SlideShare ist ein Scribd-Unternehmen logo
1 von 22
The Risky Business of Social Media Tom Snyder Trivera Interactive Contents Copyright © 2011 Trivera Interactive and ISACA
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
I’m the guy who convinces your marketing people to do all the Social Media stuff that turns the IT, IS, Security, Legal and HR people into this:
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Social Media Usage
95%  of social media users now use it for  business reasons 61%  use public social media sites like LinkedIn, Twitter, Facebook, and YouTube  every day  (up from 51% in 2008). 15%  use these sites  "constantly throughout the day. 56%  work for companies that have  no policies  that cover use  at work  and  outside work Social Media Usage
 
76%  of companies now use Social Media  for business purposes 43%  have experienced  employee misuse 31%  have  disciplined  employees for misuse 29%   block  employee access 27%   monitor  employee use 25%   ban  use for non-business purposes Social Media Usage
The Old Paradigm
The New Paradigm
[object Object],[object Object],[object Object],[object Object],[object Object],Risks for Business
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Risks for Business
[object Object],[object Object],[object Object],[object Object],[object Object],Risks for Business
Tactics  without  strategy  is the  noise before defeat Strategy  without  tactics is the  slowest route to victory -Sun Tzu Addressing Risk
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Addressing Risk
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Addressing Risk
Mitigating Risk Threats and Vulnerabilities Risks Risk Mitigation Techniques Introduction of viruses and malware to the organizational network ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Exposure to customers and the enterprise through a fraudulent or hijacked corporate presence ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Mitigating Risk Threats and Vulnerabilities Risks Risk Mitigation Techniques Unclear or undefined content rights to information posted to social media sites ,[object Object],[object Object],[object Object],[object Object],A move to a digital business model may increase customer service expectations ,[object Object],[object Object],[object Object],Mismanagement of electronic communications that may be impacted by retention regulations or e-discovery ,[object Object],[object Object],[object Object],[object Object]
Mitigating Risk Threats and Vulnerabilities Risks Risk Mitigation Techniques Use of personal accounts to communicate work-related information ,[object Object],[object Object],[object Object],[object Object],[object Object],Employee posts that link them to the enterprise ,[object Object],[object Object],[object Object],Excessive employee use of social media in the workplace ,[object Object],[object Object],[object Object],[object Object],Employee access to social media via enterprise-supplied mobile devices.  ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Social Media Audit/Assurance ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Resources and References ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
 
Tom Snyder [email_address]   http://www.triveraguy.com Trivera Interactive http://www.trivera.com   ISACA http:// www.isaca.org/socialmedia   Contents Copyright © 2011 Trivera Interactive and ISACA

Weitere ähnliche Inhalte

Was ist angesagt?

Índice de software sin licencia en el mundo.
Índice de software sin licencia en el mundo. Índice de software sin licencia en el mundo.
Índice de software sin licencia en el mundo. Luis Noguera
 
11 Reasons Why Your Company Could Be In Danger
11 Reasons Why Your Company Could Be In Danger11 Reasons Why Your Company Could Be In Danger
11 Reasons Why Your Company Could Be In DangerCopper Mobile, Inc.
 
Wiretap 5-collaboration-security-risks-revealed
Wiretap 5-collaboration-security-risks-revealedWiretap 5-collaboration-security-risks-revealed
Wiretap 5-collaboration-security-risks-revealedBritt Newton
 
Unisys Security Insights Infographic: Global
Unisys Security Insights Infographic: GlobalUnisys Security Insights Infographic: Global
Unisys Security Insights Infographic: GlobalUnisys Corporation
 
Data Protection Maturity Survey Results 2013
Data Protection Maturity Survey Results 2013 Data Protection Maturity Survey Results 2013
Data Protection Maturity Survey Results 2013 - Mark - Fullbright
 
Governing Social Media
Governing Social MediaGoverning Social Media
Governing Social MediaDoug Cornelius
 
Norton Mobile Apps Survey Report
Norton Mobile Apps Survey ReportNorton Mobile Apps Survey Report
Norton Mobile Apps Survey ReportSymantec
 
Intralinks Ponemon Research Report | Breaking Bad: The Risk of Unsecure File...
Intralinks Ponemon Research Report | Breaking Bad: The Risk of Unsecure File...Intralinks Ponemon Research Report | Breaking Bad: The Risk of Unsecure File...
Intralinks Ponemon Research Report | Breaking Bad: The Risk of Unsecure File...Melissa Luongo
 
Is Your Company Ready for a Big Data Breach?
Is Your Company Ready for a Big Data Breach?Is Your Company Ready for a Big Data Breach?
Is Your Company Ready for a Big Data Breach?- Mark - Fullbright
 
