Skip to main content

Attacking Strategies

Attacking strategies in Wardley Mapping are proactive and often aggressive maneuvers designed to force change in the market, break competitive inertia, and reshape the landscape to your advantage. Unlike defensive or reactive postures, these strategies involve deliberately driving evolution, challenging incumbents, or creating new opportunities by directly confronting or outmaneuvering competitors. They are about seizing the initiative and dictating the pace and direction of change.

⚔️ Understanding Attacking Strategies

Attacking strategies encompass a range of approaches, each tailored to specific competitive situations and objectives. The core intent is to proactively alter the competitive dynamics. Here are the key types of attacking strategies:

  • Centre of Gravity: Involves concentrating talent, expertise, or resources to become an indispensable hub that naturally attracts others, compelling them to align with your ecosystem or standards.
  • Directed Investment: Making bold, focused, venture-capital-style investments in specific future changes or emerging areas to seize a decisive advantage before competitors can react.
  • Experimentation: Utilizing rapid, small-scale tests—like hackdays, specialist groups, or skunkworks—to quickly uncover and exploit new opportunities and learn faster than rivals.
  • Fool's Mate: A swift, often uncounterable move that exploits a poorly understood or defended component in an opponent's value chain to cause cascading failure or force its commoditization.
  • Playing Both Sides: Strategically engaging with two or more opposing sides in a market or standards conflict, ensuring you benefit regardless of which side ultimately prevails.
  • Press Release Process: Employing Amazon’s “working backwards” method, starting with the customer-facing press release, to ensure clarity of vision, market fit, and drive towards industrialization of necessary components.
  • Undermining Barriers to Entry: Identifying and systematically dismantling a key barrier (e.g., cost, technology, regulation) that protects an incumbent, thereby opening the market to new competition.

Comparison of Attacking Strategies

Strategy & LinkPrimary Goal/IntentKey MechanismsTypical Use Cases/ScenariosMain BenefitsKey Climatic Patterns
Centre of GravityBecome an indispensable hub, forcing alignment.Concentration of talent/resources, creating essential dependencies.Building platforms, establishing dominant standards, becoming critical supplier.Attracts ecosystem, creates high switching costs for others, enables control over market direction.Higher order systems create new sources of worth, [Network effects (implicit)]
Directed InvestmentSeize decisive advantage in emerging areas through bold, focused investments.Venture capital-style funding, strategic acquisitions in new tech/markets, long-term R&D bets.Rapidly evolving technological landscapes, markets ripe for disruption, when future trends are somewhat clear but not yet mainstream.Potential for massive returns, first-mover advantage, shaping future market structure, creating significant barriers for latecomers.Capital flows to new areas of value, Future value is uncertain
ExperimentationRapidly uncover and exploit new opportunities through small-scale tests.Hackdays, specialist groups, skunkworks, A/B testing, prototyping, learning loops.Uncertain environments, exploring new product/service ideas, process optimization, identifying emergent needs.Faster learning, reduced cost of failure, adaptability, innovation pipeline, outmaneuvering slower competitors.Characteristics change, Evolution consists of multiple diffusion curves
Fool's MateSwiftly exploit a critical, poorly defended component in an opponent's value chain.Deep understanding of competitor's value chain, identifying single points of failure, rapid execution.When a competitor has a clear, critical vulnerability; to force commoditization of a key component they control.Can cause cascading failure for competitor, neutralize a key advantage, or force rapid, unwanted change on them.Competitors actions will change the game, Inertia can kill
Playing Both SidesBenefit regardless of outcome in a market conflict by strategically engaging with multiple opposing sides.Supplying non-exclusive components, investing in competing standards/platforms, maintaining neutrality.Standards wars, platform battles, geopolitical tensions affecting markets, markets with high uncertainty and multiple contenders.Reduced risk, sustained revenue streams, ability to adapt to whichever side wins, potential to influence outcome.Most competitors have poor situational awareness, Economy has cycles
Press Release ProcessEnsure clarity of vision and market fit by working backwards from the customer.Writing future press release/FAQ first, customer obsession, iterative refinement of vision, strong product definition.New product development, major feature launches, ensuring alignment on customer value before significant investment.Strong customer focus, clear goals, reduced wasted effort, drives industrialization of necessary components.Higher order systems create new sources of worth, Efficiency enables innovation
Undermining Barriers to EntrySystematically dismantle a key barrier protecting an incumbent to open the market.Reducing costs (e.g., via open source), new technology, influencing regulation, innovative business models.Highly concentrated markets, markets with high prices or low innovation due to lack of competition.Opens markets, increases competition, can lower prices for consumers, creates opportunities for new entrants.Evolution to higher order systems, Shifts from product to utility show punctuated equilibrium

🎯 Why Employ Attacking Strategies?

Organizations choose attacking strategies to actively shape their future rather than passively responding to market shifts. These strategies are employed to:

  • Break Inertia: Both internal organizational inertia and external market stagnation can be overcome by decisive attacking moves that force a new dynamic.
  • Dislodge Incumbents: Attacking strategies can target the vulnerabilities of established players, eroding their market share, neutralizing their advantages, or making their business models obsolete.
  • Reshape the Competitive Landscape: By introducing new technologies, business models, or standards, attackers can fundamentally alter the rules of the game and create a new landscape more favorable to their strengths.
  • Gain First-Mover Advantage: Many attacking strategies, like Directed Investment or effective Experimentation, are designed to get to the future first, capturing market share and setting de facto standards.
  • Exploit Competitor Weaknesses: Thorough mapping and situational awareness can reveal vulnerabilities in competitors' strategies or value chains, which attacking moves can then exploit.
  • Create New Market Spaces: Some attacking moves can open up entirely new markets or customer segments that were previously inaccessible or underserved.
  • Force Competitors to React: A well-executed attack compels competitors to respond, often from a defensive posture, consuming their resources and attention.

