Blueprint Playbook for iBoss

Who the Hell is Jordan Crawford?

Founder of Blueprint. I help companies stop sending emails nobody wants to read.

The problem with outbound isn't the message. It's the list. When you know WHO to target and WHY they need you right now, the message writes itself.

I built this system using government databases, public records, and 25 million job posts to find pain signals most companies miss. Predictable Revenue is dead. Data-driven intelligence is what works now.

The Old Way (What Everyone Does)

Your GTM team is buying lists from ZoomInfo, adding "personalization" like mentioning a LinkedIn post, then blasting generic messages about features. Here's what it actually looks like:

The Typical iBoss SDR Email:

Subject: Securing your hybrid workforce Hi [First Name], I noticed your company is expanding its remote operations. At iBoss, we provide Zero Trust SASE solutions that protect distributed workforces across cloud and on-premise environments. Our platform consolidates VPN, SWG, SD-WAN, CASB, and browser isolation into a single unified solution - helping organizations like yours reduce security complexity while improving threat visibility. Would you be open to a quick 15-minute call to discuss how we can help secure your hybrid infrastructure? Best, [SDR Name]

Why this fails: The prospect is an expert. They've seen this template 1,000 times. There's zero indication you understand their specific situation. Delete.

The New Way: Intelligence-Driven GTM

Blueprint flips the approach. Instead of interrupting prospects with pitches, you deliver insights so valuable they'd pay consulting fees to receive them.

1. Hard Data Over Soft Signals

Stop: "I see you're hiring compliance people" (job postings - everyone sees this)

Start: "Your W911S0-23-D-0047 contract requires CMMC Level 2 by June 30" (DOD contract database with exact contract number and deadline)

2. Mirror Situations, Don't Pitch Solutions

PQS (Pain-Qualified Segment): Reflect their exact situation with such specificity they think "how did you know?" Use government data with dates, record numbers, contract identifiers.

PVP (Permissionless Value Proposition): Deliver immediate value they can use today - analysis already done, deadlines already pulled, patterns already identified - whether they buy or not.

iBoss Intelligence Plays

These messages demonstrate precise understanding of prospects' situations through verifiable data. Each play traces to specific government databases or proprietary intelligence that competitors cannot replicate.

PVP Public Data Strong (9.1/10)

CMMC roadmap for your $4.2M at-risk contract

What's the play?

Target federal contractors with specific DOD contracts requiring CMMC Level 2 certification by June 30, 2025. Build them a custom 147-day compliance roadmap showing gap closure, C3PAO engagement, and assessment scheduling.

Why this works

You've done the work they need done anyway - pulled their exact contract number, calculated days remaining, and built a day-by-day plan. This is consulting-level value delivered before any sales conversation. The technical depth (NIST 800-171A controls, zero-trust vs traditional approaches) proves you understand CMMC requirements better than generic security vendors.

Data Sources
  1. U.S. Department of Defense - SPRS CMMC Status Database (contractor_name, cmmc_level_required, assessment_status, contract_value)
  2. DOD Contract Award Data (contract numbers, Phase 2 mandate dates)

The message:

Subject: CMMC roadmap for your $4.2M at-risk contract Built you a 147-day roadmap to get W911S0-23-D-0047 CMMC Level 2 compliant - shows gap closure, C3PAO selection, and assessment scheduling. Includes which NIST 800-171A controls can be accelerated with zero-trust architecture vs. traditional perimeter. Want the project timeline?
PQS Public Data Strong (8.9/10)

Your $4.2M Army contract requires CMMC Level 2 by June

What's the play?

Target federal contractors with DOD contracts hitting the June 30, 2025 CMMC Level 2 mandate. Use exact contract numbers, dollar amounts, and days remaining to create urgency around compliance deadlines.

Why this works

You found their specific contract number - that requires serious research and proves you're not mass-mailing. The exact deadline with day count creates real urgency. The technical question about mapping zero-trust controls to NIST 800-171A assessment objectives shows you understand CMMC requirements at a deep level. This is actionable information about THEIR situation, not generic compliance advice.