Student Mobile Workspaces
Student Mobile WorkspacesStudent Mobile Workspaces
Student Mobile WorkspacesCitrix
 
2013-ISC2-Global-Information-Security-Workforce-Study
2013-ISC2-Global-Information-Security-Workforce-Study2013-ISC2-Global-Information-Security-Workforce-Study
2013-ISC2-Global-Information-Security-Workforce-StudyTam Nguyen
 
Prof m01-2013 global information security workforce study - final
Prof m01-2013 global information security workforce study - finalProf m01-2013 global information security workforce study - final
Prof m01-2013 global information security workforce study - finalSelectedPresentations
 
Digital Generation: Security Infographic
Digital Generation: Security InfographicDigital Generation: Security Infographic
Digital Generation: Security InfographicUnisys Corporation
 
Apperian 2017 Executive Enterprise Mobility Report
Apperian 2017 Executive Enterprise Mobility ReportApperian 2017 Executive Enterprise Mobility Report
Apperian 2017 Executive Enterprise Mobility ReportJennifer Walker
 
Apperian 2016 Executive Enterprise Mobility Report_FINAL_20160217
Apperian 2016 Executive Enterprise Mobility Report_FINAL_20160217Apperian 2016 Executive Enterprise Mobility Report_FINAL_20160217
Apperian 2016 Executive Enterprise Mobility Report_FINAL_20160217Sophie Jasson-Holt
 
Apperian 2015 Executive Enterprise Mobility Survey
Apperian 2015 Executive Enterprise Mobility SurveyApperian 2015 Executive Enterprise Mobility Survey
Apperian 2015 Executive Enterprise Mobility SurveyJennifer Walker
 
Web 2.0 @ Work Survey
Web 2.0 @ Work SurveyWeb 2.0 @ Work Survey
Web 2.0 @ Work SurveyTJ Rains
 

Was ist angesagt? (19)

Índice de software sin licencia en el mundo.
Índice de software sin licencia en el mundo. Índice de software sin licencia en el mundo.
Índice de software sin licencia en el mundo.
 
11 Reasons Why Your Company Could Be In Danger
11 Reasons Why Your Company Could Be In Danger11 Reasons Why Your Company Could Be In Danger
11 Reasons Why Your Company Could Be In Danger
 
Wiretap 5-collaboration-security-risks-revealed
Wiretap 5-collaboration-security-risks-revealedWiretap 5-collaboration-security-risks-revealed
Wiretap 5-collaboration-security-risks-revealed
 
Anti-Malvertising Guidelines
Anti-Malvertising GuidelinesAnti-Malvertising Guidelines
Anti-Malvertising Guidelines
 
Unisys Security Insights Infographic: Global
Unisys Security Insights Infographic: GlobalUnisys Security Insights Infographic: Global
Unisys Security Insights Infographic: Global
 
Data Protection Maturity Survey Results 2013
Data Protection Maturity Survey Results 2013 Data Protection Maturity Survey Results 2013
Data Protection Maturity Survey Results 2013
 
Governing Social Media
Governing Social MediaGoverning Social Media
Governing Social Media
 
Norton Mobile Apps Survey Report
Norton Mobile Apps Survey ReportNorton Mobile Apps Survey Report
Norton Mobile Apps Survey Report
 
CFS November
CFS NovemberCFS November
CFS November
 
Intralinks Ponemon Research Report | Breaking Bad: The Risk of Unsecure File...
Intralinks Ponemon Research Report | Breaking Bad: The Risk of Unsecure File...Intralinks Ponemon Research Report | Breaking Bad: The Risk of Unsecure File...
Intralinks Ponemon Research Report | Breaking Bad: The Risk of Unsecure File...
 
Is Your Company Ready for a Big Data Breach?
Is Your Company Ready for a Big Data Breach?Is Your Company Ready for a Big Data Breach?
Is Your Company Ready for a Big Data Breach?
 
Student Mobile Workspaces
Student Mobile WorkspacesStudent Mobile Workspaces
Student Mobile Workspaces
 
2013-ISC2-Global-Information-Security-Workforce-Study
2013-ISC2-Global-Information-Security-Workforce-Study2013-ISC2-Global-Information-Security-Workforce-Study
2013-ISC2-Global-Information-Security-Workforce-Study
 
Prof m01-2013 global information security workforce study - final
Prof m01-2013 global information security workforce study - finalProf m01-2013 global information security workforce study - final
Prof m01-2013 global information security workforce study - final
 
Digital Generation: Security Infographic
Digital Generation: Security InfographicDigital Generation: Security Infographic
Digital Generation: Security Infographic
 
