Interviews
“Don’t Be Discouraged if You’re the Only Woman in the Room”
Morgan Demboski, the Threat Intelligence Analyst at Sophos, says the biggest challenge for women in technology is the lack of representation and female role models
Can you share your journey into the security world? What inspired you to pursue a career in this field?
I may not have originally planned to enter the tech industry, but my years of experience have shown me the significant impact of my work on our customers. Tactical threat intelligence examines the behaviors and observables of an attack—such as actions, tools, and infrastructure—while strategic threat intelligence focuses on broader aspects, including motivations, targeting, and attribution.
Early in my career, I often felt hesitant, particularly as the only woman on my team. However, I quickly realized that expertise, not gender, defines success in this field. As cybersecurity continues to evolve at an unprecedented pace, new challenges and threats emerge daily, making adaptability and resilience essential. No two days are the same, and the dynamic nature of the industry offers endless opportunities for growth and innovation.
What were some of the biggest challenges you faced as a woman, and how did you overcome them?
The biggest challenge for women in technology often depends on their specific role, but a common obstacle is the lack of representation and female role models. While progress has been made in improving gender diversity, it can still be daunting to work in environments where leadership is predominantly male. Seeing few women in senior positions can make career advancement feel like an uphill battle.
However, the industry is becoming more inclusive through initiatives such as women-in-cybersecurity programs and technical workshops designed to support and upskill women. Expanding these efforts is crucial in creating a more accessible and equitable industry for future generations.
How do you describe your leadership style, and how has it evolved over time?
I would describe my leadership style as collaborative and adaptive. In cyber threat intelligence, no one person has all the answers, so I prioritize teamwork, knowledge-sharing, and empowering others to contribute their unique expertise. Over time, my leadership style has evolved as I’ve gained more experience and confidence. Early on, I focused a lot on proving myself, but I’ve learned that great leadership isn’t about having all the answers—it’s about creating space for others to grow and succeed.
What strategies do you use to motivate and empower your team?
I actively support and mentor women in cyber threat intelligence, helping them develop their skills and advance in the industry. Industry conferences provide a great platform to connect with and guide women new to the field. At Sophos, I take pride in our commitment to addressing the gender pay gap. Through comprehensive reviews, structured budgets, and sustainable processes, our HR and leadership teams ensure equitable pay and career growth opportunities for women in cybersecurity.
Have you had any mentors or role models who have significantly influenced your career? How did they impact your journey?
Sophos has an incredible internal resource group, Sophos Women in Tech (SWiT), dedicated to empowering women in technology. Through initiatives like addressing global gender pay gaps, promoting STEM education for young girls, and providing mentorship and training, SWiT helps women build confidence in key areas such as negotiation and leadership. Being part of such a network has reinforced the importance of mentorship and advocacy in advancing women in technology, shaping my own commitment to supporting others in the field.
What advice would you give to young women aspiring to enter the security world?
To young women entering cybersecurity, don’t be discouraged if you’re the only woman in the room. Your value is defined by your expertise, not your gender. While women remain underrepresented in the field, this is an opportunity to drive change, reshape industry culture, and pave the way for future generations. Focus on continuous learning and embrace the journey of growth. With time and experience, your insights and leadership will naturally evolve, positioning you to guide and inspire others in the field.
Can you highlight some of your proudest achievements in your career so far?
I have several proud achievements, but I think I am most proud of my recent security conference presentations. Last year, I was accepted with a colleague to speak at Black Hat USA 2024 in Las Vegas on a years-long investigation we had conducted on a Chinese state-sponsored cyber espionage campaign targeting a government organization in Southeast Asia. We presented to an audience of over 700 people and was received with high regard, and I definitely consider it one of the highlights of my career.
How do you manage work-life balance, and what tips do you have for other women striving to achieve this balance?
Managing work-life balance in cyber threat intelligence can be challenging, especially in a field where threats don’t adhere to a 9-to-5 schedule. For me, balance comes from setting clear boundaries and prioritizing self-care just as much as my work. I think one of the best things you can do for yourself is to have a hobby completely unrelated to work. Cybersecurity can be intense, and I find it important to have a creative outlet. I personally enjoy pottery, painting, and bowling as my weekly hobbies, which helps me reset my mind and prevent burnout.
GISEC
ManageEngine @ GISEC Global 2025: AI, Quantum Computing, and Ransomware Form Part of Cybersecurity Outlook for 2025
As AI-powered attacks and quantum computing reshape the cyber threat landscape, organizations must rethink traditional defense strategies. In an exclusive interview, Sujoy Banerjee, Associate Director at ManageEngine, reveals how businesses can prepare for 2025’s most critical threats—from AI-generated phishing scams to quantum-decrypted ransomware (more…)
GISEC
Positive Technologies @ GISEC Global 2025: Demonstrating Cutting-Edge Cyber Threats and AI Defense Strategies
At GISEC Global 2025, Positive Technologies showcased live demonstrations of sophisticated hacking techniques while emphasising the growing role of AI in both cyber attacks and defense. In an exclusive interview with Security Review, Ilya Leonov, the Regional Director at Positive Technologies revealed insights about the Middle East’s evolving threat landscape, their work with regional governments, and why investing in human expertise remains critical despite advancing technologies (more…)
GISEC
Group-IB @ GISEC Global 2025: Tackling Evolving Cyber Threats with Localised Intelligence and AI
At this year’s GISEC Global, cybersecurity firm Group-IB showcased its expanding role in combating increasingly sophisticated cyber threats. In an exclusive interview with Security Review, Ashraf Koheil, the META Director of Business at Group-IB, discussed the company’s growing presence at GISEC, emerging cybercrime trends, and how their AI-powered threat intelligence platform is helping businesses and governments stay ahead of attackers (more…)
-
GISEC1 week agoPositive Technologies @ GISEC Global 2025: Demonstrating Cutting-Edge Cyber Threats and AI Defense Strategies
-
Cyber Security1 week agoAxis Communications Sheds Light on Video Surveillance Industry Perspectives on AI
-
GISEC1 week agoVideo: SANS Institute Weighs in on Deepfakes, Model Poisoning and Risk Frameworks at GISEC Global 2025
-
GISEC1 week agoManageEngine @ GISEC Global 2025: AI, Quantum Computing, and Ransomware Form Part of Cybersecurity Outlook for 2025
-
GISEC1 week agoVideo: SentinelOne Speaks Hyperautomation, Purple AI, and the Future of Threat Detection at GISEC Global 2025
-
Africa Focus6 days agoCyberKnight Sets Up South Africa Entity
-
GISEC1 week agoGroup-IB @ GISEC Global 2025: Tackling Evolving Cyber Threats with Localised Intelligence and AI
-
GISEC1 week agoVideo: CyberKnight on Zero Trust, AI, and Saudi Arabia’s Digital Transformation at GISEC Global 2025
