Blueprint Playbook for LastPass

Who the Hell is Jordan Crawford?

Founder of Blueprint. I help companies stop sending emails nobody wants to read.

The problem with outbound isn't the message. It's the list. When you know WHO to target and WHY they need you right now, the message writes itself.

I built this system using government databases, public records, and 25 million job posts to find pain signals most companies miss. Predictable Revenue is dead. Data-driven intelligence is what works now.

The Old Way (What Everyone Does)

Your GTM team is buying lists from ZoomInfo, adding "personalization" like mentioning a LinkedIn post, then blasting generic messages about features. Here's what it actually looks like:

The Typical LastPass SDR Email:

Subject: Simplify password management at [Company Name] Hi [First Name], I noticed you're hiring for a Security Analyst role – congrats on the growth! At LastPass, we help companies like yours eliminate password headaches with enterprise-grade credential management. Our platform includes: • Zero-knowledge encryption architecture • Dark web monitoring • SSO integrations • Admin policy controls We've helped 100,000+ businesses improve security posture and reduce IT support burden. Would you be open to a quick 15-minute call to explore how LastPass could help [Company Name]? Best, SDR Name

Why this fails: The prospect is an expert. They've seen this template 1,000 times. There's zero indication you understand their specific situation. Delete.

The New Way: Intelligence-Driven GTM

Blueprint flips the approach. Instead of interrupting prospects with pitches, you deliver insights so valuable they'd pay consulting fees to receive them.

1. Hard Data Over Soft Signals

Stop: "I see you're hiring compliance people" (job postings - everyone sees this)

Start: "Your March 15th 8-K filing disclosed unauthorized access through compromised employee credentials" (SEC filing with specific date and incident type)

2. Mirror Situations, Don't Pitch Solutions

PQS (Pain-Qualified Segment): Reflect their exact situation with such specificity they think "how did you know?" Use government data with dates, record numbers, filing references.

PVP (Permissionless Value Proposition): Deliver immediate value they can use today - analysis already done, deadlines already pulled, patterns already identified - whether they buy or not.

LastPass: Company Intelligence Summary

What They Solve

Organizations struggle to securely manage and control access to hundreds of cloud applications and credentials across their workforce, creating security vulnerabilities and compliance risks. Employees resort to insecure credential sharing methods (spreadsheets, sticky notes), and IT teams lack visibility into password-related breaches, privilege misuse, and unauthorized access.

Ideal Customer Profile

Industries: Financial Services, Professional Services (Law/Accounting), Healthcare, Education, Insurance, Tech/Software Development, Managed Service Providers

Company Size: 100+ employees (mid-market to enterprise focus)

Operational Context: Organizations managing 50+ SaaS applications, requiring regulatory compliance (GDPR, SOC2, ISO 27001), protecting sensitive client data, managing distributed teams, and needing centralized credential governance

Primary Buyer Persona

Title: CISO or VP of Information Security

Secondary Titles: Identity & Access Management Director, IT Operations Manager, Chief Technology Officer

Key Responsibilities: Overseeing cybersecurity strategy, managing credential/access control across SaaS ecosystems, ensuring regulatory compliance, reducing password-related security incidents, dark web monitoring and breach prevention

KPIs: Reduction in password-related breaches, compliance audit pass rate, credential reuse percentage, IT support tickets from password lockouts, time to offboard users, dark web credential exposure incidents

LastPass PQS Plays: Mirroring Exact Situations

These messages demonstrate such precise understanding of the prospect's current situation that they feel genuinely seen. Every claim traces to a specific government database with verifiable record numbers.

PQS Public Data Strong (8.6/10)

PCI-DSS Level 1 Providers with Credential Breach Disclosures

What's the play?

Target PCI-DSS Level 1 service providers who disclosed cybersecurity incidents involving compromised credentials in recent SEC filings (8-K or 10-K). These companies face immediate compliance pressure and QSA scrutiny, with 90-day remediation deadlines from disclosure date.

Why this works

You're referencing their exact filing date and specific breach vector (compromised credentials). PCI-DSS Level 1 remediation timelines are real regulatory requirements - this isn't a sales tactic, it's their actual deadline. The question "Who's handling the QSA evidence package?" demonstrates technical credibility and routes to the exact person managing this crisis.

Data Sources
  1. PCI Security Standards Council Qualified Providers List - service_provider_name, provider_level, compliance_status
  2. SEC EDGAR Financial Institution Filings (10-K, 8-K) - company_name, filing_date, material_breach_notices, cybersecurity_risk_management, unauthorized_access_disclosures

The message:

Subject: 90 days to close your credential incident Your SEC filing on March 15th cited compromised credentials as the breach vector. PCI-DSS Level 1 providers must demonstrate remediation within 90 days of disclosure. Who's handling the QSA evidence package?
PQS Public Data Strong (8.4/10)

PCI-DSS Level 1 Providers with Recent Credential Compromise

What's the play?

Identify PCI-DSS Level 1 service providers who recently disclosed cybersecurity incidents in SEC filings. Cross-reference filing dates with PCI-DSS remediation requirements to create urgency around their specific deadline.

Why this works

This message is hyper-specific to the recipient's exact situation - their filing date, their disclosed breach vector, and their regulatory deadline. The routing question makes it easy to forward to the right person without feeling like a hard pitch.

Data Sources
  1. PCI Security Standards Council Qualified Providers List - service_provider_name, provider_level
  2. SEC EDGAR Financial Institution Filings - filing_date, material_breach_notices, unauthorized_access_disclosures

The message:

Subject: Your March 8-K disclosed credential compromise Your March 15th 8-K filing disclosed unauthorized access through compromised employee credentials. PCI-DSS requires remediation evidence within 90 days - that's June 13th. Is someone already managing the credential audit response?

What Changes

Old way: Spray generic messages at job titles. Hope someone replies.

New way: Use public data to find companies in specific painful situations. Then mirror that situation back to them with evidence.

Why this works: When you lead with "Your March 15th 8-K filing disclosed unauthorized access through compromised employee credentials" instead of "I see you're hiring for security roles," you're not another sales email. You're the person who did the homework.

The messages above aren't templates. They're examples of what happens when you combine real data sources with specific situations. Your team can replicate this using the data recipes in each play.

Data Sources Reference

Every play traces back to verifiable public data. Here are the sources used in this playbook:

Source Key Fields Used For
PCI Security Standards Council service_provider_name, provider_level, compliance_status Identifying PCI-DSS Level 1 providers with strict access control requirements
SEC EDGAR Filings filing_date, material_breach_notices, cybersecurity_risk_management, unauthorized_access_disclosures Finding companies that disclosed credential-based security incidents
FedRAMP Marketplace csp_name, authorization_level, authorization_date, authorizing_agency Targeting cloud service providers with federal compliance requirements
HITRUST Products Directory company_name, certification_status, certification_date, control_domains Finding health tech companies with strict access control certifications
CMS Healthcare Provider Data facility_name, cms_certification_status, quality_metrics, inspection_findings Identifying healthcare facilities with compliance requirements
NCUA Credit Union Call Report Data credit_union_name, assets, membership, regulatory_status Targeting credit unions with growth patterns and regulatory oversight