Podcast: Basics of Cybersecurity and What You’re Securing

Vivian Lee

In our latest podcast, Basics of Cybersecurity and What You’re Securing, we interviewed Pat Gorman, a seasoned cybersecurity professional. With over 18 years in IT, he shares valuable insights for aspiring professionals. Pat excels in team management, network/server operations, and cybersecurity. Skilled in team motivation and compliance enforcement, Pat excels in security testing using tools such as Tenable.io and Kali Linux. Pat also shares knowledge through a YouTube channel focused on cybersecurity and IT education.

Episode Summary

  • From Entry to Expertise: Pat shared his personal journey into cybersecurity, revealing the pivotal moments that sparked his passion for the field. Today, he wears multiple hats, engaging with the community through platforms like YouTube and offering mentorship to aspiring cybersecurity enthusiasts.
  • Navigating the Basics of the Cyber Landscape: Wondering where to start your cybersecurity journey? Pat provided invaluable guidance, emphasizing the importance of understanding the fundamentals. Whether it’s diving into Security Operations Centers (SOCs), exploring offensive security tactics, or mastering the art of hacking WiFi networks, Pat highlighted key areas for beginners to focus on.
  • Key Takeaways and Tips: Beyond the basics, Pat offered additional pearls of wisdom for those keen on pursuing a career in cybersecurity. From staying updated on industry trends to honing problem-solving skills, his advice resonated with both newcomers and seasoned professionals alike.
  • Concluding Thoughts: As we wrapped up our conversation, it was evident that Pat’s insights had struck a chord with our audience. His journey from novice to expert serves as a beacon of inspiration for anyone embarking on their own cybersecurity odyssey.

Video Version

Listen to more episodes at www.airiam.com/podcast, on SpotifyApple Podcasts, Google PodcastsAmazon Music, and other podcast platforms.

New Resources In Your Inbox

Get our latest cybersecurity resources, content, tips and trends.

Other resources that might be of interest to you.

Cloud Monitoring Services: What They Are & How They Work

Cloud monitoring services keep your cloud environments operating smoothly. They help your business monitor its infrastructure, applications, and services closely, providing real-time visibility into your cloud deployments’ health and performance. This
Jesse Sumrak
>>Read More

How to Protect Your Network with Air-Gapped Systems

Cyber threats are evolving faster than you can say “two-factor authentication.” From sneaky ransomware to persistent threats that lurk in the shadows of your network, the online landscape can feel like a digital minefield. If you’re responsible for kee
Jesse Sumrak
>>Read More

Cyber Insurance vs Cyber Threats

Cyber insurance is no substitute for prevention, but it should still be treated as a preventative step, often a step (or several steps) behind zero-day threats. What Does Cyber Insurance Cover? After a ransomware outbreak, it’s common to think, “insura
Avatar photo
Jared Sholley
>>Read More