RegScale Handoff Kit · 01 of 06 · v7

October IC2 Walkthrough — Reusing the SANS Pattern with Your Inputs

A guide to applying the cowork kit you already have to your next flagship event. This is not theory. The April 29 workshop generated real ad sets, real PowerPoint decks, real email copy, and a live published landing page in 120 minutes. You can do the same for IC2 starting today.

Audience: Esty, Brittany, Morgan, Amanda Time to read: ~12 min Time to first draft: ~15 min Link convention: ↗ Monday Doc · 🚀 live published asset · 📦 cowork kit zip
TL;DR

What this is: a guided walkthrough that turns the April 29 workshop's pattern (real assets shipped through Cowork in 120 minutes) into a repeatable chain you can run for October IC2 today. How to use it: start with the orange kickoff box below — paste two prompts into Cowork and point at one Monday subitem. Drop into the deeper stages (L1 → 5) only when you need the why behind a step. Every claim has a Monday Doc link (↗) for one-click verification.

Run this in 60 seconds — for IC2 or any next event

How to kick off a Cowork session against a real Monday task you own

Don't read the whole guide first. Open Cowork, paste two prompts, point at one Monday subitem you own. The chain produces real assets — emails, ads, landing pages, decks — and writes them back to the subitem with a Voice Pass record attached. Esty reviews in <2 minutes. Same pattern that produced the SANS suite. Same pattern for IC2.

Step 1 · ConnectOpen Claude Cowork. Drop the kit zip onto the Cowork window: regscale-webinar-cowork-kit.zip
Step 2 · OrientPaste kit/prompts/01-orientation-chain.md into Cowork. It loads Layer 1 / 2 / 3 in 5 minutes.
Step 3 · Pull a taskPaste kit/prompts/02-pull-and-execute.md. Point Cowork at a Monday subitem you own — e.g., Active Marketing Programs.
Step 4 · Watch it runCowork drafts the asset, attaches it to your Monday subitem, tags Esty for SW-01 Voice Review. See Workshop Sandbox for what this looks like with 7 real assets shipped.

The April 29 workshop demoed the cowork kit. The recap surfaced that the materials were hard to absorb. This guide makes them usable: it walks the SANS Spring CSF pattern (real worked instance, all 7 slots produced live, landing page actually published) and shows what changes for October IC2 (with explicit slots for what Esty & Brittany fill in).

All voice rules, proof points, role-holders, SOPs, and asset specs are already canonicalized in Monday Docs in the AI Integration workspace. Click any monospace path with to open the canonical doc. All links open in a new tab.

i

The pattern in 60 seconds

Three layers, two prompts, one chain — six Standard Works.

Layer 1
Durable

GTM Foundations

Reconciled ICP · Buyer Personas · Positioning. Authored by the L1a Auto-GTM Commission, reconciled against workshop GTM Foundations work, promoted to canonical Monday Docs in the Layer 1: Foundations folder. See Stage L1 below.

Layer 2
Per campaign

Campaign frame

Campaign Execution Plan · Campaign Bill of Materials · Messaging Playbook · Measurement Framework. New for each campaign — SANS has its set; IC2 needs its own.

Layer 3
Per event

Event instance

Strategic brief (SW-01) · JSONB data files · per-asset hydrated specs. SANS lives in kit/data/sans_*.jsonin zip + the workspace’s SANS 2026-05-05 Instance Index; IC2 needs its own data files.

The chain (one continuous activity): Layer 1 (durable) → Layer 2 (campaign overlay) → Layer 3 (event substrate) → Pull task from Monday subitem → Follow linked SOP → Execute (apply voice + verbatim proof points + asset spec) → Write back to Monday → Notify VP of Marketing for Voice Review.
Webinar Lifecycle SOP · 6 Standard Works (click any to open Monday Doc)
Deeper context · the kit is a portable extract

The cowork kit (regscale-webinar-cowork-kit.zip) is what a Cowork session needs in-hand to execute. The full governance lives canonically in Monday:

Master SOP · SOP - Webinar Lifecycle (master) (v1.2, production-ready) — pipeline overview, 6 Standard Works, 6 Quality Gates (QG-0 through QG-5), Webinar BOM Template (v0.3, 14 assets), Quality Rubric.