Data Sources
  1. U.S. Department of Defense - SPRS CMMC Status Database (contractor_name, cmmc_level_required, contract_value)
  2. DOD Contract Award Data (contract numbers, Phase 2 mandate dates)

The message:

Subject: Your $4.2M Army contract requires CMMC Level 2 by June Contract W911S0-23-D-0047 with Army CECOM requires CMMC Level 2 certification by June 30, 2025 per the Phase 2 mandate. That's 147 days to achieve C3PAO assessment and POA&M closure for your current enclave architecture. Is someone mapping your zero-trust controls to NIST 800-171A assessment objectives?
PVP Public Data Strong (8.9/10)

147-day CMMC compliance plan for CECOM contract

What's the play?

Target federal contractors with DOD contracts requiring CMMC Level 2 certification by June 30, 2025. Build them a day-by-day compliance roadmap showing gap closure, C3PAO engagement, and assessment preparation.

Why this works

The day-by-day plan shows serious preparation effort on your part. The technical approach comparison (zero-trust vs traditional remediation) provides value they can use immediately to evaluate their options. This is a specific deliverable tied to their exact contract and timeline - not a generic offer to "help with CMMC."

Data Sources
  1. U.S. Department of Defense - SPRS CMMC Status Database (contractor_name, cmmc_level_required, contract_value)
  2. DOD Contract Award Data (contract numbers, Phase 2 mandate dates)

The message:

Subject: 147-day CMMC compliance plan for CECOM contract Your W911S0-23-D-0047 contract needs CMMC Level 2 by June 30 - I built a day-by-day plan showing gap closure, C3PAO engagement, and assessment prep. Highlights which controls benefit most from zero-trust vs. traditional remediation approaches. Should I send the compliance roadmap?
PVP Public + Internal Strong (8.8/10)

I mapped threat zones around your 3 new branches

What's the play?

Cross-reference FDIC branch application filings (showing exactly where banks are opening new locations) with FBI Dallas field office threat alerts to create branch-specific security assessments. Identify which new branch locations sit in active credential harvesting zones.

Why this works

You've combined their expansion plans (from public FDIC filings) with relevant threat intelligence (FBI regional alerts) to create a deliverable specific to THEIR situation. The CISO didn't have time to do this analysis - you did it for them. The network segmentation strategy addresses both security and compliance, showing deep understanding of banking requirements.

Data Sources
  1. FDIC BankFind Suite - Branch Applications (bank_name, branch_address, filing_date)
  2. FBI InfraGard/IC3 Regional Threat Intelligence (threat type, geography, attack patterns)

The message:

Subject: I mapped threat zones around your 3 new branches I cross-referenced your FDIC branch applications with FBI Dallas field office threat alerts for Richardson, Plano, and Frisco. Built you a report showing which locations sit in active credential harvesting zones and what network segmentation would look like. Want me to send the branch security assessment?
DATA REQUIREMENT

This play requires synthesizing FBI InfraGard/IC3 regional threat intelligence feeds with FDIC branch application data.

The threat pattern synthesis is proprietary - competitors can see branch filings but don't have your threat intelligence infrastructure.
PQS Public + Internal Strong (8.7/10)

Your Plano branch opens March 15 into active threat zone

What's the play?

Target banks opening new branches in specific ZIP codes where recent ransomware attempts have been documented. Use exact filing numbers from FDIC applications and cross-reference with FBI/regional threat data to show geographic threat patterns.

Why this works

The exact address and FDIC filing number prove you did deep research. The threat data is geographically precise to their new location - not generic "ransomware is a problem" messaging. The opening date creates urgency. The routing question is practical and easy to answer.

Data Sources
  1. FDIC BankFind Suite - Branch Applications (bank_name, branch_address, filing_number, opening_date)
  2. FBI/FS-ISAC Regional Threat Intelligence (attack type, ZIP code, incident count)

The message:

Subject: Your Plano branch opens March 15 into active threat zone Your new Plano location at 5847 Legacy Drive opens March 15 per FDIC filing 2024-SW-12-0156. That ZIP code had 4 documented ransomware attempts against financial institutions in Q4 2024. Who's architecting zero-trust controls for the new branch network?
DATA REQUIREMENT

This play requires synthesizing FDIC branch application filings with FBI/FS-ISAC regional threat intelligence showing attack patterns by ZIP code.

The ZIP-level threat pattern analysis is proprietary intelligence competitors cannot replicate.
PVP Public + Internal Strong (8.7/10)

Branch network blueprint for your Richardson location

What's the play?

Target banks opening new branches in geographies with documented ransomware patterns. Deliver a pre-built zero-trust segmentation blueprint showing how to isolate the branch from core network while maintaining compliance.

