• Explore
  • Blog
  • Podcast
  • Community
  • About
  • Services
  • Contact
Menu

Exploring Information Security

Securing the Future - A Journey into Cybersecurity Exploration
  • Explore
  • Blog
  • Podcast
  • Community
  • About
  • Services
  • Contact
Patrick Tomasso@impatrickt

Patrick Tomasso

@impatrickt

Feedback: Key to Continuous Learning

February 8, 2021

I am blogging everyday (or nearly everyday) on The Daily Drucker: 366 Days of Insight and Motivation for Getting the Right Things Done.

The action point is to list my strengths and the steps I’m taking to improve them. One of my strengths is that I get along with people really well. I have such a varied background that I usually can connect with a person on something. Not always. Most of the time. Even though I consider this a strength I still read books in that arena because there’s always something to learn or improve.

Right now I’m reading Chris Hadnagy’s new book Human Hacking: Win Friends, Influence People, and Leave Them Better Off for Having Met You. It’s a book on how to better interact with others using social engineering. This involves all sorts of things from the way I dress to body language to the things I say. It’s a good book and further helping me learn how to maximize my impressions on people.

I’d say another strength is adaptability. I’m able to come into a situation and adjust to it. Look for solutions to problems and address issues. Other than reading I’m not really doing a lot to improve that.

Another one is that I am a learner. I strive to continue to learn. I have to in the IT security space. I listen to podcasts, read blogs, I recently picked up the Wall Street Journal, and read books. I’ll go to several conferences throughout the year to connect with people and learn something new.

← The Banquet Of LifePrepare For The Storm →

Latest PoDCASTS

Featured
Apr 14, 2026
Exploring the Risks of Model Context Protocol (MCP) with Casey Bleeker
Apr 14, 2026
Apr 14, 2026
Apr 7, 2026
From Combat Zones to Corporate Lobbies: A Guide to Physical Security with Josh Winter
Apr 7, 2026
Apr 7, 2026
Mar 31, 2026
[RERELEASE] What is a SIEM?
Mar 31, 2026
Mar 31, 2026
Mar 24, 2026
[RERELEASE] What is threat modeling?
Mar 24, 2026
Mar 24, 2026
Mar 17, 2026
[RERELEASE] What is cryptography?
Mar 17, 2026
Mar 17, 2026
Mar 10, 2026
[RERELEASE] What is a Chief Information Security Officer (CISO)
Mar 10, 2026
Mar 10, 2026
Mar 3, 2026
Exploring The Bad Advice Cybersecurity Professionals Provide to the Public
Mar 3, 2026
Mar 3, 2026
Feb 24, 2026
Inside Cambodia's Scam Compounds: Pig Butchering, Organized Crime, and Protecting Your Life Savings
Feb 24, 2026
Feb 24, 2026
Feb 17, 2026
What are the AI Vulnerabilities We Need to Worry About
Feb 17, 2026
Feb 17, 2026
Feb 10, 2026
[RERELEASE] How to make time for a home lab
Feb 10, 2026
Feb 10, 2026

Powered by Squarespace