Sibling SOP suites · SOP — Brand Voice Stewardship (style gate) · GTM Messaging Book (substance gate) · SOP — Campaign Brief to Multi-Asset · SOP — Asset Specification Library · SOP — Board Creation & Schema Management · Codification Framework — Concepts.

Heuristic: the kit is what the team carries; Monday is the canonical reference. The Cowork Session Orientation is the entry point that loads everything else.

L1

What’s already locked at Layer 1 (GTM Foundations)

Pre-loaded grounding for the IC2 brief. Canonical Monday Docs in the Layer 1: Foundations folder.

What "GTM Foundations" means. The durable strategic ground of the engagement: who RegScale sells to (ICP), who within those orgs buys (Personas), and how RegScale wins (Positioning). These don't change campaign-to-campaign — every email, ad, landing page, deck, and one-pager grounds against them. They were produced by the L1a Auto-GTM Commission (Tier 1 of the commission stack) — a 30-node pipeline that takes RegScale's company URL + name and synthesizes the GTM intelligence. The outputs were then reconciled against the workshop GTM Foundations work in the L1-Reconciliation step, then promoted to canonical Monday Docs. The full commission stack — L1a → L1-Reconciliation → L2 Campaign Execution → L3 Event Support — is visualized in the workshop bundle’s v2-sop-commission-stack.html artifact (in the kit zip). Each layer feeds the next: L1 grounds L2; L2 grounds L3; L3 produces the asset substrate for any specific campaign.
3 ICPs (Canonical)
Federal Contractors & Government Agencies (FedRAMP-Bound)Primary $100M–$10B+ revenue · 200–10,000+ employees · FedRAMP / CMMC / NIST RMF / OSCAL · ACV $100K–$500K+
Enterprise SaaS (Multi-Framework Compliance)Secondary $50M–$5B+ revenue · 100–5,000 employees · CI/CD-heavy · SOC 2 / ISO 27001 / additional certifications · ACV $50K–$250K
Healthcare & Financial Services (Regulated)Tertiary $50M–$10B+ revenue · HIPAA / SOX / PCI-DSS · on-premises often table-stakes · ACV $75K–$300K+
provenanceL1a Auto-GTM Commission (30-node pipeline · raw inputs: company_name + company_url) → L1-Reconciliation (merge with workshop GTM Foundations work) → Layer 1: Foundations Monday folder (canonical)
4 Buyer Personas (Canonical)
The CISOPrimary JTBD: achieve & maintain certifications without security compromises. Title range: CISO, VP Security, Director of Cybersecurity.
The Engineering Leader (CTO / VP Engineering)High JTBD: remove compliance gating from feature delivery. Title range: VP Eng, CTO, Director of Engineering, DevSecOps Lead.
The Compliance/Audit ManagerHigh JTBD: maintain audit readiness continuously; reduce evidence chasing burden. Title range: Compliance Manager, GRC Manager, Compliance Officer.
The CEO / CROStrategic JTBD: open new markets requiring compliance certification. Title range: CEO, CRO, VP Sales, VP BD.
provenanceL1a Auto-GTM Commission (mission M11 target-audience + directive D3 distinct-jtbds + D4 role-segmentation) → L1-Reconciliation (Roster aligned with GTM Messaging Book section 02) → Layer 1: Foundations Monday folder (canonical)
4 Differentiators (Locked Positioning)
D1 · Continuous Controls Monitoring (CCM) as architectureBuilt around CCM from inception; competitors are point-in-time scanners retrofitted with automation.
D2 · Purpose-built for cyber-GRCCyber-GRC specialist; competitors adapted from IT ops (ServiceNow), governance (LogicGate), or general compliance.
D3 · System-specific organization (not framework-specific)Organize compliance by systems (GitLab, CrowdStrike, Jira) instead of frameworks (SOC 2, FedRAMP, ISO).
D4 · Headless / invisible complianceIntegrates invisibly into existing toolchains; compliance happens as background process, not as new tool.
provenanceL1a Auto-GTM Commission (directives D6 distinctive-competencies + D8 gtm-analysis + assignment A3 xPositioning) → L1-Reconciliation (dual-frame: external competitive vs. internal category) → Layer 1: Foundations Monday folder (canonical)
5 Messaging Pillars (Persona-Mapped)
P1 Speed · for CEO/CRO + Federal“FedRAMP High in 90 days vs. 12–18 months.” Use case: federal contract market access.
P2 Real-Time Visibility · for CISOs“Compliance status updated continuously from your actual infrastructure.”
P3 Engineering Integration · for CTO/VP Eng“Compliance in your CI/CD. No new tools. No slowdown.”
P4 Evidence Automation · for Compliance/Audit“Stop chasing evidence. It’s gathered continuously from your actual systems.”
P5 Multi-Framework Consolidation · for SaaS + Healthcare/Finance“One platform for FedRAMP + CMMC + SOC 2 + HIPAA + ISO 27001 — no framework duplication.”
provenanceL1a Auto-GTM Commission (directive D8 gtm-analysis) → L1-Reconciliation (5-pillar adoption from workshop GTM Foundations) → Layer 2: Campaign Execution Monday folder (Messaging Playbook canonical)
How to use this for the IC2 brief

