{"id":42090,"date":"2025-09-05T12:00:00","date_gmt":"2025-09-05T10:00:00","guid":{"rendered":"https:\/\/www.ie.edu\/uncover-ie\/?p=42090"},"modified":"2026-04-10T10:17:45","modified_gmt":"2026-04-10T08:17:45","slug":"specializing-in-cybersecurity-master-in-computer-science-and-business-technology","status":"publish","type":"post","link":"https:\/\/www.ie.edu\/uncover-ie\/specializing-in-cybersecurity-master-in-computer-science-and-business-technology\/","title":{"rendered":"Specializing in cybersecurity: Future tech careers"},"content":{"rendered":"<span class=\"span-reading-time rt-reading-time\" style=\"display: block;\"><span class=\"rt-label rt-prefix\"><\/span> <span class=\"rt-time\"> 5<\/span> <span class=\"rt-label rt-postfix\">min read<\/span><\/span>\n<p>Welcome to cybersecurity\u2014the latest addition to the <a href=\"https:\/\/www.ie.edu\/school-science-technology\/programs\/master-in-computer-science-and-business-technology\/\" target=\"_blank\" rel=\"noreferrer noopener\">Master in Computer Science &amp; Business Technology<\/a>. Led by IE alum and CySuite Group founder, <a href=\"https:\/\/www.linkedin.com\/in\/martadezavala\/?originalSubdomain=ae\" target=\"_blank\" rel=\"noreferrer noopener\">Marta de Zavala<\/a>, this elective puts students ahead in modern business strategy, where cybersecurity is a fundamental pillar for businesses in the mid- and long-term.&nbsp;<\/p>\n\n\n\n<p>Let&#8217;s find out how specializing in cybersecurity can guide you towards a meaningful career.&nbsp;<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-why-does-the-cybersecurity-specialization-give-you-a-competitive-advantage-in-the-market-nbsp\">Why does the cybersecurity specialization give you a competitive advantage in the market?&nbsp;<\/h2>\n\n\n\n<p>Marta first graduated in Business Management and Administration, after which she started working in tech sales before shifting to a cybersecurity career in consulting\u2014the latter with thanks to gaining master\u2019s degree at <a href=\"https:\/\/www.ie.edu\/school-science-technology\/\" target=\"_blank\" rel=\"noreferrer noopener\">IE School of Science &amp; Technology<\/a>. The master\u2019s gave her the chance to meet an important need in the corporate market: Filling the gap between business teams and cybersecurity.&nbsp;<\/p>\n\n\n\n<p>Now, as a cybersecurity professional, Marta aims to share real-world knowledge with students. &#8220;I started teaching cybersecurity management at IE Business School,&#8221; Marta explains. &#8220;There&#8217;s value in seeing the link between cybersecurity and business strategy. And that&#8217;s what my profile is all about that.&#8221;<\/p>\n\n\n\n<div class=\"wp-block-columns is-layout-flex wp-container-core-columns-is-layout-28f84493 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-vertically-aligned-center is-layout-flow wp-block-column-is-layout-flow\">\n<h3 class=\"wp-block-heading\" id=\"h-as-such-the-new-cybersecurity-specialization-focuses-on-strategy\">As such, the new cybersecurity specialization focuses on strategy.<\/h3>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\">\n<figure class=\"wp-block-gallery has-nested-images columns-default is-cropped wp-block-gallery-1 is-layout-flex wp-block-gallery-is-layout-flex\">\n<figure class=\"wp-block-image size-large\"><img fetchpriority=\"high\" decoding=\"async\" width=\"1024\" height=\"683\" data-id=\"42491\" src=\"https:\/\/www.ie.edu\/uncover-ie\/wp-content\/uploads\/2025\/09\/specialize-in-cybersecurity-1024x683.jpg\" alt=\"\" class=\"wp-image-42491\" srcset=\"https:\/\/www.ie.edu\/uncover-ie\/wp-content\/uploads\/2025\/09\/specialize-in-cybersecurity-1024x683.jpg 1024w, https:\/\/www.ie.edu\/uncover-ie\/wp-content\/uploads\/2025\/09\/specialize-in-cybersecurity-300x200.jpg 300w, https:\/\/www.ie.edu\/uncover-ie\/wp-content\/uploads\/2025\/09\/specialize-in-cybersecurity-150x100.jpg 150w, https:\/\/www.ie.edu\/uncover-ie\/wp-content\/uploads\/2025\/09\/specialize-in-cybersecurity-768x512.jpg 