Listen Here

| |

Actionable
Takeaways

Deploy transparent POCs as category displacement weapons:

When attacking entrenched incumbents, StrongestLayer runs one-week POCs behind existing email security gateways with zero commercial pressure—just visibility into what's being missed. At a sub-1,000-seat company running behind a top-three market leader, they surfaced 80 advanced threats in one week. This approach converts 85% of first meetings to POC and 100% of qualified POCs to technical wins. The insight: In technical categories where buyers are sophisticated, removing evaluation friction and letting comparative performance speak eliminates trust barriers faster than enterprise reference selling.

Stage-match your ICP to burn rate tolerance, not TAM:

Alan deliberately excludes Fortune 500 despite universal email security need: "When their procurement team is bigger than your whole company, not a good scene." Instead, they target 1,000-10,000 seats—enterprises with SOC2/compliance obligations but without Fortune 500 security budgets or staffing. These accounts close in under 6 months. The framework: Define ICP by sales cycle length your runway can sustain, then expand segments as capital position improves. Your ICP should evolve with company stage, not remain static based on ideal long-term positioning.

Trade IP opacity for velocity when architectural advantage compounds:

Unlike security vendors protecting methodology behind NDAs, StrongestLayer publishes full product demos on YouTube and shares detection logic openly. Alan's thesis: "I'm going all in on velocity. I'm going to transparently share, get it in front of as many customers as we can." This works because their advantage is continuous AI model improvement velocity, not a static algorithm competitors could copy. If your moat is execution speed and iteration cycles rather than a single proprietary technique, transparency accelerates trust-building and shortens enterprise consideration periods.

Quantify the shift from volume metrics to value-at-risk metrics:

Rather than competing on total threat detection volume, StrongestLayer focuses on the 2% of attack types (BEC, advanced spear phishing) that represent 90% of breach value—and are growing to 17% of attack volume by 2027. They weaponize third-party research (Harvard Kennedy School) showing AI reduces targeted attack costs by 95% while increasing success rates from 12% to 60%. The pattern: Find authoritative external validation that the threat landscape is fundamentally shifting, making incumbent solutions architecturally insufficient regardless of brand strength.

Bifurcate messaging by operational reality, not just title:

Alan messages CISOs around risk buying-down and ROI, positioning email security as a solved problem that's becoming unsolved. For security operations teams, the pitch centers on eliminating 70% false-positive user submissions that waste skilled analyst time. Both personas use the same tools, but CISOs face board-level breach risk while SOC teams face daily toil from alert fatigue. The takeaway: Map distinct daily operational pains for each buying committee member rather than broadcasting unified value propositions that dilute relevance.

Conversation
Highlights

 

How StrongestLayer Uses Transparent POCs to Displace 20-Year Email Security Incumbents

Modern B2B marketing automation has created an unintended consequence: the tactics used to generate pipeline are now architecturally identical to sophisticated phishing attacks.

Alan LeFort, the CEO of StrongestLayer, discovered this convergence while consulting on go-to-market strategy for portfolio companies in late 2024. He was researching how AI had transformed demand generation—using intent signals from platforms like Clay, crafting personalized messages at scale, spinning up lookalike domains to bypass spam filters.

“We are in this bizarro world where the techniques used by phishing and the techniques used by marketing are now 100% identical,” Alan explains. “In phishing you spin up lookalike domains because you need to trick them into going to the lookalike domain. In marketing, we do it to trick the spam filter so that you can get under the sending.”

Marketers buy intent signals to personalize outreach. Hackers harvest publicly available LinkedIn and Facebook data to craft spear phishing campaigns. Both use AI to generate perfectly branded, error-free messages. “How can we reasonably expect an employee to detect if this is a phish or if it’s a marketing email, if they use the same techniques and the same sophistication and the same AI?” Alan asks. “And the answer is they can’t.”

This insight drove Alan to join StrongestLayer as the third co-founder in late 2024, bringing go-to-market expertise to a technical team that had discovered something significant through customer feedback.

 

From Security Training to Email Security: A Customer-Driven Pivot

StrongestLayer’s first co-founder, Riz, initially built an AI-powered security awareness training platform. The thesis: rapidly evolving threats required AI to keep training current and maintain effectiveness against sophisticated attacks.

Early customers provided unexpected feedback: “Maybe you should pivot because you’re detecting things through your phishing plugin that email security programs that have been around for 20 years are missing.”

