What Our Messaging Actually Sounded Like (Before and After)
Applied / From the Field · Messaging & Positioning · Sales Motions
The Messaging Problem laid out the framework. This is what it looks like in practice, the exact pitch that was failing, why it was failing, and the version that finally worked. CISOs and SOC leads are not the same room. Here's proof.
Applied / From the Field | Messaging & Positioning · Sales Motions | 10 min read
We wrote The Messaging Problem because we kept seeing the same failure repeat itself across cybersecurity and AI startups. Not once or twice, a near-universal pattern among technically excellent teams who couldn't figure out why their pipeline was stalling.
The framework post gave you the architecture: core narrative, business layer, technical layer, and the discipline to sequence them deliberately for each persona in the buying committee. This post is the applied version. The raw material. The before-and-after that shows you exactly what the wrong message looks like when it hits the wrong person, and what the right one looks like when it finally lands.
We're pulling from real GTM work, not case studies dressed up for optics, but the actual pitch language our clients were leading with before we tore it apart together. The personas are composites. The mistakes are real.
Part One
The bad pitch. What it actually sounded like.
A single message deployed to six different stakeholders. The technical champion loved it. The deal was dying in rooms the AE was never invited into.
Here's a pitch we heard from a Series A cybersecurity company before we started working together. They were selling a detection and response platform targeting mid-market and enterprise. They had a genuinely differentiated technical approach. And they were using the following message everywhere: website, outbound, demo opener, and sales deck slide one, with everyone.
"We use AI-powered behavioral analytics and UEBA to detect advanced persistent threats in real time, reducing mean time to detect by up to 73% compared to legacy SIEM-based approaches. Our patented correlation engine processes billions of events per day with sub-second latency."
Stop. Read that again the way a CISO reads it. Then read it again the way a VP of Operations reads it. Then read it again the way a CFO reads it, the person who just got pulled into the call because someone said there's a new security tool that needs budget approval.
The CISO might track with it. They might not be impressed, it sounds like every other platform they've seen this quarter, but at least they're not lost. Everyone else in that buying committee? They've already checked out. Not because they're unsophisticated. Because you asked them to receive a message calibrated entirely for someone else.
This wasn't a single bad slide. It was a single message deployed to six different stakeholders as though they were one person. The technical champion loved it. The deal was dying in rooms the AE was never invited into.
What the wrong persona diagnosis looks like
The message above isn't bad because it's technical. It's bad because it's technical in a context-free way. It leads with mechanism instead of consequence. It answers "how does it work?" before it's established "why does this matter to me, in my role, this quarter?"
The deeper problem: the team had done persona work. They had CISO and SOC lead profiles in their CRM. They knew, intellectually, that these were different people. But when it came to building their outbound sequences, their one-pager, and their demo opener, they used one message and aimed it at a composite buyer who doesn't exist.
The signal you're doing this: Your AE reports that the technical champion loves the product, but deals keep stalling when they go up the org chart. That gap, champion enthusiasm and executive silence, is almost always a messaging architecture problem, not a sales execution problem.
Part Two
CISOs vs. SOC leads. Not the same room.
Two fundamentally different conversations, with different stakes, different fears, and different definitions of a good outcome.
This is the distinction most teams get wrong even after they've acknowledged that personas matter. They treat CISO and SOC lead as variants of the same buyer, both technical, both security-focused, just at different levels of seniority. They aren't. They are two fundamentally different conversations, with different stakes, different fears, and different definitions of a good outcome.
The CISO conversation
The CISO is not evaluating your detection fidelity. They have someone on their team for that. The CISO is answering a different set of questions, most of which are invisible to you during the demo:
Can I defend this purchase to the CFO? Does this fit the architecture direction we've already committed to? Will this create a new operational burden my team can't absorb? Is this vendor going to exist in three years? What does it look like if this fails and I'm the one who approved it?