When Esty/R3 authors the IC2 strategic brief, these are the menus to pick from — not new analysis to commission. Pick the ICP IC2 targets (likely Federal given the “flagship” framing). Pick 1–2 primary personas (likely CISO + Compliance/Audit Manager for a federal compliance event). Pick 1–2 messaging pillars (likely P1 Speed + P2 Real-Time Visibility). Use the locked positioning verbatim. The brief becomes a fill-in exercise rather than a strategy exercise.

CS

Chain 1 Sandbox — your living exemplar

A complete pre-cooked worked example of the chain end-to-end, sitting in Monday for both human reference + Cowork pull.

🧪 FS-ISAC FY27 Sandbox · folder 20275905

A second event already walks the entire chain — to be read by humans and Cowork alike.

The April 27 capability test took the FS-ISAC FY27 webinar (a flagship financial-services compliance event) all the way through the 6-SW chain in sandbox. Strategic brief, BOM Layer 1, asset bundle manifest, landing page copy, T-7 promotion email, day-of execution trace notes, post-session recap email, paired-gate review record, post-event Report & Review — every artifact a working campaign produces, sitting in Monday at canonical structure. The team can open any one of these to see the shape it should take for IC2. Cowork can pull these as worked examples when generating IC2’s analogs.

Why it’s valuable: the SANS instance focused on Movement 2 (asset production for one webinar). The FS-ISAC sandbox covers the full lifecycle — SW-00 commitment through SW-05 follow-up — so when IC2 needs a SW-04 day-of kit or a post-event Report & Review template, this is the canonical analog to mirror.

provenanceWebinar Lifecycle SOP (master + 6 SWs) → Chain 1 capability test (2026-04-27 dry run) → FS-ISAC FY27 Sandbox (folder 20275905, full lifecycle artifacts)
1

What’s in the SANS Spring CSF 2026 instance

Real data from kit/data/sans_webinar.json + the workspace’s SANS instance index. Test run — pipeline test, not approved marketing. Outputs were generated April 29 in workshop.

Campaign · Layer 2 + Layer 3kit/data/sans_webinar.json + Monday Webinars folder

“Watch how engineering teams clear FedRAMP authorization in 90 days, not 18 months — without slowing engineering velocity.”

