Connect with us

Interviews

“Don’t Be Discouraged if You’re the Only Woman in the Room”

Published

on

Morgan Demboski, the Threat Intelligence Analyst at Sophos, says the biggest challenge for women in technology is the lack of representation and female role models

Can you share your journey into the security world? What inspired you to pursue a career in this field?
I may not have originally planned to enter the tech industry, but my years of experience have shown me the significant impact of my work on our customers. Tactical threat intelligence examines the behaviors and observables of an attack—such as actions, tools, and infrastructure—while strategic threat intelligence focuses on broader aspects, including motivations, targeting, and attribution.

Early in my career, I often felt hesitant, particularly as the only woman on my team. However, I quickly realized that expertise, not gender, defines success in this field. As cybersecurity continues to evolve at an unprecedented pace, new challenges and threats emerge daily, making adaptability and resilience essential. No two days are the same, and the dynamic nature of the industry offers endless opportunities for growth and innovation.

What were some of the biggest challenges you faced as a woman, and how did you overcome them?
The biggest challenge for women in technology often depends on their specific role, but a common obstacle is the lack of representation and female role models. While progress has been made in improving gender diversity, it can still be daunting to work in environments where leadership is predominantly male. Seeing few women in senior positions can make career advancement feel like an uphill battle.

However, the industry is becoming more inclusive through initiatives such as women-in-cybersecurity programs and technical workshops designed to support and upskill women. Expanding these efforts is crucial in creating a more accessible and equitable industry for future generations.

How do you describe your leadership style, and how has it evolved over time?
I would describe my leadership style as collaborative and adaptive. In cyber threat intelligence, no one person has all the answers, so I prioritize teamwork, knowledge-sharing, and empowering others to contribute their unique expertise. Over time, my leadership style has evolved as I’ve gained more experience and confidence. Early on, I focused a lot on proving myself, but I’ve learned that great leadership isn’t about having all the answers—it’s about creating space for others to grow and succeed.

What strategies do you use to motivate and empower your team?
I actively support and mentor women in cyber threat intelligence, helping them develop their skills and advance in the industry. Industry conferences provide a great platform to connect with and guide women new to the field. At Sophos, I take pride in our commitment to addressing the gender pay gap. Through comprehensive reviews, structured budgets, and sustainable processes, our HR and leadership teams ensure equitable pay and career growth opportunities for women in cybersecurity.

Have you had any mentors or role models who have significantly influenced your career? How did they impact your journey?
Sophos has an incredible internal resource group, Sophos Women in Tech (SWiT), dedicated to empowering women in technology. Through initiatives like addressing global gender pay gaps, promoting STEM education for young girls, and providing mentorship and training, SWiT helps women build confidence in key areas such as negotiation and leadership. Being part of such a network has reinforced the importance of mentorship and advocacy in advancing women in technology, shaping my own commitment to supporting others in the field.

What advice would you give to young women aspiring to enter the security world?
To young women entering cybersecurity, don’t be discouraged if you’re the only woman in the room. Your value is defined by your expertise, not your gender. While women remain underrepresented in the field, this is an opportunity to drive change, reshape industry culture, and pave the way for future generations. Focus on continuous learning and embrace the journey of growth. With time and experience, your insights and leadership will naturally evolve, positioning you to guide and inspire others in the field.

Can you highlight some of your proudest achievements in your career so far?
I have several proud achievements, but I think I am most proud of my recent security conference presentations. Last year, I was accepted with a colleague to speak at Black Hat USA 2024 in Las Vegas on a years-long investigation we had conducted on a Chinese state-sponsored cyber espionage campaign targeting a government organization in Southeast Asia. We presented to an audience of over 700 people and was received with high regard, and I definitely consider it one of the highlights of my career.

How do you manage work-life balance, and what tips do you have for other women striving to achieve this balance?
Managing work-life balance in cyber threat intelligence can be challenging, especially in a field where threats don’t adhere to a 9-to-5 schedule. For me, balance comes from setting clear boundaries and prioritizing self-care just as much as my work. I think one of the best things you can do for yourself is to have a hobby completely unrelated to work. Cybersecurity can be intense, and I find it important to have a creative outlet. I personally enjoy pottery, painting, and bowling as my weekly hobbies, which helps me reset my mind and prevent burnout.

Interviews

“Find People Who Support You”

Published

on

Tatiana Bocharnikova, the Sales Director for Emirates at NetApp, says its more rewarding when young women reach out and say that her journey has inspired them (more…)

Continue Reading

Interviews

“We Can All Do Better By Treating Women in Tech as Equals”

Published

on

Heather Mahalik Barnhart, SANS Fellow and DFIR Curriculum Lead, says being heard in a room is something that many struggle with (more…)

Continue Reading

Cyber Security

Phishing Continues to Compromise Systems

Published

on

Biju Unni, the Vice President at Cloud Box Technologies, says cyberattacks on critical infrastructure in the MEA region are evolving rapidly (more…)

Continue Reading
Advertisement

Follow Us

Trending

Copyright © 2021 Security Review Magazine. Rysha Media LLC. All Rights Reserved.