Outreach templates
Field-tested copy for cybersecurity firms. Cold email, LinkedIn connection messages, referral asks, past-client check-ins. Use these as-is or adapt to your firm.
Cold email: CT/NE small business IT leads
Targeting owner/operator or IT lead at 20-200 person companies. Works because it names a specific CT-relevant threat and offers something concrete.
Subject: Quick question about [Company]'s website security Hey [Name], I run Valtik Studios, a penetration testing firm based in [CT city]. I was looking at the general exposure of mid-market businesses in [industry] and [Company] popped up in our target-pattern analysis. Couple of things I noticed that are worth a quick check: - Your website is missing [HSTS / proper DMARC / CSP / whichever is accurate] - [Company-specific observation] We offer a free 48-hour security assessment for businesses in Connecticut. It's automated plus manual review. You get a plain-English report with findings, severity, and fix instructions. No sales call required. If useful, here's the link: https://valtikstudios.com/free-check Best, Tre Founder, Valtik Studios https://valtikstudios.com
Cold email: compliance-driven prospect
For prospects who mentioned a compliance driver in a directory or LinkedIn post. Named trigger makes the outreach feel relevant, not spammy.
Subject: [Compliance framework] pentest for [Company] Hi [Name], Saw your [LinkedIn post / conference talk / SOC 2 announcement / etc.] about [specific compliance thing]. We run [PCI DSS / HIPAA / SOC 2 / CMMC] pentests as our primary service. A few things about how we're different: - Senior tester on every engagement, no junior handoff - Report includes remediation with business impact, not just a CVE dump - Compliance-aligned scoping so findings map to audit requirements Typical engagement: 2-4 weeks, [price range]. Happy to share a redacted sample report if useful. Would a 15-minute scoping call be helpful? - Tre Valtik Studios https://valtikstudios.com
LinkedIn connection: CISO / Head of IT
Keep it under 300 characters. Reason for reaching out + no ask.
Hi [Name], saw your post on [specific topic]. Valtik Studios runs [relevant service] engagements for [their industry] companies, so I read everything coming out of [industry] security. Would love to connect and follow your work.
Referral ask: warm network contacts
Sent to past colleagues, clients, or MSP partners. Specific ask beats generic.
Subject: Quick ask Hey [Name], Valtik has grown to the point where we can take on a few more clients this quarter. Specifically looking for: - Mid-market companies going through SOC 2 or PCI DSS 4.0 readiness - DIB contractors facing CMMC Level 2 attestation - Healthcare practices needing the post-2025 HIPAA Security Rule pentest - Any CT/NE company that got a "do you have a pentest report?" in their last vendor questionnaire If anyone comes to mind, happy to handle the intro directly so you don't have to vouch beyond "they might be useful to each other." No pressure. Thanks for thinking of us. - Tre
MSP partnership pitch
MSPs see pentest requirements in their clients constantly. Partnership model (referral fee or rev share) works. Keep it short.
Subject: Pentest partner for [MSP Company]'s clients Hi [Name], Your clients probably get asked "do you have a recent pentest?" a few times a year. Cyber insurance renewals, vendor questionnaires, compliance audits, the usual. Valtik Studios runs pentest engagements at mid-market scale. Senior testers only. Reports written for business readers, not just the SOC. Typical engagement 2-4 weeks at $8K-$30K depending on scope. We partner with MSPs in two ways: 1. Referral with [X]% fee on first engagement 2. White-label where Valtik's report is branded for your firm Either works for us. Either structure, your clients get a competent pentest and you get revenue on something you already hear about monthly. 15-minute intro call? - Tre Valtik Studios
Past-client quarterly check-in
Light-touch follow-up to past engagement clients. Low effort, high yield when they need another engagement.
Subject: [Company] security posture check-in Hey [Name], Quarterly check-in on my end. Two things I wanted to flag: 1. [Specific CVE / industry incident / threat relevant to them] 2. [Something their compliance framework updated, if applicable] If it's time for [annual pentest / retest / scope expansion / new engagement], happy to put together a proposal. Existing-client pricing applies. If not, just a ping to stay on your radar. Hope the team is well. - Tre
Post-breach prospect outreach
When a prospect's peer competitor got breached. Tactful, not vulture-like.
Subject: [Industry] security conversation Hi [Name], You probably saw the [specific competitor / peer company] incident last week. I run Valtik Studios, a pentest firm, and I've been thinking about how [industry] companies should be reading the [specific attack pattern] that caused it. Couple of concrete things to check: - [Specific control relevant to the attack pattern] - [Another specific control] - [A third] Not pitching anything specific. Just wanted to share what I'd be checking if I ran [similar industry role] at [Company]. If you want to talk through it, I'm around. - Tre
Proposal follow-up
Sent proposal, haven't heard back in 5 business days. Specific question re-engages better than "just following up."
Subject: Re: [Project name] proposal - quick question Hi [Name], Wanted to check in on the proposal from [date]. One specific question that might help you move forward: Is [scope item / timeline / budget concern] the main thing holding this up? If so, happy to discuss how we can adjust. If not, I can put together a revision addressing whatever is. If you've decided to go a different direction, no worries - just let me know so I can clear the hold on my calendar for that window. - Tre
Need help running outreach?
If you're an established cybersecurity firm struggling to convert pipeline, we sometimes work on revenue operations for peers. Primarily a service for firms in similar markets.
Contact us