Speakers

James Bond

RegScale platform lead

FedRAMP authorization architect

Travis Howerton

CEO/Founder, RegScale

Former CTO at U.S. NSA · Former federal CIO

Canonical Monday reference: SANS — SW-01 Strategic Brief · SANS — Webinar BOM · SANS — SW-00 Commitment Applied

provenanceL2 Campaign BOM (structural donor: Federal/PS webinar template) → SANS Webinar BOM (instance, Monday) → sans_webinar.json (kit JSONB)

What the workshop team actually generated — 7 slots, 120 minutes, all live in Monday

The April 29 Workshop Sandbox board produced these tangible work products through Cowork. Every asset linked below was authored by Cowork running against a Monday subitem, voice-passed by Esty, and committed to Monday. Live assets are publicly addressable URLs.

Slot 2 · T-14 Email Body

Subject: “FedRAMP in 90 days. Join us May 5.”

Full email body authored by Cowork, drafted by Field Marketing Operations role (Amanda's slot). Voice-Pass / Approved. CCM term used canonically; 3 verbatim Register entries. Pre-header: “Continuous monitoring is architecture, not a feature. See it live.”

Open Slot 2 in Monday
Slot 3 · Ad Set + LinkedIn Paid

12 SVG ad variants + LinkedIn body

300×250 + 12 IAB sizes (160×600, 728×90, 970×250, 1080×1080, 1200×627, etc.) + full LinkedIn paid post. Voice-Pass / Approved. CCM term verbatim; full Travis NSA/CIO heritage cited. Live ad set gallery deployed to Cloudflare Pages.

Open Slot 3 in Monday
regscale-ad-set-2026-04-29.pages.dev
Slot 4 · Speaker Deck Slide 9

SANS-Spring-CSF-2026-Speaker-Deck.pptx

Slide 9 (Why Us · Proof) authored by Cowork — section label, headline (“We run on what we ship”), Travis verbatim heritage citation, FedRAMP High Authorized callout. PPTX file attached to Monday subitem. SVG thumbnail + JSONB instance + speaker notes also produced.

Open Slot 4 in Monday
Download PPTX
Slot 5 · SW-04 Day-of Execution Kit

Run-of-show + dial-in + backup tech

Six-section operational document: T-30 to T+45 timeline, dual-platform backup (Zoom failover with 1Password vault credentials), recording verification, exit criteria. Voice-Pass / Approved (partial-scope: participant-facing portions only).

Open Slot 5 in Monday
Slot 6 · SW-05 Analyst One-Pager

Post-event PoC follow-up artifact

3 verbatim Register proof cards (90 days · 60% · 8x), three-pillar differentiation (practitioner heritage / headless middleware / system-specific). Advanced-track gate sequence (SW-02 substance gate THEN SW-01 voice review). Audience: BDR Josh's qualified PoC leads.

Open Slot 6 in Monday
Slot 7 · Cloudflare Pages Capstone Live

SANS landing page · publicly addressable URL

Movement 3 capstone. Self-contained HTML landing page hydrated entirely from canonical kit sources (sans_brief.json + sans_webinar.json + proof-points-register.md + M2 voice-passed content). Deployed to Cloudflare Pages. HTTP 200 verified. Zero new copy — every word voice-passed in Movement 2.

regscale-workshop-2026-04-29.pages.dev
Open Slot 7 in Monday

The point: these aren’t demos or sketches. The PPTX file opens in PowerPoint. The 12 SVGs render in any browser. The landing page is live on Cloudflare. The email body would send. This is what 120 minutes of Cowork against a 6-slot Monday board produces. Same chain — same prompts, same kit, same SOPs — runs against IC2’s subitems and produces IC2’s assets.

