Thanks for taking the time to visit my portfolio!
Today, it takes more effort than ever to earn a double-click and get head tuning results.
Review my writing examples that generated results for companies focused on cybersecurity, enterprise social networks, global collaboration, GDPR/Privacy, and many other B2B SaaS solutions.
I designed this portfolio to be short, sweet, and simple one page display of my best-written work.
But we all know product marketing encompasses so much more than writing a catchy headline. But it helps.
I am a problem solver, technical marketing writer, customer insight expert, sales enabler, GTM expert and most of all, I am a collaborator.
Take a look around and hopefully it will spark some inspiration, a quick laugh, or best of all the motivation to get in touch.
Unless you have been living under a rock, you know customer stories that detail customer problems and your solution is the number one demand generation asset.
But even then, you still need to stand out from the rest, and that takes human power, empathy, understanding your customer, and inspiration that tells a compelling story.
Proofpoint is the powerhouse for enterprise email security, helping solve some of the most pressing problems today. Phishing, BEC, targeted attacks, cloud security, and social media continue to bring more threats into enterprises than any other vector. So, it’s no surprise that email continues to lead as the most exploited vector for APT groups and other bad actors.
Check out a selection of case studies I wrote to demonstrate how and why companies continually invest in email security.
Prominent Multinational Bank Protects Brand and Customers from Social Media Fraudsters
Westinghouse supercharges email security gains better, more accurate protection with Proofpoint
It is not easy to operationalize threat intelligence to add value in SecOps and the product development cycle. How do you connect what adversaries are doing right now to how you defend your organization?
The sad truth is that it is difficult, if not impossible, to make the connection. So, what is the answer? Keep working with dated threat intelligence? Maybe you need to build some capacity for external visibility into your environment. Elite threat intelligence professionals withe the right tools get ahead of attackers and know they are being targeted. That is no small feat.
This UK retail banking organization was able to anticipate attacks and outsmart their cyber adversaries using Team Cymru Pure Signal Recon. Read more.
Tibbr, a former start-up within TIBCO, provided enterprise social network solutions that helped break down the barriers of geographic locations, partner communications, silos between disparate departments and be able to replay institutional knowledge with a wide group people that need to work together.
Look at a collection of case studies I wrote about the need and benefits of secure collaboration in diverse industries and environments.
Offshore and in the oilfield - tibbr fuels new levels of global collaboration
Filenet provides a solution that has saved billions of trees and cut red tape by 70% or more. It wasn’t that long ago that the march towards paperless processes, transactions, and communications was a challenge. Remember all those paper files in government offices, schools, doctor offices, and hospitals? There are gone now. (mostly, anyways)
These organizations invested in producing on-demand information, content management, and faster response times using FileNet. The company was purchased by IBM in 2006.
When dinosaurs and 286s roamed the earth, we humans cared about speeds and feeds. Now it’s less about outrunning the competition, but more about getting there first. When and whereto show up with the right message is a direct result of managed collaboration and communications.
A good brochure converses about benefits your audience cares about. Worthy brochures communicate benefits, efficacy, productivity, cost savings, to multiple personas and the motivations beyond technical audiences.
Everyone wants to integrate with Splunk, and Proofpoint is no exception
Proofpoint Targeted Attack Protection - SaaS Defense
Proofpoint Data Discover- Reduce your exposure to data loss and compliance risk
Shift left in your app development lifecycle, SAST, DAST, and mobile security testing
Everyone loves to sit down and read a great whitepaper, right? What could be more fun and exciting than reading a whitepaper?
There are many great answers to that question.
But the fact is that without a whitepaper, your solution lacks credibility with your customers. It's difficult for salespeople to describe your approach without having the confidence a well written use cases and industry specific information found in whitepapers.
Salespeople must prove their case and show the caliber of their ability to solve customer problems. So, like it or not, every company needs whitepapers to demonstrate its expertise in solving customer problems without putting everyone to sleep.
The best competitive intelligence supports salespeople with a combination of hard facts and antidotal information that can be easily incorporated into customer conversations. Here are a couple of examples.
Partners need validated use cases so they know when and why to include your solution in their deals. Enable your partners with short, easy-to-reference use cases, program guides and communication your sales wins to instill best practices and celebrate those hard-earned partner and sales wins.
This quick reference guide is for partners and includes SteelEye’s (Purchased by SIOS) top 10 use cases, key competitive differentiators, and some solid guidance on how to order as it isn’t easy when it comes to Linux.
All the great benefits of becoming a SteelEye partner.
Here is an example of a weekly article I used to write to celebrate key wins and best practices at CheckPoint.
The best outcome for creating a blog post is to change minds, flip the script, and cultivate an audience of customers that share the problems you are qualified solve. It’s an opportunity to get ahead of current or biased thinking. In an ideal world it would give your thought leaders the opportunity to expand their influence into new areas. I have a silly number of blogs I have written over the years. Here are just a couple that I recently wrote.
This is a key deliverable for every product marketing professional. I have written a plethora of dossiers on SOC and GRC leadership, practitioners, economic buyers, CISOs, and influencer personas involved in the network/cybersecurity decision-making process. Some are very targeted. In other cases, they get incorporates into on-boarding and LMS training modules.
But these are active and sensitive documents so I am not going to share them online. After talking I can email you an example.