D3 Strategies

Wireframe of D3 marketing strategy.

Get Started. It's Free
or sign up with your email address
D3 Strategies by Mind Map: D3 Strategies

1. Email Strategy

1.1. Outbound Campaign

1.1.1. Newsletter

1.1.1.1. 1 per month

1.1.1.1.1. Copy writing

1.1.1.1.2. Email Setup

1.1.1.1.3. Deployment

1.1.2. Outbound Blast

1.1.2.1. eBook

1.1.2.1.1. Email copy

1.1.2.1.2. Email setup

1.1.2.1.3. Deployment

1.2. Inbound Campaign

1.2.1. Nurture creation

1.2.1.1. Email copy/setup

1.2.1.2. Nurture setup in HubSpot

1.2.1.3. Set Cadence

1.2.1.4. Lead Scoring Setup Help

1.2.1.5. Deployment

2. Resources

2.1. Team Members

2.1.1. Curtis Warren

2.1.1.1. [email protected]

2.1.2. Frank Young

2.1.2.1. [email protected]

2.2. Teamwork

3. OVERVIEW

3.1. GOALS

3.1.1. Increase in SQL's in first 3 months

3.1.2. Have full marketing automation in place

3.2. Buyer Personas

3.2.1. CTO's, IT Directors, Heads of development

4. Deployment Strategies

4.1. Social

4.2. Email

4.3. SEO

5. SEO Strategy

5.1. Preliminary Full Audit

5.1.1. Conversion audit

5.1.2. Content audit

5.1.3. Onsite audit

5.1.4. Offsite audit

5.1.5. Analytics audit

5.1.6. Competitor research

5.2. Meta/title tags

5.3. Keyword research

5.4. Blog optimization?

6. Content Strategy

6.1. Blogs

6.1.1. 8 per month

6.1.1.1. ebook/blog series - Building a Better IRP - How to Meet and Exceed NIST Standards

6.1.1.1.1. How Strong is Your Incident IRP?

6.1.1.1.2. The Essential Pieces of an IRP

6.1.1.1.3. Building your IR Team

6.1.1.1.4. Start Building an IRP That Will Exceed NIST Standards with D3

6.1.1.2. ebook/blog series - First Responder's Guide to a Cyber Attack

6.1.1.2.1. The first 24 Hours

6.1.1.2.2. The Next 48 Hours

6.1.1.2.3. The Next 2 Weeks

6.1.1.2.4. Starting the Recovery

6.1.2. How Ready is Your Team for a Pass the Hash Attack (this can be an ongoing series and discuss different types of cyber attacks)

6.1.3. Integrating Patch Management into your Incident Response Strategy

6.1.4. Tips to Help You Manage Your IR Team

6.1.5. Using the Past to Improve the Future - How IT Forensics Can Help Prevent Future Vulnerabilities

6.1.6. Reducing Human Error - How Automating IR Can Help Make Your Cyber Security Air Tight

6.1.7. Is an Ounce of Prevention Really Worth a Pound of Cure? Why You'll Always Need an IRP

6.1.8. Application Whitelisting that Doesn't Handicap Your Employees

6.1.9. Best Practices for Privileged Account Management Security Framework/Strategy

6.1.10. Privilege Management That Lets Your Employees do Just What They Need

6.1.11. concept creation

6.1.12. copy writing

6.1.13. posting?

6.2. Minigraphics

6.2.1. 8 per month

6.2.1.1. 1 per blog

6.2.2. Will be using facts and statistics from the blogs

6.2.3. Design

6.3. eBooks

6.3.1. 1 per month, starting month 2 (September)

