As the vender’s sales rep launched into his pitch, each of the five decision-makers was holding the same glossy brochure for a new IoT #patient_monitoring_system. All five heard the same presentation. With the same $2 million price tag.
But there were five completely different reactions.
The vendor's sales rep continued with, "Our cloud-native architecture leverages edge computing to deliver real-time analytics through secure API endpoints..."
Dr. Sarah Martinez, the cardiac surgeon, checked her phone.
Tom Chen, the IT Director, started scribbling notes that looked more like battle plans.
CFO Jennifer Walsh pulled out her calculator.
Compliance Officer Mike Rodriguez began flipping through regulation manuals.
Hospital Administrator Lisa Thompson just looked confused.
But they all shared one unspoken fear: "Will this prevent or enable a ransomware attack on our network?"
By the end of the presentation, they had five different concerns about the exact same device—plus one universal anxiety about cybersecurity.
The decision was postponed that particular day—and possibly a deal with that vendor died altogether. Not because the technology was wrong, but because nobody understood how it solved their specific problems or protected against their shared nightmare.
Here's what each person heard, what they understood, and what they actually needed to know.
The Universal Fear: "Will This Enable a Ransomware Attack?"
Before diving into each audience's specific concerns, there was one question everybody had but nobody wanted to ask out loud: "Is this device going to be our next security vulnerability?"
Recent headlines about hospital ransomware attacks have made everyone paranoid. Every new connected device looks like a potential entry point for hackers. This fear sits underneath every other concern.
They didn’t fear only network attacks. They had all heard stories that “anyone” could infect a single medical devise, by inserting an errant thumb drive into an unprotected USB port. The virus then later spreads over the network. They didn’t know how it worked, or how to protect against it, so they feared it.
The Security Anxiety Behind Each Role:
- Surgeon: "Will I lose access to patient data mid-surgery?"
- IT Director: "Will this be the tech that brings down our network?"
- CFO: "Will we be paying ransom AND buying this device?"
- Compliance: "Will this be our HIPAA violation?"
- Administrator: "Will this make us the next hospital in the news?"
The Universal Message They Needed: "This system actually reduces your ransomware risk. It monitors network traffic for unusual patterns, isolates suspicious activity and devices, and provides secure backup data storage. Instead of creating a vulnerability, it becomes part of your defense."
Now, let's look at what each audience member specifically needed to hear:
Audience #1: The Surgeon - "Will This Help Me Save Lives?"
What Dr. Martinez Heard: "Cloud-native architecture with edge computing delivers real-time analytics through secure API endpoints with 99.9% uptime and seamless integration..."
What She Understood: "Blah blah technology blah blah computer stuff blah blah..."
What She Actually Needed to Hear: "Doctor, you'll know if your patient's condition changes 3 minutes sooner. In cardiac surgery, that's the difference between a routine procedure and an emergency. The system watches 12 vital signs simultaneously and alerts you before your patient shows visible symptoms."
The Surgeon's Real Questions:
- Will this actually improve patient outcomes?
- Will it give me false alarms that waste my time?
- Can I trust it during a critical procedure?
- Will it slow me down or help me work faster?
Audience #2: The IT Director - "Will This Break My Network?"
What Tom Chen Heard: "Cloud-native architecture with edge computing..."
What He Understood: "Oh no. Another vendor who thinks 'cloud' means 'someone else's problem.' They want to put medical devices on my network without understanding my security requirements."
What He Actually Needed to Hear: "Tom, this system runs locally in your data center. It doesn't send patient data to the cloud. The 'edge computing' means processing happens right here, in your controlled environment. It talks to your existing systems through standard protocols you already secure. And when it needs updates, you control when and how that happens."
The IT Director's Real Questions:
- Will this create new security vulnerabilities?
- How much bandwidth will it consume?
- What happens when the internet goes down?
- Who's responsible when something breaks?
- Will this work with our existing systems?
Audience #3: The CFO - "Will This Pay for Itself?"
What Jennifer Walsh Heard: "$2 million investment in IoT patient monitoring with cloud-native architecture..."
What She Understood: "Expensive technology purchase with unclear ROI and ongoing cloud costs."
What She Actually Needed to Hear: "Jennifer, this system will reduce your average length of stay by 0.8 days per patient. With 5,000 monitored patients annually, that's 4,000 bed-days freed up. At $2,100 per bed-day, you're looking at $8.4 million in additional revenue capacity. The system pays for itself in 4.3 months."