The CISO conversation is fundamentally a risk conversation. They're not evaluating upside. They're stress-testing the downside. If your message doesn't give them the language to answer those questions, ideally before they even think to ask them, and you're asking them to take on political and financial exposure without the framing to justify it.
|
Before: CISO pitch
CISO
"Our platform detects advanced persistent threats using UEBA and behavioral analytics. We process billions of events per day with sub-second latency and integrate with your existing SIEM." |
After: CISO pitch
CISO
"Most breaches aren't detected for weeks because your SOC is triaging signal volume, not investigating real threats. We cut that window from 40 days to under four, without adding headcount or replacing your existing stack." |
The "after" version isn't dumbed down. It's translated. It speaks to the consequence the CISO is actually accountable for, the dwell time window, in terms a board will understand. It pre-empts the budget objection (no headcount added) and the integration risk (no stack replacement). It earns the next question instead of requiring the CISO to translate technical claims into business risk on your behalf.
The SOC lead conversation
The SOC lead is not a junior CISO. They are a practitioner. They live in the problem every day. They know what it actually costs to triage false positives at 2 a.m. They know which integrations break in the real environment versus the demo environment. They've been burned by vendor claims before, and they will push on yours. Hard.
The SOC lead doesn't need the business case. They need to believe that you understand their world well enough to have built something that won't create more work than it solves. If your pitch is all business outcomes and no technical substance, they don't trust you. They won't say that out loud. They'll stay quiet, nod through the demo, and then raise concerns in the internal debrief you're not in.
|
Before: SOC lead pitch
SOC lead
"We reduce mean time to detect by up to 73% and help security teams improve overall posture and operational efficiency, driving better outcomes across your detection and response program." |
After: SOC lead pitch
SOC lead
"The correlation engine doesn't just surface detections, it surfaces them with the context your analyst needs to triage in under four minutes without pivoting to three other tools. Here's what that looks like on an alert your team would have spent 40 minutes on last week." |
The "after" version for the SOC lead does something specific: it earns credibility at the working level. It references the actual workflow pain (pivoting between tools, extended triage time) and grounds the claim in a concrete, demonstrable scenario. It invites scrutiny instead of deflecting it. The SOC lead who hears this message goes from skeptical observer to internal advocate, because you've spoken their language before asking them to speak yours.
Part Three
The message that finally worked.
Same product. Different messages, sequenced for who was actually in the room.
The core narrative (the one sentence that anchors everything)
"Mid-market security teams are drowning in alert volume while actual threats are sitting undetected for weeks. We close that window, without changing your stack."
This is the message that runs at the top of the funnel. It doesn't require technical context to understand. The CISO, the CFO, the VP of Operations, and the SOC lead can all receive it without feeling patronized or confused. It names the problem, names the consequence, and pre-empts the most common objection, integration disruption, in eight words.
Critically: it creates urgency without creating anxiety. It's not "you're at risk and here's the scary number." It's "here's the gap, and here's that it's fixable." That framing is deliberate. The economic buyer needs to feel that approving this purchase is the safe, defensible choice, not that they're being scared into it.
The business layer (for the CISO and executive sponsor)
Once the core narrative is established, either through content before the sales conversation or through the first five minutes of the call, the business layer picks it up and translates it into financial and operational consequence.
What it sounds like in the room: "The average mid-market security team spends 30 to 40 analyst hours per week on false positive triage. That's not a technology problem, it's an allocation problem. The analysts you have are spending their time proving things aren't threats instead of investigating the ones that are. We redirect that time. Not by replacing your team or your tools, but by giving your analysts back the four hours per shift they're losing to noise."
Notice what this version does. It translates the technical problem (false positive volume) into operational cost (30–40 analyst hours per week) without requiring the CISO to do the translation themselves. It answers the "so what?" before it's asked. And it builds a business case the CISO can carry into a CFO conversation without the vendor in the room, which is exactly what they'll need to do to get the deal closed.
