This document provides an overview of growth hacking strategies presented by Dmytro Voloshyn. It discusses identifying existing strengths, experimenting, leveraging analytics to track goals, and working on things that matter. Specific tactics covered include SEO, email marketing, PPC, social media, viral growth, API integrations, and guerrilla marketing. Tools are recommended for each channel. The presentation aims to introduce growth hacking processes and techniques for scaling startups.
2. ABOUT ME
0. Programmer 5+ years
1. Marketing manager in AB-InBev 2+ years
2. Consulting projects, outsource, sales 2+ years
3. CMO & CTO at Preply, growthhacker, 3+ years
and now
27. SEO 2015
1. Moving from keyword matching to topic
association
2. Domain-level keyword connections are on the rise
3. Google's crackdown on spam is basically a
crackdown on ranking without brand
4. Critical SEO data still flows for the 1%, but is
unavailable to the 99%
5. Even great content benefits from paid
amplification
Credits to Rand Fishkin from moz.xom
28. SEO ADVICES
1. Automated processes
2. Fake it until you make it (if it is legal:)
3. Define your threshold between black & white
4. Review your pages with tech. seo expert
5. Go mobile!
49. PPC - STRATEGY
1. Business model competition
2. Learn ad platform in deep, use extensions
3. Fit landings to channels, align messages
4. Remember about cohorts
5. Always test
54. PPC LANDING PAGES
1. Single CTA
2. Limited navigation
3. Align messages with ad copy with KW insertion
4. Work with objections
5. Length proportional to info user already knows
55. PPC REMARKETING
Try to be bigger, build brand awareness with worst banner ever)
65. VIRAL STRATEGY
1. Correlate value with perceived effort.
2. Do not think about virality until your product sucks
3. Mechanics / Touch points / Incentives
68. VIRAL K-FACTOR
Given a customer base (C), number of invites sent (S) and % of invites
accepted (A), K is calculated as (S x A) / C. If K is lower than 1 then
your user acquisition is decreasing exponentially, a value of 1 implies
steady state and K of greater than 1 indicates exponential user
acquisition.
85. API POSTING ANTI-SPAM
Checking for duplicate submissions(shingles,
hash).
Blocking excessive posts from a single IP
address(use VPN).
Requiring users to register with a valid email
address or phone(next slide)
Using a CAPTCHA to stop automated posting
tools.
Letting users flag postings they recognize as spam.
Bayesian filters