Apperian 2017 Executive Enterprise Mobility Report
Apperian 2017 Executive Enterprise Mobility ReportApperian 2017 Executive Enterprise Mobility Report
Apperian 2017 Executive Enterprise Mobility Report
 
Apperian 2016 Executive Enterprise Mobility Report_FINAL_20160217
Apperian 2016 Executive Enterprise Mobility Report_FINAL_20160217Apperian 2016 Executive Enterprise Mobility Report_FINAL_20160217
Apperian 2016 Executive Enterprise Mobility Report_FINAL_20160217
 
Apperian 2015 Executive Enterprise Mobility Survey
Apperian 2015 Executive Enterprise Mobility SurveyApperian 2015 Executive Enterprise Mobility Survey
Apperian 2015 Executive Enterprise Mobility Survey
 
Web 2.0 @ Work Survey
Web 2.0 @ Work SurveyWeb 2.0 @ Work Survey
Web 2.0 @ Work Survey
 

Ähnlich wie Risky business of social media

Meraj Ahmad - Information security in a borderless world
Meraj Ahmad - Information security in a borderless worldMeraj Ahmad - Information security in a borderless world
Meraj Ahmad - Information security in a borderless worldnooralmousa
 
Internet & Social Media issues for brand owners
Internet & Social Media issues for brand ownersInternet & Social Media issues for brand owners
Internet & Social Media issues for brand ownersDavid Green
 
Fraud in Social Media: Facing the Growing Threat
Fraud in Social Media: Facing the Growing ThreatFraud in Social Media: Facing the Growing Threat
Fraud in Social Media: Facing the Growing ThreatFraudBusters
 
Social Media
Social MediaSocial Media
Social MediaJ.L+C.L
 
Find the Risk vs. Reward Balance in Social Media
Find the Risk vs. Reward Balance in Social MediaFind the Risk vs. Reward Balance in Social Media
Find the Risk vs. Reward Balance in Social MediaGerardo A Dada
 
Rothke rsa 2012 what happens in vegas goes on youtube using social networks...
Rothke rsa 2012   what happens in vegas goes on youtube using social networks...Rothke rsa 2012   what happens in vegas goes on youtube using social networks...
Rothke rsa 2012 what happens in vegas goes on youtube using social networks...Ben Rothke
 
Creating And Enforcing Anti Malware Practices
Creating And Enforcing Anti Malware PracticesCreating And Enforcing Anti Malware Practices
Creating And Enforcing Anti Malware PracticesDiane M. Metcalf
 
20110720 fose 2011 sm governance
20110720 fose 2011 sm governance20110720 fose 2011 sm governance
20110720 fose 2011 sm governanceJesse Wilkins
 
How Social Media Can Destroy Your Business Model Final
How Social Media Can Destroy Your Business Model FinalHow Social Media Can Destroy Your Business Model Final
How Social Media Can Destroy Your Business Model FinalAnjuan Simmons
 
How Social Media Can Destroy Your Business Model
How Social Media Can Destroy Your Business ModelHow Social Media Can Destroy Your Business Model
How Social Media Can Destroy Your Business ModelKami Watson Huyse, APR
 
Social networking risks
Social networking risksSocial networking risks
Social networking risksPadma Kannan
 
Auditing Social Media SOPAC2013
Auditing Social Media SOPAC2013Auditing Social Media SOPAC2013
Auditing Social Media SOPAC2013KINSHIP digital
 
How to manage and leverage business use of social media platforms
How to manage and leverage business use of social media platformsHow to manage and leverage business use of social media platforms
How to manage and leverage business use of social media platformsSocialengine India
 
It consumerisation presentation
It  consumerisation presentationIt  consumerisation presentation
It consumerisation presentationrevaathey
 
It consumerisation presentation
It  consumerisation presentationIt  consumerisation presentation
It consumerisation presentationrevaathey
 
Web 2.0..Business Friend or Foe?
Web 2.0..Business Friend or Foe?Web 2.0..Business Friend or Foe?
Web 2.0..Business Friend or Foe?Stites & Harbison
 
SMAC - The paradigm shift : Creating future of the Enterprise
SMAC - The paradigm shift : Creating future of the EnterpriseSMAC - The paradigm shift : Creating future of the Enterprise
SMAC - The paradigm shift : Creating future of the EnterpriseNikhil Kulkarni
 
Replies Required for below Posting 1 user security awarene.docx
Replies Required for below  Posting 1  user security awarene.docxReplies Required for below  Posting 1  user security awarene.docx
Replies Required for below Posting 1 user security awarene.docxsodhi3
 

Ähnlich wie Risky business of social media (20)

Social media risks guide
Social media risks guideSocial media risks guide
Social media risks guide
 
