SlideShare ist ein Scribd-Unternehmen logo
1 von 29
Downloaden Sie, um offline zu lesen
SOCIAL MEDIA: WHY SHOULD IT BE
ON YOUR AUDIT PLAN?
Shivangi Nadkarni, CISA, CIPT, DCPP
Co-Founder & CEO – Arrka Consulting
The Social Media Ecosystem
15-Feb-17Arrka Consulting - Confidential
2
This is a placeholder text.
It can be replaced by your
own one.
Communication Apps:
Gmail, Skype,
Whatsapp...
Organizational
sites, apps,
games, pages
Games,
Interactive
Media
Popular Apps:
Facebook, Linked In,
Twitter...
The Risks: Category #1
15-Feb-17
3
Arrka Consulting - Confidential
How things can go wrong…
15-Feb-17Arrka Consulting - Confidential
4
Twitter:
 Who: Their own CFO – Anthony Noto
 What: Accidently tweeted instead of sending a private message
 What was it about: An M&A plan
 "I still think we should buy them. He is on your schedule for Dec 15 or 16
-- we will need to sell him. i have a plan.“
How things can go wrong…
15-Feb-17Arrka Consulting - Confidential
5
Across Social Media:
 Who: UK Armed Forces
 What: Disclosed details of Britain’s submarines, posted videos of people
& equipment in Afghanistan & Libya, details of sensitive visits, etc
How things can go wrong
15-Feb-17Arrka Consulting - Confidential
6
 …Am sure each of you has a story to tell from your own
organization…
Data Leakage on Social Media – How?
15-Feb-17Arrka Consulting - Confidential
7
Leakage
The
DELIBERATE
The VICTIM
The ‘OOPS’!
Data leaked by mistake
• Very Common
• Eg: putting great details in Linked In profiles,
uploading sensitive documents on public
cloud, posting internal plans on Facebook, etc
The Malicious
Insider
Victimised by Cybercrime
• 40 percent of social media users have
fallen victim to cybercrime
• One in six users believe their accounts
have been compromised*
* Norton Study
At the Organizational Level
15-Feb-17Arrka Consulting - Confidential
8
 Impersonation/ spoofing of organization’s properties
 Fake pages, handles etc
 Fake domains
 Fake apps
The Risks: Category #2
15-Feb-17
9
Arrka Consulting - Confidential
When you are Online – what happens in the
background?
15-Feb-17Arrka Consulting - Confidential
10
Types of data collected:
- Device id, location data, browser history, your OS,
- Anything else you may have given ‘permission’ to
access – eg, contact info, etc
Your Profile &
Identity is built
What happens to this data?
15-Feb-17Arrka Consulting - Confidential
11
ANALYTICS is done on
this
SOLD to data networks/
ad networks/ other
agencies
-Who use it to sell
products & services to
you
Used to SYNC UP with
other channels to do
omni-channel reach
Fed into ALGORITHMS
and used to make
automated decisions
about you
In Short, When You Are Online….
What happens when you use a mobile app?
15-Feb-17Arrka Consulting - Confidential
13
You give ‘Permissions’
What happens when you use…
15-Feb-17Arrka Consulting - Confidential
14
APP or Website
Gets access to
your account
So How and Why is all this relevant to an organization?
15-Feb-17
15
Arrka Consulting - Confidential
15-Feb-17Arrka Consulting - Confidential
16
 Your organization is engaging in all these digital interactions
 Online
 Mobile apps
 Applications like FB/ Instagram/ Linked in/ etc
Data: Today’s Reality
15-Feb-17Arrka Consulting - Confidential
17
Explosion of
Data
• Tracking
• Online Behavioural
Advertising (OBA)
• Ad / Data Networks
Individuals as
Data
Generators
Social, Mobile,
Analytics,
Cloud, IOT…
Personal
Data is the
New
Currency
Types of Personal Data
15-Feb-17Arrka Consulting - Confidential
18
PERSONAL DATA
Knowingly provided
by a user
