The Inverted Podcast

Inverted Product Management Group on LinkedIn

This podcast series explores topics related to the creation and use of product in the areas of Security, privacy, online safety, infrastructure security etc. We call these people Inverted Product people because the primary goals for these product people are somehow inverted: success is "when nothing happens". There are fundamental differences in metrics, strategies, personas, communication, and road mapping from the ones of “traditional product teams”

  1. The Inverted Podcast #16: Unorthodox Security

    FEB 17

    The Inverted Podcast #16: Unorthodox Security

    In this episode, the Inverted Podcast dives deep into the unconventional world of cybersecurity with special guest Olivier Martinet, Chief Information and Security Officer of TX Group—the largest private media group in Switzerland. Hosts Jeroen, Dario Salice, and Dana Kaufman explore how TX Group balances modern security practices with the unique demands of a media organization, from protecting critical infrastructure to embracing digital transformation.Discover why Olivier Martinet aims to make his company “unattractive to hackers,” focusing on detection and rapid response rather than strict prevention. The episode covers TX Group’s journey to passwordless authentication, adaptive MFA, and cloud-first strategies, as well as their approach to training journalists for safe exploration of the dark web.The conversation also tackles controversial decisions, such as investing in defense over cyber insurance, collaborating with competitors for industry-wide security, and managing supply chain vulnerabilities in ad networks. Learn how TX Group turns security incidents into opportunities for transparency and trust, and why the ultimate metric is damage containment rather than incident count.If you’re interested in real-world security strategies, zero trust, and the evolving challenges facing media organizations, this episode is a must-listen. Connect with the hosts and guests on LinkedIn for more insights!Connect with the hosts and guests on LinkedIn to continue the conversation!🎧Listen, learn, and join the conversation!🎧Find us on LinkedIn, Spotify, YouTube, Amazon Music/Audible, iHeartRadio, and leave a message with your thoughts or questions. ✅  Subscribe for more deep dives into the world of inverted product management!✅ 🔗 Join the conversation in the Inverted Product Management community on LinkedIn.Inverted PM LinkedIn Group: https://www.linkedin.com/groups/12902712/#SecurityPM #ProductManagement #riskmanagement #risk #Cybersecurity #InvertedPM #TrustAndSafety #security #abuseprevention #userexperience #businessmodelcanvas Music by: BensoundLicense code: KQNVJHTWQEBEDSEA

    39 min
  2. The Inverted Podcast #15: The Business Model Canvas for Security - Part 2

    FEB 3

    The Inverted Podcast #15: The Business Model Canvas for Security - Part 2

    In the second part of this special two-episode series, the hosts of the Inverted podcast continue their deep dive into how the Business Model Canvas applies to security products and companies. Building on the foundation set in part one, this episode explores the practical challenges and strategic decisions that security businesses face as they scale, partner, and evolve. Key topics include: Recap of the Business Model Canvas and its relevance to securityThe importance of trust, transparency, and ongoing customer relationships in security Scaling strategies: cloud marketplaces, reseller networks, and partnershipsManaging costs, pricing models, and the impact of AI on business operationsNavigating regulatory requirements and the elevated security bar for vendorsMonetizing core knowledge and threat intelligence Adapting business models for embedding, acquisition, and changing market needsThe slides referenced in this episode can be found here: https://docs.google.com/presentation/d/e/2PACX-1vSHZNmpfvpwGORtsTWdn-3ZR-JAISyO1kO-ydqlqWNkswJaDVSaQ9OYBllOQwW23zUgBDuKPbw0v_Nn/pub?start=false&loop=false&delayms=60000 Whether you’re a founder, product manager, or simply interested in the intersection of business strategy and security, this episode offers actionable insights and engaging discussion. Don’t miss the conclusion of this in-depth exploration of the Security Business Model Canvas! Connect with the hosts and guests on LinkedIn to continue the conversation! 🎧Listen, learn, and join the conversation!🎧Find us on LinkedIn, Spotify, YouTube, Amazon Music/Audible, iHeartRadio, and leave a message with your thoughts or questions. ✅  Subscribe for more deep dives into the world of inverted product management!✅  🔗 Join the conversation in the Inverted Product Management community on LinkedIn.Inverted PM LinkedIn Group: https://www.linkedin.com/groups/12902712/#SecurityPM #ProductManagement #riskmanagement #risk #Cybersecurity #InvertedPM #TrustAndSafety #security #abuseprevention #userexperience #businessmodelcanvas Music by: BensoundLicense code: KQNVJHTWQEBEDSEA