provenanceCowork Session Orientation (loads Layer 1/2/3) → Workshop Sandbox board 18410736703 (parent + 7 slot subitems) → kit/prompts/02-pull-and-execute.md (per-slot execution) → SW-01 Voice Review (Esty quick-scan) → Cloudflare Pages capstone (Movement 3 publish)
T-14 Email · Asset 1 of 9 in the suite (verbatim)kit/data/sans_email_t14.json
Proof points used (verbatim) · Full Register ↗
  • PP-01FedRAMP High authorization in 90 days vs. the traditional 12–18 months
  • PP-05audit prep time reduced by 60%
  • PP-13RegScale itself is FedRAMP High Authorized — operated using the RegScale platform

14 entries total in the canonical Proof Points Register. Never paraphrase — auto-fail at SW-01 voice gate.

provenanceGTM Messaging Book § Proof Points Register (canonical Register) → Proof Points Register (standalone Monday Doc) → kit/proof-points-register.md (portable extract) → Asset Specs schema enum (validation enforcement)
2

What changes for October IC2

Side-by-side: what stays vs. what swaps. Brittany & Esty fill the right column.

ElementStays the sameChanges for IC2
Layer 1 foundations
ICP, Personas, Positioning, Pillars (canonical)
SAME — canonical in Layer 1: Foundations folder; menu in Stage L1SAME — pick from menu; no new analysis
Voice rules
5 principles + forbidden words + CCM gate
SAMESOP — Brand Voice StewardshipSAME — no new voice work needed
Proof points
14 verbatim metrics
SAMEProof Points RegisterSAME — subset selected per asset, never paraphrased
Asset specs & Webinar BOM
Schema + 14-asset canonical inventory
SAMESOP — Asset Specs + Webinar BOM TemplateSAME — same shape; subset per IC2 format
SOPs
Webinar Lifecycle (6 SWs) + foundational
SAMESOP — Webinar Lifecycle + sibling suitesSAME — same procedure, all 6 quality gates
Role-holders + gatekeeperSAMERole Holders FY26; VP of Marketing Esty is gate; Morgan backupSAME — same review chain
Strategic brief (SW-01)
why-anything / why-now / why-us
NEWSANS SW-01 brief + FS-ISAC FY27 briefNEW — Esty/R3 authors IC2’s brief; same shape; pick from L1 menus
Campaign-level JSONB
title, dates, speakers, hero offer, KPIs
NEWsans_webinar.jsonNEWic2_event.json with IC2 facts
Per-asset JSONB
subject, body blocks, proof selection
NEWsans_email_*.json × 4NEWic2_email_*.json hydrated by Brittany
Monday board + subitems
parent + slots for the cowork chain
NEWWorkshop Sandbox board (with all 7 slots produced)NEW — IC2 item on Active Marketing Programs (or new sandbox); use SOP — Board Creation & Schema Mgmt

Six rows stay; three rows change. The three changes are the per-event work that always needs doing for any new campaign.

How the chain actually runs — concrete, against your real Monday tasks

Two prompts copy-pasted. One Monday subitem you own. Real assets attached to that subitem in 15 minutes.

