Podcast: Basics of Cybersecurity and What You’re Securing

Vivian Lee

In our latest podcast, Basics of Cybersecurity and What You’re Securing, we interviewed Pat Gorman, a seasoned cybersecurity professional. With over 18 years in IT, he shares valuable insights for aspiring professionals. Pat excels in team management, network/server operations, and cybersecurity. Skilled in team motivation and compliance enforcement, Pat excels in security testing using tools such as Tenable.io and Kali Linux. Pat also shares knowledge through a YouTube channel focused on cybersecurity and IT education.

Episode Summary

  • From Entry to Expertise: Pat shared his personal journey into cybersecurity, revealing the pivotal moments that sparked his passion for the field. Today, he wears multiple hats, engaging with the community through platforms like YouTube and offering mentorship to aspiring cybersecurity enthusiasts.
  • Navigating the Basics of the Cyber Landscape: Wondering where to start your cybersecurity journey? Pat provided invaluable guidance, emphasizing the importance of understanding the fundamentals. Whether it’s diving into Security Operations Centers (SOCs), exploring offensive security tactics, or mastering the art of hacking WiFi networks, Pat highlighted key areas for beginners to focus on.
  • Key Takeaways and Tips: Beyond the basics, Pat offered additional pearls of wisdom for those keen on pursuing a career in cybersecurity. From staying updated on industry trends to honing problem-solving skills, his advice resonated with both newcomers and seasoned professionals alike.
  • Concluding Thoughts: As we wrapped up our conversation, it was evident that Pat’s insights had struck a chord with our audience. His journey from novice to expert serves as a beacon of inspiration for anyone embarking on their own cybersecurity odyssey.

Video Version

Listen to more episodes at www.airiam.com/podcast, on SpotifyApple Podcasts, Google PodcastsAmazon Music, and other podcast platforms.

New Resources In Your Inbox

Get our latest cybersecurity resources, content, tips and trends.

Other resources that might be of interest to you.

Hybrid AI: How to Use Multiple Tools to Deliver Maximum Value

Most businesses make the same mistake with AI: they pick one tool and try to force it to do everything. Microsoft Copilot becomes their solution for coding, content creation, data analysis, and customer support. Or they subscribe to ChatGPT Plus and ex
Jesse Sumrak
>>Read More

Stop Cyber Werewolves: The Importance of Identity Management

Imagine a cybercriminal as a werewolf—a shape-shifting predator that blends into the shadows, hiding its true nature until it strikes. These cyber werewolves use clever tactics to steal your identity and impersonate you, wreaking havoc within your comp
Vivian Lee
>>Read More

Cloud Monitoring Services: What They Are & How They Work

Cloud monitoring services keep your cloud environments operating smoothly. They help your business monitor its infrastructure, applications, and services closely, providing real-time visibility into your cloud deployments’ health and performance. This
Jesse Sumrak
>>Read More