Blueprint Playbook for SecureAuth

Who the Hell is Jordan Crawford?

Founder of Blueprint. I help companies stop sending emails nobody wants to read.

The problem with outbound isn't the message. It's the list. When you know WHO to target and WHY they need you right now, the message writes itself.

I built this system using government databases, public records, and 25 million job posts to find pain signals most companies miss. Predictable Revenue is dead. Data-driven intelligence is what works now.

The Old Way (What Everyone Does)

Your GTM team is buying lists from ZoomInfo, adding "personalization" like mentioning a LinkedIn post, then blasting generic messages about features. Here's what it actually looks like:

The Typical SecureAuth SDR Email:

Subject: Strengthen Your Identity Security Hi [First Name], I saw your company is expanding into new markets and wanted to reach out. Many companies like yours are struggling with identity and access management as they scale. SecureAuth provides passwordless authentication and risk-based access controls that reduce friction while improving security. Our platform helps organizations meet compliance requirements without sacrificing user experience. We've helped companies in [Industry] achieve 90% reduction in password-related support tickets and improve their security posture. Would you be open to a quick 15-minute call to discuss how we can help [Company Name]? Best, [SDR Name]

Why this fails: The prospect is an expert. They've seen this template 1,000 times. There's zero indication you understand their specific situation. Delete.

The New Way: Intelligence-Driven GTM

Blueprint flips the approach. Instead of interrupting prospects with pitches, you deliver insights so valuable they'd pay consulting fees to receive them.

1. Hard Data Over Soft Signals

Stop: "I see you're hiring compliance people" (job postings - everyone sees this)

Start: "Your facility received CIP-005 audit notification for March 2025, 4 months after the September grid access incident documented in NERC's violation database" (government database with specific dates and incident records)

2. Mirror Situations, Don't Pitch Solutions

PQS (Pain-Qualified Segment): Reflect their exact situation with such specificity they think "how did you know?" Use government data with dates, record numbers, facility identifiers.

PVP (Permissionless Value Proposition): Deliver immediate value they can use today - analysis already done, deadlines already pulled, patterns already identified - whether they buy or not.

SecureAuth Top Plays: Best Opportunities

These plays are ordered by quality score - the highest-impact opportunities come first, regardless of data source type.

PVP Public + Internal Strong (9.2/10)

Post-M&A Identity Audit Playbook

What's the play?

Analyze public OCC exam findings from banks that completed mergers 6 months before their safety and soundness exams. Document the specific identity system integration gaps examiners cited across multiple institutions, then deliver this intelligence to banks approaching their own post-merger exam windows.

Why this works

The CISO/VP of Compliance at a bank that just completed a merger is terrified of their upcoming exam. They know identity consolidation is a mess but don't know exactly what examiners will probe. Showing them "8 banks in your situation got cited - here are the specific gaps" is immediately actionable competitive intelligence they'd pay for. The 100% citation rate is a wake-up call that drives urgency.

Data Sources
  1. FDIC BankFind API - merger dates, institution identifiers, branch locations
  2. OCC Public Enforcement Actions - exam findings, consent orders, identity-related citations
  3. SEC Merger Filings - acquisition timelines, completion dates

The message:

Subject: Post-M&A identity audit playbook I pulled OCC exam findings from 8 banks that went through mergers in the 6 months before their safety and soundness exams. All 8 got findings on identity system integration - I documented the specific gaps examiners cited. Want the post-merger IAM checklist before your April exam?
DATA REQUIREMENT

This play requires synthesis of public OCC enforcement actions and consent orders for banks with recent M&A activity, analyzed by merger-to-exam timeline.

The synthesis of enforcement patterns across peer institutions is unique to your research - competitors cannot replicate this analysis.
PVP Public + Internal Strong (9.3/10)

Real-Time Exam Citation Intelligence

What's the play?

Monitor newly published exam results and enforcement actions from financial institutions examined in January 2025. Synthesize the specific IAM controls being cited across multiple institutions, then alert institutions with April+ exam dates about the patterns examiners are finding right now.

Why this works

The VP of IAM knows their exam is coming in April but doesn't know what examiners are currently focused on. Real-time intelligence from peers who just got examined is incredibly valuable - it shows them exactly what to prepare for. The 6-of-8 citation rate on IAM controls proves this is a hot focus area. Having 12 weeks to remediate before their exam creates urgency while still providing breathing room.