    44 min
  3. The Inverted Podcast #14: The Business Model Canvas for Security - Part 1

    FEB 3

    The Inverted Podcast #14: The Business Model Canvas for Security - Part 1

    This is part one of a special two-episode series where the hosts of the Inverted podcast explore how the Business Model Canvas—a strategic framework for visualizing and designing business models—applies to both traditional companies and the world of security products. The conversation begins with an overview of the nine building blocks of the canvas, illustrated through real-world examples like LEGO, and then pivots to a deep dive into the unique challenges faced by security businesses. Key topics include: What is the Business Model Canvas and how does it help structure ideas for startups and established companies?How LEGO leverages partnerships, customer segments, and channels for growth and brand loyalty.The importance of trust, transparency, and scaling for security products, including the shift from detection to prevention and remediation.Strategies for building customer relationships, leveraging cloud marketplaces, and demonstrating value to enterprise clients.Lively debates on direct-to-consumer vs. enterprise sales, the evolution of security products, and how to build lasting trust with customers.The slides referenced in this episode can be found here: https://docs.google.com/presentation/d/e/2PACX-1vSHZNmpfvpwGORtsTWdn-3ZR-JAISyO1kO-ydqlqWNkswJaDVSaQ9OYBllOQwW23zUgBDuKPbw0v_Nn/pub?start=false&loop=false&delayms=60000 Whether you’re a founder, product manager, or simply curious about business frameworks and security, this episode is packed with practical insights and engaging discussion. Stay tuned for part two, where the team continues building out the Security Business Model Canvas for the fictitious security company! Connect with the hosts and guests on LinkedIn to continue the conversation! 🎧Listen, learn, and join the conversation!🎧Find us on LinkedIn, Spotify, YouTube, Amazon Music/Audible, iHeartRadio, and leave a message with your thoughts or questions. ✅  Subscribe for more deep dives into the world of inverted product management!✅  🔗 Join the conversation in the Inverted Product Management community on LinkedIn.Inverted PM LinkedIn Group: https://www.linkedin.com/groups/12902712/#SecurityPM #ProductManagement #riskmanagement #risk #Cybersecurity #InvertedPM #TrustAndSafety #security #abuseprevention #userexperience #businessmodelcanvas Music by: BensoundLicense code: KQNVJHTWQEBEDSEA

    41 min
  4. The Inverted Podcast #13: The Cost of Perfection - How Clarity Drives Better Security Products

    JAN 21

    The Inverted Podcast #13: The Cost of Perfection - How Clarity Drives Better Security Products

    In this episode, Jeroen, Dario Salice, and Dana Kaufman dive deep into the challenges of building secure products in a world obsessed with perfection. The hosts discuss the recent debate around synced passkeys and whether synchronizing credentials across devices truly undermines security. They break down sensational headlines, explore the real risks versus perceived threats, and share practical strategies for product managers to create clarity amid crisis and confusion.Listeners will learn: What passkeys are and how syncing works across platforms like Apple Keychain and Google Password ManagerWhy clarity is essential in responding to security escalations and sensational claimsHow to balance innovation with realistic risk management, and avoid letting edge cases stymie progressThe importance of consistency, communication, and ecosystem thinking in product securityWhether you’re a security PM, engineer, or just curious about how tech leaders handle the pressure of keeping products safe, this episode offers actionable insights and real-world stories. Tune in for a candid conversation about clarity, risk, and the journey to better security.Connect with the hosts and guests on LinkedIn to continue the conversation!🎧Listen, learn, and join the conversation!🎧Find us on LinkedIn, Spotify, YouTube, Amazon Music/Audible, iHeartRadio, and leave a message with your thoughts or questions. ✅  Subscribe for more deep dives into the world of inverted product management!✅  🔗 Join the conversation in the Inverted Product Management community on LinkedIn.Inverted PM LinkedIn Group: https://www.linkedin.com/groups/12902712/ #SecurityPM #ProductManagement #riskmanagement #risk #Cybersecurity #InvertedPM #TrustAndSafety #security #abuseprevention #userexperience Spotify: https://open.spotify.com/episode/4Cq1VFUSnGxAP12rrGzSJDMusic by: BensoundLicense code: KQNVJHTWQEBEDSEA

