How Can CMOs Serve Hungry Prospects With Expert Biometric Content?

How can CMOs serve hungry prospects with expert biometric content?

(Imagen 4)

Biometric product companies offer a tasty mixture of fingerprint, face, iris, voice, DNA, and other biometric hardware and software. These companies employ Chief Marketing Officers (CMOs) responsible for their firms’ inbound product marketing. Hungry prospects devour any content the firm can provide, and the CMOs devour any employee or contractor who can provide the necessary content.

The CMO will appreciate this seasoned quote from Lee Densmer:

“Companies are outsourcing the writing at great expense….[I]t is a heavy lift to make sure daily content for the platform is useful, relevant, and align with your business. Outsourcing doesn’t really work unless the writer really knows your business, is in touch with corporate leaders, and stays on top of trends.”

Read Densmer’s article: https://www.linkedin.com/pulse/why-linkedin-b2b-growth-hard-right-now-what-youre-doing-lee-densmer-pqvgc

So if you’re a content-devouring CMO at a biometric company, doesn’t it make sense to contract with Bredemarket’s biometric product marketing expert to serve a delicious dinner of your content needs?

Talk to Bredemarket: https://bredemarket.com/mark/

(And yes, it is almost lunchtime. Why do you ask?)

CxOs, Bredemarket Can Help Even If You DON’T Have Your Act Together

(Imagen 4)

I have positioned Bredemarket so I can fill the gaps in a Chief Marketing Officer’s existing content plan, or a Chief Revenue Officer’s proposal plan, or a Chief Strategy Officer’s existing analysis plan.

But what if you don’t have a plan?

Bredemarket can help you too.

This post describes how I can plug into your existing plan, or how I can help you create a plan if you don’t have one.

But first let’s dispense with the theory of how to properly do things, because it’s silly.

What theory says

If you read LinkedIn for any length of time, you will run across content marketers and copywriters and other Professional Content Experts.

These 17x certified PCEs are all too willing to tell you The Correct Way For Companies To Engage With Writing Contractors.

Because the way your company engages with contractors I s completely wrong.

Here is The Correct Way:

“When engaging with a contractor, you must provide the contractor with a detailed content brief that answers all 42 questions your contractor will ask or may ask. Failure to do this brands you as a failed substandard company.”

Imagen 4. Link.

Bull.

Bredemarket rarely receives any kind of brief from my clients. Sometimes we get a paragraph. Or sometimes we just get a couple of sentences:

“A local Utah paper ran an article about how our end customer used our solution to solve world hunger. Here’s the article; get additional information from the guy quoted in the article and write a blog post about it.”

These two sentences would drive a Professional Content Expert up a wall, because they don’t answer all 42 questions.

So what?

It’s a starting point. If I were given that, I could start.

So forget the theory of The Correct Way For Companies To Engage With Writing Contractors, and just start writing (but thinking first).

If you have a plan (or at least an idea)

Many of my clients have a content, proposal, or analysis plan—or at least an idea of what they need. There are many times when I simply plug in to a client’s existing plan. Here are some examples:

  • One client’s CMO needed a twice-a-month series of blog posts to promote one of their company’s services. The service featured multiple facets, so I had plenty to write about. So I plugged into the existing system and wrote.
  • Another client needed a series of case studies to grab the attention of their prospects. Again, the client’s product addressed multiple markets, and the variety of customer case studies gave me plenty to write about. So I plugged into the existing system and wrote.
  • Multiple clients have asked me to manage and/or write proposals for them. Two of the clients (one being SMA) had very well-defined capture management and proposal processes. The others didn’t—I was the de facto expert in the (virtual) room—but they knew which Request for Proposal (RFP) or Request for Information (RFI) required a response. So I plugged into the existing system and wrote.
  • Multiple clients (mainly in the identity/biometric realm) have asked me to perform analyses. Whether they had an established analysis process or not, they knew what they wanted. So I plugged into the existing system and wrote.

So I easily completed these one-off (or twelve-off) tasks, responding to my clients’ well-defined requests.

But others face the challenge of not knowing what they want.

If you don’t have a plan

Let’s say that my messages about being afraid of competitors stealing from you have resonated.

And you know you have a content black hole.

Imagen.

But how do you fill it?

Good question.

And perhaps you already know how you and I will figure out the answer.

The seven questions again

You may have seen me push my free ebook “Seven Questions Your Content Creator Should Ask You.”

I think I’ve pushed it a time or two.

The beautiful thing about the seven questions is that you can not only apply them to a particular piece of content such as a blog post, but to an entire content-proposal-analysis strategy.

And here I DO mean strategy, not tactics.

There are other methods to derive a strategy, but this is as good as any.

As a reminder, the seven questions are:

So if you book a free meeting with me to figure out a strategy, we can work through these questions to jointly understand your company, your products, and the material you need. I haven’t the slightest idea how our conversation will progress, but perhaps I may end up asking you questions like this:

  • WHY do your competitors suck?
  • HOW do your prospects make purchasing decisions?
  • WHAT do your salespeople need to close deals (conversion)?
  • What are your GOALS to move prospects through your funnel?