Meraj Ahmad - Information security in a borderless world
Meraj Ahmad - Information security in a borderless worldMeraj Ahmad - Information security in a borderless world
Meraj Ahmad - Information security in a borderless world
 
Internet & Social Media issues for brand owners
Internet & Social Media issues for brand ownersInternet & Social Media issues for brand owners
Internet & Social Media issues for brand owners
 
Fraud in Social Media: Facing the Growing Threat
Fraud in Social Media: Facing the Growing ThreatFraud in Social Media: Facing the Growing Threat
Fraud in Social Media: Facing the Growing Threat
 
Social Media
Social MediaSocial Media
Social Media
 
Find the Risk vs. Reward Balance in Social Media
Find the Risk vs. Reward Balance in Social MediaFind the Risk vs. Reward Balance in Social Media
Find the Risk vs. Reward Balance in Social Media
 
Rothke rsa 2012 what happens in vegas goes on youtube using social networks...
Rothke rsa 2012   what happens in vegas goes on youtube using social networks...Rothke rsa 2012   what happens in vegas goes on youtube using social networks...
Rothke rsa 2012 what happens in vegas goes on youtube using social networks...
 
Social Media Policies by Sarah Wallace
Social Media Policies by Sarah WallaceSocial Media Policies by Sarah Wallace
Social Media Policies by Sarah Wallace
 
Creating And Enforcing Anti Malware Practices
Creating And Enforcing Anti Malware PracticesCreating And Enforcing Anti Malware Practices
Creating And Enforcing Anti Malware Practices
 
20110720 fose 2011 sm governance
20110720 fose 2011 sm governance20110720 fose 2011 sm governance
20110720 fose 2011 sm governance
 
How Social Media Can Destroy Your Business Model Final
How Social Media Can Destroy Your Business Model FinalHow Social Media Can Destroy Your Business Model Final
How Social Media Can Destroy Your Business Model Final
 
How Social Media Can Destroy Your Business Model
How Social Media Can Destroy Your Business ModelHow Social Media Can Destroy Your Business Model
How Social Media Can Destroy Your Business Model
 
Social networking risks
Social networking risksSocial networking risks
Social networking risks
 
Auditing Social Media SOPAC2013
Auditing Social Media SOPAC2013Auditing Social Media SOPAC2013
Auditing Social Media SOPAC2013
 
How to manage and leverage business use of social media platforms
How to manage and leverage business use of social media platformsHow to manage and leverage business use of social media platforms
How to manage and leverage business use of social media platforms
 
It consumerisation presentation
It  consumerisation presentationIt  consumerisation presentation
It consumerisation presentation
 
It consumerisation presentation
It  consumerisation presentationIt  consumerisation presentation
It consumerisation presentation
 
Web 2.0..Business Friend or Foe?
Web 2.0..Business Friend or Foe?Web 2.0..Business Friend or Foe?
Web 2.0..Business Friend or Foe?
 
SMAC - The paradigm shift : Creating future of the Enterprise
SMAC - The paradigm shift : Creating future of the EnterpriseSMAC - The paradigm shift : Creating future of the Enterprise
SMAC - The paradigm shift : Creating future of the Enterprise
 
Replies Required for below Posting 1 user security awarene.docx
Replies Required for below  Posting 1  user security awarene.docxReplies Required for below  Posting 1  user security awarene.docx
Replies Required for below Posting 1 user security awarene.docx
 

Mehr von Trivera Interactive

5 Elements of a Successful Social Media Plan
5 Elements of a Successful Social Media Plan5 Elements of a Successful Social Media Plan
5 Elements of a Successful Social Media PlanTrivera Interactive
 
Creating, Maintaining and Executing your Social Media Editorial Calendar
Creating, Maintaining and Executing your Social Media Editorial CalendarCreating, Maintaining and Executing your Social Media Editorial Calendar
Creating, Maintaining and Executing your Social Media Editorial CalendarTrivera Interactive
 
Social Media 5 Years Later: Strategy is Still the Key
Social Media 5 Years Later: Strategy is Still the KeySocial Media 5 Years Later: Strategy is Still the Key
Social Media 5 Years Later: Strategy is Still the KeyTrivera Interactive
 
5 Digital Marketing Mistakes You're Probably Making
5 Digital Marketing Mistakes You're Probably Making5 Digital Marketing Mistakes You're Probably Making
5 Digital Marketing Mistakes You're Probably MakingTrivera Interactive
 
5 Digital Marketing Mistakes You're Probably Making - 2014 BizExpo
5 Digital Marketing Mistakes You're Probably Making - 2014 BizExpo5 Digital Marketing Mistakes You're Probably Making - 2014 BizExpo
5 Digital Marketing Mistakes You're Probably Making - 2014 BizExpoTrivera Interactive
 
