The mis-routed candidate pool
The cybersecurity workforce gap has been documented for a decade. Roughly 469,000 US roles remain open per CyberSeek at this writing, and the supply-demand ratio sits near 0.85. The standard response to the gap has been to expand technical training pipelines, fund community college cybersecurity certificates, and push certification-based hiring. These responses are not wrong. They are incomplete. They operate on the assumption that cybersecurity candidates must be produced from technical backgrounds. That assumption misreads the nature of the work and misses a candidate pool the existing training pipelines are not designed to reach.
My doctoral capstone at the University of Miami, defended March 2026, investigated a narrow version of this question using art students rather than cybersecurity candidates. The study was titled Bridging Art and STEM: A Mixed-Methods Study Examining Whether Explicit Instruction and START Mapping Enable Art Students to Recognize STEM Processes in Creative Work, with co-researchers John Kumar and Daniel Leong. The pre/post design with n=16 art students tested whether explicit vocabulary instruction could surface the STEM-adjacent cognition that art students were already performing implicitly. The shift was measurable and larger in the qualitative artifacts than in the quantitative change scores. Students performed the same cognitive moves before and after the intervention. What changed was their ability to name those moves in STEM vocabulary.
The capstone generalizes directly to cybersecurity workforce development. A graphic designer who spends her days working through visual hierarchies, testing readability across audiences, and iterating based on observed behavior is performing reasoning cybersecurity fields label as threat modeling, adversarial testing, and behavioral analysis. A theater director who stages a production manages threat surfaces (the script can go wrong in many specific ways), establishes redundant controls (prompt lines, understudies, emergency exits), runs tabletop rehearsals, and conducts post-incident retrospectives. A historian who reconstructs a political event from fragmentary evidence performs exactly the reasoning a forensic investigator does. The field names the reasoning differently, and the field has no systematic way to recognize the underlying competence. That is the mis-routing problem.
What STEAM integration research actually shows
Georgette Yakman's 2008 paper[1] introduced STEAM as an extension of STEM with the arts as an integral rather than decorative component. Yakman argued that the isolation of disciplines in traditional schooling obscures the common cognitive moves that span them, and that an integrated curriculum produces learners who carry reasoning patterns from one domain to another. The claim is not that art students are secretly scientists. It is that the cognitive moves each discipline valorizes are partial overlaps with the cognitive moves other disciplines valorize, and an integrated curriculum makes the overlaps visible and usable.
Bequette and Bequette[2] extended the argument in 2012 with a critical review of the STEM-versus-STEAM literature. Their central contribution was the observation that arts integration is not decorative to STEM learning but structural. The specific cognitive moves they identified (iterative refinement, constraint-based problem solving, audience-conscious communication, ambiguity tolerance) are among the most important competencies cybersecurity hiring managers describe when asked what separates good practitioners from bad ones. The vocabulary is different. The underlying work is not.
Henriksen's 2014 study[3] of award-winning STEM teachers documented creative practice patterns among the teachers themselves. Domain humility, iterative design, and comfort with ambiguity emerged as recurring characteristics of the excellent STEM teachers in her sample. These are also the characteristics arts education deliberately develops in its students. The observation is consequential for workforce reasoning. Excellent performance in STEM requires cognitive dispositions that arts training produces as side effects, and arts training produces them more reliably than standard STEM pathways do.
Root-Bernstein and colleagues[5] provided empirical support from an unexpected angle. Their 2008 paper surveyed avocations (non-professional creative activities) among elite scientists (Nobel laureates, National Academy members, Royal Society fellows, Sigma Xi members). The finding was that elite scientists are substantially more likely to practice arts and crafts activities than scientists at lower tiers. Causality is not identified in the paper, but the association is robust and consistent with the STEAM-integration hypothesis: arts practice and elite STEM performance share underlying cognitive dispositions. Land's 2013 paper[6] documented similar associations at the curriculum level across multiple STEAM integration studies.
The four cybersecurity cognitive moves arts training builds
The STEAM literature makes claims that can sound hand-waving without concrete connection to the field in question. Four specific cognitive moves show up in both arts training and cybersecurity work, and each is teachable, observable, and load-bearing in cybersecurity performance. The cybersecurity field should recognize them.
The first is iterative refinement under external evaluation. The painting studio critique, the music recital rehearsal, the writing workshop revision cycle all train students to produce work, expose it to external critique, revise, and expose again. The studio model of arts education is built around this cycle. It is also exactly what cybersecurity detection engineering looks like. A detection rule is written. It runs against historical data. False positives are identified. The rule is revised. The rule is run again. The cycle repeats until the rule produces acceptable signal-to-noise ratios. A candidate who has spent four years in the studio critique cycle has substantial adjacent training for detection engineering work. Hiring pipelines that filter by cert instead of by artifact-and-critique discipline miss this candidate.
