chat
expand_more

Abnormal Engineering Stories, Episode #5: Customer-Focused Product Development with 3x Co-Founder

Many companies aspire to be customer-centric, but few find a way to operationalize customer-centricity into their team’s culture. As a 3x SaaS startup founder, most recently at Orum, and a veteran of Facebook and Palantir, Ayush Sood...
September 27, 2021

Many companies aspire to be customer-centric, but few find a way to operationalize customer-centricity into their team’s culture. As a 3x SaaS startup founder, most recently at Orum, and a veteran of Facebook and Palantir, Ayush Sood has seen this first hand. He knows that an engineering team that deeply understands customer needs and takes action to effectively solve them can move much faster and have much greater impact than others.

In this episode of Abnormal Engineering Stories, Ayush shares how he intentionally injected customer-driven prioritization into his companies via MEDDIC, and the positive impact it had for his customers and team. While MEDDIC is typically utilized as an Enterprise Sales process, adopting it within Orum’s engineering teams had great impact and effect. Ayush and I will discuss:

  • Real-world examples of how MEDDIC focused his teams on building customer value,
  • Identifying and building rapport with economic buyers and champions, and
  • How he re-interpreted the MEDDIC framework as Orum grew.

If you enjoy this episode, you can also subscribe on Apple, Spotify, or Google Podcasts.

Useful Resources:

Abnormal Engineering Stories, Episode #5: Customer-Focused Product Development with 3x Co-Founder

See Abnormal in Action

Schedule a Demo

Get the Latest Email Security Insights

Subscribe to our newsletter to receive updates on the latest attacks and new trends in the email threat landscape.

 

See the Abnormal Solution to the Email Security Problem

Protect your organization from the full spectrum of email attacks with Abnormal.

See a Demo
 
Integrates Insights Reporting 09 08 22

Related Posts

B AI Series
Discover how Abnormal's advanced AI models are used to detect abnormalities in email behavior and protect organizations from the most sophisticated email attacks.
Read More
B Insights from Clemson University CISO
John Hoyt, CISO at Clemson University, shares his take on the unique cybersecurity challenges of higher education and how Abnormal Security can help.
Read More
B Nigerian Prince
Scams about the Nigerian Prince that promise millions have been around for decades. But they are transitioning, now using ChatGPT and similar tools to seem more convincing.
Read More
B 9 12 23 ATO
Learn why account takeovers are successful, how to detect and remediate them, and how to better protect yourself from cybercriminals in the future.
Read More
B 9 8 23 Incident Response
An effective incident response plan is crucial to minimizing the effects of an email attack and preventing future breaches.
Read More
B MKT006 09 05 23 Site and Social Images for MDC Blog v02
This company has the best cybersecurity product I’ve ever seen, and we’re primed for a future where AI is the focus. Here’s my thoughts on why.
Read More