768w, https:\/\/www.ie.edu\/uncover-ie\/wp-content\/uploads\/2025\/09\/specialize-in-cybersecurity.jpg 1200w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n<\/figure>\n<\/div>\n<\/div>\n\n\n\n<p>&#8220;We&#8217;ll analyze the field from a company perspective, which has a lot to do with reputation,&#8221; says Marta. &#8220;We&#8217;ll examine system security, network security and data protection as part of strategy, alongside crisis management and compliance. Those are the key points of departure. We&#8217;ll also have workshops about security quantification\u2014breaking down costs, understanding how much cybersecurity costs a company in comparison to the collateral after a cyber attack.&#8221;&nbsp;<\/p>\n\n\n\n<p>&#8220;In sales, everything&#8217;s easier after a cyber attack because people buy out of fear,&#8221; says Marta. &#8220;But it&#8217;s important to have a strong foundation in prevention, which is a big aspect of cybersecurity strategy. That means justifying costs to a CEO or CFO. Our specialization will allow students to tackle all fields of cybersecurity from the technical side to the business side.&#8221;\u00a0<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-challenges-facing-cybersecurity-nbsp\">Challenges facing cybersecurity&nbsp;<\/h2>\n\n\n\n<p>Cybersecurity already faces real challenges that companies must prepare for. For Marta, training people continues to be critical. \u201cMore than 80% of successful cyber attacks come from&nbsp;human risk,&#8221; Marta says. &#8220;Phishing emails, for instance, or impersonations. You can have top-tier technology, but if your people aren&#8217;t trained, you can still fail.&#8221;&nbsp;<\/p>\n\n\n\n<p>&#8220;There are instances of millions of dollars being lost. Solving this be as simple as having a clear protocol to avoid these situations. Let&#8217;s say, every time we receive a certain type of email, we require two-factor authentication, right? Or instead of just deleting a phishing email, we take the extra-step of personally calling the company or provider to confirm whether the request is legitimate.&#8221;&nbsp;<\/p>\n\n\n\n<div class=\"wp-block-columns is-layout-flex wp-container-core-columns-is-layout-28f84493 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-vertically-aligned-center is-layout-flow wp-block-column-is-layout-flow\">\n<h3 class=\"wp-block-heading\" id=\"h-looking-ahead-marta-s-team-at-cysuite-group-are-preparing-for-new-levels-of-threat-nbsp\"><strong>Looking ahead, Marta\u2019s team at CySuite Group are preparing for new levels of threat.<\/strong>&nbsp;<\/h3>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\">\n<figure class=\"wp-block-gallery has-nested-images columns-default is-cropped wp-block-gallery-2 is-layout-flex wp-block-gallery-is-layout-flex\">\n<figure class=\"wp-block-image size-large\"><img decoding=\"async\" width=\"1024\" height=\"632\" data-id=\"42492\" src=\"https:\/\/www.ie.edu\/uncover-ie\/wp-content\/uploads\/2025\/09\/cybersecurity-businesses-1024x632.jpg\" alt=\"\" class=\"wp-image-42492\" srcset=\"https:\/\/www.ie.edu\/uncover-ie\/wp-content\/uploads\/2025\/09\/cybersecurity-businesses-1024x632.jpg 1024w, https:\/\/www.ie.edu\/uncover-ie\/wp-content\/uploads\/2025\/09\/cybersecurity-businesses-300x185.jpg 300w, https:\/\/www.ie.edu\/uncover-ie\/wp-content\/uploads\/2025\/09\/cybersecurity-businesses-150x93.jpg 150w, https:\/\/www.ie.edu\/uncover-ie\/wp-content\/uploads\/2025\/09\/cybersecurity-businesses-768x474.jpg 768w, https:\/\/www.ie.edu\/uncover-ie\/wp-content\/uploads\/2025\/09\/cybersecurity-businesses.jpg 1200w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n<\/figure>\n<\/div>\n<\/div>\n\n\n\n<p>One of the main challenges in the near future is post-quantum security, which involves all the safeguards needed for companies to prevent and minimize the impact of a quantum computer cyberattack.