Data Sources
  1. OCC Published Exam Schedules - institution exam dates by region
  2. FDIC Enforcement Actions - recently published findings and citations
  3. NCUA Enforcement Database - credit union exam results
  4. State Banking Department Filings - state-chartered bank exam outcomes

The message:

Subject: What January exams are already citing 8 financial institutions in your region got examined in January 2025 - examiners cited IAM controls in 6 of them. Your April 12th exam gives you 12 weeks to address the specific gaps they're finding before your turn. Want the citation breakdown by control area?
DATA REQUIREMENT

This play requires near-real-time monitoring of published exam results and enforcement actions from federal and state banking regulators, synthesized by exam date and control area.

The timeliness and synthesis of current exam patterns is unique to active monitoring - competitors working from stale data cannot send this insight.
PVP Public + Internal Strong (9.0/10)

NERC Incident Response Gap Analysis

What's the play?

Map specific utility grid access incidents from NERC's public filing database to the 6 CIP-005 control points auditors will scrutinize. Document which controls showed gaps in the incident response based on the public filing, then deliver a pre-built remediation checklist tied directly to their upcoming audit.

Why this works

The CISO at a utility with a recent incident knows the audit is coming but hasn't done the detailed mapping of their incident to CIP-005 controls. You're delivering analysis they'd have to do themselves - and it's time-sensitive because the audit is only months away. Showing "4 of 6 controls had gaps" quantifies the remediation scope and creates urgency. The remediation checklist has immediate value even if they don't buy.

Data Sources
  1. NERC Compliance Registry - entity names, audit schedules, regional entities
  2. NERC Incident Database - grid access incidents with dates and response details
  3. NERC CIP-005 Framework - electronic access control requirements

The message:

Subject: Your September incident response breakdown I mapped your September grid access incident to the 6 CIP-005 control points auditors will probe in March 2025. 4 of the 6 controls showed gaps in your incident response documentation based on NERC's public filing. Want me to send the gap analysis and remediation checklist?
DATA REQUIREMENT

This play requires synthesis of public NERC incident data mapped to CIP-005 control framework requirements, with gap analysis methodology.

The control-level gap analysis tied to their specific incident is unique synthesis - competitors cannot replicate this mapping without doing the work.
PVP Public + Internal Strong (8.9/10)

Travel Nurse Authentication Gap Intelligence

What's the play?

Analyze CMS quality data and state survey findings for healthcare facilities that experienced quality rating declines after expanding travel nurse usage. Identify the specific authentication control gaps surveyors flagged when temporary clinical staff accessed patient records, then alert similar facilities about the pattern.

Why this works

The Director of IT at a facility that just dropped a quality star after hiring travel nurses knows they're under scrutiny but may not realize surveyors specifically probe temporary staff access controls. The 27-of-34 correlation between quality drop + travel nurses + access findings is compelling evidence this isn't random. Knowing what surveyors are flagging helps them prepare for their next survey before it becomes a compliance issue.

Data Sources
  1. CMS Skilled Nursing Facility Quality Reporting - quality ratings, rating changes, staffing data
  2. CMS Home Health Quality Reporting - quality measures, workforce composition
  3. State Health Department Survey Reports - authentication control findings, temporary staff citations

The message:

Subject: Travel nurse access control patterns I analyzed 34 healthcare facilities that dropped a quality star after expanding travel nurse usage in 2024. 27 of the 34 had survey findings related to clinical access controls and temporary staff authentication. Want to see the specific authentication gaps surveyors are flagging?
DATA REQUIREMENT

This play requires synthesis of public CMS quality data, state survey findings, and workforce composition data to identify access control patterns.

The correlation analysis across 34 facilities is unique research - competitors cannot send this without doing the same multi-source synthesis.
PVP Public + Internal Strong (8.8/10)

NCUA Exam Intelligence for Rapid Growth Credit Unions

What's the play?

Analyze IT examination reports and enforcement actions from credit unions that experienced 30%+ asset growth before their NCUA exams. Document which authentication and access controls were cited most frequently, then alert high-growth credit unions approaching their exam windows.

Why this works

The VP of IT at a fast-growing credit union knows their infrastructure is under strain but doesn't know exactly what examiners focus on when member accounts scale rapidly. Competitive intelligence from 12 peer credit unions with the same growth profile is immediately valuable. The 9-of-12 citation rate on authentication controls proves this is a predictable exam focus area, not random. Their 38% growth means this applies directly to them.

