There are so many amazing MSP events and conferences to attend. But events can be quite overwhelming, especially the larger ones, where thousands of other MSPs and IT professionals are competing for the same clients and territory. It’s easy to get lost in all of the noise, unless you have a plan.
Hopefully, your calendars are fully booked with meetings in advance. But don’t stress, if they’re not. We’ve curated a list of 5 creative networking techniques to help you cut through the noise, build more meaningful relationships, and turn random encounters into lasting business opportunities. Ready? Let’s plan for success.
Technique #1: The 404 Approach
Print small signs that say “404: Meeting Not Found” and place them along rows of empty chairs, food tables, or random spots throughout the venue with a QR code. Not only is this creative and unique, but it’s also a great way to boost personal brand awareness.
When people scan the QR code, direct them to a personalized landing page with a funny and convincing message that would entice a potential prospect to book a 15-minute meeting. Don’t just direct them to your LinkedIn profile; give them a memorable experience.
Add a calendar link right below with a call to action like:
“Let’s turn this 404 into a 1:1.”
Be creative. Look outside of your industry for more inspiration.
This technique will help you draw attention and stand out.
Technique #2: The YouTube Interview Method
You don’t need to be a mega YouTube celebrity or drag heavy cameras and equipment to conduct 2-minute interviews. Your phone is good enough, and it’s spontaneous. Ask your prospects questions about their current tech stack and what they love or hate about it. Ask a question about MSP pricing, and what they would do if budget weren’t a barrier, or which tools they are desperately trying to replace.
Both questions bring you closer to understanding their unique pain points, and by default, position you as someone who listens before pitching solutions.
If you conduct these short interviews for 30 minutes, you’ll have plenty of interested prospects in the pipeline to follow up with after the conference.
And speaking of YouTube, here are 11 Valuable YouTube Channels Every MSP Must Follow for tips on pricing strategies, professional reviews of cybersecurity tools, and how to sell your services like a pro.
IMPORTANT NOTE: Always ask the people you plan on filming for permission, and be respectful if they say no.
Technique #3: The Charging Station Chillout
Charging stations are the unofficial networking lounges of conferences. This is where you can introduce yourself, spark casual conversations, and connect with prospects while their phones are charging.
The person’s battery may only be 17% charged, so you’ll have plenty of time to make a strong impression and possibly continue the chat over a scheduled meeting later.
Want to know what else you can discuss? Whether they have strong endpoint security and device posture as charging stations with open Wi-Fi are prime targets for malicious actors who could be nearby, silently launching a calculated Man-in-the-Middle (MiTM) attack as you exchange LinkedIn details or use a calendar app to schedule a meeting for later on.
Ask if they have any strategies in place to protect devices when they’re on public networks, like the one you’re both recharging your phones at. If they answer “yes”, follow up with whether third parties they work with share the same security protocols, especially when accessing sensitive data remotely. Make a joke about it to help the conversation flow and lighten the mood.
Technique #4: The Escalator Pitch
What can you say in under a minute? A lot.
Use a 30-second pitch as you ride the escalators. Keep it short, to the point, and ask open-ended questions. Do not pitch your services. Focus on what they’re looking forward to seeing at the event, but make sure you ask them a question that will pique their curiosity.
Tell them about an interesting and exploding thread you came across on a particular Subreddit, and get their thoughts on the subject. You can do this within 15 seconds or less. Let them know you’d be happy to carry the conversation later on, and actually follow up. Don’t make the mistake of not following up, because that brief but valuable moment will disappear just as fast as it happened.
By the end of the day, people can barely remember who they had lunch with, let alone a 15-second chat by the escalator. Follow up. Some of the best connections and closed deals happen between floors and in the hallways, not in the meeting rooms or event floors.
Technique #5: The Keynote Speed Date
Keynote sessions are a big part of conferences. Not only are they valuable for insightful takeaways, they are also perfect opportunities to network with potential prospects.
Arrive early, and start talking with people around you. Take down their details before the session begins and ask them their thoughts on the topic of the session. Once again, your key objective is not to sell them anything, but to uncover any challenges they face related to the topic.
AI is a huge topic, and typically the focal point of many keynotes nowadays. Take the opportunity to ask potential clients how they use Gen AI tools in their organizations, such as with help desks, ticketing, or user provisioning. Ask how many employees they manage to get a sense of the organization’s type and scale. Once again, do not sell your services.
Your goal is to build meaningful conversations before the speakers take the stage, and aim for meetings or dinners after the conference has ended.
There you have it. 5 creative and unique ways to book more meetings with potential clients and get the most out of your conference experiences.
And speaking of meaningful conversations, the Guardz team will be at IT Nation Secure 2025, from June 2-4 at the Gaylord Palms Resort & Convention Center in beautiful Orlando, Florida.
Make sure you stop by Booth #504 and say hello.
- Share On:
Written by
Jordan is a Cybersecurity Content Creator and community builder. He has written for many cybersecurity companies and knows more stats about a data breach than IBM.