Gameplan for Online Marketing: Getting more measurable results from your Onli...
Gameplan for Online Marketing: Getting more measurable results from your Onli...Gameplan for Online Marketing: Getting more measurable results from your Onli...
Gameplan for Online Marketing: Getting more measurable results from your Onli...Trivera Interactive
 
Using Video Marketing in Social Media
Using Video Marketing in Social MediaUsing Video Marketing in Social Media
Using Video Marketing in Social MediaTrivera Interactive
 
What is Social Media and Why Should I Care?
What is Social Media and Why Should I Care?What is Social Media and Why Should I Care?
What is Social Media and Why Should I Care?Trivera Interactive
 
How Social Media Impacts Your SEO
How Social Media Impacts Your SEOHow Social Media Impacts Your SEO
How Social Media Impacts Your SEOTrivera Interactive
 
Your Website - Still the Bullseye
Your Website - Still the BullseyeYour Website - Still the Bullseye
Your Website - Still the BullseyeTrivera Interactive
 
Getting to the Top in Google - Your Blueprint to Search Engine Success
Getting to the Top in Google - Your Blueprint to Search Engine SuccessGetting to the Top in Google - Your Blueprint to Search Engine Success
Getting to the Top in Google - Your Blueprint to Search Engine SuccessTrivera Interactive
 
Twitter: Fun and Games or Powerful Business Tool
Twitter: Fun and Games or Powerful Business ToolTwitter: Fun and Games or Powerful Business Tool
Twitter: Fun and Games or Powerful Business ToolTrivera Interactive
 
Optimizing and Integrating Social Media into your PR
Optimizing and Integrating  Social Media into your PR Optimizing and Integrating  Social Media into your PR
Optimizing and Integrating Social Media into your PR Trivera Interactive
 
Search Optmization: Social Media & Websites
Search Optmization: Social Media & WebsitesSearch Optmization: Social Media & Websites
Search Optmization: Social Media & WebsitesTrivera Interactive
 
Social Media: Fun and Games or Powerful Business Tool
Social Media: Fun and Games or Powerful Business ToolSocial Media: Fun and Games or Powerful Business Tool
Social Media: Fun and Games or Powerful Business ToolTrivera Interactive
 
Time to Jump on the Twitter Bandwagon for Training and Education
Time to Jump on the Twitter Bandwagon for Training and EducationTime to Jump on the Twitter Bandwagon for Training and Education
Time to Jump on the Twitter Bandwagon for Training and EducationTrivera Interactive
 

Mehr von Trivera Interactive (19)

5 Elements of a Successful Social Media Plan
5 Elements of a Successful Social Media Plan5 Elements of a Successful Social Media Plan
5 Elements of a Successful Social Media Plan
 
Creating, Maintaining and Executing your Social Media Editorial Calendar
Creating, Maintaining and Executing your Social Media Editorial CalendarCreating, Maintaining and Executing your Social Media Editorial Calendar
Creating, Maintaining and Executing your Social Media Editorial Calendar
 
Social Media 5 Years Later: Strategy is Still the Key
Social Media 5 Years Later: Strategy is Still the KeySocial Media 5 Years Later: Strategy is Still the Key
Social Media 5 Years Later: Strategy is Still the Key
 
5 Digital Marketing Mistakes You're Probably Making
5 Digital Marketing Mistakes You're Probably Making5 Digital Marketing Mistakes You're Probably Making
5 Digital Marketing Mistakes You're Probably Making
 
5 Digital Marketing Mistakes You're Probably Making - 2014 BizExpo
5 Digital Marketing Mistakes You're Probably Making - 2014 BizExpo5 Digital Marketing Mistakes You're Probably Making - 2014 BizExpo
5 Digital Marketing Mistakes You're Probably Making - 2014 BizExpo
 
Gameplan for Online Marketing: Getting more measurable results from your Onli...
Gameplan for Online Marketing: Getting more measurable results from your Onli...Gameplan for Online Marketing: Getting more measurable results from your Onli...
Gameplan for Online Marketing: Getting more measurable results from your Onli...
 
Using Video Marketing in Social Media
Using Video Marketing in Social MediaUsing Video Marketing in Social Media
Using Video Marketing in Social Media
 
What is Social Media and Why Should I Care?
What is Social Media and Why Should I Care?What is Social Media and Why Should I Care?
What is Social Media and Why Should I Care?
 
