Calendar An icon of a desk calendar. Cancel An icon of a circle with a diagonal line across. Caret An icon of a block arrow pointing to the right. Email An icon of a paper envelope. Facebook An icon of the Facebook "f" mark. Google An icon of the Google "G" mark. Linked In An icon of the Linked In "in" mark. Logout An icon representing logout. Profile An icon that resembles human head and shoulders. Telephone An icon of a traditional telephone receiver. Tick An icon of a tick mark. Is Public An icon of a human eye and eyelashes. Is Not Public An icon of a human eye and eyelashes with a diagonal line through it. Pause Icon A two-lined pause icon for stopping interactions. Quote Mark A opening quote mark. Quote Mark A closing quote mark. Arrow An icon of an arrow. Folder An icon of a paper folder. Breaking An icon of an exclamation mark on a circular background. Camera An icon of a digital camera. Caret An icon of a caret arrow. Clock An icon of a clock face. Close An icon of the an X shape. Close Icon An icon used to represent where to interact to collapse or dismiss a component Comment An icon of a speech bubble. Comments An icon of a speech bubble, denoting user comments. Comments An icon of a speech bubble, denoting user comments. Ellipsis An icon of 3 horizontal dots. Envelope An icon of a paper envelope. Facebook An icon of a facebook f logo. Camera An icon of a digital camera. Home An icon of a house. Instagram An icon of the Instagram logo. LinkedIn An icon of the LinkedIn logo. Magnifying Glass An icon of a magnifying glass. Search Icon A magnifying glass icon that is used to represent the function of searching. Menu An icon of 3 horizontal lines. Hamburger Menu Icon An icon used to represent a collapsed menu. Next An icon of an arrow pointing to the right. Notice An explanation mark centred inside a circle. Previous An icon of an arrow pointing to the left. Rating An icon of a star. Tag An icon of a tag. Twitter An icon of the Twitter logo. Video Camera An icon of a video camera shape. Speech Bubble Icon A icon displaying a speech bubble WhatsApp An icon of the WhatsApp logo. Information An icon of an information logo. Plus A mathematical 'plus' symbol. Duration An icon indicating Time. Success Tick An icon of a green tick. Success Tick Timeout An icon of a greyed out success tick. Loading Spinner An icon of a loading spinner. Facebook Messenger An icon of the facebook messenger app logo. Facebook An icon of a facebook f logo. Facebook Messenger An icon of the Twitter app logo. LinkedIn An icon of the LinkedIn logo. WhatsApp Messenger An icon of the Whatsapp messenger app logo. Email An icon of an mail envelope. Copy link A decentered black square over a white square.

‘I was heartbroken’: Dundee mum overcomes ‘nightmare’ childhood to win fame as IT security expert

Cheryl Torano.
Cheryl Torano.

A Dundee mum and IT professional has spoken about overcoming her “living nightmare” childhood to find success and feature in a new book.

Cheryl Torano.

Abertay ethical hacking graduate Cheryl Torano, 36, left school at 16 after a turbulent childhood spent in and out of the care system.

Excluded from school 18 times, she struggled to come to terms with the death of her older brother David Mara when she was only 15.

But she overcame her grief to gain a string of top level qualifications, and secure a job as a cyber security engineer with Dundee IT services company brightsolid.

She said: “I was a very troubled kid, spending most of my days worrying about whether or not my siblings and I were going to eat that day.”

She said her childhood “officially ended” when her brother David died in 1999, aged just 19.

“To say I was heartbroken would be an understatement,” she said.

“I shut down emotionally for a long time, and when I turned 16 I left school with basic qualifications to get paid employment just so that I could survive.”

David would have been 40-years-old on Friday, September 11.

David Mara and Cheryl Torano, Dundee.

Cheryl tells her story in The Rise of the Cyber Women, a collection of real life experiences of women working in cybersecurity.

After leaving school, she worked as an office admin where her struggles with a troublesome office printer sparked an interest that would go on to change her life.

She said: “I spent a lot of time researching the issues and fixing them myself.

“For the first time in my life I dared to dream, and that dream was for a career in IT. I applied to college, and much to my surprise I was accepted.”

Cheryl deferred the place for two years after discovering she was pregnant.

After college, she advanced to Abertay University’s ethical hacking course, where her research into how a talking child’s toy could be reprogrammed to say potentially harmful things led to the product’s withdrawal.

“I was proud to play my part in protecting children,” she said.

“Balancing being a parent and university life was far from easy, and at times I had to remind myself, when I was exhausted, that my end goal was to benefit my children and honour the memory of my brother.”

Cheryl Torano.

Cheryl said she has shared her story to inspire others, in particular women, to consider a career in cybersecurity.

“The industry needs more women with all different kinds of skills and backgrounds,” she said.

“Don’t be afraid to ask for help, then ask for help again. There will be days where it feels like there is no light at the end of the tunnel.

“If a broken little girl like I was can achieve what I’ve achieved, so can you.”