&nbsp;<\/p>\n\n\n\n<p>\u201cEven if your data is safe today, it may not be once quantum computing becomes mainstream,&#8221; says Marta. &#8220;To put it simply, our current encryption methods will become outdated. Right now, powerful quantum computers like those from IBM and Google are mainly used for research. But the moment they become widely accessible, cybercriminals will use them too. That\u2019s why we\u2019re researching and developing solutions now\u2014so companies can prepare for that future before it arrives.\u201d&nbsp;<\/p>\n\n\n\n<p>CySuite Group are tackling the uncertainty with extensive research, with a current portfolio of service that includes detailed code audits inside companies, reviewing systems line by line and flagging areas for future improvement.&nbsp;<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-careers-after-specializing-in-cybersecurity-nbsp\">Careers after specializing in cybersecurity&nbsp;<\/h2>\n\n\n\n<p>The rising interest in cybersecurity has generated a new inlet of jobs for tech-savvy professionals. In fact, it was Marta&#8217;s time in tech sales at a large multinational <a href=\"https:\/\/www.ie.edu\/uncover-ie\/how-computer-scientists-are-mastering-the-world-of-biztech\/\" target=\"_blank\" rel=\"noreferrer noopener\">technology<\/a> group that allowed her to buck the trend. &#8220;This was in 2017, before cybersecurity boomed,&#8221; she explains. &#8220;<a href=\"https:\/\/www.ie.edu\/uncover-ie\/the-impact-of-data-privacy-regulations-on-global-business-governance\/\" target=\"_blank\" rel=\"noreferrer noopener\">GDPR<\/a> didn&#8217;t come into action until 2018. Companies were already facing issues like hacking and there was noise of regulations arriving. Sectors like banking or healthcare were pushing towards acquiring this type of service.&#8221;&nbsp;<\/p>\n\n\n\n<div class=\"wp-block-columns is-layout-flex wp-container-core-columns-is-layout-28f84493 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-vertically-aligned-center is-layout-flow wp-block-column-is-layout-flow\">\n<h3 class=\"wp-block-heading\" id=\"h-marta-subsequently-received-a-grant-to-study-at-ie-school-of-science-amp-technology-it-was-during-this-time-she-was-approached-by-a-multinational-consulting-firm\"><strong>Marta subsequently received a grant to study at IE School of Science &amp; Technology. It was during this time she was approached by a multinational consulting firm.<\/strong><\/h3>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\">\n<figure class=\"wp-block-gallery has-nested-images columns-default is-cropped wp-block-gallery-3 is-layout-flex wp-block-gallery-is-layout-flex\">\n<figure class=\"wp-block-image size-large\"><img decoding=\"async\" width=\"1024\" height=\"701\" data-id=\"42493\" src=\"https:\/\/www.ie.edu\/uncover-ie\/wp-content\/uploads\/2025\/09\/cybersecurity-degree-1024x701.jpg\" alt=\"\" class=\"wp-image-42493\" srcset=\"https:\/\/www.ie.edu\/uncover-ie\/wp-content\/uploads\/2025\/09\/cybersecurity-degree-1024x701.jpg 1024w, https:\/\/www.ie.edu\/uncover-ie\/wp-content\/uploads\/2025\/09\/cybersecurity-degree-300x205.jpg 300w, https:\/\/www.ie.edu\/uncover-ie\/wp-content\/uploads\/2025\/09\/cybersecurity-degree-150x103.jpg 150w, https:\/\/www.ie.edu\/uncover-ie\/wp-content\/uploads\/2025\/09\/cybersecurity-degree-768x526.jpg 768w, https:\/\/www.ie.edu\/uncover-ie\/wp-content\/uploads\/2025\/09\/cybersecurity-degree.jpg 1080w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n<\/figure>\n<\/div>\n<\/div>\n\n\n\n<p>Marta worked in the consulting sector with large financial institutions in Spain and governmental entities in Saudi Arabi before going on to found her own company in Dubai. &#8220;I decided it was time for me to launch my own business,&#8221; Marta explains. &#8220;I noticed a need in the market for cyber security firms that could adapt to middle-size entities and not necessarily carry the big names we&#8217;re so used to seeing. So I started <a href=\"https:\/\/www.linkedin.com\/company\/cysuitegroup\/?originalSubdomain=ae\" target=\"_blank\" rel=\"noreferrer noopener\">CySuite<\/a>. We now have clients in the UAE, Saudi, Europe, Portugal, the UK and established partnerships in South