How Social Media Impacts Your SEO
How Social Media Impacts Your SEOHow Social Media Impacts Your SEO
How Social Media Impacts Your SEO
 
Your Website - Still the Bullseye
Your Website - Still the BullseyeYour Website - Still the Bullseye
Your Website - Still the Bullseye
 
Getting to the Top in Google - Your Blueprint to Search Engine Success
Getting to the Top in Google - Your Blueprint to Search Engine SuccessGetting to the Top in Google - Your Blueprint to Search Engine Success
Getting to the Top in Google - Your Blueprint to Search Engine Success
 
Twitter: Fun and Games or Powerful Business Tool
Twitter: Fun and Games or Powerful Business ToolTwitter: Fun and Games or Powerful Business Tool
Twitter: Fun and Games or Powerful Business Tool
 
Optimizing and Integrating Social Media into your PR
Optimizing and Integrating  Social Media into your PR Optimizing and Integrating  Social Media into your PR
Optimizing and Integrating Social Media into your PR
 
Search Optmization: Social Media & Websites
Search Optmization: Social Media & WebsitesSearch Optmization: Social Media & Websites
Search Optmization: Social Media & Websites
 
Social Media: Fun and Games or Powerful Business Tool
Social Media: Fun and Games or Powerful Business ToolSocial Media: Fun and Games or Powerful Business Tool
Social Media: Fun and Games or Powerful Business Tool
 
Time to Jump on the Twitter Bandwagon for Training and Education
Time to Jump on the Twitter Bandwagon for Training and EducationTime to Jump on the Twitter Bandwagon for Training and Education
Time to Jump on the Twitter Bandwagon for Training and Education
 
Twitterbandwagon4
Twitterbandwagon4Twitterbandwagon4
Twitterbandwagon4
 
nonbox marketing summit
nonbox marketing summitnonbox marketing summit
nonbox marketing summit
 
SMUM Morning Keynote
SMUM Morning KeynoteSMUM Morning Keynote
SMUM Morning Keynote
 

Kürzlich hochgeladen

Buy gmail accounts.pdf Buy Old Gmail Accounts
Buy gmail accounts.pdf Buy Old Gmail AccountsBuy gmail accounts.pdf Buy Old Gmail Accounts
Buy gmail accounts.pdf Buy Old Gmail AccountsBuy Verified Accounts
 
Call US-88OO1O2216 Call Girls In Mahipalpur Female Escort Service
Call US-88OO1O2216 Call Girls In Mahipalpur Female Escort ServiceCall US-88OO1O2216 Call Girls In Mahipalpur Female Escort Service
Call US-88OO1O2216 Call Girls In Mahipalpur Female Escort Servicecallgirls2057
 
Chapter 9 PPT 4th edition.pdf internal audit
Chapter 9 PPT 4th edition.pdf internal auditChapter 9 PPT 4th edition.pdf internal audit
Chapter 9 PPT 4th edition.pdf internal auditNhtLNguyn9
 
International Business Environments and Operations 16th Global Edition test b...
International Business Environments and Operations 16th Global Edition test b...International Business Environments and Operations 16th Global Edition test b...
International Business Environments and Operations 16th Global Edition test b...ssuserf63bd7
 
Cybersecurity Awareness Training Presentation v2024.03
Cybersecurity Awareness Training Presentation v2024.03Cybersecurity Awareness Training Presentation v2024.03
Cybersecurity Awareness Training Presentation v2024.03DallasHaselhorst
 
Fordham -How effective decision-making is within the IT department - Analysis...
Fordham -How effective decision-making is within the IT department - Analysis...Fordham -How effective decision-making is within the IT department - Analysis...
Fordham -How effective decision-making is within the IT department - Analysis...Peter Ward
 
Global Scenario On Sustainable and Resilient Coconut Industry by Dr. Jelfina...
Global Scenario On Sustainable  and Resilient Coconut Industry by Dr. Jelfina...Global Scenario On Sustainable  and Resilient Coconut Industry by Dr. Jelfina...
Global Scenario On Sustainable and Resilient Coconut Industry by Dr. Jelfina...ictsugar
 
Church Building Grants To Assist With New Construction, Additions, And Restor...
Church Building Grants To Assist With New Construction, Additions, And Restor...Church Building Grants To Assist With New Construction, Additions, And Restor...
Church Building Grants To Assist With New Construction, Additions, And Restor...Americas Got Grants
 
Guide Complete Set of Residential Architectural Drawings PDF
Guide Complete Set of Residential Architectural Drawings PDFGuide Complete Set of Residential Architectural Drawings PDF
Guide Complete Set of Residential Architectural Drawings PDFChandresh Chudasama
 