The technical layer (for the SOC lead and against the blocker)
The technical layer restores the credibility that a purely business-oriented pitch strips away. It's also the message your champion carries into internal conversations you'll never be part of.
What it sounds like in the room: "The correlation engine pulls enrichment from your EDR, your identity provider, and your cloud logs, in sequence and not in parallel, so by the time the alert surfaces, it already has the context your analyst needs to make a triage call. No pivoting to three other tools. No waiting on a SIEM query. The alert arrives with the answer, not just the question. Here's a detection from a real environment we can walk through, one your team would have categorized as a potential threat, spent 40 minutes on, and closed as a false positive. We surface it in under four minutes with a confidence score your analyst can defend."
This version does something the original pitch couldn't: it builds a specific, testable claim around a workflow scenario the SOC lead recognizes. It pre-empts the most common technical objection in this category before the SOC lead raises it. And it gives the champion a concrete example they can repeat in the debrief, which means your message is in the room even when you're not.
What changed, and what didn't
The product didn't change. The sequencing did.
One quarter. Message architecture only. No product changes, no pricing changes, no increase in outbound volume.
The company that ran this experiment didn't rebuild their product. They didn't redesign their website from the ground up. They rebuilt their message architecture and retrained their AEs to shift register, to move fluidly between business narrative and technical depth based on who was in the room, not based on what slide they were on.
| 3x increase in executive sponsor engagement after leading with the business layer, not the architecture diagram | −40% reduction in deals stalling after champion enthusiasm, because the business case was self-contained | +SOC technical champions actively advocating internally, not just nodding in demos |
The numbers are directional, not a controlled study. But the directional shift was fast, within one quarter, and it came entirely from message architecture, not from changes to the product, the pricing, or the outbound volume.
The more lasting change was cultural. The AEs stopped treating the deck as a linear narrative and started treating the room as a variable. They stopped asking "are we on slide four?" and started asking "who's across the table right now, and what do they need to hear to take the next step?" Those are different questions. They produce different conversations.
The trap nobody warns you about
Specificity is the hardest part. It's also the only part that matters.
Vague outcome language isn't safe. It's invisible.
The most common reaction we hear when teams see the layered message architecture for the first time is: "We already do this. We have a technical deck and a business deck." They don't. What they have is a technical deck and a business deck that both lead with the same abstract outcome claims, just with different quantities of acronyms.
Real specificity means naming the exact workflow pain. The exact time cost. The exact scenario your buyer has lived through. "Reduce alert fatigue" is not specific. "Give your analyst back four hours per shift by surfacing detections with context instead of noise" is specific. "Improve security posture" is not specific. "Close the 40-day dwell time window before your next board meeting on cyber risk" is specific.
Specificity is hard because it requires knowing your buyer's world well enough to speak their version of the problem back to them, not your version of their problem. That knowledge comes from win/loss calls, from champion conversations, from the objections your AEs hear in the rooms you're not invited into. It's not something you can synthesize from internal brainstorming. It has to be earned from the field.
The startup that can say exactly what changes, for exactly who, in exactly what timeframe, wins the credibility battle before the technical evaluation even starts. Vague outcome language isn't safe. It's invisible.
If you read The Messaging Problem and found yourself nodding along to the framework, this post is the test. Take your current one-pager and read it aloud as your CISO. Then read it as your SOC lead. If the language doesn't shift, if the same paragraph is doing the work for both rooms, and you haven't built the architecture yet. You've built a document that tries to serve everyone and ends up serving no one particularly well.
Build both layers. Sequence them deliberately. Put the right message in the right room before you need to defend it in one you weren't invited into.
Questions about how your message lands across the buying committee? We build the positioning frameworks, message architectures, and GTM programs cybersecurity and AI startups need to speak credibly to every stakeholder in the room.
Book a discovery call.png?width=1024&height=256&name=Aterous%20Logo%20-%20Black%20Transparent%20(1024x256).png)