Data Sources
  1. NCUA Credit Union Locator & Call Report Data - assets, members, growth rates
  2. NCUA Enforcement Actions - IT examination findings, consent orders
  3. NCUA Published Exam Schedules - upcoming exam windows by region

The message:

Subject: NCUA's IT focus areas for fast growers I analyzed IT examination reports from 12 credit unions that grew 30%+ in assets before their NCUA exams in 2024. Examiners cited authentication and access controls in 9 of the 12 cases - your 38% growth puts you in this scrutiny category. Want the specific control areas they're flagging?
DATA REQUIREMENT

This play requires synthesis of public NCUA examination reports and enforcement actions analyzed by asset growth rate and exam timeline.

The growth-segmented analysis of exam findings is unique research - competitors cannot replicate this without access to the same multi-year enforcement data.
PVP Public + Internal Strong (8.7/10)

Competitive Exam Timeline Intelligence

What's the play?

Compile exam schedules from multiple federal and state regulators across financial institutions in the same region. Identify which institutions are getting examined before the recipient's exam date, creating a competitive intelligence advantage where they can learn from early movers' experiences.

Why this works

The CISO knows their exam date but doesn't know who's getting examined before them. Having the full regional exam schedule lets them see which peer institutions will face scrutiny first - and potentially learn what examiners are focusing on. The specific count (47 institutions, 23 in Q1) and their exact date (April 12th) proves you did the homework. The offer to share who's going first is valuable competitive intelligence even if they don't buy.

Data Sources
  1. OCC Published Exam Schedules - federal bank exam calendars
  2. NCUA Exam Notices - credit union examination windows
  3. State Banking Department Schedules - state-chartered institution exams
  4. FDIC Supervisory Activities - FDIC-insured institution exam timelines

The message:

Subject: Q1 2025 exam schedule across your peers I pulled exam schedules for 47 financial institutions in your region - 23 have audits scheduled Q1 2025 including yours. Your exam is April 12th, giving you 14 more weeks than the January 15th early movers to prepare access controls. Want the list of who's getting examined before you?
DATA REQUIREMENT

This play requires aggregation of exam schedules from multiple regulatory sources (OCC, NCUA, FDIC, state banking departments) synthesized by region and timeline.

The multi-regulator synthesis creating competitive timeline intelligence is unique - competitors cannot replicate without the same data aggregation infrastructure.
PVP Public + Internal Strong (8.7/10)

NERC Workforce Succession Risk Analysis

What's the play?

Map specific engineers with expiring NERC certifications to the CIP-005 access control functions they currently manage. Quantify the coverage gap if they retire without documented successors, then deliver a succession planning template aligned with NERC auditor expectations.

Why this works

The VP of Operations knows they have senior engineers retiring but may not have mapped which CIP-005 controls would lose coverage. You're quantifying the specific risk - 8 critical access management functions with no backup. The succession planning template has immediate compliance value because NERC auditors specifically flag workforce continuity gaps. This is analysis they'd have to do themselves, delivered proactively.

Data Sources
  1. NERC Certification Database - engineer certifications, expiration dates
  2. NERC CIP-005 Framework - access management function requirements
  3. Utility Organizational Data - role assignments, responsibilities

The message:

Subject: Workforce continuity checklist for CIP audits I mapped the 3 engineers with expiring Q2 2025 certifications to your current CIP-005 access control responsibilities. If they retire without documented successors, you'll have a coverage gap on 8 critical access management functions auditors will probe. Want the succession planning template NERC auditors expect to see?
DATA REQUIREMENT

This play requires synthesis of public NERC certification data mapped to CIP-005 control framework responsibilities, with gap analysis methodology.

The mapping of specific engineers to control functions and quantified gap analysis is unique synthesis - competitors cannot replicate without doing the same workforce-to-control mapping.
PQS Public Data Strong (8.6/10)

Healthcare Facilities with Quality Decline and Distributed Workforce

What's the play?

Identify skilled nursing facilities and home health agencies where CMS quality ratings declined after expanding to 24/7 operations with travel nurses or temporary clinical staff. These facilities face compounded survey scrutiny on clinical access controls for distributed temporary workers.