Unknowingly
provided by a user
Observed Data
Derived or Inferred
Data
Harvested
From 3P
sources
Eg: Filling in
account details
Eg: Device
identifiers,
Location Data,
etc
Eg: Data generated from
analysis and/or deploying
algorithms. Like online
behaviour profiles
What does the law say?
15-Feb-17Arrka Consulting - Confidential
19
 Data Protection & Privacy laws in most countries:
 Define personal data to include all device data, meta data, location data,
etc
 Anything from a device that can be used to identify an individual
 The laws have some strict curbs on how this data should be treated
and used
 With some stiff penalties and liabilities
 Eg:
 EU GDPR: upto 2% to 4% of global turnover
 Most countries have criminal liabilities
So Who Owns What Data?
15-Feb-17Arrka Consulting - Confidential
20
Dedicated
3rd Parties
3P’s using their
own platforms/
products
Personal Data
Personal Data
3P’s own usage
4th
Parties
Where Does
Accountability lie?
Who takes on the
liabilities?
Who carries the
reputation risk?
What can go wrong?: InMobi
15-Feb-17Arrka Consulting - Confidential
21
 One of the world’s largest Mobile Ad Network
 Tracked a customer’s location using surrounding wi-fi networks
 EVEN when the customer had turned off location services on her mobile
 Hauled up and fined by the US FTC
 InMobi: Basically from India!
What can go wrong: Silverpush
15-Feb-17Arrka Consulting - Confidential
22
 A technology that tracks ‘audio beacons’ from Televisions
 Captured on a mobile device
 Sent to a central server
 Profiles what exactly you have watched on tv
 Feeds to ad networks to deliver ads
 Not even a standalone app
 Embedded in other mobile apps
 Hauled up by US FTC
Think of this scenario
15-Feb-17Arrka Consulting - Confidential
23
 Your organization ties up with a third party to co-brand a mobile app
 Hosts it on the third party’s platform
 Third party uses the data from the customer to do analytics and sell
to an ad network
 Meanwhile, your orgn has promised the customer that you wont sell
her personal data to anyone
 What happens in this scenario? Who is accountable?
To Summarise
15-Feb-17Arrka Consulting - Confidential
24
Data Leakage
related risks
Data Accountability
related risks
Risks from the
Social Media Ecosystem
What can you do to address this?
15-Feb-17
25
Arrka Consulting - Confidential
What can you do to address this
15-Feb-17Arrka Consulting - Confidential
26
 Create Awareness
 That these risks exist
 They are real
 They are an integral part of business – not a ‘tech-only’ problem
 They have to be urgently addressed
 Assess
 What is your organization’s risk exposure vis-à-vis the social media
ecosystem
 Assess the gaps
What can you do to address this
15-Feb-17Arrka Consulting - Confidential
27
 Review existing programs/ initiatives that address these risks
 Likely that existing risk management initiatives may be addressing some parts of
these risks
 Initiate new programs/ initiatives to take care of unaddressed gaps
 Do this on a continual basis
 Pace of change is explosive
 Risk profiles keep changing
 Global developments affect local ecosystems- although you may not be dealing
with outside markets
15-Feb-17Arrka Consulting - Confidential
28
 It is an exciting world out there….full of opportunities….just make
sure you have your risks covered as you make the most of the
opportunities
Shivangi Nadkarni, CISA, DCPP, CIPT
Co-Founder & CEO – Arrka Consulting
shivangi.nadkarni@arrka.com
www.arrka.com
@shivanginadkarn
Questions?
15-Feb-17
29
Arrka Consulting - Confidential

