Introduction
Not all lead sources are equal, and not all methods of finding opportunities are appropriate for your role. This lesson defines where leads should come from, how to identify them, and what boundaries must be followed when sourcing opportunities.
Your goal is not to generate as many leads as possible—it is to identify relevant, usable, and appropriate opportunities using approved methods.
Why Lead Source Control Matters
Without clear guidelines on lead sources:
- Time is wasted on low-quality opportunities
- Inconsistent or unapproved communication may occur
- The company’s reputation may be affected
- Leads may enter the system without proper context
Controlled sourcing ensures that:
- Leads are aligned with company capabilities
- Communication remains consistent and professional
- Opportunities are easier to evaluate and manage
Approved Lead Sources
You are authorized to identify and capture leads from the following sources:
1. Inbound Inquiries
These are the most reliable and highest-priority leads.
Examples:
- Website contact forms
- Emails from potential clients
- Direct inquiries from organizations
Why they matter:
- The client has already expressed interest
- There is a defined need or request
- These leads are typically higher quality
2. Referrals
Leads provided by:
- Existing clients
- Business partners
- Professional networks
Why they matter:
- Often comes with some level of trust
- More likely to convert into viable opportunities
- May require less initial validation
3. Event Listings and Public Opportunities
You may identify potential opportunities by reviewing:
- Event platforms (e.g., Eventbrite)
- Convention center schedules
- Venue calendars
- Public event announcements
Why they matter:
- Indicate the upcoming demand for security services
- Provide early visibility into potential opportunities
4. Existing Client Expansion Opportunities
Current clients may have additional or recurring needs.
Examples:
- New events
- Expanded coverage
- Additional locations
Why they matter:
- Existing relationship reduces risk
- Higher likelihood of repeat business
Restricted or Controlled Sources
The following activities are not permitted without approval:
1. Cold Outreach
Examples:
- Calling businesses
- Sending unsolicited emails
- Messaging organizations without prior contact
2. Direct Pitching
Examples:
- Offering services proactively
- Attempting to sell or position services
- Sending proposals without a request
3. Social Media Outreach
Examples:
- Direct messaging businesses or event organizers
- Responding publicly with service offers
Key Rule
You are identifying opportunities—not initiating sales conversations.
How to Evaluate a Lead Source
When reviewing a potential source, ask:
- Is this an approved source?
- Is there a clear indication of need?
- Can I gather relevant information from this source?
- Does this align with RSS services?
If the answer is unclear:
Do not proceed—seek clarification
How This Applies to Your Role
Your responsibility is to:
- Monitor approved sources
- Identify potential opportunities
- Capture available information
- Document leads properly
You are not responsible for:
- Reaching out to sell services
- Initiating conversations without approval
- Making commitments on behalf of the company
Common Mistakes to Avoid
- Attempting to generate leads through unapproved methods
- Prioritizing quantity over quality
- Engaging in unauthorized communication
- Misidentifying non-relevant opportunities as leads
Key Takeaway
Lead generation must be controlled, intentional, and aligned with company standards.
By using approved sources, you ensure that:
The business development process stays structured and effective
Opportunities are relevant and usable
Communication remains professional and consistent