America. &#8221;&nbsp;<\/p>\n\n\n\n<p>Reflecting on her own professional growth, Marta insists that graduates with this specialization will have a world of options open to them. Some may find themselves in consulting, where each project presents a new challenge, while others may opt for in-house roles at corporates, working across departments. The real opportunity lies in fuzing approaches. &#8220;Businesses need professionals who can translate complex technical risks into strategic priorities,&#8221; says Marta. With the centrality of data compliance in reputation, companies need experts in public-facing roles, handling crisis management protocols or working alongside PR teams.&nbsp;<\/p>\n\n\n\n<p>That, of course, doesn&#8217;t rule out technical roles. \u201cThey may want to specialize in ethical hacking,\u201d Marta notes. &#8220;Companies now stress-test their systems to identify vulnerabilities. Others may focus on compliance, tackling issues like money laundering or terrorism. There&#8217;s also growing interest in data protection, especially with fast-developing fields like cryptography and post-quantum security.&#8221;&nbsp;<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-become-more-with-ie-school-of-science-amp-technology-nbsp\">Become more with IE School of Science &amp; Technology&nbsp;<\/h2>\n\n\n\n<p>Marta\u2019s journey\u2014from business student to cybersecurity entrepreneur\u2014captures exactly what the <a href=\"https:\/\/www.ie.edu\/school-science-technology\/programs\/master-in-computer-science-and-business-technology\/\" target=\"_blank\" rel=\"noreferrer noopener\">Master in Computer Science &amp; Business Technology<\/a> is designed to support. Her ability to bridge technical knowledge with strategic thinking&nbsp;shows how today\u2019s cybersecurity leaders need more than just technical skills; they need business acumen, communication abilities and a clear understanding of organizational goals.&nbsp;<\/p>\n\n\n\n<p>This is the same mindset the program fosters. Through hands-on projects, industry collaboration and specializations like cybersecurity, students build a dual skill set that prepares them to work across departments, industries and even borders. Marta\u2019s own career proves how impactful this combination can be\u2014from helping global clients manage risk to publishing resources like &#8220;<a href=\"https:\/\/www.amazon.com\/Cybersecurity-Families-pretty-everyone-Cysuite\/dp\/B0CNY6QY5P\" target=\"_blank\" rel=\"noreferrer noopener\">Cyber Security for Families<\/a>&#8221; to build awareness beyond the office.&nbsp;<\/p>\n\n\n\n<p>Whether you want to consult, lead innovation in a corporate setting, or start something of your own, change is possible at IE School of Science &amp; Technology. Follow the link below to find out more information.<\/p>\n\n\n\n<div class=\"wp-block-columns banner h-banner banner-b is-layout-flex wp-container-core-columns-is-layout-28f84493 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\">\n<h3 class=\"wp-block-heading banner-title\" id=\"boost-your-career-with-our-master-in-management\">Start specializing in cybersecurity with IE School of Science &amp; Technology<\/h3>\n\n\n\n<p class=\"banner-content\">Study the Master in Computer Science &amp; Business Analytics.<\/p>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\">\n<div class=\"wp-block-buttons is-layout-flex wp-block-buttons-is-layout-flex\">\n<div class=\"wp-block-button banner-btn\"><a class=\"wp-block-button__link wp-element-button\" href=\"https:\/\/www.ie.edu\/school-science-technology\/programs\/master-in-computer-science-and-business-technology\/\" target=\"_blank\" rel=\"noreferrer noopener\">Learn more<\/a><\/div>\n<\/div>\n<\/div>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>Gain insights from Marta de Zavala, course leader and IE alum.