NewBase 19 April 2024 Energy News issue - 1717 by Khaled Al Awadi.pdf
NewBase  19 April  2024  Energy News issue - 1717 by Khaled Al Awadi.pdfNewBase  19 April  2024  Energy News issue - 1717 by Khaled Al Awadi.pdf
NewBase 19 April 2024 Energy News issue - 1717 by Khaled Al Awadi.pdfKhaled Al Awadi
 
8447779800, Low rate Call girls in Rohini Delhi NCR
8447779800, Low rate Call girls in Rohini Delhi NCR8447779800, Low rate Call girls in Rohini Delhi NCR
8447779800, Low rate Call girls in Rohini Delhi NCRashishs7044
 
PSCC - Capability Statement Presentation
PSCC - Capability Statement PresentationPSCC - Capability Statement Presentation
PSCC - Capability Statement PresentationAnamaria Contreras
 
APRIL2024_UKRAINE_xml_0000000000000 .pdf
APRIL2024_UKRAINE_xml_0000000000000 .pdfAPRIL2024_UKRAINE_xml_0000000000000 .pdf
APRIL2024_UKRAINE_xml_0000000000000 .pdfRbc Rbcua
 
The-Ethical-issues-ghhhhhhhhjof-Byjus.pptx
The-Ethical-issues-ghhhhhhhhjof-Byjus.pptxThe-Ethical-issues-ghhhhhhhhjof-Byjus.pptx
The-Ethical-issues-ghhhhhhhhjof-Byjus.pptxmbikashkanyari
 
Market Sizes Sample Report - 2024 Edition
Market Sizes Sample Report - 2024 EditionMarket Sizes Sample Report - 2024 Edition
Market Sizes Sample Report - 2024 EditionMintel Group
 
Innovation Conference 5th March 2024.pdf
Innovation Conference 5th March 2024.pdfInnovation Conference 5th March 2024.pdf
Innovation Conference 5th March 2024.pdfrichard876048
 
Youth Involvement in an Innovative Coconut Value Chain by Mwalimu Menza
Youth Involvement in an Innovative Coconut Value Chain by Mwalimu MenzaYouth Involvement in an Innovative Coconut Value Chain by Mwalimu Menza
Youth Involvement in an Innovative Coconut Value Chain by Mwalimu Menzaictsugar
 

Kürzlich hochgeladen (20)

Buy gmail accounts.pdf Buy Old Gmail Accounts
Buy gmail accounts.pdf Buy Old Gmail AccountsBuy gmail accounts.pdf Buy Old Gmail Accounts
Buy gmail accounts.pdf Buy Old Gmail Accounts
 
Call US-88OO1O2216 Call Girls In Mahipalpur Female Escort Service
Call US-88OO1O2216 Call Girls In Mahipalpur Female Escort ServiceCall US-88OO1O2216 Call Girls In Mahipalpur Female Escort Service
Call US-88OO1O2216 Call Girls In Mahipalpur Female Escort Service
 
Chapter 9 PPT 4th edition.pdf internal audit
Chapter 9 PPT 4th edition.pdf internal auditChapter 9 PPT 4th edition.pdf internal audit
Chapter 9 PPT 4th edition.pdf internal audit
 
Japan IT Week 2024 Brochure by 47Billion (English)
Japan IT Week 2024 Brochure by 47Billion (English)Japan IT Week 2024 Brochure by 47Billion (English)
Japan IT Week 2024 Brochure by 47Billion (English)
 
International Business Environments and Operations 16th Global Edition test b...
International Business Environments and Operations 16th Global Edition test b...International Business Environments and Operations 16th Global Edition test b...
International Business Environments and Operations 16th Global Edition test b...
 
Cybersecurity Awareness Training Presentation v2024.03
Cybersecurity Awareness Training Presentation v2024.03Cybersecurity Awareness Training Presentation v2024.03
Cybersecurity Awareness Training Presentation v2024.03
 
Fordham -How effective decision-making is within the IT department - Analysis...
Fordham -How effective decision-making is within the IT department - Analysis...Fordham -How effective decision-making is within the IT department - Analysis...
Fordham -How effective decision-making is within the IT department - Analysis...
 
Global Scenario On Sustainable and Resilient Coconut Industry by Dr. Jelfina...
Global Scenario On Sustainable  and Resilient Coconut Industry by Dr. Jelfina...Global Scenario On Sustainable  and Resilient Coconut Industry by Dr. Jelfina...
Global Scenario On Sustainable and Resilient Coconut Industry by Dr. Jelfina...
 
Church Building Grants To Assist With New Construction, Additions, And Restor...
Church Building Grants To Assist With New Construction, Additions, And Restor...Church Building Grants To Assist With New Construction, Additions, And Restor...
Church Building Grants To Assist With New Construction, Additions, And Restor...
 