Weitere ähnliche Inhalte

Was ist angesagt?

Was ist angesagt? (10)

Chapter 8 big data and privacy
Chapter 8 big data and privacyChapter 8 big data and privacy
Chapter 8 big data and privacy
 
Cyber Risks - Legal innovation 2018
Cyber Risks - Legal innovation 2018Cyber Risks - Legal innovation 2018
Cyber Risks - Legal innovation 2018
 
Social Media Monitoring tools as an OSINT platform for intelligence
Social Media Monitoring tools as an OSINT platform for intelligenceSocial Media Monitoring tools as an OSINT platform for intelligence
Social Media Monitoring tools as an OSINT platform for intelligence
 
Pentest trends 2017
Pentest trends 2017Pentest trends 2017
Pentest trends 2017
 
Open Source Insight: Amazon Servers Exposed Open Source & the Public Sector...
Open Source Insight:  Amazon Servers Exposed  Open Source & the Public Sector...Open Source Insight:  Amazon Servers Exposed  Open Source & the Public Sector...
Open Source Insight: Amazon Servers Exposed Open Source & the Public Sector...
 
Possible cyber security threats of 2016
Possible cyber security threats of 2016Possible cyber security threats of 2016
Possible cyber security threats of 2016
 
The Privacy Illusion
The Privacy IllusionThe Privacy Illusion
The Privacy Illusion
 
Community of Practice Innovatie
Community of Practice InnovatieCommunity of Practice Innovatie
Community of Practice Innovatie
 
Online Trust Alliance Recommendations
Online Trust Alliance RecommendationsOnline Trust Alliance Recommendations
Online Trust Alliance Recommendations
 
A Sneak Peek into Internet of Things!
A Sneak Peek into Internet of Things!A Sneak Peek into Internet of Things!
A Sneak Peek into Internet of Things!
 

Andere mochten auch

UCD AFC vs Shels 40pg a5 PREVIEW reduced
UCD AFC vs Shels 40pg a5 PREVIEW reducedUCD AFC vs Shels 40pg a5 PREVIEW reduced
UCD AFC vs Shels 40pg a5 PREVIEW reduced
Georgina Dwyer
 

Andere mochten auch (13)

UCD AFC vs Shels 40pg a5 PREVIEW reduced
UCD AFC vs Shels 40pg a5 PREVIEW reducedUCD AFC vs Shels 40pg a5 PREVIEW reduced
UCD AFC vs Shels 40pg a5 PREVIEW reduced
 
Presentacion profesional
Presentacion profesionalPresentacion profesional
Presentacion profesional
 
sertifikasi kompetensi
sertifikasi kompetensisertifikasi kompetensi
sertifikasi kompetensi
 
Presentacion fuentes dependientes
Presentacion fuentes dependientesPresentacion fuentes dependientes
Presentacion fuentes dependientes
 
Escola Rel - cicle superior B 2016-17
Escola Rel - cicle superior B 2016-17Escola Rel - cicle superior B 2016-17
Escola Rel - cicle superior B 2016-17
 
Shoppers stop
Shoppers stopShoppers stop
Shoppers stop
 
Pharmacy 1
Pharmacy 1Pharmacy 1
Pharmacy 1
 
Supplementary Intervention Material in Developing Grammatical Competence of G...
Supplementary Intervention Material in Developing Grammatical Competence of G...Supplementary Intervention Material in Developing Grammatical Competence of G...
Supplementary Intervention Material in Developing Grammatical Competence of G...
 
Survey analysis
Survey analysisSurvey analysis
Survey analysis
 
Ibm design v1.2
Ibm design v1.2Ibm design v1.2
Ibm design v1.2
 
Administração financeira uma abordagem gerencial livro
Administração financeira uma abordagem gerencial livroAdministração financeira uma abordagem gerencial livro
Administração financeira uma abordagem gerencial livro
 
Φυσική Ε΄ 7.1. ΄΄Διάδοση του φωτός΄΄
Φυσική Ε΄ 7.1. ΄΄Διάδοση του φωτός΄΄Φυσική Ε΄ 7.1. ΄΄Διάδοση του φωτός΄΄
Φυσική Ε΄ 7.1. ΄΄Διάδοση του φωτός΄΄
 
Φυσική Ε΄ - Επανάληψη 7ης ενότητας: ΄΄ Φως΄΄
Φυσική Ε΄ - Επανάληψη 7ης ενότητας: ΄΄ Φως΄΄Φυσική Ε΄ - Επανάληψη 7ης ενότητας: ΄΄ Φως΄΄
Φυσική Ε΄ - Επανάληψη 7ης ενότητας: ΄΄ Φως΄΄
 

Ähnlich wie Social media data leakage and data accountability risks

Data Privacy Micc Presentation
Data Privacy   Micc PresentationData Privacy   Micc Presentation
Data Privacy Micc Presentation
ashishjoshi
 

Ähnlich wie Social media data leakage and data accountability risks (20)

Information security overview
Information security overviewInformation security overview
Information security overview
 
DN18 | Deploying a Risk Monitoring Tool on Third Parties | Jean-François Heer...
DN18 | Deploying a Risk Monitoring Tool on Third Parties | Jean-François Heer...DN18 | Deploying a Risk Monitoring Tool on Third Parties | Jean-François Heer...
DN18 | Deploying a Risk Monitoring Tool on Third Parties | Jean-François Heer...
 
Data Protection Scotland Summit 2019
Data Protection Scotland Summit 2019Data Protection Scotland Summit 2019
Data Protection Scotland Summit 2019
 
Your Digital Identity - are you feeling lucky?
Your Digital Identity - are you feeling lucky?Your Digital Identity - are you feeling lucky?
Your Digital Identity - are you feeling lucky?
 