<\/p>\n","protected":false},"author":56,"featured_media":42420,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":"","_wpscppro_dont_share_socialmedia":false,"_wpscppro_custom_social_share_image":0,"_facebook_share_type":"","_twitter_share_type":"","_linkedin_share_type":"","_pinterest_share_type":"","_linkedin_share_type_page":"","_instagram_share_type":"","_medium_share_type":"","_threads_share_type":"","_google_business_share_type":"","_selected_social_profile":[],"_wpsp_enable_custom_social_template":false,"_wpsp_social_scheduling":{"enabled":true,"datetime":"2025-09-05 10:00:00","platforms":[],"status":"pending_publication","dateOption":"today","timeOption":"now","customDays":"","customHours":"","customDate":"","customTime":"","schedulingType":"absolute"},"_wpsp_active_default_template":true},"categories":[335,1084],"tags":[508,483,489,944],"class_list":["post-42090","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-admissions-programs","category-program-insights","tag-master-in-computer-science-and-business-technology","tag-masters","tag-school-of-science-and-technology","tag-science-technology-and-data"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v24.4 (Yoast SEO v27.3) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Specializing in cybersecurity: Future tech careers<\/title>\n<meta name=\"description\" content=\"Interested in studying computer science and business technology? Start specializing in cybersecurity with IE School of Science &amp; Technology.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.ie.edu\/uncover-ie\/specializing-in-cybersecurity-master-in-computer-science-and-business-technology\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Specializing in cybersecurity: Future tech careers\" \/>\n<meta property=\"og:description\" content=\"Interested in studying computer science and business technology? Start specializing in cybersecurity with IE School of Science &amp; Technology.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.ie.edu\/uncover-ie\/specializing-in-cybersecurity-master-in-computer-science-and-business-technology\/\" \/>\n<meta property=\"og:site_name\" content=\"Uncover IE\" \/>\n<meta property=\"article:published_time\" content=\"2025-09-05T10:00:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2026-04-10T08:17:45+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.ie.edu\/uncover-ie\/wp-content\/uploads\/2025\/08\/specializing-in-cybersecurity-1.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"2560\" \/>\n\t<meta property=\"og:image:height\" content=\"1375\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Benjamin Bridson\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Benjamin Bridson\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"6 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.ie.edu\\\/uncover-ie\\\/specializing-in-cybersecurity-master-in-computer-science-and-business-technology\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.ie.edu\\\/uncover-ie\\\/specializing-in-cybersecurity-master-in-computer-science-and-business-technology\\\/\"},\"author\":{\"name\":\"Benjamin Bridson\",\"@id\":\"https:\\\/\\\/www.ie.edu\\\/uncover-ie\\\/#\\\/schema\\\/person\\\/40456c228b5d3161530c80ce4cb0ede6\"},\"headline\":\"Specializing in cybersecurity: Future tech careers\",\"datePublished\":\"2025-09-05T10:00:00+00:00\",\"dateModified\":\"2026-04-10T08:17:45+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.ie.edu\\\/uncover-ie\\\/specializing-in-cybersecurity-master-in-computer-science-and-business-technology\\\/\"},\"wordCount\":1179,\"publisher\":{\"@id\":\"https:\\\/\\\/www.ie.edu\\\/uncover-ie\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.ie.edu\\\/uncover-ie\\\/specializing-in-cybersecurity-master-in-computer-science-and-business-technology\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.ie.edu\\\/uncover-ie\\\/wp-content\\\/uploads\\\/2025\\\/08\\\/specializing-in-cybersecurity-1.jpg\",\"keywords\":[\"Master in Computer Science and Business Technology\",\"Masters\",\"School of Science and Technology\",\"Science Technology and Data\"],\"articleSection\":[\"Admissions &amp; Programs\",\"Program