The CFO's Real Questions:
- What's the total cost of ownership?
- How quickly will we see ROI?
- What are the ongoing operational costs?
- What happens to our budget if this fails?
- Can we afford NOT to do this?
Audience #4: The Compliance Officer - "Will This Get Us in Trouble?"
What Mike Rodriguez Heard: "IoT devices with cloud connectivity and API endpoints..."
What He Understood: "New ways for us to accidentally violate HIPAA, FDA regulations, and state privacy laws."
What He Actually Needed to Hear: "Mike, this system is designed for HIPAA compliance from the ground up. All data stays within your network perimeter. The FDA cleared it under 510(k) pathway. It includes audit trails for every access and action. We've mapped every feature to relevant regulations and can show you exactly how it meets your compliance requirements."
The Compliance Officer's Real Questions:
- Does this meet HIPAA requirements?
- What's the FDA status?
- How do we audit this system?
- What happens if there's a data breach?
- Will this create new compliance risks?
Audience #5: The Hospital Administrator - "Will This Make Us Look Good?"
What Lisa Thompson Heard: "Advanced IoT technology with cloud-native architecture..."
What She Understood: "Complicated technology that might impress some people but could also create problems I'll have to explain to the board."
What She Actually Needed to Hear: "Lisa, this positions Regional Medical Center as the most advanced cardiac care facility in the region. When patients research hospitals, they'll see that you use the same monitoring technology as Mayo Clinic and Johns Hopkins. This isn't just about better care—it's about market positioning and patient attraction."
The Administrator's Real Questions:
- Will this improve our reputation?
- How do we communicate this to patients and families?
- What happens if this makes us look less competent?
- Will this help us compete with other hospitals?
- Can we use this in our marketing?
The Cloud-to-IoT Challenge
Here's why this pitch almost failed: The vendor used "cloud-first" messaging for an IoT medical device. And, healthcare IoT is different from consumer IoT.
Cloud Messaging:
- "Everything in the cloud"
- "Access from anywhere"
- "Automatic updates"
- "Unlimited scalability"
New IoT Reality:
- Patient data must stay local
- Access must be controlled
- Updates must be validated
- Scale is limited and predictable
The Translation Challenge:
- Edge computing = Local processing power
- Hybrid architecture = Best of both worlds
- Real-time analytics = Immediate answers
- Secure API endpoints = Safe data sharing
- Zero Trust Architecture = no individual device is trusted until validated
The Solution: One Device, Five Stories
The same IoT patient monitoring system became five different value propositions:
For the Surgeon: "Earlier detection, better outcomes"
For IT: "Local processing, full control"
For Finance: "4.3-month payback, $8.4M revenue impact"
For Compliance: "HIPAA-compliant, FDA-cleared, audit-ready"
For Administration: "Competitive advantage, market positioning"
Same device. Same capabilities. Five completely different stories.
However, this vendor’s sales rep made the mistake of being too technical for his audience. He failed to address each one’s specific concerns in a way they understood, so he didn’t write a contract with them. No sale today.
Without their specific concerns addressed, each of the five decision-makers decided to postpone any decision about this new tech acquisition for another time. And because the rep didn’t “strike while the iron is hot,” their excitement will be dwindled somewhat. Any future presentations by this vendor will be working against headwinds from now on. And, another vendor could easily swoop in and make the sale by addressing the right concerns. And, in fact, that is exactly what happened. Even if the tech from this company was better.
The image in the painting of the Endowment Founder has seen this bit before. He just sighed. “These people don’t understand how to relate to each other,” he muttered.
The Bottom Line
Medical device sales fail when vendors assume one presentation fits all audiences. Surgeons don't care about API endpoints. IT directors don't care about clinical outcomes. CFOs don't care about cloud architecture.
But they all care about the same device—when you explain it in their language. Each audience member needs to get the right info, in a way that they understand.
The companies that win big contracts understand this. They know that selling medical devices isn't about having the best technology. It's about having the best translation.
That’s why you need the Renaissance Copywriter, to address the concerns of every member on the buyer’s team.
In order to contact me to discuss how I can help you with your project, and to get on my calendar, you can contact me by clicking the button below and fill out the form. Or you can visit my LinkedIn profile (https://www.linkedin.com/in/jeff-jackson-medical-ghostwriter) and book a phone call or Zoom session. Simply click the button on my profile ("Book a Call") and in the message field, specify that you'd prefer a Zoom call (the default is a 30-minute telephone call).
← Contact me here!