Inverted Product Management Podcast
Inverted Product Management Podcast
Podcast Description
This podcast series explores topics related to the creation and use of product in the areas of Security, privacy, online safety, infrastructure security etc. We call these people Inverted Product people because the primary goals for these product people are somehow inverted: success is "when nothing happens". There are fundamental differences in metrics, strategies, personas, communication, and road mapping from the ones of “traditional product teams”
Podcast Insights
Content Themes
The show delves into unique topics surrounding security product management, such as the Critical Attacker Journey, the measurement of 'badness' in systems, and the contrast between user engagement and threat prevention. Episodes provide actionable insights, with examples such as the phases of an attacker journey and the concept of the Invisible Line in metrics.

This podcast series explores topics related to the creation and use of product in the areas of Security, privacy, online safety, infrastructure security etc. We call these people Inverted Product people because the primary goals for these product people are somehow inverted: success is “when nothing happens”. There are fundamental differences in metrics, strategies, personas, communication, and road mapping from the ones of “traditional product teams”
Join the hosts of The Inverted Podcast for our first ever in-person recording as they dive into the world of bug bounty programs with special guest Marcel Eyer from GoBugFree in Zurich. In this episode, the team discusses the evolution of bug bounty platforms, the importance of external security testing, and the challenges companies face when deciding between public and private bounty programs. You’ll hear real-world insights on triaging bug reports, managing researcher relationships, and the pressures of timely vulnerability disclosure.The conversation explores how bug bounty programs fit into broader security strategies, their role in building developer skills, and the impact of AI and cloud technologies on vulnerability trends. The hosts also tackle the business side—how companies measure return on investment, set expectations for zero-day discoveries, and foster a thriving community of ethical hackers.Whether you’re a security professional, developer, or just curious about how organizations protect their software, this episode offers practical advice, industry anecdotes, and a look at the future of bug hunting. Tune in to learn why bug bounty programs are not just about finding bugs—they’re about building safer products, smarter teams, and stronger communities.Connect with the hosts and guests on LinkedIn to continue the conversation!🎧Listen, learn, and join the conversation!🎧Find us on LinkedIn, Spotify, YouTube, Amazon Music/Audible, iHeartRadio, and leave a message with your thoughts or questions. ✅ Subscribe for more deep dives into the world of inverted product management!✅ 🔗 Join the conversation in the Inverted Product Management community on LinkedIn.Inverted PM LinkedIn Group: https://www.linkedin.com/groups/12902712/#SecurityPM #ProductManagement #riskmanagement #risk #Cybersecurity #InvertedPM #TrustAndSafety #security #abuseprevention #userexperience #businessmodelcanvas Music by: BensoundLicense code: KQNVJHTWQEBEDSEA

Disclaimer
This podcast’s information is provided for general reference and was obtained from publicly accessible sources. The Podcast Collaborative neither produces nor verifies the content, accuracy, or suitability of this podcast. Views and opinions belong solely to the podcast creators and guests.
For a complete disclaimer, please see our Full Disclaimer on the archive page. The Podcast Collaborative bears no responsibility for the podcast’s themes, language, or overall content. Listener discretion is advised. Read our Terms of Use and Privacy Policy for more details.