Data Privacy Micc Presentation
Data Privacy   Micc PresentationData Privacy   Micc Presentation
Data Privacy Micc Presentation
 
Social Media and the Law
Social Media and the LawSocial Media and the Law
Social Media and the Law
 
Consumer Mobile Policy & Security - Lightspeed & Kantar
Consumer Mobile Policy & Security - Lightspeed & KantarConsumer Mobile Policy & Security - Lightspeed & Kantar
Consumer Mobile Policy & Security - Lightspeed & Kantar
 
Is GDPR a showstopper for social media usage in your company
Is GDPR a showstopper for social media usage in your companyIs GDPR a showstopper for social media usage in your company
Is GDPR a showstopper for social media usage in your company
 
Lecture #22: Web Privacy & Security Breach
Lecture #22: Web Privacy & Security BreachLecture #22: Web Privacy & Security Breach
Lecture #22: Web Privacy & Security Breach
 
COVID-19 free penetration tests by Pentest-Tools.com
COVID-19 free penetration tests by Pentest-Tools.comCOVID-19 free penetration tests by Pentest-Tools.com
COVID-19 free penetration tests by Pentest-Tools.com
 
Internet of Things With Privacy in Mind
Internet of Things With Privacy in MindInternet of Things With Privacy in Mind
Internet of Things With Privacy in Mind
 
Data Security for Nonprofits
Data Security for NonprofitsData Security for Nonprofits
Data Security for Nonprofits
 
GDPR How ready are you? The What, Why and How.
GDPR How ready are you? The What, Why and How.GDPR How ready are you? The What, Why and How.
GDPR How ready are you? The What, Why and How.
 
The 1% Who Can Take Down your Organization
The 1% Who Can Take Down your OrganizationThe 1% Who Can Take Down your Organization
The 1% Who Can Take Down your Organization
 
The Ugly Secret about Third Party Risk Management.pdf
The Ugly Secret about Third Party Risk Management.pdfThe Ugly Secret about Third Party Risk Management.pdf
The Ugly Secret about Third Party Risk Management.pdf
 
Smart Data Module 5 d drive_legislation
Smart Data Module 5 d drive_legislationSmart Data Module 5 d drive_legislation
Smart Data Module 5 d drive_legislation
 
Privacy 2020: Recap & Predictions
Privacy 2020: Recap & PredictionsPrivacy 2020: Recap & Predictions
Privacy 2020: Recap & Predictions
 
FinTech Belgium - MeetUp on The Ideal RegTech for Banks and FinTechs - Jean-F...
FinTech Belgium - MeetUp on The Ideal RegTech for Banks and FinTechs - Jean-F...FinTech Belgium - MeetUp on The Ideal RegTech for Banks and FinTechs - Jean-F...
FinTech Belgium - MeetUp on The Ideal RegTech for Banks and FinTechs - Jean-F...
 
GDPR - Applift firstscreen june 2016
GDPR - Applift firstscreen june 2016GDPR - Applift firstscreen june 2016
GDPR - Applift firstscreen june 2016
 
The Ugly Secret about Third Party Risk Management.pptx
The Ugly Secret about Third Party Risk Management.pptxThe Ugly Secret about Third Party Risk Management.pptx
The Ugly Secret about Third Party Risk Management.pptx
 

Kürzlich hochgeladen

Indian Escort in Abu DHabi 0508644382 Abu Dhabi Escorts
Indian Escort in Abu DHabi 0508644382 Abu Dhabi EscortsIndian Escort in Abu DHabi 0508644382 Abu Dhabi Escorts
Indian Escort in Abu DHabi 0508644382 Abu Dhabi Escorts
Monica Sydney
 
原版制作美国爱荷华大学毕业证(iowa毕业证书)学位证网上存档可查
原版制作美国爱荷华大学毕业证(iowa毕业证书)学位证网上存档可查原版制作美国爱荷华大学毕业证(iowa毕业证书)学位证网上存档可查
原版制作美国爱荷华大学毕业证(iowa毕业证书)学位证网上存档可查
ydyuyu
 
Top profile Call Girls In Dindigul [ 7014168258 ] Call Me For Genuine Models ...
Top profile Call Girls In Dindigul [ 7014168258 ] Call Me For Genuine Models ...Top profile Call Girls In Dindigul [ 7014168258 ] Call Me For Genuine Models ...
Top profile Call Girls In Dindigul [ 7014168258 ] Call Me For Genuine Models ...
gajnagarg
 
