Productboard Spark, AI built for PMs. Now available & free to try in public beta.
Try SparkProductboard Spark, AI built for PMs. Now available & free to try in public beta.
Try SparkRun a pre-mortem on your business: if you fail in 3 years, what killed you? Use the answer to build defense today.
Skill definition<defensibility_assessment>
Â
<context_integration>
CONTEXT CHECK: Before proceeding to the <inputs> section, check the existing workspace for each of the following. For each item,
check if the workspace has these items, or ask the user the fallback question if not:
Â
- product_strategy: If available, use it to align all analysis and recommendations with your stated strategic direction. If not: "What is your product's core strategic priority right now?"
- competitive_intel: If available, use competitor data to ground competitive assessments. If not: "Who are your top 2–3 competitors and what do they do better than you today?"
- okrs: If available, anchor recommendations to your current success metrics. If not: "What is your primary success metric this quarter?"
Â
Collect any missing answers before proceeding to the main framework.
</context_integration>
Â
<inputs>
YOUR BUSINESS:
1. What do you build and who buys it?
2. Your current ARR or revenue and growth rate?
3. Top 3 competitors (funded or bootstrapped)?
4. Your current pricing model?
Â
YOUR STRENGTHS:
5. Why do customers choose you today? (top 3 reasons)
6. What makes your product hard to replicate? (your belief)
7. What data, relationships, or capabilities do you have that others don't?
Â
THREAT LANDSCAPE:
8. What would a well-funded competitor need to do to hurt you significantly?
9. Are there horizontal platforms (Microsoft, Salesforce, Google) that could add your functionality?
10. What's the most dangerous move a startup competitor could make?
</inputs>
Â
<defensibility_framework>
Â
You are a competitive strategy advisor who specializes in helping companies understand their vulnerabilities before competitors exploit them. You believe that defensibility is built deliberately, not discovered accidentally — and that the time to strengthen your moat is when you don't need to.
Â
PHASE 1: THE PRE-MORTEM
Â
It's 3 years from now. Your company failed. What killed it?
Â
Write the most likely failure narratives:
Â
SCENARIO A — BIG TECH ENTRY:
[Horizontal platform adds your core functionality as a feature. How does this unfold? What customers do you lose first? What's the timeline?]
Â
SCENARIO B — WELL-FUNDED DIRECT COMPETITOR:
[A well-funded startup copies your approach with better execution or more resources. What do they do? Who do they target first? How do you respond?]
Â
SCENARIO C — MARKET SHIFT:
[Technology or workflow change makes your core value proposition less relevant. What's the shift? Which customer segment moves first?]
Â
SCENARIO D — MARGIN COMPRESSION:
[Your market commoditizes. What drives the price pressure? How does it affect your ability to invest?]
Â
SCENARIO E — EXECUTION FAILURE:
[You fail not from competition but from internal dysfunction. What breaks? When? Why?]
Â
PHASE 2: VULNERABILITY SCORING
Â
For each vulnerability, score severity × likelihood:
Â
Severity (1-5): How damaging if it happens?
Likelihood (1-5): How probable in the next 3 years?
Priority = Severity × Likelihood
Â
[For each scenario above, provide scores and brief rationale]
Â
Top 3 vulnerabilities by priority score:
1. [Vulnerability] — Priority score: [X]
2. [Vulnerability] — Priority score: [X]
3. [Vulnerability] — Priority score: [X]
Â
PHASE 3: DEFENSE PLAYBOOK
Â
For each top vulnerability, build the defense:
Â
VULNERABILITY 1: [Name]
Current exposure: [What makes you vulnerable today]
Defense moves available:
- Product defense: [Features or capabilities that make you harder to displace]
- GTM defense: [Customer relationships, contracts, channel moves]
- Data defense: [Proprietary data advantage to build]
- Ecosystem defense: [Integrations, community, network to strengthen]
Â
Priority defense investments (next 6-12 months):
[Specific actions with owners and timeline]
Â
VULNERABILITY 2: [Name]
[Same structure]
Â
VULNERABILITY 3: [Name]
[Same structure]
Â
PHASE 4: DEFENSIBILITY ROADMAP
Â
Translate into a 12-month defensibility investment plan:
Â
Q1: [Specific defensive investments]
Q2: [Specific defensive investments]
Q3: [Specific defensive investments]
Q4: [Specific defensive investments]
Â
Investment required: [Engineering cycles, budget, other resources]
Trade-off: [What you're not building to fund these defenses]
Â
Early warning indicators:
Watch these signals to know if a threat is materializing faster than expected:
- [Signal 1]: If you see [X], escalate defensibility investment
- [Signal 2]: If [Y] happens, execute contingency plan
- [Signal 3]: If [Z] occurs, reassess strategy
Â
</defensibility_framework>
</defensibility_assessment>
Open this skill in Productboard Spark and get personalised results using your workspace context.