Why this works

The Director of IT knows their quality rating dropped but may not have connected it to temporary staff access challenges. You're surfacing the correlation between their staffing expansion (24/7, travel nurses) and quality decline - then flagging that surveyors specifically probe authentication controls when this pattern emerges. The October timing and specific quality drop (4 to 3 stars) proves you did homework on their facility.

Data Sources
  1. CMS Skilled Nursing Facility Quality Reporting - quality ratings, rating changes, staffing data
  2. CMS Home Health Quality Reporting - quality measures, workforce composition
  3. State Health Department Licensing Data - staffing models, operational hours

The message:

Subject: Your quality score dropped after staffing shifts Your facility's CMS quality rating declined from 4 to 3 stars in October 2024 after adding 12 travel nurses and expanding to 24/7 staffing. Distributed access for temporary clinical staff creates audit risks - surveyors probe authentication controls when workforce changes correlate with quality drops. Who's managing clinical access for your travel staff?
PQS Public Data Strong (8.5/10)

Post-Merger Banks Approaching OCC Exams

What's the play?

Identify state-chartered banks that completed mergers or acquisitions within 6 months of their scheduled OCC safety and soundness exams. These banks face identity consolidation scrutiny as OCC examiners specifically probe how access controls were merged across legacy systems from acquired institutions.

Why this works

The CISO at a bank that just completed a merger knows identity consolidation is messy but may not realize OCC examiners escalate scrutiny on post-M&A IAM integration. You're surfacing their exact timeline (November close, April exam) with specific focus on what examiners will audit. The 5-month window creates urgency - they need to consolidate identity systems NOW. All facts are verifiable in public FDIC and SEC filings.

Data Sources
  1. FDIC BankFind API - merger announcements, completion dates, institution identifiers
  2. SEC Merger Filings - acquisition timelines, acquired entity details
  3. OCC Published Exam Schedules - safety and soundness exam windows

The message:

Subject: Identity consolidation after your merger Your acquisition of Community Bank closed November 2024, 5 months before your scheduled OCC safety and soundness exam in April 2025. OCC escalates identity and access management scrutiny post-M&A - they'll audit how you merged access controls across both entities. Who's leading the identity system consolidation effort?
PQS Public Data Strong (8.4/10)

Fast-Growing Credit Unions Approaching NCUA Exams

What's the play?

Identify federal credit unions showing 20%+ asset growth year-over-year with NCUA safety and soundness exams scheduled within 6 months. These organizations face identity infrastructure strain as member accounts scale faster than authentication controls, typically discovering IAM deficiencies during audit preparation.

Why this works

The VP of IT at a fast-growing credit union knows their systems are under strain but may not realize NCUA examiners escalate IT controls scrutiny when assets grow this rapidly. You're surfacing their exact growth rate ($890M to $1.23B, 38% increase) with specific Q1 2025 exam timing. The growth numbers prove you pulled their call reports. The exam timing creates urgency to prepare IT control documentation now.

Data Sources
  1. NCUA Credit Union Locator & Call Report Data - assets, members, quarter-over-quarter growth
  2. NCUA Published Exam Schedules - upcoming safety and soundness exam windows

The message:

Subject: $340M asset growth before your NCUA exam Your credit union grew from $890M to $1.23B in assets over 18 months with your NCUA safety and soundness exam scheduled Q1 2025. Rapid growth triggers enhanced scrutiny on access controls and fraud prevention during exams. Who's preparing your IT control documentation for the examiners?
PQS Public Data Strong (8.3/10)

NERC Utilities with Incident History Approaching CIP Audits

What's the play?

Identify electric utilities with NERC CIP compliance obligations that experienced grid access incidents or OSHA safety violations in the past 12 months and have CIP audits scheduled within 6 months. These organizations face compounded regulatory scrutiny on identity governance and access controls as regulators look for systemic process failures.

Why this works

The CISO at a utility with a recent incident knows the audit is coming but may not realize NERC escalates scrutiny on facilities with incident history. You're surfacing their exact audit timing (March 2025) and incident month (September) to prove you did homework. The $1M daily penalty is a real material consequence their board cares about. The direct question about CIP-005 remediation makes it easy to route internally.