insights\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.ie.edu\\\/uncover-ie\\\/specializing-in-cybersecurity-master-in-computer-science-and-business-technology\\\/\",\"url\":\"https:\\\/\\\/www.ie.edu\\\/uncover-ie\\\/specializing-in-cybersecurity-master-in-computer-science-and-business-technology\\\/\",\"name\":\"Specializing in cybersecurity: Future tech careers\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.ie.edu\\\/uncover-ie\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.ie.edu\\\/uncover-ie\\\/specializing-in-cybersecurity-master-in-computer-science-and-business-technology\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.ie.edu\\\/uncover-ie\\\/specializing-in-cybersecurity-master-in-computer-science-and-business-technology\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.ie.edu\\\/uncover-ie\\\/wp-content\\\/uploads\\\/2025\\\/08\\\/specializing-in-cybersecurity-1.jpg\",\"datePublished\":\"2025-09-05T10:00:00+00:00\",\"dateModified\":\"2026-04-10T08:17:45+00:00\",\"description\":\"Interested in studying computer science and business technology? Start specializing in cybersecurity with IE School of Science & Technology.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.ie.edu\\\/uncover-ie\\\/specializing-in-cybersecurity-master-in-computer-science-and-business-technology\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.ie.edu\\\/uncover-ie\\\/specializing-in-cybersecurity-master-in-computer-science-and-business-technology\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.ie.edu\\\/uncover-ie\\\/specializing-in-cybersecurity-master-in-computer-science-and-business-technology\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.ie.edu\\\/uncover-ie\\\/wp-content\\\/uploads\\\/2025\\\/08\\\/specializing-in-cybersecurity-1.jpg\",\"contentUrl\":\"https:\\\/\\\/www.ie.edu\\\/uncover-ie\\\/wp-content\\\/uploads\\\/2025\\\/08\\\/specializing-in-cybersecurity-1.jpg\",\"width\":2560,\"height\":1375,\"caption\":\"Specializing in cybersecurity: Future tech careers\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.ie.edu\\\/uncover-ie\\\/specializing-in-cybersecurity-master-in-computer-science-and-business-technology\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Portada\",\"item\":\"https:\\\/\\\/www.ie.edu\\\/uncover-ie\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Specializing in cybersecurity: Future tech careers\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.ie.edu\\\/uncover-ie\\\/#website\",\"url\":\"https:\\\/\\\/www.ie.edu\\\/uncover-ie\\\/\",\"name\":\"Uncover IE\",\"description\":\"Uncover IE\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.ie.edu\\\/uncover-ie\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.ie.edu\\\/uncover-ie\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.ie.edu\\\/uncover-ie\\\/#organization\",\"name\":\"Uncover IE\",\"url\":\"https:\\\/\\\/www.ie.edu\\\/uncover-ie\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.ie.edu\\\/uncover-ie\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.ie.edu\\\/uncover-ie\\\/wp-content\\\/uploads\\\/2021\\\/03\\\/logo.png\",\"contentUrl\":\"https:\\\/\\\/www.ie.edu\\\/uncover-ie\\\/wp-content\\\/uploads\\\/2021\\\/03\\\/logo.png\",\"width\":1609,\"height\":356,\"caption\":\"Uncover IE\"},\"image\":{\"@id\":\"https:\\\/\\\/www.ie.edu\\\/uncover-ie\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.ie.edu\\\/uncover-ie\\\/#\\\/schema\\\/person\\\/40456c228b5d3161530c80ce4cb0ede6\",\"name\":\"Benjamin Bridson\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.ie.edu\\\/uncover-ie\\\/wp-content\\\/uploads\\\/2025\\\/04\\\/cropped-ie_emba_abril2514674-1-scaled-1-96x96.jpg\",\"url\":\"https:\\\/\\\/www.ie.edu\\\/uncover-ie\\\/wp-content\\\/uploads\\\/2025\\\/04\\\/cropped-ie_emba_abril2514674-1-scaled-1-96x96.jpg\",\"contentUrl\":\"https:\\\/\\\/www.ie.edu\\\/uncover-ie\\\/wp-content\\\/uploads\\\/2025\\\/04\\\/cropped-ie_emba_abril2514674-1-scaled-1-96x96.jpg\",\"caption\":\"Benjamin Bridson\"},\"description\":\"Benjamin is the editor of Uncover IE. His writing is featured in the LAMDA Verse and Prose Anthology Vol. 19, The Primer and Moonflake Press. Benjamin provided translation for \\\"FalseStuff: La Muerte de las Musas\\\", winner of Best Theatre Show at the Max Awards 2024. Benjamin was shortlisted for the Bristol Old Vic Open Sessions 2016 and the Alpine Fellowship Writing Prize 2023.