The second co-founder, Josh Bass—with email security experience at Proofpoint, Mandiant, and Google’s threat research team—recognized the opportunity. “Josh realized we have an email security product. We just haven’t used it that way,” Alan recalls. They rebuilt focused solely on email security in six months and launched in 2024.

But entering an established category created immediate credibility challenges. Investors repeatedly questioned whether AI could truly disrupt a market with deeply entrenched 20-year players.

The answer required reframing the problem around architectural inadequacy rather than incremental improvement.

 

Why N=1 Attack Datasets Break Pattern-Matching Architectures

Legacy email security solutions operate on pattern-matching—essentially the same approach used to develop vaccines. “You need to gather data, sadly, from several people that got ill and didn’t make it,” Alan explains. “That is how security research works. They monitor all these different sensors, they see weird stuff, the customer complains, they analyze the weird stuff and they’re like, oh, it was this kind of attack and it worked this way.”

The system deploys signatures based on known attacks. It works effectively—until attack diversity eliminates the pattern dataset.

“What happens when your pattern based, your pattern matching system doesn’t have the data to train itself on? Because every attack is unique,” Alan points out. “When the body of data for a given attack type is n equals 1, no pattern matching system will ever catch it.”

AI-powered attacks create exactly this scenario. Large language models function as sophisticated thesauruses capable of infinite variation. “It can take an attack and make it look like a thousand different attacks to the existing technologies.”

Harvard Kennedy School research from November 2024 quantified the shift: AI enables attackers to profile 88% of company employees using publicly available data, create targeted spear phishing campaigns at 95% lower cost, and increase click rates from 12% baseline to 60%—even among security-trained employees.

Alan contextualizes the 60% statistic: “I’m a risk taking guy, but I won’t play Russian roulette. And in Russian roulette, the odds of putting a bullet in your head are 1 in 6, 17%. Why would any executive be happy with 60?”

More critically, advanced threats (business email compromise, targeted spear phishing) currently represent 2% of total attack volume but 90% of breach value—forecast to reach 17% of attack volume by 2027.

 

Transparent One-Week POCs That Achieve 85% Meeting-to-POC Conversion

Rather than compete through traditional enterprise sales methods, StrongestLayer built their go-to-market around comparative proof with zero commercial pressure.

Their POC structure: run for one week behind the customer’s existing email security solution. No commitment required. Just visibility into what’s being missed.

At one company under 1,000 seats running a top-three market share leader, they surfaced approximately 80 advanced threats in one week. “We’re not finding low hanging fruit. They’re all taking care of the low hanging fruit really well,” Alan clarifies. The focus is sophisticated attacks that pattern-matching architectures structurally cannot detect.

This transparency approach delivers 85% conversion from first meeting to POC, and 100% from qualified POC to technical win in 2024 (Alan acknowledges these are early-stage numbers).

The strategy extends beyond sales process. Unlike security vendors protecting methodologies behind NDAs, StrongestLayer publishes full product demos on YouTube. “Rather than hide it behind NDAs and whatnot, we’re putting our demos out to the world,” Alan says. “I’m going all in on velocity.”

The underlying thesis: when competitive advantage comes from continuous AI model improvement velocity rather than static IP, transparency accelerates customer trust faster than secrecy protects your moat.

 

Stage-Matching ICP to Sales Cycle Constraints

Despite email security being universally needed, StrongestLayer deliberately excludes Fortune 500 accounts from their initial ICP. The decision is operationally pragmatic.

“When their procurement team is bigger than your whole company, not a good scene,” Alan explains. With approximately 30 employees, they cannot sustain 18-month enterprise sales cycles against their burn rate.

Instead, they target 1,000-10,000 seat companies—enterprises with full SOC2 and compliance obligations but without Fortune 500 procurement complexity. “They have all the compliance obligations of a large Fortune 100, Fortune 500, but they don’t have the budget, they don’t have the staff, they don’t have the team size, they don’t have the tools available to them. And, but they have all the obligations.”

The explicit constraint: “We kind of said our ICP has to be for 6 month deal size or less. And as we get bigger, as we raise more money, it expands outwards.”

Alan frames this as a broader principle: “We should think about ICPS as being stage dependent that map to the maturity of the company.” Select based on what current resources can execute, not aspirational positioning.

 

Operational Reality-Based Messaging Bifurcation

StrongestLayer messages CISOs and security operations teams differently despite selling identical technology. The distinction maps to divergent daily operational contexts.

