Maes: A Barrel for Every Maes

Maes is described as Belgium’s second most popular beer, and “Maes” is also described as the country’s third most common surname. With the market leader said to be outselling Maes by roughly 4 to 1, the brand looks for leverage where it can actually own something. The name.

So Maes decides to rally the Maes families of Belgium by giving them a free barrel of beer, and turning that offer into a reason to gather, invite, and celebrate publicly.

The mechanism: a surname offer with a social booking loop

Eligible families sign up through a custom Facebook app to claim the barrel. The same flow lets them book a pub for a chosen date and invite friends, so the reward is designed to be shared rather than quietly consumed.

In Belgian FMCG marketing, turning a broad brand problem into a narrow community identity can create disproportionate participation and talk value.

Why this lands

This works because it converts a discount into status. You are not “getting a deal.” You are being singled out because of who you are, and the campaign immediately pushes you into a social moment where other people experience the brand alongside you. The pub booking is the smart part, because it transforms redemption into an event.

Extractable takeaway: If you need advocacy, attach the reward to an identity trigger and force the payoff into a shared setting, so the benefit becomes a gathering people naturally document and retell.

What the brand is really doing

The real question is how a challenger beer brand turns a shared surname into a social growth loop that scales beyond the free barrel itself.

Maes is using a surname as a distribution engine. The name creates a defined audience, the free barrel creates urgency, and the “book a pub and invite friends” flow turns each participant into a micro-host who does recruitment for you.

What to steal from the Maes mechanic

  • Exploit a unique ownership angle. If you can credibly “own” a name, place, ritual, or identifier, build the campaign around that.
  • Design the share into the redemption. Booking a pub and inviting friends is a built-in amplification mechanic.
  • Reward the group, not just the individual. Group rewards create social proof and higher perceived value.
  • Keep eligibility simple. One clear rule beats a complicated promo code maze.

A few fast answers before you act

What is “A barrel for every Maes”?

It’s a promotion that offers a free barrel of Maes beer to people with the surname “Maes,” turning surname identity into a social recruitment mechanic.

How do people redeem the offer?

By signing up through a custom Facebook app that also lets them book a pub date and invite friends.

Why is the pub booking part important?

It converts redemption into an event, which increases sharing, attendance, and the number of people who experience the brand in a social setting.

What problem is this trying to solve?

It’s designed to build advocacy and attention for a challenger brand by mobilising a defined community rather than competing only on mass advertising.

What is the key risk with identity-based offers?

If eligibility or verification feels unfair or confusing, it can backfire. The rule has to be clear, and the experience needs to feel welcoming rather than exclusionary.

Febelfin: Amazing Mind Reader Reveals His Gift

Febelfin, the Belgian federation for the financial sector, launched a campaign urging people in Belgium to be vigilant about what they make available online. To drive the message home, they recruited Dave, an extremely gifted “clairvoyant” who appears to read strangers with uncanny accuracy.

Dave showcases his talent to a random sample of people. Just when they start to believe in his gift, the magic behind the magic is revealed.

The trick that makes the “mind reading” believable

The mechanism is a classic reveal structure. First, you watch a performer deliver personal details that feel impossible to know. Then you discover the method: the information is assembled from what people have already left exposed online, and fed to the performer in real time. The stunt lands because it starts as wonder and ends as discomfort.

In consumer cybersecurity awareness campaigns, showing how easily public traces can be stitched into a personal profile is often more persuasive than abstract warnings.

Why it lands

This works because it makes the risk feel immediate and personal. The audience is not asked to imagine a faceless threat. They watch real people realize that a stranger can infer and retrieve sensitive details from what is already searchable, shareable, and often forgotten.

Extractable takeaway: If you turn an invisible risk into a visible demonstration that feels “too accurate to be safe”, you shift behavior faster. People do not remember the warning line. They remember the moment they felt exposed.

The intent behind the stunt

The campaign is not really about a performer. It is about reframing online sharing as a security decision. The real question is how to make careless public sharing feel risky enough that people actually change their settings and habits.

By revealing the method, the story pivots from “psychic” to “preventable”, and the viewer is left with a clear implication: tighten what you publish, and you reduce what can be weaponized.

