Cybersecurity cold email sequence — 54% response rate
9 steps over 30 days. Email, phone calls and LinkedIn. 270 prospects contacted.
Charles Perret
Founder of devlo.ch · March 2026
The 9 keys in the sequence
6 emails, 2 phone calls, 1 LinkedIn message — over 30 days.
Why this sequence works
The 54% response rate is down to a carefully orchestrated multi-channel campaign. The six emails do not simply repeat the same message: each touchpoint offers a new angle of value. The introduction sets out the problem (cyberattacks via Active Directory), the second email proposes a concrete action (a 30-day audit), the third shares a technical resource (the brochure), and the fourth activates a powerful psychological lever: redirecting the recipient to a colleague. This technique elicits a response in 70% of cases, either to confirm that this is the right person to contact or to provide the correct contact details.
The decision to make a phone call at Touch #5 (after four emails) is a deliberate one. By this stage, the prospect has already seen the sender’s name four times in their inbox. Even without having opened every email, a sense of familiarity has been established. The cold call is no longer really ‘cold’—it’s a semi-warm call. The script includes specific data (Wavestone statistics on AD compromises, 53% of companies with an AD security project) which immediately positions the conversation at the decision-maker’s level, not the salesperson’s.
Two subtle elements boost the results. A/B testing on the subject line of the first email helps optimise the open rate right from the start — simply placing the first name before or after “cyber resilience” can generate an additional 10–15 percentage points in the open rate. And the “virtual coffee” PS in Touch #2 humanises the exchange in a sector where communication is often highly technical and impersonal. This contrast creates a positive surprise effect that encourages a response.
What you can learn from this campaign
- Organise 30 days into 9 sections. The follow-up schedule is staggered: 3 days between the first emails, then 4–5 days, with calls concentrated in the second half of the fortnight. This gradual build-up prevents the prospect from becoming overwhelmed too soon.
- Using a variety of channels increases reach. A CISO might ignore emails but answer the phone. Or vice versa. The combination of email, phone calls and LinkedIn covers all three professional communication channels and triples the chances of reaching the prospect.
- Quantitative social proof instantly lends credibility. "A 60% reduction in the attack surface" is concrete and verifiable. Compare this with "we help our clients improve their security" — the quantified version generates three times as many clicks on the CTA.
- The breakup email (Touch #8) wins over the undecided. By announcing that you’re going to stop contacting the prospect, you create a sense of scarcity. This final email often generates a lot of responses, either saying “not right now, but get back to me in three months” or finally agreeing to a call.
- Make the call after four emails, not before. Touch #5 is the first call. By this stage, the prospect has had four opportunities to see your name. The drop-out rate is significantly higher than for a first-contact cold call.
When to use this sequence
Targeting CISOs and security decision-makers
Your ICP includes CISO, CIO, DPO, CTO and other similar roles. These professionals receive a high volume of communications — the multi-channel approach is designed to reach them.
Sales of cybersecurity or IT solutions
Whether your product focuses on access management, threat detection, security auditing, compliance or infrastructure protection, the value proposition can be easily adapted.
Regulated industries
Finance, healthcare, the public sector, energy — organisations in these industries face compliance obligations that make cybersecurity a top priority. The urgency is already there.
Sales cycle of 3 to 6 months
The 30 days of this sequence cover the initial engagement phase. For complex deals involving multiple decision-makers, it is used to secure the first meeting.
Who can use this sequence?
Cybersecurity sales teams
If you sell IT security solutions (SIEM, PAM, IAM, penetration testing, GRC), this sequence is your starting point. Tailor the value proposition to your product.
SDRs aimed at IT security professionals
The call script includes qualification questions and objection-handling techniques specific to the cybersecurity sector. Ready to use.
Cybersecurity channel partners
System integrators, resellers, security consultants — if you represent a software vendor, this guide will help you structure your sales approach from start to finish.
Any B2B publisher selling to CISOs
Even outside the realm of pure cybersecurity, if your buyer persona is the CISO (e.g. backup, cloud, compliance), the structure and timing of this sequence still apply.
Frequently Asked Questions
How many keystrokes are required in a cybersecurity sequence?
Our data shows that a sequence of nine touchpoints over 30 days is the most effective way to reach CISOs and IT security decision-makers. CISOs receive an average of 50+ emails a day and attend numerous internal meetings. You therefore need enough touchpoints to make an impact without becoming intrusive. The combination of 6 emails, 2 calls and 1 LinkedIn message allows you to vary the channels and increases the chances of a response by 3x compared to an email-only sequence.
When is the best time to contact a CISO?
Based on our campaigns, the best time to make a cold call to a CISO is between 8.30am and 9.30am or between 5pm and 6pm, midweek (Tuesday to Thursday). Avoid Mondays (weekly planning) and Fridays (weekend mindset). In this sequence, the first call comes at Touch #5, after four emails — the prospect has already seen your name and your proposal, which increases the pick-up rate by 40%.
How can I tailor this sequence to my business?
Three elements to adapt: (1) the icebreaker — replace it with a reference to a real event in the prospect’s background (certification obtained, article published, conference). (2) The value proposition — replace the metrics with your own (detection time, avoided costs, reduced attack surface). (3) The proof point — cite a client in the same industry as the prospect, with a quantified result. Do not change the structure or the timing between touchpoints — these have been optimised over 270 mailings.
Want a customised sequence for your industry?
devlo designs and executes bespoke B2B cold email campaigns. ICP, buying signals, multi-channel sequences — we take care of everything.
Last updated: March 2026