CISOs hear about emerging risk profiles and architectural inadequacy of existing solutions. They’re “always firefighting” and may show “natural reticence” to revisiting problems they believe solved. The message focuses on why the threat landscape shift makes current solutions structurally insufficient.

Security operations teams hear about eliminating investigation toil. Specifically: the 70% false-positive rate on user-submitted potential phishing attempts. “When we’ve talked to users, they said 70% of those user submissions are not actual real threats, but they have to investigate them because compliance and monitoring and all those things.”

Alan positions this as freeing analysts from waste: “Imagine that 70% of the work that your skilled, seasoned engineers that are in short supply because you don’t have the budget is just a waste of time, a tail chasing exercise.”

Their technology reduces this to near zero. Same product, identical security stack, completely different value propositions based on what each persona encounters operationally.

 

Category Displacement Through Architectural Inadequacy Claims

StrongestLayer’s positioning avoids vendor-specific criticism in favor of generational architectural arguments. “We’re not saying that those are bad companies. I came from one of the very big companies. I was an exec there, I ran a business unit there,” Alan notes. “But generationally, the attack type, that change means that their architecture that they’ve built, that they’ve perfected over 20 years doesn’t meet the problem of the moment.”

This framing enables displacement without requiring customers to admit poor prior decisions. The incumbent solution worked effectively for 20 years—and remains effective against the attack types it was designed to handle. The problem is structural: pattern-matching architectures cannot detect threats with n=1 datasets, regardless of vendor execution quality.

For early-stage companies attacking established categories, this offers a framework: demonstrate that fundamental shifts in the problem space render entire architectural approaches insufficient. Prove the claim through direct comparison rather than marketing assertions. Remove evaluation friction through transparent POCs. Match ICP selection to stage-based sales cycle constraints.

The displacement strategy isn’t about better features. It’s about shifts in the threat landscape that make architectural generation more relevant than vendor reputation—and systematically proving that thesis holds in customer environments.

 

Recommended Founder
Interviews

Tiffany Ricks

CEO and Founder of HacWare

Tiffany Ricks, CEO and Founder of HacWare: $2.6 Million Raised to Build the Future of Security Awareness

Harley Sugarman

Founder & CEO of Anagram

Harley Sugarman, Founder & CEO of Anagram: $10 Million Raised to Transform Human-Driven Security

Dave Mor

CEO and Co-Founder of OneLayer

Dave Mor, CEO and Co-Founder of OneLayer: $15 Million Raised to Protect Private Cellular Networks

Aurelie Guerrieri

Chief Marketing & Alliances Officer of DataDome

Aurelie Guerrieri, Chief Marketing & Alliances Officer at DataDome: 20 Years in Silicon Valley – Insights on the Evolving Tech Landscape

Edward Wu

CEO and Founder of Dropzone AI

Edward Wu, CEO & Founder of Dropzone AI: $20 Million Raised to Build the Future of AI SOC Analysts

Arjun Bhatnagar

CEO & Co-Founder of Cloaked

Arjun Bhatnagar, CEO of Cloaked: $25 Million Raised to Build the Future of Data Privacy

Diana Rabba

Head of Marketing of Exein

Long Game Marketing: Building Trust in High-Stakes B2B Sales

Carolyn Crandall

CEO, Advisor, GTM IT/IS, xCMO CEO, Advisor, GTM IT/IS, xCMO of Marticulate

Should You Really Become a Fractional CMO? (Ft. Carolyn Crandall)

Scott McCrady

CEO of SolCyber

Scott McCrady, CEO of SolCyber: $20 Million Raised to Build the Future of Managed Security

Dan Lorenc

CEO & Founder of Chainguard

Dan Lorenc, CEO & Founder of Chainguard: $250 Million Raised to Power the Future of Software Supply Chain Security

Ori Eisen

CEO & Founder of Trusona

Ori Eisen, CEO & Founder of Trusona: $38 Million Raised to Power the Future of Account Takeover Prevention

Itzik Alvas

CEO & Co-Founder of Entro Security

Itzik Alvas, CEO & Co-Founder of Entro Security: $24 Million Raised to Build the Future of Non-Human Identity Management

Nadav Arbel

CEO & Co-Founder of Cyrebro

Nadav Arbel, CEO & Co-Founder of Cyrebro: $51 Million Raised to Build the Future of ML-Backed MDR

