Top In-Demand Cybersecurity Skills in the Upcoming Years

Hey there,

We recently ran a series of webinars* on how different-sized cybersecurity teams modernized their security operations and embedded polling questions within the webinars to gather some feedback. A set of possible answers was selected based on the ENISA NIS Investments report. In this blog post I’d like to share the results of the polls and the conclusions we can draw from them.

The Right Skills, Processes and Technology with the Right Data

When establishing or modernizing security operations across an organization to make it become more resilient, two important elements are needed:

  1. People with the right skills
  2. Processes and technology with the right data

Skills Decreasing in Value

Skills that have been in high demand in recent years are now decreasing in value. They include:

Skills Increasing in Value

With many traditional cybersecurity tasks giving way to automation, what know-how still makes cybersecurity professionals indispensable in their field? Fortunately, there is still plenty according to ENISA. I have personally enjoyed many of them for years and they are also a reflection of our security strategy here at Splunk. The key cybersecurity competencies ENISA identified as the winners in the years ahead are:

What is the Number One Cybersecurity Skill that any Security Department will need?

When deciding to advance your skill set you may be confronted with a choice between the ISACA CISM Course (Risk Management), the Splunk Developing SOAR Playbooks Course (Incident Response) and the Splunk For Data Analytics and Data Science Training (Data Science and Analysis).

Let’s take a look at the results of our poll, listing the focus skills by priority.:

In-demand cybersecurity skills

Insights into the Security Operations Maturity

In order to dive deeper into maturity levels we asked two additional questions. These questions were aligned with two modernization stories we talked about in our webinar 5 Security Modernization Stories: What Our Customers Taught Us In 2020.

In the first story, Skyscanner shared how crucial it was for them to enrich their data with context such as “To which project belongs an EC2 instance on AWS”, ”What is the criticality of an IP Address” or “Is a highly privileged user behind a certain username”. It is not a big surprise that most participants of our poll considered enriching data and adding context to security alerts to be very important. Fortunately, these best practise enrichment concepts are built into Splunk Enterprise Security.

In the second modernization story Norlys talked about how they increased efficiency with Splunk Phantom and their playbooks. They shared how they measured their improvements with different KPIs such as Mean Time to Detect, Respond, Contain, Recover and Closure. The poll also revealed that the majority of organizations measure more than 5 KPIs in security operations.

Top In-demand cybersecurity skills

Hope this gave you some valuable insight to help you plan and take your security operations to the next level.

Cheers,

Matthias

*The majority of webinar attendees had job titles such as CISO, Head of Information Security, SOC Product Owner or Cyber Security Team Lead.

Related Articles

Predicting Cyber Fraud Through Real-World Events: Insights from Domain Registration Trends
Security
12 Minute Read

Predicting Cyber Fraud Through Real-World Events: Insights from Domain Registration Trends

By analyzing new domain registrations around major real-world events, researchers show how fraud campaigns take shape early, helping defenders spot threats before scams surface.
When Your Fraud Detection Tool Doubles as a Wellness Check: The Unexpected Intersection of Security and HR
Security
4 Minute Read

When Your Fraud Detection Tool Doubles as a Wellness Check: The Unexpected Intersection of Security and HR

Behavioral analytics can spot fraud and burnout. With UEBA built into Splunk ES Premier, one data set helps security and HR reduce risk, retain talent, faster.
Splunk Security Content for Threat Detection & Response: November Recap
Security
1 Minute Read

Splunk Security Content for Threat Detection & Response: November Recap

Discover Splunk's November security content updates, featuring enhanced Castle RAT threat detection, UAC bypass analytics, and deeper insights for validating detections on research.splunk.com.
Security Staff Picks To Read This Month, Handpicked by Splunk Experts
Security
2 Minute Read

Security Staff Picks To Read This Month, Handpicked by Splunk Experts

Our Splunk security experts share their favorite reads of the month so you can follow the most interesting, news-worthy, and innovative stories coming from the wide world of cybersecurity.
Behind the Walls: Techniques and Tactics in Castle RAT Client Malware
Security
10 Minute Read

Behind the Walls: Techniques and Tactics in Castle RAT Client Malware

Uncover CastleRAT malware's techniques (TTPs) and learn how to build Splunk detections using MITRE ATT&CK. Protect your network from this advanced RAT.
AI for Humans: A Beginner’s Field Guide
Security
12 Minute Read

AI for Humans: A Beginner’s Field Guide

Unlock AI with the our beginner's field guide. Demystify LLMs, Generative AI, and Agentic AI, exploring their evolution and critical cybersecurity applications.
Splunk Security Content for Threat Detection & Response: November 2025 Update
Security
5 Minute Read

Splunk Security Content for Threat Detection & Response: November 2025 Update

Learn about the latest security content from Splunk.
Operation Defend the North: What High-Pressure Cyber Exercises Teach Us About Resilience and How OneCisco Elevates It
Security
3 Minute Read

Operation Defend the North: What High-Pressure Cyber Exercises Teach Us About Resilience and How OneCisco Elevates It

The OneCisco approach is not about any single platform or toolset; it's about fusing visibility, analytics, and automation into a shared source of operational truth so that teams can act decisively, even in the fog of crisis.
Data Fit for a Sovereign: How to Consider Sovereignty in Your Digital Resilience Strategy
Security
5 Minute Read

Data Fit for a Sovereign: How to Consider Sovereignty in Your Digital Resilience Strategy

Explore how digital sovereignty shapes resilient strategies for European organisations. Learn how to balance control, compliance, and agility in your data infrastructure with Cisco and Splunk’s flexible, secure solutions for the AI era.