The second is ambiguity tolerance under decision pressure. Arts practice is fundamentally a process of making decisions without complete information. Every brushstroke, every line of dialogue, every measure of music is a decision under ambiguity. The artist cannot wait for certainty and still produce work. She must decide, observe the result, and decide again. This is the same cognitive posture incident responders describe as the central skill of the job: you will not have all the information when you need to decide, and the decision cannot be deferred. Candidates from arts backgrounds have cultivated this posture in ways that purely technical candidates often have not.
The third is audience modeling. Every art form is explicitly constructed for audiences, and arts training is explicit about modeling the audience before producing the work. This maps onto cybersecurity reporting in a direct way. A finding report that the engineering team will read needs different framing than a finding report the CFO will read, which needs different framing than a finding report that a regulator will read. Cybersecurity practitioners who have not learned audience modeling produce reports that only other security practitioners can act on, and the findings die in translation. Candidates from arts and humanities backgrounds arrive with the audience-modeling skill already developed. The field benefits when they are hired.
The fourth is pattern recognition across fragmentary evidence. Literary analysis, art-history attribution, musical-theme identification, and archaeological reconstruction all require the practitioner to make inferences from incomplete data. Cybersecurity threat hunting, forensic investigation, and threat-intelligence attribution require exactly the same skill. The vocabulary differs. The cognitive demand is the same. Humanities graduates who have spent four years reconstructing historical events from primary sources are trained to do what threat hunters do.
What the capstone's START mapping does that matters here
The START mapping framework from the capstone is a structured prompt set that asks the learner to label her existing cognitive moves in the target domain's vocabulary. For art students mapping to STEM, START prompted them to identify which specific STEM processes their creative work instantiated: hypothesis formation, iterative testing, evidence weighing, inference from incomplete data. The Ritchhart[4] making-thinking-visible tradition grounds the design. Students who had been doing the work without labels became students who could label and therefore claim the work. Spence's signaling theory[7] predicts that the new ability to label makes the underlying competence visible to evaluators who could not see it before.
A START-style mapping designed for cybersecurity career changers from arts and humanities backgrounds would ask the learner to identify which specific cybersecurity cognitive moves her prior practice instantiated. It would not ask her to acquire vocabulary first. It would ask her to map her existing practice to the target vocabulary, in a written artifact that the learner produces and an evaluator can read. The evaluator is not asked to take the candidate's claim on faith. She is given the mapped artifact, which is itself Ritchhart-style evidence of the reasoning.
This matters for the adult cybersecurity career changer from an arts background because it converts what currently feels like a disadvantage (the field does not recognize her credentials) into a usable signal (the mapped artifact demonstrates her adjacent reasoning). Knowles' andragogical framework[8] predicts that adult learners respect training that respects their prior experience. A cybersecurity training program that asks an arts graduate to start from zero fails Knowles' second assumption and produces disengagement. A program that asks her to map her existing competence succeeds.
Implications for cybersecurity recruiting practice
The recruiting implication of this research is specific. Cybersecurity hiring pipelines that filter by certification count miss candidates whose adjacent reasoning exceeds that of certified candidates with weaker adjacent reasoning. Firms that add an artifact review step, where candidates submit a constructed portfolio demonstrating mapped reasoning, gain access to a candidate pool invisible to their competitors. This is not a DEI exercise. It is a labor-market efficiency argument. Firms that adjust first access stronger candidates at lower competitive cost.
A concrete design for the artifact review step looks like this. The candidate is given a cybersecurity scenario at the entry-level difficulty of the target role. She is asked to describe in prose what she would do, why she would do it, and what she is uncertain about. The response is evaluated against a rubric whose concepts can be articulated in multiple vocabularies (arts, humanities, technical). A candidate who says she would "observe the scene first and trust her intuition about which thread to follow, since most signals in the environment are false alarms" has articulated triage prioritization in non-technical vocabulary. The rubric should recognize the reasoning. If the rubric only accepts the technical vocabulary, the evaluation is gated on signaling rather than on underlying competence, and Spence's[7] signaling theory predicts the predictable market inefficiency that follows.
The DecipherU readiness assessments are designed with this concept-not-keyword scoring in mind. The keyword banks include arts-adjacent vocabulary alongside the cybersecurity vocabulary, and the scoring evaluates the reasoning visible in the response, not the specific words the respondent used. This is not a gimmick. It is an application of the mapping principle the capstone validated. Hiring practices that adopt a similar concept-based evaluation rubric access candidate pools that keyword-based rubrics filter out.
Implications for cybersecurity training practice
The training implication is complementary. A cybersecurity training program that serves adult career changers from arts and humanities backgrounds should not begin with technical content. It should begin with a mapping exercise that surfaces the learner's existing adjacent reasoning, and then scaffold the acquisition of technical vocabulary onto the mapped foundation. Vygotsky's zone of proximal development[9] predicts that learners scaffolded this way progress faster and retain longer than learners taught technical vocabulary as the entry point.