Ani Chaudhuri

CEO & Co-Founder of Dasera

Ani Chaudhuri, CEO & Co-Founder of Dasera: $21 Million Raised to Build the Future of Data Security

Paul Valente

CEO and Co-Founder of VISO Trust

Paul Valente, CEO and Co-Founder of VISO Trust: $17 Million Raised to Build the Future of Third-Party Cyber Risk Management

Mykolas Rambus

CEO & Co-Founder of Hush

Mykolas Rambus, CEO & Co-Founder of Hush: $7.5 Million Raised to Build the Future of Data Privacy

Sebastian Stranieri

CEO & Founder of VU Security

Sebastian Stranieri, CEO & Founder of VU Security: $24 Million Raised to Build the Future of Digital Identity & Fraud Prevention

Justin Beals

CEO, Co-Founder of Strike Graph

Justin Beals, CEO of Strike Graph: $12 Million Raised to Build the Future of Automated Security and Compliance

Marina Segal

CEO and Co-Founder of Tamnoon

Marina Segal, CEO & Co-Founder of Tamnoon: Over $5 Million Raised to Build the Future of Cloud Security

Jean Le Bouthillier

CEO of Qohash

Jean Le Bouthillier, CEO of Qohash: $20 Million Raised to Build the Future of Data Security

Colby Proffitt

VP of Marketing of Shift5

From the Pentagon to B2B: Colby Proffitt’s Journey and ABM Insights

Dan Lowden

CMO of Blackbird.AI

How to Create a Category: Dan Lowden’s 8-Exit CMO Playbook

Eric Olden

CEO and Founder of Strata Identity

Eric Olden, CEO and Founder of Strata Identity: $42 Million Raised to Build the Identity Orchestration Category

Ben Levine

Senior Director of Product Management and Marketing of Axiado Corporation

Building Marketing Guidelines That Actually Stick Across Teams

Peter Prizio Jr

CEO of SnapAttack

Peter Prizio Jr, CEO of SnapAttack: $8 Million Raised to Power the Future of Threat Management

Stijn Vande Casteele

Founder of Sweepatic

Stijn Vande Casteele, Founder of Sweepatic: $4.4 Million Raised to Build the Future of External Attack Surface Management

David Etue

CEO of Nisos

David Etue, CEO of Nisos: $33 Million Raised to Build the Future of Managed Intelligence

Jason Martin

Co-Founder and Co-CEO of Permiso Security

Jason Martin, Co-Founder and Co-CEO of Permiso Security: $10 Million Raised to Build the Future of Cloud Security

Ryan Schonfeld

Founder & CEO of Hivewatch

Ryan Schonfeld, CEO of Hivewatch: $25 Million Raised to Build the OS of Physical Security

Matteo Bogana

CEO and Co-Founder of Cleafy

Matteo Bogana, CEO & Co-Founder of Cleafy: $12 Million Raised to Build the Future of Online Fraud Prevention

Umaimah Khan

CEO and Co-Founder of Opal Security

Umaimah Khan, CEO & Co-Founder of Opal Security: $32 Million Raised to Build the Future of Identity Security

Danny Lopez

CEO of Glasswall

Danny Lopez CEO of Glasswall: $60+ Million Raised to Make the Content Disarm and Reconstruction (CDR) Category Mainstream

Mollie Breen

CEO and Co-Founder of Perygee

Mollie Breen, CEO and Co-Founder of Perygee: $6.4 Million Raised to Build the Future of IT/OT Security

Tony Lombardo

VP of Marketing of ThreatModeler Software

Why 99% of Cybersecurity Marketers Are Doing Demand Gen Wrong

Arie Zilberstein

CEO and Co-Founder of Gem Security

Arie Zilberstein, CEO and Co-Founder of Gem Security: $34 Million Raised to Power the Future of Cloud Detection and Response

Jessica Pratt

Director of Marketing and Communications of Peak Metrics

How PeakMetrics Turns Product Data Into Marketing Gold

Josh Shaul

CEO of Allure Security

Josh Shaul, CEO of Allure Security: $6 Million Raised to Help Businesses Win the Battle Against Online Scammers

Christian Almenar

CEO & Co-Founder of Monad

Christian Almenar, CEO of Monad: $19 Million Raised to Solve the Cybersecurity Big Data Problem

