Skip to content
CYBER RISKLINKEDIN + EMAILENTERPRISE CISO

Cold email campaign for cyber risk management — multi-channel campaign

5 steps over 28 days. 4 emails, 1 LinkedIn message.

Charles Perret, founder of devlo

Charles Perret

Founder of devlo.ch · March 2026

N/A
Prospects contacted
N/A
Open rate
N/A
Response rate
N/A
Interested prospects

The 5 keys to the sequence

4 emails, 1 LinkedIn message — over 28 days.

LinkedInFirst day of the seriesLinkedIn login
LinkedIn connection request Date sent: first day of the sequence Sender: {{salesRep}} Content: --- → Invitation to connect on LinkedIn: (Leave this field blank to bypass LinkedIn’s limit of 5 personalised connections per day and send 15 invitations per day) --- → Introduction (sent 1 day after the LinkedIn connection is accepted): Hello {{firstName}}, thank you for connecting. In large organisations, issues relating to incidents involving suppliers, exposure to ransomware or regulatory compliance often arise outside of scheduled security reviews. How are these matters typically handled at {{companyName}}? --- → Message with colleagues’ names + typo (sent 5 days later): {{firstName}}, regarding these matters, do you usually deal with them directly, or is it {% if colleaguename1 != blank and colleaguename2 != blank %}{{colleaguename1}} or {{colleaguename2}}{% elsif colleaguename1 != blank %}{{colleaguename1}}{% elsif colleaguename2 != blank %}{{colleaguename2}}{% else %}another member of the security or risk management team{% endif %} who handles them? I’m just checking to make sure I’m addressing the right person at {{companyName}}. --- → Corrections of typos (sent immediately afterwards): *security, sorry --- → Follow-up message (sent 7 days later): Hello {{firstName}}, I’ll leave it there for now, if this isn’t the right time. Should we get back in touch in 3 months to see if your needs have changed? I wish you the best of luck with your current projects.
EmailDay 1Email #2
Subject: What can be seen from the outside at {{companyName}}
Version A – with an opening line Dear {{firstName}}, {{icebreaker}} Within large organisations, security teams are increasingly being asked to understand what external attackers actually see when they assess the company and its ecosystem. Is this something {{companyName}} is already looking into? Kind regards, {{signature}} unsubscribe Version B – without introduction Dear {{firstName}}, Many large security teams have recently been faced with a more difficult question: what does an attacker actually see when observing the organisation from the outside? It is often in this gap between internal controls and external exposure that surprises arise. Is this a topic that {{companyName}} is already interested in? Kind regards, {{signature}} unsubscribe
Email7 days laterEmail #3
Subject: {% if colleagueName1 != blank and colleagueName2 != blank %} Does this concern {{colleagueName1}} or {{colleagueName2}}? {% elsif colleagueName1 != blank %} Does it concern {{colleagueName1}}? {% elsif colleagueName2 != blank %} Does it concern {{colleagueName2}}? {% else %} Does it concern someone at {{companyName}}? {% endif %}
Hello {{firstName}}, Would it be a good idea to include {% if colleaguename1 != blank and colleaguename2 != blank %}{{colleaguename1}} or {{colleaguename2}}{% elsif colleaguename1 != blank %}{{colleaguename1}}{% elsif colleaguename2 != blank %}{{colleaguename2}}{% else %}a member of your security or risk management team{% endif %}? In similar environments, security teams have reduced investigation times from several days to a matter of minutes by directly linking dark web activity and threats to exposed assets and critical suppliers, enabling them to act before incidents escalate. We look forward to your response. {{signature}} Unsubscribe
Email6 days laterEmail #4
Hello {{firstName}}, One of the challenges frequently cited by security managers is having a multitude of tools, yet lacking visibility into external alerts that actually impact their assets, suppliers or brand. This is often where false positives creep in and relevant signals go unnoticed, particularly during ransomware incidents or those involving suppliers. Is your team comfortable with this situation today? Kind regards, {{signature}} Unsubscribe
Email9 days laterEmail #5
Hello {{firstName}}, I don’t want to push it if now isn’t the right time. If it might be of use to you, I’d be happy to offer a brief, no-obligation resource, such as a one-off analysis of your exposure on the dark web, an overview of the threats facing your brand, or a short regulatory compliance checklist for large enterprises. Or perhaps we could get back in touch in a few months, when your priorities have shifted? Have a good day. {{signature}} Unsubscribe

Why this sequence works

This 5-step campaign, running over 28 days, combines LinkedIn and email to reach CISOs at companies with a turnover of over €2 billion in Europe. The targeting is strictly enterprise-focused, with a consultative rather than transactional approach.

The "corrected typo" technique on LinkedIn ("seucrity" → "*security, sorry") is a brilliant personalisation trick. It gives the impression of a message typed quickly and authentically, rather than an automated template. This touch of imperfection significantly increases the response rate.

A/B testing between a version with an icebreaker and one without (Touch #2) allows the approach to be optimised according to the segment. For CISOs who do not have an active LinkedIn presence, the version without an icebreaker avoids the risk of a forced connection.

What you can learn from this campaign

  • Use the typo technique. A corrected typo makes the message look genuine and boosts the response rate.
  • A/B test: icebreaker vs no icebreaker. For CISOs without a LinkedIn profile, it is more effective to avoid forced icebreakers.
  • Offer a free resource on breakups. Dark web scans, threat snapshots or regulatory checklists — they offer value even without conversion.
  • Adopt a consultative tone, not a transactional one. Open-ended questions rather than a sales pitch — suitable for CISOs at companies with a turnover of €2 billion or more.

When to use this sequence

Enterprise cyber risk management solutions

Cyber risk management, threat intelligence, security scoring — for large organisations.

Targeting CISOs at companies with turnover of over €2 billion

The consultative tone and open-ended questions are tailored to this level of decision-making.

Regulated European market

Regulated sectors (finance, healthcare, energy) where cyber compliance is mandatory.

LinkedIn-first prospecting

If your strategy relies on LinkedIn as your main channel, this guide shows you how to implement it.

Who can use this sequence?

Threat intelligence providers

If your solution monitors the dark web, external threats or supplier risk.

SDRs targeting enterprise CISOs

The consultative approach and open-ended questions are designed for this level of seniority.

Cyber risk scoring platforms

If your product assesses and quantifies an organisation’s cyber risk.

Enterprise cybersecurity consultants

Adapt the process to suit your own security audit and consultancy services.

Frequently Asked Questions

How can you approach CISOs at companies worth over €2 billion?

A consultative approach (open-ended questions, no direct sales pitch) is essential. Enterprise CISOs receive dozens of approaches every day — a well-thought-out question (“What does an attacker see from the outside?”) stands out from a product pitch. The A/B testing icebreaker allows you to tailor your approach to the prospect’s LinkedIn profile.

Is the typo technique risky?

No, provided you correct it straight away in a follow-up message. "seucrity → *security, sorry" makes the exchange seem natural and genuine. CISOs who spot this sort of mistake realise that the message isn’t a generic template, which increases the likelihood of a reply.

Why offer a free dark web scan when you break up?

This is the "ultimate lead magnet" for a CISO. Even if the prospect isn’t interested in the solution, a free scan of their organisation’s dark web exposure offers immediate and tangible value. It creates a foothold for future discussions.

Want a customised sequence for your industry?

devlo designs and executes bespoke B2B cold email campaigns. ICP, buying signals, multi-channel sequences — we take care of everything.

View all 25 sequences

Last updated: March 2026