You get the idea. As we talk through things, perhaps you and I will get ideas about how Bredemarket can help you.

Or maybe not. Maybe it turns out you need a web designer, or a videographer, or a demand generation expert, or an accountant.

But if we determine that Bredemarket can help you, then we can create the plan and figure out how I can best execute on the plan. A competitor analysis? A series of blog posts? We will figure it out.

Then I’ll plug into the new existing system and write.

A call to action

Your content, proposals, and analyses will presumably incorporate a call to action.

It’s no surprise that this post also has one.

Visit my “content for tech marketers” page, read about what we can do together, and book a free 30 minute content needs assessment. You can book it at the top of the page or the bottom, whatever turns you on.

But let’s move. Your competitors are already moving.

Content for tech marketers.

Is There a Calculator On That Slide Rule?

(Imagen 4)

Once again I’m painting a picture, this time of two people: the IT chick, deftly wielding her slide rule as she sizes up hardware and software, and the finance dude, deftly wielding his calculator as he tabulates profit, loss, and other money stuff. Each of them in their own little worlds.

Despite the thoughts of Norman Marks in his post “Cyber is one of many business risks.”

  • “Many years ago, my friend Ed Hill, a Managing Director with Protiviti at the time, coined the expression ‘there is no such thing as IT risk. There is only business risk.’”
  • “The [Qualsys] report reveals a persistent disconnect between cybersecurity operations and business outcomes. While 49% of respondents reported having formal risk programmes, only 30% link them directly to business objectives. Even fewer (18%) use integrated risk scenarios that consider both business processes and financial exposure.”

I admit that I often draw a clear distinction between technical risk and business risk. For example, the supposedly separate questions regarding whether a third-party risk management (TPRM) algorithm is accurate, and what happens if an end customer sues your company because the end customer’s personally identifiable information was breached on your partner company’s system.

Imagen 4.

So make sure that when your IT chick wields her slide rule, the tool has an embedded calculator on it to quantify the financial effects of her IT decisions.

Is There a Calculator On That Slide Rule?

Painting a Picture: The Content Challenges of a Biometric Chief Marketing Officer

(Imagen 4)

If this reads odd, there’s a reason.

Imagine a Chief Marketing Officer sitting at her desk, wondering how she can overcome her latest challenge within three weeks.

She is a CMO at a biometric software company, and she needs someone to write the first two entries in a projected series of blog posts about the company’s chief software product. The posts need to build awareness, and need to appeal to prospects with some biometric knowledge.

So she contacts the biometric product marketing expert, John E. Bredehoft of Bredemarket, via his meeting request form, and schedules a Google Meet for the following meeting.

At the scheduled time she joins the meeting from her laptop on her office desk and sees John on the screen. John is a middle-aged Caucasian man with graying hair. He is wearing wire-rimmed glasses with a double bridge. He has a broad smile, with visible lines around his eyes and mouth. His eyes are brown  and appear to be looking directly at the camera. He is wearing a dark blue collared shirt. While his background is blurred, he appears to be in a room inside his home, with a bookcase and craft materials in the background.

After some pleasantries and some identity industry chit chat, John started asking some questions. Why? How? What? Goal? Benefits? Target audience (which he called hungry people)? Emotions? Plus some other questions.

They discussed some ideas for the first two blog posts, each of which would be about 500 words long and each of which would cost $500 each. John pledged to provide the first draft of the first post within three calendar days.

After the call, the CMO had a good feeling. John knew biometrics, knew blogging, and had some good ideas about how to raise the company’s awareness. She couldn’t wait to read Bredemarket’s first draft.

If you are in the same situation as the CMO is this story, schedule your own meeting with Bredemarket by visiting the https://bredemarket.com/mark/ URL and filling out the Calendly form.

Remember how I warned you that this post was going to read odd? In case you’re wondering about the unusual phrasing—including a detailed description of what I look like—it’s because I fed the entire text of this blog post to Google Gemini. Preceded by the words “Draw a realistic picture of.” And here’s what I got.

Imagen 4. I’m not on the screen, but I like the content ideas.
Imagen 4. With the bookcases. And I’ve never had a beard.
Imagen 4. But that’s not blurred.

The Source of Bredemarket’s Content Creator Questions 1-3 of 7

(Imagen 4)

Perhaps you’ve seen Bredemarket’s ebook “Seven Questions Your Content Creator Should Ask You.

If you didn’t already know this, I took the first three questions, in order, from Simon Sinek.

Regarding Sinek’s three questions, see the HubSpot post “3 Key Marketing Takeaways from Simon Sinek’s ‘Start With Why.’”

These three questions, as well as others—there are more than seven—form the first part of Bredemarket’s engagement with its clients. I ask, then I act.

I ask, then I act.