Guide Complete Set of Residential Architectural Drawings PDF
Guide Complete Set of Residential Architectural Drawings PDFGuide Complete Set of Residential Architectural Drawings PDF
Guide Complete Set of Residential Architectural Drawings PDF
 
NewBase 19 April 2024 Energy News issue - 1717 by Khaled Al Awadi.pdf
NewBase  19 April  2024  Energy News issue - 1717 by Khaled Al Awadi.pdfNewBase  19 April  2024  Energy News issue - 1717 by Khaled Al Awadi.pdf
NewBase 19 April 2024 Energy News issue - 1717 by Khaled Al Awadi.pdf
 
8447779800, Low rate Call girls in Rohini Delhi NCR
8447779800, Low rate Call girls in Rohini Delhi NCR8447779800, Low rate Call girls in Rohini Delhi NCR
8447779800, Low rate Call girls in Rohini Delhi NCR
 
No-1 Call Girls In Goa 93193 VIP 73153 Escort service In North Goa Panaji, Ca...
No-1 Call Girls In Goa 93193 VIP 73153 Escort service In North Goa Panaji, Ca...No-1 Call Girls In Goa 93193 VIP 73153 Escort service In North Goa Panaji, Ca...
No-1 Call Girls In Goa 93193 VIP 73153 Escort service In North Goa Panaji, Ca...
 
PSCC - Capability Statement Presentation
PSCC - Capability Statement PresentationPSCC - Capability Statement Presentation
PSCC - Capability Statement Presentation
 
Enjoy ➥8448380779▻ Call Girls In Sector 18 Noida Escorts Delhi NCR
Enjoy ➥8448380779▻ Call Girls In Sector 18 Noida Escorts Delhi NCREnjoy ➥8448380779▻ Call Girls In Sector 18 Noida Escorts Delhi NCR
Enjoy ➥8448380779▻ Call Girls In Sector 18 Noida Escorts Delhi NCR
 
APRIL2024_UKRAINE_xml_0000000000000 .pdf
APRIL2024_UKRAINE_xml_0000000000000 .pdfAPRIL2024_UKRAINE_xml_0000000000000 .pdf
APRIL2024_UKRAINE_xml_0000000000000 .pdf
 
The-Ethical-issues-ghhhhhhhhjof-Byjus.pptx
The-Ethical-issues-ghhhhhhhhjof-Byjus.pptxThe-Ethical-issues-ghhhhhhhhjof-Byjus.pptx
The-Ethical-issues-ghhhhhhhhjof-Byjus.pptx
 
Market Sizes Sample Report - 2024 Edition
Market Sizes Sample Report - 2024 EditionMarket Sizes Sample Report - 2024 Edition
Market Sizes Sample Report - 2024 Edition
 
Innovation Conference 5th March 2024.pdf
Innovation Conference 5th March 2024.pdfInnovation Conference 5th March 2024.pdf
Innovation Conference 5th March 2024.pdf
 
Youth Involvement in an Innovative Coconut Value Chain by Mwalimu Menza
Youth Involvement in an Innovative Coconut Value Chain by Mwalimu MenzaYouth Involvement in an Innovative Coconut Value Chain by Mwalimu Menza
Youth Involvement in an Innovative Coconut Value Chain by Mwalimu Menza
 

Risky business of social media

  • 1. The Risky Business of Social Media Tom Snyder Trivera Interactive Contents Copyright © 2011 Trivera Interactive and ISACA
  • 2.
  • 3. I’m the guy who convinces your marketing people to do all the Social Media stuff that turns the IT, IS, Security, Legal and HR people into this:
  • 4.
  • 5. 95% of social media users now use it for business reasons 61% use public social media sites like LinkedIn, Twitter, Facebook, and YouTube every day (up from 51% in 2008). 15% use these sites "constantly throughout the day. 56% work for companies that have no policies that cover use at work and outside work Social Media Usage
  • 6.  
  • 7. 76% of companies now use Social Media for business purposes 43% have experienced employee misuse 31% have disciplined employees for misuse 29% block employee access 27% monitor employee use 25% ban use for non-business purposes Social Media Usage
  • 10.
  • 11.
  • 12.
  • 13. Tactics without strategy is the noise before defeat Strategy without tactics is the slowest route to victory -Sun Tzu Addressing Risk
  • 14.
  • 15.
  • 16.
  • 17.
  • 18.
  • 19.
  • 20.
  • 21.  
  • 22. Tom Snyder [email_address] http://www.triveraguy.com Trivera Interactive http://www.trivera.com ISACA http:// www.isaca.org/socialmedia Contents Copyright © 2011 Trivera Interactive and ISACA