    28 min
  5. The Inverted Podcast #12: Using Risk to Quantify Security

    JAN 8

    The Inverted Podcast #12: Using Risk to Quantify Security

    In this episode, the hosts and guests explore the challenges and strategies of risk quantification in security and product management. The conversation covers why traditional risk labels like “low, medium, high” often fall short, and emphasizes the importance of defining exactly what risk is being measured. The panel discusses practical approaches to mapping business dependencies, understanding disruption impact, and making risk actionable for organizations. Key topics include: The limitations of abstract risk ratingsHow to define and communicate risk in clear termsBuilding dependency maps to identify critical assets and processesThe role of risk appetite and organizational culture in decision-makingStrategies for bridging the gap between technical and business teamsMaking risk quantification actionable for leaders and operational teamsWhether you’re a security professional, product manager, or business leader, this episode offers practical insights on how to make risk management meaningful and effective. Connect with the hosts and guests on LinkedIn to continue the conversation! 🎧Listen, learn, and join the conversation!🎧 Find us on LinkedIn, Spotify, YouTube, Amazon Music/Audible, iHeartRadio, and leave a message with your thoughts or questions. ✅  Subscribe for more deep dives into the world of inverted product management!✅  🔗 Join the conversation in the Inverted Product Management community on LinkedIn. Inverted PM LinkedIn Group: https://www.linkedin.com/groups/12902712/ #SecurityPM #ProductManagement #riskmanagement #risk #Cybersecurity #InvertedPM #TrustAndSafety #security #abuseprevention #userexperience Music by: Bensound License code: KQNVJHTWQEBEDSEA

    43 min
  6. 12/09/2025

    The Inverted Podcast #11: AI and Security

    🎙️The Inverted Podcast #11: AI and Security🎙️In this episode of the Inverted Product Management podcast, the hosts and guests dive deep into the evolving landscape of AI risk and security. The discussion covers how AI is transforming both the tactics of attackers and the strategies defenders must use to keep organizations safe. The panel explores real-world examples of phishing, the challenges of integrating AI into products, and the complexities of governing AI use within enterprises.Key topics include: How AI is enabling more sophisticated and scalable attacksThe rise of creative phishing and malware campaigns powered by AIThe importance of AI governance, policy, and shadow AI in organizationsBalancing transparency and explainability in AI-driven security decisionsThe impact of AI on physical systems, such as autonomous vehicles and manufacturingStrategies for choosing secure and trustworthy AI solutionsThe ongoing challenge of measuring and communicating security valueWhether you’re a product manager, security professional, or tech enthusiast, this episode offers actionable insights on navigating the risks and opportunities of AI in today’s digital world.Connect with the hosts and guests on LinkedIn to continue the conversation!🎧Listen, learn, and join the conversation!🎧Find us on LinkedIn, Spotify, YouTube, Amazon Music/Audible, and leave a message with your thoughts or questions. ✅  Subscribe for more deep dives into the world of inverted product management!✅ 🔗 Join the conversation in the Inverted Product Management community on LinkedIn.Inverted PM LinkedIn Group: https://www.linkedin.com/groups/12902712/#SecurityPM #ProductManagement #WebScraping #BrowserExtensions #Cybersecurity #InvertedPM #TrustAndSafety #ThreatModeling #abuseprevention #userexperience Music by: BensoundLicense code: KQNVJHTWQEBEDSEA

    31 min
  7. The Inverted Podcast #10: Building security products for small vs large businessesInverted Product Management Podcast #10: Building security products for small vs large businesses

    12/01/2025

    The Inverted Podcast #10: Building security products for small vs large businessesInverted Product Management Podcast #10: Building security products for small vs large businesses

