FedSavvy Logo 2019 RGB
  • Home
  • Why Us
    • Founder’s Philosophy
    • About the Founder
    • About The Team
    • Meet The Team
    • Join The Team
    • In the Media
  • Services
    • Black Hat Review Sessions
    • Capture Support and Competitive Intelligence
    • Battle Cards
    • Rapid CI™
    • Agency Evaluation Trend Analysis
    • Market Intelligence and Account Planning
    • Stand-Up Your Market and Competitive Intelligence Function
  • Blog
  • Shop
  • Login | Signup
  • Contact Us
Product was added to your cart

Cart

Capture Essentials: Black Hat Review Session

October 4, 2012Fedsavvy Strategies4 commentsAdmin@fedsavvy

Many of you know what a Black Hat Review Session is (Black Hat for short) or a least one of the countless variations. Many more of you have heard of the term, but you don’t necessarily know what it really is and what the point is. Perhaps this blog post will sharpen the pencil for some of the Black Hat savvy people and educate others who wonder what a Black Hat is.

First things first, Black Hats are not short meetings of a bunch of guys sitting around a table also known as BOGSAT talking about things they’ve heard. While BOGSAT might be useful for catching up on news or otherwise generating a few ideas, a BOGSAT session is only as useful as the classic water cooler talks you may see in your office. Black Hats are – at their core – business war gaming sessions. You’re engaged in competition to win business whether it is management consulting services, IT services, sales of technology, whatever.

What’s the bottom line? The objective of a Black Hat is to give the capture team much better insight into probable opposing win strategies thereby allowing the capture team’s strategy to adjust and ultimately a better chance to prevail.

I am not advocating Black Hats for every capture. Black Hats are very demanding to do effectively. Consider the use of a Black Hat if you have a capture effort that is a major re-compete, a significant stretch target or a very large capture compared to your overall business.

As is the case with any exercise the Black Hat must be well planned in order to succeed. Let’s review some important planning and preparatory steps to make the Black Hat a success.

It’s all about the people. First and foremost is who you engage to participate in the Black Hat. Exercising a careful selection process can make or break a Black Hat from the start. This may seem obvious, but the participants must have one or more of the following attributes to be effective in a Black Hat.

  • Knowledge of the competitor being examined
  • Knowledge of the buying customer
  • Experience running and winning captures
  • Sound technical knowledge relevant to the opportunity in question
  • Experience participating in Black Hat Review Sessions

Admittedly, this may sound like a MOTO series of criteria, but all too often I’ve been asked to include someone with dubious value to the Black Hat. There are few (if any) people that add value to any given Black Hat. Is there ever a single person who is also the best person any job? No. People with something to offer are key to winning. Not everyone is a good fit for every job and every instance.

Who’s on first? Don’t just unceremoniously assign people to teams without some structure. Give them some roles relevant to why you picked them in the first place. At a minimum select a team lead. The team lead should be the person with the overall best relevant knowledge to the capture effort or at least the best experience to run a Black Hat team.

Who is going to eat your lunch? It is imperative to spend time and effort to research and analyze the strengths, weaknesses and possible strategies that may be engaged by all of the most credible competitors before you start the session itself. There may be some people out there that are positively brilliant and they can develop creative and plausible win strategies in the blink of an eye without the slightest bit of preparation. However, the rest of us mere mortals have to work at this and work hard.

If you’ve read any of my earlier blog postings you’ll note that I always emphasize to do your homework. Admittedly, I was the geeky kid in school who did his homework (OK, maybe during the lunch period, but it did get done). Time invested in knowing your competition actually pays off. If you think you know everything there is to know about a competitor you’re wrong. Check hubris at the door. Assume that even companies you worked for before – even a short while before the Black Hat – have capabilities and experience you don’t know. Do your homework.

Provided you really do know the most likely and credible competition (getting here is another topic entirely, but let’s assume you know it for now) take some time to build a competitor profile. This is not a copy-paste exercise from the company website. Does any company do a great job of both updating their website with relevant information or broadcast everything that they do right now? Further, websites are merely an extension of a marketing communications effort. They often tell stories about what the company wants to do as much as what they actually do. Dig into a company. Dig deep. What do they have that might be brought to bear to win? Who do they have that might be utilized to win? Think. Write it down. This helps everyone.