  1. The role-holder opens Claude Cowork. Drops the kit zip onto the Cowork window: regscale-webinar-cowork-kit.zip. Cowork now has the voice rules, proof points, asset specs, and JSONB examples in-hand.
  2. From the kit zip, open kit/prompts/01-orientation-chain.md. Copy its full contents. Paste into Cowork chat. Cowork loads Layer 1 (foundations) → Layer 2 (campaign frame) → Layer 3 (event instance) and confirms each layer before advancing per the Cowork Session Orientation. ~5 minutes.
  3. From the kit zip, open kit/prompts/02-pull-and-execute.md. Copy. Paste. Cowork pulls the role-holder’s assigned subitem from Monday — for IC2, this would be a subitem the team creates on the Active Marketing Programs board. For the workshop, slot subitems were on the Workshop Sandbox board. Cowork reads the linked SOP, executes the procedure.
  4. Cowork writes back to the Monday subitem: Asset Draft column gets the body content, Asset Files gets the rendered file (PPTX, SVG, etc.), SPA Preview URL gets the suite-demo route, Workshop Status = Ready for Review. You can verify this happened by looking at Slot 2 (T-14 Email) in the Workshop Sandbox subitem board — every column populated by Cowork on April 29.
  5. Cowork tags Esty (VP of Marketing, brand gatekeeper) in the subitem comment: @Esty — Slot N ready for SW-01 Voice Review. Substance review (Messaging Book SW-02) precedes style review (Brand Voice SW-01) per the Brand Voice SOP Key Rule.
  6. Esty pings her own Cowork session with gate Slot N. The Voice Review Quick-Scan runs in ≤2 minutes (anti-pattern check + 5-principle scoring). Status updates to Voice-Pass / Approved, Drafting (conditional), or Blocked (show-stopper). Backup gatekeeper if Esty is occupied: Morgan. The April 29 workshop produced 7 Voice Pass records across 4 gate sweeps in <2 minutes per asset — see Slot 1’s gate sweep record.

Same two prompts work for every future campaign. Different board ID. Different campaign. Same chain. Today, you could open a Monday subitem you own — say a real promotional email task or a real landing page draft task — paste these prompts into Cowork, and have the asset back in your Monday subitem within 15 minutes.

provenanceCowork Session Orientation (the canonical entry-point doc) → kit/prompts/01-orientation-chain.md + 02-pull-and-execute.md (extracted for portable use) → Workshop Sandbox board (April 29 live execution) → FS-ISAC FY27 Sandbox (Chain 1 dry-run validation)
4

The hard rules that prevent voice drift

Canonical text from SOP — RegScale Brand Voice Stewardship (v2.0).

Voice Principle 1 · Category-defining
GTM Messaging Book § Differentiation

Uses Continuous Controls Monitoring (CCM) as the category language. Positions CCM per the Messaging Book Differentiation file as a “structural difference, not a feature comparison” and as a “foundation, not a feature.” Critical: do not drift to Continuous Compliance Monitoring — the canonical RegScale term is Continuous Controls Monitoring.

provenanceGTM Messaging Book § 07 Differentiation Holistic #2SOP - Brand Voice Stewardship Voice Principle 1kit/voice/SW-01 Voice Review anti-pattern gate
Voice Principle 2 · Practitioner-grounded
GTM Messaging Book § Differentiation

RegScale’s voice cites practitioner heritage as the source of authority. “Built and run by industry veterans,” “founder served as CTO of a U.S. National Security Agency,” “Chief Product Officer built the AWS compliance programs from scratch.” Generic industry-leading voice that doesn’t cite practitioner depth is off-voice.

provenanceGTM Messaging Book § 07 Differentiation Holistic #1SOP - Brand Voice Stewardship Voice Principle 2sans_webinar.json speakers[1] canonical bio (Travis: Former CTO at U.S. NSA · Former federal CIO)
Voice Principle 3 · Proof-pointed with verbatim metrics
Proof Points Register

Every speed, efficiency, or scale claim uses the verbatim numbers from the Proof Points Register, not paraphrased ones. “FedRAMP High in 90 days vs. 12–18 months” — not fast FedRAMP. “1M+ assets actively managed” — not many customers. The 14-entry Register is enforced as schema enum on proof_points_used_verbatim.

provenanceGTM Messaging Book § Proof Points Register (leads across sections)Proof Points Register Monday Doc (standalone)kit/proof-points-register.md (portable)Asset Specs schema enum on proof_points_used_verbatim (validation enforcement)
Voice Principle 4 · System-specific, not framework-specific
GTM Messaging Book § Differentiation

RegScale’s product narrative organizes around customer systems, not around frameworks. Voice that frames RegScale as we do SOC 2 + FedRAMP + ISO misses the positioning. Voice that frames it as “compliance ties to your actual systems across all frameworks” is on-voice.

