D3 Strategies

Wireframe of D3 marketing strategy.

Get Started. It's Free
or sign up with your email address
D3 Strategies by Mind Map: D3 Strategies

1. Email Strategy

1.1. Outbound Campaign

1.1.1. Newsletter 1 per month Copy writing Email Setup Deployment

1.1.2. Outbound Blast eBook Email copy Email setup Deployment

1.2. Inbound Campaign

1.2.1. Nurture creation Email copy/setup Nurture setup in HubSpot Set Cadence Lead Scoring Setup Help Deployment

2. Resources

2.1. Team Members

2.1.1. Curtis Warren [email protected]

2.1.2. Frank Young [email protected]

2.2. Teamwork


3.1. GOALS

3.1.1. Increase in SQL's in first 3 months

3.1.2. Have full marketing automation in place

3.2. Buyer Personas

3.2.1. CTO's, IT Directors, Heads of development

4. Deployment Strategies

4.1. Social

4.2. Email

4.3. SEO

5. SEO Strategy

5.1. Preliminary Full Audit

5.1.1. Conversion audit

5.1.2. Content audit

5.1.3. Onsite audit

5.1.4. Offsite audit

5.1.5. Analytics audit

5.1.6. Competitor research

5.2. Meta/title tags

5.3. Keyword research

5.4. Blog optimization?

6. Content Strategy

6.1. Blogs

6.1.1. 8 per month ebook/blog series - Building a Better IRP - How to Meet and Exceed NIST Standards How Strong is Your Incident IRP? The Essential Pieces of an IRP Building your IR Team Start Building an IRP That Will Exceed NIST Standards with D3 ebook/blog series - First Responder's Guide to a Cyber Attack The first 24 Hours The Next 48 Hours The Next 2 Weeks Starting the Recovery

6.1.2. How Ready is Your Team for a Pass the Hash Attack (this can be an ongoing series and discuss different types of cyber attacks)

6.1.3. Integrating Patch Management into your Incident Response Strategy

6.1.4. Tips to Help You Manage Your IR Team

6.1.5. Using the Past to Improve the Future - How IT Forensics Can Help Prevent Future Vulnerabilities

6.1.6. Reducing Human Error - How Automating IR Can Help Make Your Cyber Security Air Tight

6.1.7. Is an Ounce of Prevention Really Worth a Pound of Cure? Why You'll Always Need an IRP

6.1.8. Application Whitelisting that Doesn't Handicap Your Employees

6.1.9. Best Practices for Privileged Account Management Security Framework/Strategy

6.1.10. Privilege Management That Lets Your Employees do Just What They Need

6.1.11. concept creation

6.1.12. copy writing

6.1.13. posting?

6.2. Minigraphics

6.2.1. 8 per month 1 per blog

6.2.2. Will be using facts and statistics from the blogs

6.2.3. Design

6.3. eBooks

6.3.1. 1 per month, starting month 2 (September) How to Prevent an IT Security Breach (based on blog series, see above for specifics) Copy creation Design 1Landing page per eBook Design Copy creation CTAs 4-5 email nurture following Setup in HubSpot

6.3.2. First Responder's Guide to a Cyber Attack - The First X Hours

6.4. Whitepapers

6.4.1. 1 per month, starting in Sept

6.4.2. Built for Response: Centralize, Standardize, and Act with a Unified IR Platform

6.4.3. Supercharging NIST 800-61: Enhancing Proven Playbooks with Automated Response Orchestration

6.4.4. From Detection to Recovery: 4 Tools that Speed Response through the IR Lifecycle

6.4.5. IR Team Empowerment: 5 Tools that Make Your Team Smarter, Faster, and "Bigger"

6.4.6. Being Prepared Means Being Adaptable (agile): Responding to Dynamic Cyber Attacks with Dynamic Task Orchestration

6.4.7. Make SIEM Actionable: Focus on the Threats that Matter and Reduce Alert Fatigue with Unified IR

6.5. Case Studies

6.5.1. 1 per quarter Concepts creation Gather client info for document Copy creation Design Deploy (emails, nurtures)

6.6. Infographics

6.6.1. 1 per month Timeline of a Cyber Security Attack Design Deploy Gather stats/data Real-World Costs of a Cyber Security Attack

6.7. Video

6.7.1. 4 videos (Sept, Oct, Dec., Jan.)

6.7.2. Video concept

6.7.3. Storyboarding

6.7.4. Creation of video

6.7.5. Deployment

6.8. Buyer Persona

6.8.1. Customer research

6.8.2. Copy creation

6.8.3. Design

6.9. Customer Journey

6.9.1. Customer research

6.9.2. Copy creation

6.9.3. Design

7. Ad Strategy

7.1. Adwords

7.1.1. Paid Ads Ad copy creation Ad image creation Ad setup Deployment

7.1.2. Remarketing Ad copy creation Ad image creation Ad setup Deployment

7.2. Social Ads

7.2.1. Content Promotion Paid Ads Facebook LinkedIn Twitter

8. Web Wireframe

8.1. Menu Bar

8.1.1. Why Us Respond Faster Empower Users Determine Root Cause Full Lifecycle Management Trent Reporting Demonstrate Compliance Maintain Trust Holistic Risk Approach Risk Visibility Across Silos

8.1.2. Industry Software & Technology Banking Healthcare Insurance Energy Retail Media & Communications Manufacturing Pharmaceuticals

8.1.3. Solutions Cyber Incident Response Forensics Case Management Fraud Management IP Management Compliance Retail Loss Prevention Brand Protection Enterprise Risk Management Physical Security Reporting Business Continuity?

8.1.4. Products Core Engine Connectors/Integrations Intelligence Layer Professional Services

8.1.5. Comapny About Us News & Events Careers Contact Us

8.1.6. Demo