Get the gang together. Have 1-2 pre-Black Hat preparatory teleconferences for 30 minutes. Even some basic work before you start the session itself will enable success. If nothing else the short conversations will spark ideas and build rapport before the session starts. I’ve never seen a Black Hat team come together successfully without some good preparation. Good teams build on each other’s strengths and ideas. Harness that power.

No doubt that this blog post doesn’t do the Black Hat process justice. However, maybe this helped you think about it some more or it merely confirmed what you already know. In either case…

Stay focused. Do your capture homework. There are some great opportunities out there. Good hunting!

© FedSavvy Strategies and FedSavvy Strategies blog, 2012-2018. Unauthorized use and/or duplication of this material without express and written permission from this blog’s author and/or owner is strictly prohibited. Excerpts and links may be used, provided that full and clear credit is given to FedSavvy Strategies and FedSavvy Strategies blog with appropriate and specific direction to the original content.

Tags: black hat, capture, competitive intelligence, market intelligence

Related Articles

Guidelines for Assessing Competitor Capabilities

September 10, 2020Admin@fedsavvy

Fundamentals of the Intelligence Process and Competitive Intelligence in GOVCON

February 9, 2021Admin@fedsavvy

Palantir…is the big data boogeyman coming into your market?

November 22, 2022Admin@fedsavvy

4 comments. Leave new

How to focus your black hat review
February 28, 2018 3:13 am

[…] (If you would like a more expansive exploration of these basics, check out a blast-from-the-past post on the topic at the FedSavvy Strategies blog: “Capture Essentials: Black Hat Review Session.”) […]

Reply
How to conduct a competitive-environment scan
April 9, 2018 6:39 am

[…] basics, check out a blast-from-the-past post on the topic at the FedSavvy Strategies’ blog: “Capture Essentials: Black Hat Review Session” or the more recent blog: “How to Focus Your Black Hat Review.” If you need assistance in […]

Reply
A page from the facilitator’s playbook – traps to avoid in working with teams
September 6, 2018 1:04 pm

[…] to help them understand their competitors.  Anytime you facilitate a complex event such as a Black Hat review, you have to be wary of common traps to which your participants (and you) can fall victim.  When […]

Reply
Assessing a contract opportunity with Porter’s Five Forces model
March 17, 2020 8:05 am

[…] circle in Figure 1, Industry Rivalry, is what we typically assess in a competitive analysis and Black Hat review – the “who’s who” for a particular opportunity, influenced by factors such as the customer […]

Reply

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Recent Posts

  • Deadly Sins: Ignorance is not bliss and your past does not govern your future
  • Shining some light on By Light IT Professional Services
  • Deadly Sins in Proposals: Adventures in Trick Plays
  • Palantir…is the big data boogeyman coming into your market?
  • Is Leidos eating your candy?

Savvy Source signup form!

Do you love #GOVCON market and competitive intelligence topics?  Sign up for our monthly newsletter...the Savvy Source!

Subscribing to Savvy Source magic...

Thank you for signing up for the Savvy Source!  

Tags

accenture alion AT&T black hat Booz Allen Hamilton business development process capture CIO-SP3 Collection competitive analysis competitiveintelligence competitive intelligence competitor federal contracting GDIT govcon HII leidos ManTech market analysis market intelligence mergers and acquisitions mindmapping Modeling northrop grumman Opportunity opportunity to watch palantir Peraton Perspecta production raytheon SAIC strategy top govcon top govcon competitors USAID washington technology win-loss

Quick Menu

  • Home
  • Why Us
  • Services
  • Blog
  • Terms and Conditions
  • Privacy Policy
  • Contact Us

Quick Links

  • Home
  • Why Us
  • Services
  • Blog
  • Terms and Conditions
  • Privacy Policy
  • Contact Us
Fed Savvy Strategies Logo
Signup for Our Newsletter »

Contact Us

1751 Pinnacle Drive, Suite 600
McLean, Virginia 22102

Contact Us

© FedSavvy Strategies 2012-2021. Unauthorized use and/or duplication of this material without express and written permission from FedSavvy Strategies is strictly prohibited.
Designed by DOTLINE