6.3.1.1. How to Prevent an IT Security Breach (based on blog series, see above for specifics)

6.3.1.2. Copy creation

6.3.1.3. Design

6.3.1.4. 1Landing page per eBook

6.3.1.4.1. Design

6.3.1.4.2. Copy creation

6.3.1.4.3. CTAs

6.3.1.5. 4-5 email nurture following

6.3.1.5.1. Setup in HubSpot

6.3.2. First Responder's Guide to a Cyber Attack - The First X Hours

6.4. Whitepapers

6.4.1. 1 per month, starting in Sept

6.4.2. Built for Response: Centralize, Standardize, and Act with a Unified IR Platform

6.4.3. Supercharging NIST 800-61: Enhancing Proven Playbooks with Automated Response Orchestration

6.4.4. From Detection to Recovery: 4 Tools that Speed Response through the IR Lifecycle

6.4.5. IR Team Empowerment: 5 Tools that Make Your Team Smarter, Faster, and "Bigger"

6.4.6. Being Prepared Means Being Adaptable (agile): Responding to Dynamic Cyber Attacks with Dynamic Task Orchestration

6.4.7. Make SIEM Actionable: Focus on the Threats that Matter and Reduce Alert Fatigue with Unified IR

6.5. Case Studies

6.5.1. 1 per quarter

6.5.1.1. Concepts creation

6.5.1.2. Gather client info for document

6.5.1.3. Copy creation

6.5.1.4. Design

6.5.1.5. Deploy (emails, nurtures)

6.6. Infographics

6.6.1. 1 per month

6.6.1.1. Timeline of a Cyber Security Attack

6.6.1.1.1. Design

6.6.1.1.2. Deploy

6.6.1.1.3. Gather stats/data

6.6.1.2. Real-World Costs of a Cyber Security Attack

6.7. Video

6.7.1. 4 videos (Sept, Oct, Dec., Jan.)

6.7.2. Video concept

6.7.3. Storyboarding

6.7.4. Creation of video

6.7.5. Deployment

6.8. Buyer Persona

6.8.1. Customer research

6.8.2. Copy creation

6.8.3. Design

6.9. Customer Journey

6.9.1. Customer research

6.9.2. Copy creation

6.9.3. Design

7. Ad Strategy

7.1. Adwords

7.1.1. Paid Ads

7.1.1.1. Ad copy creation

7.1.1.2. Ad image creation

7.1.1.3. Ad setup

7.1.1.4. Deployment

7.1.2. Remarketing

7.1.2.1. Ad copy creation

7.1.2.2. Ad image creation

7.1.2.3. Ad setup

7.1.2.4. Deployment

7.2. Social Ads

7.2.1. Content Promotion

7.2.1.1. Paid Ads

7.2.1.1.1. Facebook

7.2.1.1.2. LinkedIn

7.2.1.1.3. Twitter

8. Web Wireframe

8.1. Menu Bar

8.1.1. Why Us

8.1.1.1. Respond Faster

8.1.1.2. Empower Users

8.1.1.3. Determine Root Cause

8.1.1.4. Full Lifecycle Management

8.1.1.5. Trent Reporting

8.1.1.6. Demonstrate Compliance

8.1.1.7. Maintain Trust

8.1.1.8. Holistic Risk Approach

8.1.1.9. Risk Visibility Across Silos

8.1.2. Industry

8.1.2.1. Software & Technology

8.1.2.2. Banking

8.1.2.3. Healthcare

8.1.2.4. Insurance

8.1.2.5. Energy

8.1.2.6. Retail

8.1.2.7. Media & Communications

8.1.2.8. Manufacturing

8.1.2.9. Pharmaceuticals

8.1.3. Solutions

8.1.3.1. Cyber Incident Response

8.1.3.2. Forensics Case Management

8.1.3.3. Fraud Management

8.1.3.4. IP Management

8.1.3.5. Compliance

8.1.3.6. Retail Loss Prevention

8.1.3.7. Brand Protection

8.1.3.8. Enterprise Risk Management

8.1.3.9. Physical Security Reporting

8.1.3.10. Business Continuity?

8.1.4. Products

8.1.4.1. Core Engine

8.1.4.2. Connectors/Integrations

8.1.4.3. Intelligence Layer

8.1.4.4. Professional Services

8.1.5. Comapny

8.1.5.1. About Us

8.1.5.2. News & Events

8.1.5.3. Careers

8.1.5.4. Contact Us

8.1.6. Demo