\",\"url\":\"https:\\\/\\\/www.ie.edu\\\/uncover-ie\\\/author\\\/ben-bridson\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Specializing in cybersecurity: Future tech careers","description":"Interested in studying computer science and business technology? Start specializing in cybersecurity with IE School of Science & Technology.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.ie.edu\/uncover-ie\/specializing-in-cybersecurity-master-in-computer-science-and-business-technology\/","og_locale":"en_US","og_type":"article","og_title":"Specializing in cybersecurity: Future tech careers","og_description":"Interested in studying computer science and business technology? Start specializing in cybersecurity with IE School of Science & Technology.","og_url":"https:\/\/www.ie.edu\/uncover-ie\/specializing-in-cybersecurity-master-in-computer-science-and-business-technology\/","og_site_name":"Uncover IE","article_published_time":"2025-09-05T10:00:00+00:00","article_modified_time":"2026-04-10T08:17:45+00:00","og_image":[{"width":2560,"height":1375,"url":"https:\/\/www.ie.edu\/uncover-ie\/wp-content\/uploads\/2025\/08\/specializing-in-cybersecurity-1.jpg","type":"image\/jpeg"}],"author":"Benjamin Bridson","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Benjamin Bridson","Est. reading time":"6 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.ie.edu\/uncover-ie\/specializing-in-cybersecurity-master-in-computer-science-and-business-technology\/#article","isPartOf":{"@id":"https:\/\/www.ie.edu\/uncover-ie\/specializing-in-cybersecurity-master-in-computer-science-and-business-technology\/"},"author":{"name":"Benjamin Bridson","@id":"https:\/\/www.ie.edu\/uncover-ie\/#\/schema\/person\/40456c228b5d3161530c80ce4cb0ede6"},"headline":"Specializing in cybersecurity: Future tech careers","datePublished":"2025-09-05T10:00:00+00:00","dateModified":"2026-04-10T08:17:45+00:00","mainEntityOfPage":{"@id":"https:\/\/www.ie.edu\/uncover-ie\/specializing-in-cybersecurity-master-in-computer-science-and-business-technology\/"},"wordCount":1179,"publisher":{"@id":"https:\/\/www.ie.edu\/uncover-ie\/#organization"},"image":{"@id":"https:\/\/www.ie.edu\/uncover-ie\/specializing-in-cybersecurity-master-in-computer-science-and-business-technology\/#primaryimage"},"thumbnailUrl":"https:\/\/www.ie.edu\/uncover-ie\/wp-content\/uploads\/2025\/08\/specializing-in-cybersecurity-1.jpg","keywords":["Master in Computer Science and Business Technology","Masters","School of Science and Technology","Science Technology and Data"],"articleSection":["Admissions &amp; Programs","Program insights"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.ie.edu\/uncover-ie\/specializing-in-cybersecurity-master-in-computer-science-and-business-technology\/","url":"https:\/\/www.ie.edu\/uncover-ie\/specializing-in-cybersecurity-master-in-computer-science-and-business-technology\/","name":"Specializing in cybersecurity: Future tech careers","isPartOf":{"@id":"https:\/\/www.ie.edu\/uncover-ie\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.ie.edu\/uncover-ie\/specializing-in-cybersecurity-master-in-computer-science-and-business-technology\/#primaryimage"},"image":{"@id":"https:\/\/www.ie.edu\/uncover-ie\/specializing-in-cybersecurity-master-in-computer-science-and-business-technology\/#primaryimage"},"thumbnailUrl":"https:\/\/www.ie.edu\/uncover-ie\/wp-content\/uploads\/2025\/08\/specializing-in-cybersecurity-1.jpg","datePublished":"2025-09-05T10:00:00+00:00","dateModified":"2026-04-10T08:17:45+00:00","description":"Interested in studying computer science and business technology? Start specializing in cybersecurity with IE School of Science & Technology.","breadcrumb":{"@id":"https:\/\/www.ie.edu\/uncover-ie\/specializing-in-cybersecurity-master-in-computer-science-and-business-technology\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.ie.edu\/uncover-ie\/specializing-in-cybersecurity-master-in-computer-science-and-business-technology\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.ie.edu\/uncover-ie\/specializing-in-cybersecurity-master-in-computer-science-and-business-technology\/#primaryimage","url":"https:\/\/www.ie.edu\/uncover-ie\/wp-content\/uploads\/2025\/08\/specializing-in-cybersecurity-1.jpg","contentUrl":"https:\/\/www.ie.edu\/uncover-ie\/wp-content\/uploads\/2025\/08\/specializing-in-cybersecurity-1.jpg","width":2560,"height":1375,"caption":"Specializing in cybersecurity: Future tech careers"},{"@type":"BreadcrumbList","@id":"https:\/\/www.ie.edu\/uncover-ie\/specializing-in-cybersecurity-master-in-computer-science-and-business-technology\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Portada","item":"https:\/\/www.ie.edu\/uncover-ie\/"},{"@type":"ListItem","position":2,"name":"Specializing in cybersecurity: Future tech careers"}]},{"@type":"WebSite","@id":"https:\/\/www.ie.edu\/uncover-ie\/#website","url":"https:\/\/www.ie.edu\/uncover-ie\/","name":"Uncover IE","description":"Uncover IE","publisher":{"@id":"https:\/\/www.ie.edu\/uncover-ie\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.ie.edu\/uncover-ie\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.ie.edu\/uncover-ie\/#organization","name":"Uncover IE","url":"https:\/\/www.ie.edu\/uncover-ie\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.ie.edu\/uncover-ie\/#\/schema\/logo\/image\/","url":"https:\/\/www.ie.edu\/uncover-ie\/wp-content\/uploads\/2021\/03\/logo.png","contentUrl":"https:\/\/www.ie.edu\/uncover-ie\/wp-content\/uploads\/2021\/03\/logo.png","width":1609,"height":356,"caption":"Uncover IE"},"image":{"@id":"https:\/\/www.ie.edu\/uncover-ie\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.ie.edu\/uncover-ie\/#\/schema\/person\/40456c228b5d3161530c80ce4cb0ede6","name":"Benjamin Bridson","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.ie.edu\/uncover-ie\/wp-content\/uploads\/2025\/04\/cropped-ie_emba_abril2514674-1-scaled-1-96x96.jpg","url":"https:\/\/www.ie.edu\/uncover-ie\/wp-content\/uploads\/2025\/04\/cropped-ie_emba_abril2514674-1-scaled-1-96x96.jpg","contentUrl":"https:\/\/www.ie.edu\/uncover-ie\/wp-content\/uploads\/2025\/04\/cropped-ie_emba_abril2514674-1-scaled-1-96x96.jpg","caption":"Benjamin Bridson"},"description":"Benjamin is the editor of Uncover IE. His writing is featured in the LAMDA Verse and Prose Anthology Vol. 19, The Primer and Moonflake Press. Benjamin provided translation for \"FalseStuff: La Muerte de las Musas\", winner of Best Theatre Show at the Max Awards 2024. Benjamin was shortlisted for the Bristol Old Vic Open Sessions 2016 and the Alpine Fellowship Writing Prize 2023.","url":"https:\/\/www.ie.edu\/uncover-ie\/author\/ben-bridson\/"}]}},"_links":{"self":[{"href":"https:\/\/www.ie.edu\/uncover-ie\/wp-json\/wp\/v2\/posts\/42090","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.ie.edu\/uncover-ie\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.ie.edu\/uncover-ie\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.ie.edu\/uncover-ie\/wp-json\/wp\/v2\/users\/56"}],"replies":[{"embeddable":true,"href":"https:\/\/www.ie.edu\/uncover-ie\/wp-json\/wp\/v2\/comments?post=42090"}],"version-history":[{"count":46,"href":"https:\/\/www.ie.edu\/uncover-ie\/wp-json\/wp\/v2\/posts\/42090\/revisions"}],"predecessor-version":[{"id":45348,"href":"https:\/\/www.ie.edu\/uncover-ie\/wp-json\/wp\/v2\/posts\/42090\/revisions\/45348"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.ie.edu\/uncover-ie\/wp-json\/wp\/v2\/media\/42420"}],"wp:attachment":[{"href":"https:\/\/www.ie.edu\/uncover-ie\/wp-json\/wp\/v2\/media?parent=42090"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.ie.edu\/uncover-ie\/wp-json\/wp\/v2\/categories?post=42090"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.ie.edu\/uncover-ie\/wp-json\/wp\/v2\/tags?post=42090"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}