Bandura's self-efficacy theory[10] adds a second argument. An adult arts graduate entering cybersecurity training has low domain-specific self-efficacy at the start of the transition. A program that opens by cataloguing her technical gaps reduces self-efficacy further, which predicts early dropout. A program that opens by mapping her existing competence increases self-efficacy through the first of Bandura's four sources, mastery experiences she can now narrate in the target vocabulary. The difference between the two design choices shows up as retention data across months.
Csikszentmihalyi's research on creativity and flow[11] adds a third. Learners in flow states process information faster and retain longer than learners in anxious or bored states. Arts graduates are often particularly attuned to flow-state cultivation because their training demanded it. A cybersecurity training program that respects flow-state design (focused sessions, minimal friction, meaningful challenge calibrated to the learner's current capability) aligns with what arts graduates already practice, and the alignment matters more than the technical content density for the first several months of the transition.
The DecipherU Cybersecurity Career Transition course applies these design principles explicitly. Module one opens with Knowles and Mezirow[13] rather than with technical content. Module four treats the portfolio as a constructed artifact in Papert's sense. The target learner for this course is deliberately broad, and arts-and-humanities graduates are among the populations the design is optimized for. The research base is strong enough that the sequencing is not a preference. It is an empirical commitment.
A closing argument for the field
Cybersecurity is a field that advertises itself as requiring creativity, ambiguity tolerance, pattern recognition, and audience-conscious communication. It is also a field whose hiring practices filter most strongly on certification-based signals and technical vocabulary. The two facts contradict each other. The STEAM-integration research tradition gives the field a method for resolving the contradiction without lowering standards. Reasoning is the bottleneck. Vocabulary is the currency. Firms that invest in evaluation rubrics that see through vocabulary to reasoning access stronger candidates at lower competitive cost. Training programs that scaffold vocabulary onto existing reasoning retain adult learners that certification-first programs lose.
The capstone that this essay extends was a small study. Sixteen art students at one institution. A replication at cybersecurity scale, with adult arts-and-humanities graduates mapping onto specific cybersecurity entry roles, is the next research step. Schön's reflective-practitioner framework[12] suggests that the DecipherU platform itself, which serves adult career changers from multiple prior backgrounds and produces substantial artifact evidence of their trajectories, is a candidate data source for that replication. I expect the replication to show what the original capstone showed at a different scale: that making existing reasoning visible to the learner and the evaluator is the unlock, and that the cybersecurity workforce pipeline has been leaving talent on the table because that unlock is absent from standard pipelines. This essay is the argument for why the pipelines should change. The DecipherU implementation is one attempt at how.
References
- [1]Yakman, G. (2008). STEAM education: An overview of creating a model of integrative education. Pupils' Attitudes Towards Technology (PATT), 19, 335-358.
- [2]Bequette, J. W., & Bequette, M. B. (2012). A place for art and design education in the STEM conversation. Art Education, 65(2), 40-47. https://doi.org/10.1080/00043125.2012.11519167
- [3]Henriksen, D. (2014). Full STEAM ahead: Creativity in excellent STEM teaching practices. The STEAM Journal, 1(2), Article 15. https://doi.org/10.5642/steam.20140102.15
- [4]Ritchhart, R., Church, M., & Morrison, K. (2011). Making thinking visible: How to promote engagement, understanding, and independence for all learners. Jossey-Bass.
- [5]Root-Bernstein, R., Allen, L., Beach, L., Bhadula, R., Fast, J., Hosey, C., Kremkow, B., Lapp, J., Lonc, K., Pawelec, K., Podufaly, A., Russ, C., Tennant, L., Vrtis, E., & Weinlander, S. (2008). Arts foster scientific success: Avocations of Nobel, National Academy, Royal Society, and Sigma Xi members. Journal of Psychology of Science and Technology, 1(2), 51-63. https://doi.org/10.1891/1939-7054.1.2.51
- [6]Land, M. H. (2013). Full STEAM ahead: The benefits of integrating the arts into STEM. Procedia Computer Science, 20, 547-552. https://doi.org/10.1016/j.procs.2013.09.317
- [7]Spence, M. (1973). Job market signaling. The Quarterly Journal of Economics, 87(3), 355-374. https://doi.org/10.2307/1882010
- [8]Knowles, M. S., Holton, E. F., & Swanson, R. A. (2015). The adult learner: The definitive classic in adult education and human resource development (8th ed.). Routledge. https://doi.org/10.4324/9781315816951
- [9]Vygotsky, L. S. (1978). Mind in society: The development of higher psychological processes. Harvard University Press.
- [10]Bandura, A. (1977). Self-efficacy: Toward a unifying theory of behavioral change. Psychological Review, 84(2), 191-215. https://doi.org/10.1037/0033-295X.84.2.191
- [11]Csikszentmihalyi, M. (1996). Creativity: Flow and the psychology of discovery and invention. Harper Collins.
- [12]Schön, D. A. (1983). The reflective practitioner: How professionals think in action. Basic Books.
- [13]Mezirow, J. (1991). Transformative dimensions of adult learning. Jossey-Bass.