provenanceGTM Messaging Book § 07 Differentiation Holistic #3SOP - Brand Voice Stewardship Voice Principle 4Positioning Differentiator D3
Voice Principle 5 · Headless / invisible compliance
GTM Messaging Book § Differentiation

RegScale’s adoption narrative is “most users never log into RegScale at all — they simply work in their existing tools while RegScale operates in the background.” Voice that frames it as “true middleware” integrating with CrowdStrike / GitLab / Snyk / Jira is on-voice.

provenanceGTM Messaging Book § 07 Differentiation Unique #3SOP - Brand Voice Stewardship Voice Principle 5Positioning Differentiator D4
Auto-fail show-stopper · Wrong category term
SW-01 anti-pattern gate

Any draft using Continuous Compliance Monitoring fails the SW-01 anti-pattern gate at ≤30 seconds and routes back to drafting. Hard substitution. Common AI drift — expect it; gate it.

Forbidden words in shipped copy
leverage (verb)transformativesynergizeunlock valueseamlessbest-in-classnext-generationholisticLearn more

holistic is OK only when followed by an enumeration of what’s included. Generic CTAs like Learn more always fail.

5

Who reviews what — slot & role map

Roles + gate authority for every campaign. Source: Role Holders FY26 (Canonical).

SlotRoleFY26 holderOwns · Workshop subitem
Slot 1VP of Marketing · Brand GatekeeperEsty PeskowitzSW-01 Quick-Scan reviewer · brand gatekeeper · backup: Morgan. April 29: Slot 1 cascade demo + 4 gate sweeps
Slot 2Field Marketing OperationsAmanda Greenspan-D’SouzaLanding page copy + email drafts · ~81% of board activity. April 29: Slot 2 T-14 email body draft
Slot 3Paid Media ContractorElyse HoekstraLinkedIn paid + Google Ads + IAB ad set. April 29: Slot 3 ad set + LinkedIn paid post
Slot 4Brand & Design LeadMorgan JohnsonDeck design + visual assets. Backup gatekeeper. April 29: Slot 4 deck slide 9 (Why Us proof)
Slot 5Field Marketing LeadBrittany GleasonOwned-event execution + commitment + tier classification. April 29: Slot 5 SW-04 Day-of Execution Kit
Slot 6PMM LeadAlex WhiteProduct marketing · positioning · one-pagers. April 29: Slot 6 SW-05 analyst one-pager

Supporting roles (off-chain but in-the-loop)

RoleFY26 holderOwns
CEO/FounderTravis HowertonExecutive concept input on Federal/PS opportunities. Speaker pattern. Voice principle 2 anchor: former CTO at U.S. NSA, former federal CIO.
Marketing Operations LeadJon ColletteHubSpot, Salesforce, WPEngine ops. Recording processing. Off-hours WPEngine push owner.
Web Implementation PartnerHong DiazWPEngine staging→prod builds. Design execution support.
Federal/PS Technical SMEDave WaltermirePolicy & Compliance Messaging Book section technical adjudication.
Social/Content LeadGabrielle HovendonSocial calendar, newsletter, LinkedIn cadence, clip publishing.
Engagement Lead (Elynox)Daniel @ ElynoxWorkshop facilitation, SOP codification. Maintenance owner for the Role Holders doc.
provenancePhase 6 Status Update Cadence + Phase 7 retrofit (workshop)role-holders-fy26.md (Obsidian vault)Role Holders Monday Doc (canonical)
6

What needs to be created for IC2 specifically

Three new authoring jobs. The rest of the kit + Monday Docs apply as-is.