Why this works

The specific address and timeline create relevance. The threat context is geographically precise to their exact location. The technical solution (zero-trust segmentation blueprint) is clearly defined and addresses both security and compliance. Easy yes/no question to receive immediate value.

Data Sources
  1. FDIC BankFind Suite - Branch Applications (bank_name, branch_address, opening_date)
  2. FBI/FS-ISAC Regional Threat Intelligence (attack type, ZIP code, incident count)

The message:

Subject: Branch network blueprint for your Richardson location Your Richardson branch at 2401 E Spring Valley opens in 89 days into a ZIP code with 4 Q4 ransomware attempts. I drafted a zero-trust segmentation blueprint showing how to isolate the branch from your core network while maintaining compliance. Should I send you the architecture diagram?
DATA REQUIREMENT

This play requires FDIC branch filings combined with regional threat data and reference architectures for branch segmentation.

The compliance-aware segmentation blueprint is proprietary IP competitors cannot replicate.
PVP Public + Internal Strong (8.7/10)

Security playbook for your Richardson branch launch

What's the play?

Target banks in the final 90 days before branch openings in geographies with documented ransomware attempts. Deliver a pre-built launch security checklist covering network segmentation, access controls, and threat monitoring.

Why this works

The specific location and timeline create urgency. The threat context is geographically precise. The practical checklist is immediately actionable for their exact situation - they can use it whether they buy from you or not. Easy to accept deliverable with no commitment required.

Data Sources
  1. FDIC BankFind Suite - Branch Applications (bank_name, branch_address, opening_date)
  2. FBI/FS-ISAC Regional Threat Intelligence (attack type, ZIP code, incident count)

The message:

Subject: Security playbook for your Richardson branch launch Your Richardson location opens in 89 days into a corridor with 4 documented ransomware attempts on financial institutions. Created a launch security checklist showing network segmentation, access controls, and threat monitoring specific to branch integration. Want the pre-launch security playbook?
DATA REQUIREMENT

This play requires FDIC branch data combined with regional threat intelligence and branch launch security frameworks.

The branch integration security framework is proprietary IP based on deployment experience across dozens of financial institutions.
PQS Public Data Strong (8.6/10)

147 days to get $4.2M contract CMMC-compliant

What's the play?

Target federal contractors with DOD contracts requiring CMMC Level 2 by June 30, 2025. Highlight the contract value at risk and the compressed timeline for C3PAO assessment plus remediation work.

Why this works

The dollar amount makes the stakes crystal clear. The timeline math (147 days total, 60-90 for assessment, leaving only 57 days for gap closure) creates urgency. They understand C3PAO assessment timelines because you cited industry-standard ranges. The routing question is appropriate and easy to answer.

Data Sources
  1. U.S. Department of Defense - SPRS CMMC Status Database (contractor_name, cmmc_level_required, contract_value)
  2. DOD Contract Award Data (contract numbers, Phase 2 mandate dates)

The message:

Subject: 147 days to get $4.2M contract CMMC-compliant Your W911S0-23-D-0047 contract hits the June 30 CMMC Level 2 deadline - that's $4.2M in annual revenue at risk. Most C3PAO assessments take 60-90 days after architecture remediation, leaving you 57 days for gap closure. Who's leading your CMMC readiness program?
PVP Public + Internal Strong (8.6/10)

Threat overlay for your DFW branch expansion

What's the play?

Target banks with multiple FDIC branch applications in the Dallas-Fort Worth metro area. Map their specific branch locations against FBI Dallas field office threat alerts to identify which locations sit in active threat corridors.

Why this works

You've done specific work combining their filings with threat data - this synthesis required effort on your part. The technical solution (network segmentation strategy) is clearly defined and addresses compliance requirements banks must meet. The deliverable is clearly scoped and easy to accept.

Data Sources
  1. FDIC BankFind Suite - Branch Applications (bank_name, branch_address, filing_date)
  2. FBI InfraGard/IC3 Regional Threat Intelligence (threat type, geography, attack patterns)

The message:

Subject: Threat overlay for your DFW branch expansion Mapped your 3 FDIC branch applications against FBI Dallas field office alerts - Richardson and Plano locations both sit in active threat corridors. Prepared a network segmentation strategy showing how to isolate new branches while maintaining audit compliance. Want the security architecture brief?
DATA REQUIREMENT

This play requires synthesizing FDIC branch filing data with FBI/InfraGard regional threat intelligence and compliance-aware reference architectures.