    🎙️Inverted Product Management Podcast #10: Building security products for small vs large businesses with Tim Ehrhart 🎙️In this episode of the Inverted Product Management podcast, Tim Ehrhart CISO at F. Hoffmann-La Roche Ltd joins the panel to explore the unique challenges and strategies involved in building and selling security products for both small businesses (SMBs) and large enterprises. The discussion dives into how expectations, resources, and risks differ dramatically between these customer segments, and what that means for product managers, engineers, and security leaders.Key topics include: The fundamental differences between SMBs and enterprises in security needs and expectationsHow attackers target small businesses versus large organizationsThe importance of secure defaults and flexible configuration in security productsReal-world stories of security failures and successesThe role of automation, outsourcing, and managed services for SMBsThe complexity tax and operational challenges faced by enterprisesHow to measure success and set actionable goals for security teamsThe impact of supply chain and third-party risksPractical advice for designing fraud detection and security features that work for both small and large customersWhether you’re building security features, managing risk, or just want to understand how security products are shaped by business realities, this episode offers actionable insights and candid perspectives from industry experts.Connect with the hosts and guests on LinkedIn to continue the conversation!🎧Listen, learn, and join the conversation!🎧Find us on LinkedIn, Spotify, YouTube, Amazon Music/Audible, and leave a message with your thoughts or questions. ✅  Subscribe for more deep dives into the world of inverted product management!✅ 🔗 Join the conversation in the Inverted Product Management community on LinkedIn.Inverted PM LinkedIn Group: https://www.linkedin.com/groups/12902712/#SecurityPM #ProductManagement #WebScraping #BrowserExtensions #Cybersecurity #InvertedPM #TrustAndSafety #ThreatModeling #abuseprevention #userexperience Music by: BensoundLicense code: KQNVJHTWQEBEDSEA

    48 min
  8. 11/18/2025

    Inverted Product Management Podcast #9: User-Centric Security – Making Security Work for Real People

    🎙️Inverted Product Management Podcast #9: User-Centric Security – Making Security Work for Real People🎙️In this episode of the Inverted Product Management podcast, host Jeroen Kemperman is joined by Dario Salice, Tom Williamson, Dana Kaufman, and special guest Cristina Vintila, an expert in security operations and cryptosystems. Together, they dive deep into the concept of user-centric security—exploring how product teams can design secure systems that truly support users, rather than frustrate them.The panel shares real-world stories of security gone wrong, like confusing account suspensions and overly complex authentication flows, and discusses how these experiences can drive users away. They highlight the importance of understanding user journeys, reducing unnecessary decisions, and minimizing user fatigue. The conversation also covers practical strategies for building security features that are intuitive, explainable, and aligned with business goals.Key topics: What is user-centric security?Common pitfalls in security designReal examples from Meta, Microsoft, and moreMeasuring and reducing user fatigueThe role of automation and default settingsCommunicating security value to leadershipWhether you’re a product manager, designer, or engineer, this episode offers actionable insights on how to balance robust security with great user experience. Tune in to learn how to make security a seamless part of your product—and why sometimes, success means users barely notice it’s there.🎧Listen, learn, and join the conversation!🎧Find us on LinkedIn, Spotify, YouTube, Amazon Music/Audible, and leave a message with your thoughts or questions. ✅  Subscribe for more deep dives into the world of inverted product management!✅ 🔗 Join the conversation in the Inverted Product Management community on LinkedIn.Inverted PM LinkedIn Group: https://www.linkedin.com/groups/12902712/#SecurityPM #ProductManagement #WebScraping #BrowserExtensions #Cybersecurity #InvertedPM #TrustAndSafety #ThreatModeling #abuseprevention #userexperience Music by: BensoundLicense code: KQNVJHTWQEBEDSEA

    41 min

About

This podcast series explores topics related to the creation and use of product in the areas of Security, privacy, online safety, infrastructure security etc. We call these people Inverted Product people because the primary goals for these product people are somehow inverted: success is "when nothing happens". There are fundamental differences in metrics, strategies, personas, communication, and road mapping from the ones of “traditional product teams”