Podcast: Basics of Cybersecurity and What You’re Securing

Vivian Lee

In our latest podcast, Basics of Cybersecurity and What You’re Securing, we interviewed Pat Gorman, a seasoned cybersecurity professional. With over 18 years in IT, he shares valuable insights for aspiring professionals. Pat excels in team management, network/server operations, and cybersecurity. Skilled in team motivation and compliance enforcement, Pat excels in security testing using tools such as Tenable.io and Kali Linux. Pat also shares knowledge through a YouTube channel focused on cybersecurity and IT education.

Episode Summary

  • From Entry to Expertise: Pat shared his personal journey into cybersecurity, revealing the pivotal moments that sparked his passion for the field. Today, he wears multiple hats, engaging with the community through platforms like YouTube and offering mentorship to aspiring cybersecurity enthusiasts.
  • Navigating the Basics of the Cyber Landscape: Wondering where to start your cybersecurity journey? Pat provided invaluable guidance, emphasizing the importance of understanding the fundamentals. Whether it’s diving into Security Operations Centers (SOCs), exploring offensive security tactics, or mastering the art of hacking WiFi networks, Pat highlighted key areas for beginners to focus on.
  • Key Takeaways and Tips: Beyond the basics, Pat offered additional pearls of wisdom for those keen on pursuing a career in cybersecurity. From staying updated on industry trends to honing problem-solving skills, his advice resonated with both newcomers and seasoned professionals alike.
  • Concluding Thoughts: As we wrapped up our conversation, it was evident that Pat’s insights had struck a chord with our audience. His journey from novice to expert serves as a beacon of inspiration for anyone embarking on their own cybersecurity odyssey.

Video Version

Listen to more episodes at www.airiam.com/podcast, on SpotifyApple Podcasts, Google PodcastsAmazon Music, and other podcast platforms.

New Resources In Your Inbox

Get our latest cybersecurity resources, content, tips and trends.

Other resources that might be of interest to you.

What Is Identity and Access Management (IAM): Complete Guide

With our modern-day hyper-connected world, the old “castle-and-moat” approach to security just doesn’t cut it anymore. Cloud services, remote work, and interconnected systems have become the norm, making the traditional network perimeter practically no
Jesse Sumrak
>>Read More

E-Greetings or E-Threats? The Era of Holiday E-Cards

E-Greetings or E-Threats? It’s the holiday season! This means sweet treats, lights and ornaments, and holiday cards with well wishes. Unless you’ve been living under a rock, sending and receiving holiday greetings has evolved from traditional paper car
Vivian Lee
>>Read More

How to Recover From a Ransomware Attack with Immutable Backups

Ransomware attacks have been on the rise over the last decade, and businesses have failed to find a one-size-fits-all approach to eliminating the threat. Prevention is better than cure, but with criminal hackers are tenacious and flexibility, it’s not
Jesse Sumrak
>>Read More