The compliance-aware threat overlay analysis is unique to your security intelligence infrastructure.
PVP Public Data Strong (8.5/10)

Your CMMC gap analysis for the Army CECOM contract

What's the play?

Target federal contractors with specific DOD contracts requiring CMMC Level 2 certification. Pull their current enclave architecture from public disclosures and map it against NIST 800-171A assessment objectives to identify gap areas.

Why this works

You've done actual architecture analysis work - pulled their enclave details and mapped them to specific NIST controls. The "7 control families" is precise and actionable. The deliverable (gap analysis + remediation timeline) is clearly defined and immediately valuable whether they buy or not.

Data Sources
  1. U.S. Department of Defense - SPRS CMMC Status Database (contractor_name, cmmc_level_required, contract_value)
  2. DOD Contract Award Data (contract numbers)
  3. Public System Security Plans (enclave architecture details)

The message:

Subject: Your CMMC gap analysis for the Army CECOM contract I pulled your current enclave architecture from public disclosures and mapped it against NIST 800-171A assessment objectives for CMMC Level 2. Identified 7 control families where zero-trust implementation would accelerate your C3PAO readiness for W911S0-23-D-0047. Want the gap analysis and remediation timeline?
PQS Public Data Strong (8.5/10)

Your Army contract needs CMMC cert in 21 weeks

What's the play?

Target federal contractors with DOD contracts requiring CMMC Level 2 by June 30, 2025. Frame the timeline in weeks and highlight the C3PAO assessor shortage constraint that reduces available remediation time.

Why this works

The timeline in weeks creates a different urgency than days or months. The assessor shortage detail is a real constraint they may not know about - this is valuable intelligence. The math (8-10 weeks for assessment scheduling leaves only 11 weeks for actual work) makes the compressed timeline visceral. The practical readiness question is easy to route.

Data Sources
  1. U.S. Department of Defense - SPRS CMMC Status Database (contractor_name, cmmc_level_required, contract_value)
  2. DOD Contract Award Data (contract numbers, Phase 2 mandate dates)

The message:

Subject: Your Army contract needs CMMC cert in 21 weeks W911S0-23-D-0047 hits the Phase 2 CMMC Level 2 mandate on June 30 - that's 21 weeks from today. C3PAO assessment scheduling alone is running 8-10 weeks due to assessor shortage, leaving 11 weeks for remediation. Is your security architecture assessment-ready?
PQS Public + Internal Strong (8.4/10)

3 phishing campaigns hit banks in your DFW expansion zone

What's the play?

Target banks with FDIC branch application filings in Richardson and Plano, Texas. Cross-reference with FBI Dallas field office alerts about coordinated credential harvesting attacks in those specific cities during November.

Why this works

The geographic specificity matches their exact expansion plan - they researched FDIC filings to find Richardson and Plano. The threat pattern is timely and relevant to their exact situation. Regional FBI context adds credibility. The security planning question is practical and easy to route to the right person.

Data Sources
  1. FDIC BankFind Suite - Branch Applications (bank_name, branch_address, city)
  2. FBI IC3/InfraGard Regional Threat Intelligence (attack type, city, date)

The message:

Subject: 3 phishing campaigns hit banks in your DFW expansion zone Your branch filings show expansion into Richardson and Plano - both cities saw credential harvesting attacks on regional banks in November. The FBI Dallas field office flagged this pattern as coordinated infrastructure targeting. Is your security team modeling branch network exposure before you open?
DATA REQUIREMENT

This play requires synthesizing FDIC branch application data with FBI IC3/InfraGard regional threat intelligence feeds.

The city-level threat pattern analysis combined with branch filing timelines is proprietary intelligence.
PQS Public Data Strong (8.4/10)

June 30 CMMC deadline puts $4.2M contract at risk

What's the play?

Target federal contractors with DOD contracts requiring CMMC Level 2 by June 30, 2025. Emphasize the contract suspension risk and the compressed timeline for zero-trust implementation plus C3PAO assessment.

Why this works

The contract suspension risk is more serious than just "compliance deadline" - it threatens revenue. The timeline math creates urgency (147 days total, but zero-trust takes 90-120 days, leaving little buffer). The routing question is appropriate for the seniority level who owns compliance programs.

