Podcast: Basics of Cybersecurity and What You’re Securing

Vivian Lee

In our latest podcast, Basics of Cybersecurity and What You’re Securing, we interviewed Pat Gorman, a seasoned cybersecurity professional. With over 18 years in IT, he shares valuable insights for aspiring professionals. Pat excels in team management, network/server operations, and cybersecurity. Skilled in team motivation and compliance enforcement, Pat excels in security testing using tools such as Tenable.io and Kali Linux. Pat also shares knowledge through a YouTube channel focused on cybersecurity and IT education.

Episode Summary

  • From Entry to Expertise: Pat shared his personal journey into cybersecurity, revealing the pivotal moments that sparked his passion for the field. Today, he wears multiple hats, engaging with the community through platforms like YouTube and offering mentorship to aspiring cybersecurity enthusiasts.
  • Navigating the Basics of the Cyber Landscape: Wondering where to start your cybersecurity journey? Pat provided invaluable guidance, emphasizing the importance of understanding the fundamentals. Whether it’s diving into Security Operations Centers (SOCs), exploring offensive security tactics, or mastering the art of hacking WiFi networks, Pat highlighted key areas for beginners to focus on.
  • Key Takeaways and Tips: Beyond the basics, Pat offered additional pearls of wisdom for those keen on pursuing a career in cybersecurity. From staying updated on industry trends to honing problem-solving skills, his advice resonated with both newcomers and seasoned professionals alike.
  • Concluding Thoughts: As we wrapped up our conversation, it was evident that Pat’s insights had struck a chord with our audience. His journey from novice to expert serves as a beacon of inspiration for anyone embarking on their own cybersecurity odyssey.

Video Version

Listen to more episodes at www.airiam.com/podcast, on SpotifyApple Podcasts, Google PodcastsAmazon Music, and other podcast platforms.

New Resources In Your Inbox

Get our latest cybersecurity resources, content, tips and trends.

Other resources that might be of interest to you.

How Immutable Backups Exorcise Ransomware Hauntings

The Haunting of Corrupted Data: How Immutable Backups Exorcise Ransomware It’s stormy, water droplets slamming against the glass as you sit in the office doing another late night. You’re alone when the phone rings alive. Your hand hesitates midway, jus
Vivian Lee
>>Read More

Airiam Partners with UnderDefense to Set a New Benchmark for Cyber Resilience

[March 28, 2024] – Airiam, a leader in cybersecurity and resilience solutions has today announced its partnership with an innovative Managed Detection and Response (MDR) provider, UnderDefense, to set a new benchmark for cyber resilience in businesses.
Vivian Lee
>>Read More

Social Engineering: What to Look For and Things to Avoid

Social engineering plays a role in many cybersecurity attacks. What is Social Engineering? To begin with, attempts to gain access to your accounts or gather your personal information can come from anywhere: Facebook, Twitter, phone calls, text, etc. Th
Avatar photo
Andy Gritzer
>>Read More