotulski, A. Respício, Cybersecurity education: evolution tions/csec2017.pdf/.
of the discipline and analysis of master programs, Comput. Secur. (75) (2018) [62] J. Parrish, A. Impagliazzo, K. Rj Rajendra, H. Santos, M. Rizwan, Jsang A. Asghar,
24–35. June 2018. T. Pereira, E. Stavrou, Global perspectives on cybersecurity education for 2030: a
[59] M. Carlton, Y. Levy, Cybersecurity skills: foundational theory and the cornerstone case for a meta-discipline, in: Proc. Of ITiCSE 2018, ACM, 2018, pp. 36–54.
of advanced persistent threats (APTs) mitigation, Online Journal of Applied [63] F. Moller, T. Crick, A university-based model for supporting computer science
Knowledge Management - iiakm.org (2) (2017) 16–28, https://doi.org/10.36965/ curriculum reform, Journal of Computers in Education 5 (4) (2018) 415–434, in
OJAKM.2017.5. Cybersecurity. Retrieved in June 2020 from, https://link.springer.com/article/10
[60] C. Parr, Cybersecurity Skills Need Boost in Computer Science Degrees, 2014. .1007/s40692-018-0117-x.
Retrieved in April 2020 from, https://www:timeshighereducation:com/news/cybe [64] T. Hemphill, P. Longstreet, Financial data breaches in the U.S. retail economy:
rsecurity-skills-need-boost-in-computer-science-degrees/2016933:article/. restoring confidence in information technology security standards, Technol. Soc.
44 (2016) 30–38.

13

You might also like