In essence, attacking strategies are chosen when a proactive, assertive approach is deemed necessary to achieve significant market shifts or gain a decisive competitive edge, especially in dynamic or contested environments.

🔄 The Attacker's Mindset: Common Themes

Successfully executing attacking strategies requires more than just selecting a tactic; it demands a particular mindset and an embrace of certain underlying principles. These common themes often distinguish effective attackers:

  • Proactivity and Initiative: Attackers don't wait for the future to happen to them; they seek to create it. They are biased towards action and look for opportunities to seize the initiative, forcing others to react to their moves.
  • Calculated Risk-Taking: While some attacking moves can be high-risk, they are rarely reckless. A thorough understanding of the landscape (often through Wardley Mapping) allows attackers to make informed bets where the potential rewards justify the risks. The risk of inaction is often weighed against the risk of action.
  • Focus on Asymmetry: Attackers often look for ways to create or exploit asymmetries. This could be leveraging a unique capability, exploiting a competitor's blind spot, or using a different business model that incumbents struggle to replicate. The goal is to avoid a head-on fight where the incumbent's superior resources might prevail.
  • Forcing Uncomfortable Change: Attacking strategies frequently aim to make competitors uncomfortable by challenging their established norms, undermining their profitable revenue streams, or forcing them to adopt new, less familiar ways of working.
  • Speed and Decisiveness: Many attacking scenarios reward speed. Whether it's being the first to market with an innovation or rapidly exploiting a newly identified weakness, attackers understand that windows of opportunity can close quickly.
  • Strong Situational Awareness: Effective attackers have a deep understanding of the competitive environment, including their own capabilities, competitor vulnerabilities, market dynamics, and the evolution of components in the value chain. This awareness is crucial for identifying attacking opportunities and anticipating responses.
  • Willingness to Cannibalize or Disrupt Self: Sometimes, the most potent attacking move involves disrupting one's own existing products or services before a competitor does. This requires foresight and a long-term perspective.

⚠️ Risks and Considerations in Attacking Moves

While the rewards of successful attacking strategies can be substantial, they also come with significant risks and important considerations:

  • High Resource Commitment: Many attacking strategies, such as Directed Investment or sustained efforts to Undermine Barriers to Entry, can require significant upfront investment in terms of capital, talent, and time.
  • Potential for Retaliation: Incumbents are rarely passive. A direct attack can provoke strong retaliatory measures, including price wars, legal challenges, or counter-attacks on your own core business.
  • Market Destabilization and Unintended Consequences: Attacking moves can destabilize a market in unpredictable ways. While this might be the goal, it can also create openings for other competitors or lead to outcomes that are not entirely favorable to the attacker.
  • Reputational Risk: Aggressive or "ruthless" attacking strategies can damage a company's reputation with customers, partners, or the broader public if they are perceived as unfair, unethical, or overly predatory.
  • Risk of Failure and Wasted Effort: By their nature, many attacking strategies are high-risk. If the assumptions underpinning the strategy are wrong, or if the execution is flawed, the effort can result in significant losses and wasted resources.
  • Internal Resistance: Bold attacking moves can face internal resistance from those comfortable with the status quo or wary of the risks involved. Strong leadership is needed to overcome this inertia.
  • Ethical Boundaries: Leaders must carefully consider the ethical implications of their chosen attacking strategies. While business is competitive, actions that cause undue harm, deceive stakeholders, or exploit vulnerabilities in a malicious way can have long-term negative consequences. For example, a "Fool's Mate" strategy, while effective, might be viewed as underhanded if not carefully considered.

Attacking Angles in Other Strategies

The intent to proactively force change and gain advantage isn't limited to strategies explicitly categorized as "Attacking." Several strategies from other categories can be wielded with a distinctly aggressive or attacking intent, or their execution can have significant attacking effects on competitors:

  • Land Grab: This positional strategy, aimed at rapidly acquiring market share or resources, is inherently aggressive. It seeks to dominate a space quickly, often to preempt competitors or establish a commanding early lead, effectively attacking their potential for growth.
  • Embrace and Extend: While an ecosystem play, its historical application has often been a powerful attacking move. By embracing an open standard or technology and then extending it with proprietary features, companies can neutralize the original standard and lock customers into their ecosystem, attacking the openness that might have benefited competitors.
  • Tower and Moat: This strategy involves building a strong, defensible position (the tower) and then creating significant barriers (the moat) to prevent others from attacking it. While defensive in its core, the act of aggressively expanding the moat or using the tower's strength to encroach on adjacent territories can be a form of attack.
  • Innovate, Leverage, Commoditize (ILC): The "commoditize" phase of ILC can be a direct attack on competitors who rely on the value of the component being commoditized. By driving down its price or making it openly available, an organization can undermine a rival's profit margins or entire business model.
  • Open Approaches: While often used to accelerate evolution for broader benefit, strategically opening up a key technology or platform can be a direct attack on an incumbent who relies on a proprietary, closed system. Google's Android is a classic example of this, attacking Apple's iOS dominance.
  • Standards Game: Actively trying to make your technology the dominant standard is an attacking move against competing standards. Success means your rivals are forced to adapt, pay licensing fees, or become irrelevant.

Recognizing the potential attacking intent or effect of these and other strategies provides a more nuanced understanding of the competitive landscape. The key is to look beyond the category label and analyze how a strategy is being deployed and what impact it has on competitors and market dynamics.

Author

Dave Hulbert
Dave Hulbert
Builder and maintainer of Wardley Leadership Strategies