What privacy-awareness teams can borrow

  • Lead with a believable scenario: start in a world viewers accept, then escalate into the lesson.
  • Make the reveal educational: do not only shock. Show the method so people understand what to change.
  • Use real reactions as proof: authentic discomfort is more convincing than any statistic.
  • Keep the message singular: one risk, one demonstration, one behavior change.
  • End with control: the viewer should feel “I can prevent this” rather than “this is inevitable”.

A few fast answers before you act

What is Febelfin’s “Amazing Mind Reader” video?

It is a hidden-camera awareness film where a “clairvoyant” appears to know intimate details about strangers, then reveals that the information was gathered from what they have available online.

What is the campaign trying to teach?

That personal data leakage is often self-inflicted through oversharing, weak privacy settings, and public profiles. The “magic” is the internet.

Why use a mind reader premise?

Because it creates instant attention and a clean reveal. The viewer first experiences surprise, then realizes the risk is real and avoidable.

Is this about online banking only?

It is framed by the financial sector, but the lesson applies broadly: anything public or easily discoverable can be combined into a usable profile by bad actors.

What is the biggest risk in copying this format?

If the reveal feels manipulative or too invasive, the audience can reject the message. The best executions shock first, then immediately teach and restore a sense of control.

Recruitment: Pirates and Cyber Warriors

Since 2010 I have covered how different agencies around the world have been innovating with their recruitment campaigns. Now here are the latest two to join the list.

Two modern filters for hard-to-hire talent

Both ideas avoid broad “we’re hiring” noise. Instead, they place the offer inside the candidate’s real behavior, then use a simple mechanism to separate curiosity from capability.

The better recruitment move is to screen for behavior before you screen for polish.

The real question is not how to attract more applicants, but how to surface people whose behavior already matches the role.

Pirate Recruitment

Young web designers often need expensive application suites to create, and many end up downloading them from illegal pirate websites. Ogilvy Brussels uses that insight by uploading a file that appears to be the “wanted” application suite.

When designers download it, they do not find the software. They find a stronger offer: a job opportunity, delivered right inside the moment of intent.

In competitive digital talent markets, the hardest problem is not reach but signal.

Why this one works

The delivery is the targeting. If you are not the kind of person who looks for pro tools, you never see it. If you are, the offer lands as a wink that proves the agency understands your world. Because the message appears inside a live tool-search moment, it feels relevant instead of interruptive.

Extractable takeaway: Put the offer where the target audience already goes to solve a real problem. The closer your message sits to a “work moment”, the higher the relevance and the lower the waste.

Cyber Warriors Challenge

Wieden+Kennedy wants to recruit community managers for its client Old Spice, so it creates a deliberately crazy set of challenges. Candidates get five days to complete one or more tasks and submit proof of their exploits.

Cyber Warriors Challenge

Why this one works

It forces the right kind of effort. Community management is not just “posting”. It is speed, judgment, creativity, and resilience under ambiguity. A challenge-based entry filters for people who can actually do the work, not just describe it.

A small, time-boxed demonstration of the craft makes the screening signal stronger than a generic application form.

What to steal for your own recruitment

  • Recruit inside real behavior: distribute where the audience already acts, not where recruiters usually post.
  • Make the first step self-selecting: the wrong candidates should bounce naturally.
  • Keep the proof simple: “show me” beats “tell me”, but it has to be feasible in limited time.
  • Respect the audience: clever targeting works when it feels insightful, not exploitative.
  • Optimize for quality, not volume: fewer applicants can be a feature if they are better matched.

A few fast answers before you act

What is “pirate recruitment” in one line?

A job offer is packaged as a fake software download on pirate sites, so the right web designers discover the recruitment message at the moment they search for pro tools.

What is the Cyber Warriors Challenge?

A time-boxed set of tasks used as a screening step to recruit Old Spice community managers by requiring candidates to submit proof of real-world exploits.

Why do these tactics outperform standard job ads?

They target behavior, not demographics. Both approaches reach people in-context and require a small demonstration of motivation or capability.

What is the biggest risk when copying these ideas?

Trust and ethics. If the tactic feels deceptive, unsafe, or disrespectful to the audience, it can damage the employer brand faster than it attracts applicants.

How do you measure success?

Not by raw applicant volume. Track qualified applicants, interview-to-offer ratio, time-to-hire, and early performance or retention of hires sourced through the mechanic.