Podcast: Basics of Cybersecurity and What You’re Securing

Vivian Lee

In our latest podcast, Basics of Cybersecurity and What You’re Securing, we interviewed Pat Gorman, a seasoned cybersecurity professional. With over 18 years in IT, he shares valuable insights for aspiring professionals. Pat excels in team management, network/server operations, and cybersecurity. Skilled in team motivation and compliance enforcement, Pat excels in security testing using tools such as Tenable.io and Kali Linux. Pat also shares knowledge through a YouTube channel focused on cybersecurity and IT education.

Episode Summary

  • From Entry to Expertise: Pat shared his personal journey into cybersecurity, revealing the pivotal moments that sparked his passion for the field. Today, he wears multiple hats, engaging with the community through platforms like YouTube and offering mentorship to aspiring cybersecurity enthusiasts.
  • Navigating the Basics of the Cyber Landscape: Wondering where to start your cybersecurity journey? Pat provided invaluable guidance, emphasizing the importance of understanding the fundamentals. Whether it’s diving into Security Operations Centers (SOCs), exploring offensive security tactics, or mastering the art of hacking WiFi networks, Pat highlighted key areas for beginners to focus on.
  • Key Takeaways and Tips: Beyond the basics, Pat offered additional pearls of wisdom for those keen on pursuing a career in cybersecurity. From staying updated on industry trends to honing problem-solving skills, his advice resonated with both newcomers and seasoned professionals alike.
  • Concluding Thoughts: As we wrapped up our conversation, it was evident that Pat’s insights had struck a chord with our audience. His journey from novice to expert serves as a beacon of inspiration for anyone embarking on their own cybersecurity odyssey.

Video Version

Listen to more episodes at www.airiam.com/podcast, on SpotifyApple Podcasts, Google PodcastsAmazon Music, and other podcast platforms.

New Resources In Your Inbox

Get our latest cybersecurity resources, content, tips and trends.

Other resources that might be of interest to you.

Managed Detection and Response (MDR): Don’t Let Cyber Zombies Infiltrate Your Network

Grab your baseball bats, axes, shovels, or whatever your choice of weapons is. It’s time for the cyber zombie apocalypse. Hunkering down in your secure network fortress isn’t an option anymore; the cyber zombies (malware, ransomware, and hackers) are b
Vivian Lee
>>Read More

Why Data Backups Are Important (And How to Do Them Right)

Most businesses know data backups are important, but they still treat them as an afterthought. However, backups aren’t just important—they’re essential.  Losing your system data isn’t just an annoyance or a setback. It could break your business overnig
Jesse Sumrak
>>Read More

How Often Should You Pentest?

  How Often Should You Pentest? Penetration testing is important because it allows organizations to simulate real-world attacks on their systems and networks in order to identify vulnerabilities and weaknesses.  By conducting these tests, companie
Avatar photo
Art Ocain
>>Read More