Marketing is about message and audience. Don’t have the right message, and the audience you reach will not matter. Have the right message and wrong audience, same result. People hire me to help define the audience and write the message that compellingly reaches the audience that needs to be reached. Whether it’s a website, book, blog, article or White Paper — I’m the guy that tells the story you want to tell.
Whites Papers — The Story
I’d done a bunch of White Papers over the years, but they rose to a higher level when I was hired by Windtalker Security, a company blazing trails in the all-important arena of information security or InfoSec for court systems, attorneys, and their clients. Windtalker had identified a hole in the cyber-security market that translated into a hole in the American legal justice system: the gatekeepers of justice, America’s lawyers and American court systems, were out of step with progress when it came to secure communication of private information and data.
So Windtalker Security developed a software to secure the communications between attorneys, clients, and the court system. To reach the market effectively, they needed a writer who understood the worlds of law, litigation, marketing, law firms, security, and the courts. That person was me, and because of this relationship, I have written numerous White Papers addressing the subject of information security on a wide variety of levels.
Two that stand out are posted on the company website, https://windtalkersecurity.com/about, entitled “Lessons from the Sony Hack: It’s a Scary Cyber-World Out There,” and “In the Wake of Shore v. Johnson & Bell: All Law Firms Face Potentially Catastrophic Liability.” Many more have been written and will soon be entering the ethernet.
As we take this product to market, I also write personaes and analyze ROI and such, but the most exciting thing is that I’ve been commissioned to write a book with Windtalker’s VP of Operations, Doug Martinez, beginning with this lead-in: The World is a dangerous place… This book will also serve as the basis for a series of lectures, FAQs, and blogs on cyber-security in the legal profession.