Welcome to Woman In Cyber Security

Maytal Brooks-Kempler, The Cyber Woman !

by Magda CHELLY November 08, 2017

Maytal Brooks-Kempler, The Cyber Woman !

Maytal Brooks-Kempler is the founder and CEO of “Helena Security” a consulting firm specializing in Security Awareness.

Maytal had a non-orthodox career: from the role of Security Analyst in the Israeli Army, to a business role as an Account Manager where she understood that she preferred the technical side and moved to be a Pre-sales Engineer and Security Architect. After a few years, in 2010 Maytal wanted a new challenge and moved to the consulting world.

In 2014 Maytal began delivering the CISSP training (as an authorized (ISC)2 instructor) and since then has delivered dozens of CISSP, HCISPP and CISO classes.


How did you achieve what you did?

There is no substitute for hard work. As a lecturer, I see a lot of young motivated individuals who ask me how they can find a high-ranking position, my response is always the same – Do the legwork… there are no shortcuts, learn, work, accumulate experience.


Throughout my career I always take the time to learn more, from the academic side (I hold a BA in Biology and Business administration and an MBA), to Security trainings (CCSE, CISSP, ISO27001 Auditor to name just a few of the courses I attended) and self-development courses. I have weekly time slots dedicated to learning and updating.


What were the main challenges

As a woman, I faced many challenges over the years. Many times, when I entered meetings with a salesman, people assumed that I was the saleswoman and he- the technical consultant.

Over the years, as I accumulated more experience, my self-confidence increased and I stopped apologizing for being a cyber woman!

Another challenge is balancing family and career. I have three amazing children and a supportive partner (He is an Electrical Engineer – so he has long days as well). Having children and wanting to spend time with them, is not something one should apologize for, however for me it was obviously a challenge in an environment with a majority of men.

I am continuously striving to enhance my high-performance capabilities and have people judge me by my actual work and no my hours of work.


How would you encourage women to join technology/cyber security?

The gender gap in the tech work is shocking. Only 25% of tech employees are woman, only 11% of the cyber industry!

It saddens me when I open a new course and in many cases, I’m the only woman in the room.

 I’m here to tell young aspiring women – You can do it!

Cyber Security is a fascinating, challenging, changing, creative field that women have a lot to contribute to.


What are the best tips that you advise to follow.

Never let anyone lower you. You CAN have it all

Women in cyber is power!





Magda Lilia Chelly, is the Managing Director of Responsible Cyber Pte. by day, and a cyber feminist hacker by night. Magda is the brand ambassador of Peerlyst, one of the strongest InfoSec online communities. She spends most of her time supporting chief information security officers in their cyber security strategy and roadmap. She reviews technical architectures, cloud migrations, and digital transformations. She is continuously raising cyber security awareness & diversity at a global scale. She is currently based in Singapore, with a global reach through her company in 19 locations worldwide. She speaks five languages fluently, and has a PhD in Telecommunication Engineering with a subsequent specialization in cyber security. She also was recently nominated as global leader of the year at the Women in IT Awards 2017, and TOP 50 cyber security influencer globally.

Also in Cyber Role Models

The Story of Franziska Bühler-Schmocker, Between Web Server Security and Web Application Firewalls
The Story of Franziska Bühler-Schmocker, Between Web Server Security and Web Application Firewalls

by Magda CHELLY November 28, 2017

Franziska Bühler currently works as a Senior Systems Engineer in Switzerland. 
Her main areas of responsibility are web server security and everything related to the access layer. In Switzerland, this typically includes authentication and web application firewalls.
She holds a Bachelor of Science degree in computer science with a specialization in IT security. She is also a Certified OSSTMM Professional Security Tester (OPST), accredited by ISECOM (Institute for Security and Open Methodologies).

Continue Reading

Amber C. Williamson, Cybersecurity is a fascinating field and it’s never a dull moment in this industry
Amber C. Williamson, Cybersecurity is a fascinating field and it’s never a dull moment in this industry

by Magda CHELLY November 19, 2017

Amber C. Williamson is an IT Mentor Advocate for upcoming aspirants in the Cybersecurity & Information Technology world. Her journey was introduced during her childhood and has never left. She is the first generation in her family to have a Double Bachelor’s and Double Master’s Degree in Biology, Computer Science, Information Systems, and Network Communications. Amber has over 12+ years of industry experience and currently pursuing her cybersecurity certifications for 2018. She is a force to be reckon with and willing to make a difference in the lives of others in Cyber Security.

Continue Reading

Sarah Hendrickson; Pen tests, vulnerability scanning, red team testing – I built it all !
Sarah Hendrickson; Pen tests, vulnerability scanning, red team testing – I built it all !

by Magda CHELLY November 12, 2017

I worked my way through college at a Research and Development lab for a company that milled flour and made baking mixes for consumers as well as restaurants.  I obtained my degree in Chemistry and the lab job included running the analyticals to write the product nutritionals (%fat, %carbs, %protein, etc.).  At almost 6’ tall, I was significantly taller than my manager and when she went to read the instrumentation, her results varied significantly than mine.  I used a software application to calibrate the instruments to remove the human error.  It worked well and they asked me to do this for the instruments in their Quality Assurance lab.  This was the only time I have ever “coded”. 

Continue Reading