If you would like to learn more about Bredemarket’s marketing and writing services, visit my “Content for Tech Marketers” page at bredemarket.com/mark

Stealing the Sun

(Imagen 4)

I am going to publish a lengthy blog post on strategy development on Monday, and I’m trying to keep it a serious affair.

But as I worked on one part of the past, I found myself trying to work in song references.

But rather than break up the flow of the serious Monday post, I will instead work all the references into this Sunday post and be done with them.

Because the Monday post is serious and deals with important topics such as threats to corporate revenue.

Let’s say that my messages about being afraid of competitors stealing from you have resonated.

Whether they’ve been caught stealing or not.

And you know you have a content black hole.

Imagen.

Not a black hole sun.

But how do you fill it?

Good question.

I will answer it Monday.

Then we’ll all get rich.

Meta Mutters

The Meta properties are great for driving engagement, but Meta’s odd and untimely application of its rules can be maddening.

I was checking my personal Facebook account this afternoon when I noticed a “Profile has some issues” message and clicked on the “View details” button to see why my profile had a gold restricted minus sign.

Profile has some issues.

When I clicked on the button I found a list of 11 issues encompassing my personal profile, the Bredemarket page, and the Bredemarket groups.

None later than April 17.

Lovely spam, wonderful spam.

I discussed THAT encounter with the Metabot in my Bredemarket post “Defeating the Metabot to Share Whistic’s Survey Results.” As far as I can tell, my grievous violation was this parenthetical statement:

“(And one more key finding. Read the article.)”

I got flagged because Facebook said my content could “trick people to visit…a website.”

We removed your post. You figure out what happened.

But even after removing the parenthetical comment I got flagged again.

Eventually I just posted a link with no text on Facebook, and since that time have studiously avoided posting calls to action on Facebook posts.

But this past issue remains a present issue because my account is restricted…and I’m supposed to do something about it. But without a DeLorean I’m not sure what. I can’t remove the offending posts since Facebook already did so.

It turns out that Wendy Wilkes wrote about this in late July.

“Many users are seeing this today — it’s caused by old posts flagged by Facebook’s system, not recent activity….

You’re not alone — it’s happening to many!

#FacebookIssue #ContentCreator #StayCalm “

From Wendy Wilkes.

So I guess I will just hang tight and see if it auto clears.

And remind myself again that Facebook is not a dependable platform. That’s the message we’re supposed to get from this…right?

When Meta Personal Accounts Become Professional

Originally posted on my personal Instagram https://www.instagram.com/reel/DM3KMPvvsR4/

My personal Facebook account is technically a “professional” account, and therefore has Meta’s silly weekly contests. I have the content part down, but I’m NOT creating a Meta personal AI bot. (The Bredemarket Instagram account has two.)

Today’s Acronym is PIA (Privacy Impact Assessment)

(Imagen 4)

(Part of the biometric product marketing expert series)

Do U.S. government agencies simply run roughshod over your privacy rights?

Not exactly.

Government agencies are required to issue Privacy Impact Assessments (PIAs) for their projects.

The Federal Bureau of Investigation alone has issued over 60 PIAs.

For example, here is the PIA for CODIS, the Combined National Deoxyribonucleic Acid (DNA) Index System (CODIS).

And if anything needs a PIA, it’s CODIS, since it potentially contains your personally identifiable information…and the personally identifiable information of your relatives.

The PIAs themselves are detailed. The CODIS PIA includes 8 sections with 19 pages of questions and responses. For example, here is the response in section 8 regarding privacy:

The type, quantity, and sources of information collected by FBI CODIS are necessary to identify crime scene offenders, missing persons, or unidentified human remains, or to link multiple crime scenes. Such information is only further disseminated for these purposes. Moreover, NDIS does not store State Identification Number/Universal Control Number or otherwise collect, handle, disseminate, or store contributors’ names. Therefore, CODIS DNA profiles and pedigrees can only be matched to a named individual by the submitting Criminal Justice Agency forensic laboratory, independent of NDIS.

  • The privacy risks associated with the collection and maintenance of FBI CODIS information are inaccurate information, unauthorized access, and unauthorized disclosures.
  • The privacy risks associated with the access and use of FBI CODIS information are unauthorized access, unauthorized (or overly broad) disclosures, and loss of data.
  • The privacy risks associated with the dissemination of FBI CODIS information are the risks of unauthorized disclosures and loss of data.

The risks of unauthorized access, unauthorized disclosures, loss of data and inaccurate information are mitigated by the quality assurance standards promulgated by the FBI pursuant to the Federal DNA Identification Act. These risks are further mitigated by the system, physical access, network-infrastructure, auditing and quality assurance controls, as described more specifically in Sections 6.1 and 6.2, which are in compliance with FIPS Publication 199, as applicable.

The risk of inaccurate information is also specifically mitigated through the identity verification process performed by participating Criminal Justice Agency forensic laboratories to confirm a potential match. The identity must be confirmed prior to the disclosure of any personally identifiable information to the law enforcement entity who submitted the DNA sample.

Lastly, notice is provided as described in Section 5.1.