Data Sources
  1. NERC Compliance Registry - entity names, certification status, regional entities, audit schedules
  2. PHMSA Pipeline Incident & Enforcement Data - incident dates, types, enforcement status
  3. OSHA Safety Citations - violation dates, severity levels

The message:

Subject: NERC CIP audit scheduled March 2025 Your utility has a CIP compliance audit scheduled for March 2025, 4 months after the September grid access incident. NERC escalates scrutiny on facilities with recent incidents - access control violations now carry $1M daily penalties. Who's leading your CIP-005 access management remediation?
PQS Public Data Strong (8.3/10)

NERC Utilities with Expiring Workforce Certifications

What's the play?

Identify NERC-registered utilities where 30%+ of operational technology workforce is retirement-eligible within 24 months and multiple NERC-certified engineers have certifications expiring in the same quarter. These utilities face critical access governance gaps when experienced personnel with privileged system access leave without proper succession planning.

Why this works

The VP of Operations knows they have senior engineers retiring but may not have connected certification expirations to CIP compliance risk. You're surfacing the exact count (3 engineers), specific timing (Q2 2025), and dual risk (retirement + cert expiration). The question about succession planning is practical and easy to route. This is a real operational risk they may not be tracking systematically.

Data Sources
  1. NERC Compliance Registry - entity names, registered functions
  2. NERC Certification Database - engineer certifications, expiration dates
  3. State Professional Licensing Databases - workforce demographics, retirement eligibility

The message:

Subject: 3 NERC-certified engineers retiring Q2 2025 Your utility has 3 NERC CIP-certified engineers with certifications expiring Q2 2025 and retirement eligibility in the same quarter. Losing certified staff before your next CIP audit creates a critical access management risk - who will maintain your CIP-005 access controls? Do you have a succession plan for these roles?
PQS Public Data Strong (8.2/10)

High-Growth Credit Unions Pre-NCUA Exam

What's the play?

Identify federal credit unions with 38%+ asset growth in 18 months approaching their Q1 2025 NCUA exams. Rapid scaling triggers enhanced examiner scrutiny on authentication controls and fraud prevention as member accounts scale faster than IT infrastructure.

Why this works

The VP of IT knows their systems are strained but the specific growth percentage (38%) and exam timing (Q1 2025) proves you pulled their call reports and know their exam schedule. The authentication angle flags a blind spot - they may be focused on core banking systems but haven't thought about how rapidly scaling member accounts stress authentication infrastructure. The easy yes/no question makes routing simple.

Data Sources
  1. NCUA Credit Union Locator & Call Report Data - assets, members, growth rates
  2. NCUA Exam Schedules - upcoming exam windows

The message:

Subject: 38% asset growth flags IT controls review Your 38% asset growth in 18 months puts IT access management on NCUA's exam checklist for Q1 2025. Examiners specifically probe authentication controls when member accounts scale this fast. Is your IT team ready for the access control walkthrough?
PQS Public Data Strong (8.1/10)

NERC Incidents Documented Pre-Audit

What's the play?

Identify utilities where recent grid access incidents are documented in NERC's violation database ahead of scheduled CIP audits. Incident history triggers enhanced scrutiny on CIP-005 electronic access controls during audits.

Why this works

The CISO can verify both the incident month (September) and audit timing (March 2025) in under 60 seconds using public NERC databases. The CIP-005 reference is exactly their concern area. The remediation documentation question is practical. Slightly repetitive with the first NERC variant but still solid on specificity and verifiability.

Data Sources
  1. NERC Compliance Registry - audit schedules
  2. NERC Violation Database - documented incidents with dates

The message:

Subject: September incident flagged for your March audit Your September grid access incident is documented in NERC's violation database ahead of your March 2025 CIP audit. Incident history triggers enhanced scrutiny on CIP-005 electronic access controls during audits. Is someone already documenting your access remediation for the auditors?
PQS Public Data Okay (7.9/10)

Post-Merger Banks with Short Integration Windows

What's the play?

Identify state banks that closed acquisitions with only 5 months until their OCC exams. The compressed timeline creates urgency for identity system consolidation as OCC will audit access control integration.

Why this works

Timeline pressure is clear and real - 5 months to consolidate identity systems is tight. Specific exam focus on access controls is the right compliance angle. Practical question about current mapping efforts. Slightly less punchy than the first M&A variant but still good specificity.