Strategic brief (ic2_brief.json) — same shape as sans_brief.json or FS-ISAC FY27 brief: campaign name, audience segment (pick ICP from Stage L1), persona distribution (pick 1–2 personas), why-anything / why-now / why-us, channel commitments, cross-asset consistency commitments. Author per SOP — Campaign Brief to Multi-Asset; pick messaging pillar from Stage L1 (P1–P5).
Owner: Esty (R3 / VP of Marketing)
Campaign + per-asset JSONB (ic2_event.json + ic2_email_*.json etc.) — hydrated by Brittany from the brief and the asset specs library. Same shape as the SANS files in the kit. Reference the Webinar BOM Template (v0.3, 14 assets) to scope which assets IC2 needs. Authoring procedure: SOP — Asset Specification Library.
Owner: Brittany (Field Marketing Lead)
IC2 Monday board + subitems — create parent item on Active Marketing Programs board; create subitems for each authoring slot with role mapping (matches the 6-slot pattern from Workshop Sandbox board); add SOP link to each Asset Draft column. Use SOP — Board Creation & Schema Management for column schema.
Owner: Esty + Brittany
Voice docs · SOP — Brand Voice Stewardship + SW-00, SW-01, Quality Rubric, Voice Pass Template all in kit/voice/. No new work.
Already in Monday + kit
Proof Points Register · Proof Points Register — 14 verbatim metrics. No new work.
Already in Monday
Asset specs library · SOP — Asset Specification Library · templates per asset type (in kit/specs/). No new work.
Already in Monday + kit
Webinar Lifecycle SOP suite · SOP — Webinar Lifecycle (master) + BOM Template + 6 SWs (SW-00 · SW-01 · SW-02 · SW-03 · SW-04 · SW-05) + Quality Rubric. No new work.
Already in Monday
L1 foundations (canonical) · ICP + Personas + Positioning. No new work.
Already in Monday
Role Holders · Role Holders — FY26. No new work.
Already in Monday
Chain 1 Sandbox exemplar · FS-ISAC FY27 brief + 11 sibling artifacts in folder 20275905. No new work.
Already in Monday
The two prompts · kit/prompts/01 + kit/prompts/02. No new work.
In kit
Lesson from the FedRAMP 20x execution arc

QG-5 (post-event Report & Review) is non-negotiable.

The most instructive moment in the SANS lineage isn’t a success — it’s a failure. The FedRAMP 20x in Motion Webinar (Nov 19, 2025, Carahsoft co-marketed; Monday item 9257948251) executed all six phases through follow-up. The Report & Review subitem was scheduled for T+33 (Dec 22, 2025) and was cancelled in March 2026. That cancellation is the single failure mode the entire Webinar Lifecycle SOP exists to prevent.

QG-5 (the gate that closes a webinar) requires the Report & Review filed. The webinar Monday item cannot move to Closed without it. Status Update Cadence weekly checkpoint surfaces drift if R&R subitem ages past T+30. For IC2: the chain doesn’t close on the day of the event. It closes when the lessons are filed and the next campaign benefits from them. Default R&R owner per FedRAMP 20x pattern: Marketing Operations Lead [Jon Collette]. The Chain 1 Sandbox includes a Post-event Report & Review template for FS-ISAC FY27 — the canonical analog for IC2’s eventual R&R.

What this guide is and isn’t. All SANS Spring CSF data is real and sourced from kit/data/sans_*.json + the workspace’s SANS instance index — explicitly labeled a test run. The April 29 Workshop Sandbox board produced 7 tangible work products (T-14 email body, ad set with 12 SVG variants, PPTX deck slide 9, day-of execution kit, analyst one-pager, gatekeeper records, Cloudflare Pages landing page) all linked above. The Chain 1 Sandbox (FS-ISAC FY27, folder 20275905) is the second pre-cooked exemplar covering the full lifecycle. All voice rules, proof points, role-holders, SOPs, and L1 foundations are sourced from canonical Monday Docs in the AI Integration workspace. The October IC2 specifics (audience composition, agenda, speakers, hero offer, dates, format) are deliberately NOT provided here — they come from the IC2 strategic brief Esty/Brittany develop using the same shape as sans_brief.json or the FS-ISAC analog, drawing from the L1 menus in Stage L1.