Cyber Fusion Forum
Cyber Fusion Forum
Podcast Description
Where real-world outcomes meet cybersecurity thinking.
Sitting down with IT professionals—who are shaping how companies collaborate, adapt, and secure their operations. Some are deep in the cybersecurity trenches. Others work in roles that influence security without it being their core remit.
We unpack how People, Process, Technology with Innovation come together to drive impact actually helps businesses move forward.
If you’re in tech, security, or care about what security actually helps businesses move forward, this is the conversation you want to be part of.
Podcast Insights
Content Themes
The podcast covers various themes including cybersecurity challenges in product development, identity and access management (IAM) mistakes, network security versus IAM strategies, and integrating security within DevOps. Specific episodes discuss the implications of AI in product teams, common IAM pitfalls, the need for layered security approaches, and building operational security into business processes, showcasing practical examples and expert anecdotes.

Where real-world outcomes meet cybersecurity thinking.
Sitting down with IT professionals—who are shaping how companies collaborate, adapt, and secure their operations. Some are deep in the cybersecurity trenches. Others work in roles that influence security without it being their core remit.
We unpack how People, Process, Technology with Innovation come together to drive impact actually helps businesses move forward.
If you’re in tech, security, or care about what security actually helps businesses move forward, this is the conversation you want to be part of.
Penetration testing is crowded with great brands and even greater illusions.
In this episode, William Wright, CEO of Closed Door Security and UK Council member at CREST, breaks down the stark difference between real pen testing and glorified vulnerability scans.
We get into how to vet providers, what a good report actually looks like, why references matter, and how threat-led testing changes the game from “find issues” to “prove business-relevant risk.”
William shares war stories: a bank test that missed an IDOR exposing transactions, a $65k engagement that produced 70+ pages of screenshots but ignored systemic compromise, and how weak internal testing loops create “unknown unknowns” that later become ransomware incidents. If you buy, run, or rely on pen tests, this is your field guide to getting value and avoiding smoke and mirrors.

Disclaimer
This podcast’s information is provided for general reference and was obtained from publicly accessible sources. The Podcast Collaborative neither produces nor verifies the content, accuracy, or suitability of this podcast. Views and opinions belong solely to the podcast creators and guests.
For a complete disclaimer, please see our Full Disclaimer on the archive page. The Podcast Collaborative bears no responsibility for the podcast’s themes, language, or overall content. Listener discretion is advised. Read our Terms of Use and Privacy Policy for more details.