Data Sources
  1. FDIC BankFind API - merger completion dates
  2. OCC Exam Schedules - upcoming safety and soundness exams

The message:

Subject: April OCC exam after November merger You closed the Community Bank acquisition in November 2024 with your OCC exam in April 2025. That's a 5-month window to consolidate identity systems - OCC will audit your access control integration. Is someone already mapping the merged authentication architecture?
PQS Public Data Okay (7.9/10)

Q2 Certification Expirations Without Backup Staff

What's the play?

Identify NERC utilities with multiple engineers whose certifications expire Q2 2025 and no documented successors in NERC's database. CIP auditors specifically flag workforce continuity gaps in access management roles.

Why this works

Specific certification database reference adds credibility. Workforce continuity is a real audit concern. Training question is practical. Slightly less impactful than the retirement angle but still solid specificity.

Data Sources
  1. NERC Certification Database - certification expirations, documented successors
  2. NERC Compliance Registry - audit focus areas

The message:

Subject: Q2 cert expirations with no backup staff 3 of your NERC-certified engineers have certs expiring Q2 2025 with no documented successors in NERC's database. CIP auditors specifically flag workforce continuity gaps in access management roles. Who's training the backup team for CIP-005 responsibilities?
PQS Public Data Okay (7.8/10)

3-Star Facilities After Travel Nurse Expansion

What's the play?

Identify healthcare facilities whose CMS ratings dropped to 3 stars after expanding to 24/7 operations with contract clinical staff. Surveyors correlate quality declines with access control gaps when temporary workers access patient records.

Why this works

Quality drop and staffing change are specific and verifiable. Access control angle is relevant to compliance concerns. Survey prep question is actionable. Slightly less detailed than the first healthcare variant but still good specificity.

Data Sources
  1. CMS Quality Reporting - rating changes, staffing models
  2. State Health Department Survey Data - access control findings

The message:

Subject: 3-star rating after travel nurse expansion Your rating dropped to 3 stars in October after expanding to 24/7 operations with contract clinical staff. Surveyors correlate quality declines with access control gaps when temporary workers access patient records. Is someone documenting your authentication policies for the next survey?

What Changes

Old way: Spray generic messages at job titles. Hope someone replies.

New way: Use public data to find companies in specific painful situations. Then mirror that situation back to them with evidence.

Why this works: When you lead with "Your April 12th exam gives you 14 more weeks than peers examined in January to demonstrate IAM improvements" instead of "I see you're in financial services," you're not another sales email. You're the person who did the homework.

The messages above aren't templates. They're examples of what happens when you combine real data sources with specific situations. Your team can replicate this using the data recipes in each play.

Data Sources Reference

Every play traces back to verifiable public data. Here are the sources used in this playbook:

Source Key Fields Used For
NERC Compliance Registry entity_name, nerc_certification_status, regional_entity, registered_functions Electric utility compliance obligations and audit schedules
NERC Certification Database engineer_certifications, expiration_dates, documented_successors Workforce continuity risk for CIP compliance
CMS SNF Quality Reporting facility_name, quality_measures, staffing_ratios, patient_outcomes Skilled nursing facility quality and compliance gaps
CMS ASC Quality Reporting facility_name, quality_measures, safety_outcomes, adverse_events Ambulatory surgery center operational risks
CMS Home Health Quality agency_name, quality_measures, patient_outcomes, oasis_data Home health agency distributed workforce challenges
NCUA Call Report Data credit_union_name, assets, members, financial_performance Credit union growth and compliance pressure
FDIC BankFind API institution_name, charter_type, fdic_cert_id, financial_data State bank mergers and exam scheduling
FINRA BrokerCheck firm_name, crd_number, registration_status, compliance_history Broker-dealer regulatory requirements
EPA SDWIS water_system_name, pwsid, violations, enforcement_actions Public water system compliance gaps
PHMSA Pipeline Data operator_name, incident_type, incident_date, enforcement_status Natural gas pipeline operator safety incidents
OCC Exam Schedules institution_name, exam_date, exam_type Federal bank examination timing and competitive intelligence
NCUA Exam Schedules credit_union_name, exam_window, exam_type Credit union examination timing
OCC Enforcement Actions institution_name, finding_type, citation_details, consent_orders Bank exam findings and identity control citations
SEC Merger Filings acquiring_institution, target_institution, merger_date Bank M&A timelines and post-merger audit windows
State Health Department Surveys facility_name, survey_findings, authentication_citations Healthcare access control violations