Data Sources
  1. U.S. Department of Defense - SPRS CMMC Status Database (contractor_name, cmmc_level_required, contract_value)
  2. DOD Contract Award Data (contract numbers, Phase 2 mandate dates)

The message:

Subject: June 30 CMMC deadline puts $4.2M contract at risk Army CECOM contract W911S0-23-D-0047 requires CMMC Level 2 by June 30 - non-compliance triggers contract suspension. You need C3PAO assessment complete and POA&M accepted in 147 days, but most zero-trust implementations take 90-120 days. Who owns the CMMC compliance timeline?
PQS Public + Internal Strong (8.3/10)

FBI flagged your expansion corridor for coordinated attacks

What's the play?

Target banks with FDIC branch applications across Richardson, Plano, and Frisco (DFW corridor). Cross-reference with FBI Dallas identification of coordinated credential harvesting campaigns in that specific corridor during November.

Why this works

The geographic specificity to their exact expansion plan (three specific cities) proves research depth. FBI source adds serious credibility. The attack pattern timing detail (integration periods) is highly relevant to their situation - attackers target banks during vulnerable integration phases. The security planning question is practical.

Data Sources
  1. FDIC BankFind Suite - Branch Applications (bank_name, branch_address, city)
  2. FBI InfraGard/IC3 Regional Threat Intelligence (attack pattern, geography, timing)

The message:

Subject: FBI flagged your expansion corridor for coordinated attacks Your 3 new branches in Richardson, Plano, and Frisco fall within the DFW corridor where FBI Dallas identified coordinated credential harvesting in November. The attack pattern specifically targeted banks during branch network integration periods. Is your team threat-modeling the expansion timeline?
DATA REQUIREMENT

This play requires synthesizing FDIC branch applications with FBI InfraGard/IC3 regional threat intelligence showing attack pattern timing.

The integration-phase attack pattern analysis is proprietary threat intelligence.
PQS Public + Internal Strong (8.3/10)

Your March branch opening coincides with attack pattern

What's the play?

Target banks with FDIC branch openings scheduled for March 15 in Plano, Texas. Cross-reference opening date with tax season timing and FBI-documented November attack patterns that exploited branch onboarding during high-transaction periods.

Why this works

The specific address and exact date create immediate relevance. The seasonal timing insight (tax season = high transactions) adds value they may not have considered. The attack pattern detail (exploiting onboarding windows during high-transaction periods) is tactically relevant to their situation. The integration phase is the right security focus.

Data Sources
  1. FDIC BankFind Suite - Branch Applications (bank_name, branch_address, opening_date)
  2. FBI IC3 Threat Intelligence (attack pattern timing, seasonal correlations)

The message:

Subject: Your March branch opening coincides with attack pattern Plano branch at 5847 Legacy Drive opens March 15 per your FDIC filing - that's peak tax season when FBI saw coordinated bank attacks. The November pattern specifically exploited branch network onboarding windows during high-transaction periods. Who's handling security for the integration phase?
DATA REQUIREMENT

This play requires synthesizing FDIC branch filings with FBI threat pattern analysis showing seasonal attack timing correlations.

The seasonal threat pattern synthesis is proprietary intelligence based on FBI collaboration.

What Changes

Old way: Spray generic messages at job titles. Hope someone replies.

New way: Use public data to find companies in specific painful situations. Then mirror that situation back to them with evidence.

Why this works: When you lead with "Your W911S0-23-D-0047 contract requires CMMC Level 2 by June 30" instead of "I see you're hiring for compliance roles," you're not another sales email. You're the person who did the homework.

The messages above aren't templates. They're examples of what happens when you combine real data sources with specific situations. Your team can replicate this using the data recipes in each play.

Data Sources Reference

Every play traces back to verifiable data. Here are the sources used in this playbook:

Source Key Fields Used For
FDIC BankFind Suite bank_name, branch_address, filing_number, opening_date, city, state Branch expansion tracking for FDIC-insured banks
DOD SPRS CMMC Database contractor_name, cmmc_level_required, assessment_status, contract_value Federal contractor CMMC compliance status
DOD Contract Awards contract_number, contractor_name, contract_value, Phase 2 mandate dates Specific contract identifiers and compliance deadlines
FBI InfraGard/IC3 Threat Intelligence threat_type, geography, attack_pattern, timing, city Regional threat patterns and attack timing analysis
Public System Security Plans enclave_architecture, control_families, security_posture Current architecture for CMMC gap analysis