Lisa O’Reilly

Vice President of Marketing of iVerify

How iVerify’s First Marketing Hire Built a Research-Driven Engine

Rodrigo Leme

Marketing Director of Right-Hand Cybersecurity

Rodrigo Leme, Marketing Director at Right-Hand Cybersecurity: Standing Out in a Crowded Market – Niche Targeting and Customer-Centric Approach

Austin Gadient

CTO & Co-Founder of Vali Cyber

Austin Gadient, CTO & Co-Founder of Vali Cyber: $15 Million Raised to Build the Future of Linux Security

Tony Scott

CEO & President of Intrusion

How the ex-White House CIO turned around a failing cybersecurity company by fixing the product first | Tony Scott

Neil Serebryany

CEO and Co-Founder of CalypsoAI

Neil Serebryany, CEO & Co-Founder of CalypsoAI: $38 Million Raised to Power the Future of AI Security

Bill Moore

CEO and Founder of XONA

Bill Moore, CEO and Founder of XONA: $30 Million Raised to Build the Future of OT User Access

Pukar Hamal

CEO and Founder of SecurityPal

Pukar Hamal, CEO and Founder of SecurityPal: $21 Million Raised to Power the Future of Customer Assurance

Paul Lewis

Founder and CEO of Calamu

Paul Lewis, CEO of Calamu: $20 Million Raised to Build the Cyber Storage Category

David Brumley

CEO of Mayhem

David Brumley, CEO of Mayhem: $38 Million Raised to Build the Future of Security Testing

Philippe Humeau

CEO of CrowdSec

Philippe Humeau, CEO of CrowdSec: $21 Million Raised to Build the Future of Cyber Threat Intelligence

Megan Howard

VP of Marketing of Vali Cyber

Do Webinars Still Work in Cybersecurity?

Kyle Hanslovan

CEO & Co-Founder of Huntress

Kyle Hanslovan, CEO of Huntress: $160 Million Raised to Build the Future of Managed Security

Ayal Yogev

CEO and Co-Founder of Anjuna

Ayal Yogev, CEO and Co-Founder of Anjuna: $42 Million to Build The Future of Confidential Computing

Stephen de Vries

CEO and Co-Founder of IriusRisk

Stephen de Vries, CEO and Co-Founder of IriusRisk: $40 Million Raised to Build the Future of Threat Modeling

Sivan Tehila

Founder and CEO of Onyxia

Sivan Tehila, Founder and CEO of Onyxia: $5 Million Raised to Build the Future of Cybersecurity Performance Management

Michael Assraf

CEO & Co-Founder of Vicarius

Michael Assraf, CEO of Vicarius: $29 Million Raised to Build the Future of Vulnerability Prioritization

Robert Cowart

CEO & Co-Founder of ElastiFlow

Robert Cowart, CEO & Co-Founder of ElastiFlow: $8 Million Raised to Power the Future of Network Performance and Security Analytics

Adam Cecchetti

CEO & Co-Founder of Staris AI

Adam Cecchetti, CEO & Co-Founder of Staris AI: $5.7 Million Raised to Build Total Context Security for Application Protection

Tom Jermoluk

CEO of Beyond Identity

Tom “TJ” Jermoluk, CEO of Beyond Identity: $200 Million Raised to Build the Future of Multi-Factor Authentication

Ken Bagnall

CEO & Founder of Silent Push

Ken Bagnall, CEO & Founder of Silent Push: $22 Million Raised to Transform Threat Intelligence Through Adversary Infrastructure Monitoring

Russell Spitler

CEO & Co-Founder of Nudge Security

Russell Spitler, CEO & Co-Founder of Nudge Security: $17 Million Raised to Build the Future of SaaS Security

John Milburn

CEO of Clear Skye

John Milburn, CEO of Clear Skye: More Than $20 Million Raised to Build the Future of Identity and Access Governance

Spencer Thompson

CEO and Co-Founder of Prelude

Spencer Thompson, CEO and Co-Founder of Prelude: Over $30 Million Raised to Build the Future of Continuous Security Testing

Ian Amit

CEO and Founder of Gomboc

Ian Amit, CEO & Founder of Gomboc: $5 Million Raised to Build the Future of Cloud Security Remediation

Ryan Lasmaili

CEO & Co-Founder of Vaultree

Ryan Lasmaili, CEO of Vaultree: $16 Million Raised to Build the World’s First Fully Functional Data-in-Use Encryption