一比一原版(Offer)康考迪亚大学毕业证学位证靠谱定制
一比一原版(Offer)康考迪亚大学毕业证学位证靠谱定制一比一原版(Offer)康考迪亚大学毕业证学位证靠谱定制
一比一原版(Offer)康考迪亚大学毕业证学位证靠谱定制
pxcywzqs
 
Russian Call girls in Abu Dhabi 0508644382 Abu Dhabi Call girls
Russian Call girls in Abu Dhabi 0508644382 Abu Dhabi Call girlsRussian Call girls in Abu Dhabi 0508644382 Abu Dhabi Call girls
Russian Call girls in Abu Dhabi 0508644382 Abu Dhabi Call girls
Monica Sydney
 

Kürzlich hochgeladen (20)

20240510 QFM016 Irresponsible AI Reading List April 2024.pdf
20240510 QFM016 Irresponsible AI Reading List April 2024.pdf20240510 QFM016 Irresponsible AI Reading List April 2024.pdf
20240510 QFM016 Irresponsible AI Reading List April 2024.pdf
 
Vip Firozabad Phone 8250092165 Escorts Service At 6k To 30k Along With Ac Room
Vip Firozabad Phone 8250092165 Escorts Service At 6k To 30k Along With Ac RoomVip Firozabad Phone 8250092165 Escorts Service At 6k To 30k Along With Ac Room
Vip Firozabad Phone 8250092165 Escorts Service At 6k To 30k Along With Ac Room
 
Meaning of On page SEO & its process in detail.
Meaning of On page SEO & its process in detail.Meaning of On page SEO & its process in detail.
Meaning of On page SEO & its process in detail.
 
Microsoft Azure Arc Customer Deck Microsoft
Microsoft Azure Arc Customer Deck MicrosoftMicrosoft Azure Arc Customer Deck Microsoft
Microsoft Azure Arc Customer Deck Microsoft
 
Indian Escort in Abu DHabi 0508644382 Abu Dhabi Escorts
Indian Escort in Abu DHabi 0508644382 Abu Dhabi EscortsIndian Escort in Abu DHabi 0508644382 Abu Dhabi Escorts
Indian Escort in Abu DHabi 0508644382 Abu Dhabi Escorts
 
Nagercoil Escorts Service Girl ^ 9332606886, WhatsApp Anytime Nagercoil
Nagercoil Escorts Service Girl ^ 9332606886, WhatsApp Anytime NagercoilNagercoil Escorts Service Girl ^ 9332606886, WhatsApp Anytime Nagercoil
Nagercoil Escorts Service Girl ^ 9332606886, WhatsApp Anytime Nagercoil
 
Power point inglese - educazione civica di Nuria Iuzzolino
Power point inglese - educazione civica di Nuria IuzzolinoPower point inglese - educazione civica di Nuria Iuzzolino
Power point inglese - educazione civica di Nuria Iuzzolino
 
Best SEO Services Company in Dallas | Best SEO Agency Dallas
Best SEO Services Company in Dallas | Best SEO Agency DallasBest SEO Services Company in Dallas | Best SEO Agency Dallas
Best SEO Services Company in Dallas | Best SEO Agency Dallas
 
20240507 QFM013 Machine Intelligence Reading List April 2024.pdf
20240507 QFM013 Machine Intelligence Reading List April 2024.pdf20240507 QFM013 Machine Intelligence Reading List April 2024.pdf
20240507 QFM013 Machine Intelligence Reading List April 2024.pdf
 
APNIC Policy Roundup, presented by Sunny Chendi at the 5th ICANN APAC-TWNIC E...
APNIC Policy Roundup, presented by Sunny Chendi at the 5th ICANN APAC-TWNIC E...APNIC Policy Roundup, presented by Sunny Chendi at the 5th ICANN APAC-TWNIC E...
APNIC Policy Roundup, presented by Sunny Chendi at the 5th ICANN APAC-TWNIC E...
 
原版制作美国爱荷华大学毕业证(iowa毕业证书)学位证网上存档可查
原版制作美国爱荷华大学毕业证(iowa毕业证书)学位证网上存档可查原版制作美国爱荷华大学毕业证(iowa毕业证书)学位证网上存档可查
原版制作美国爱荷华大学毕业证(iowa毕业证书)学位证网上存档可查
 
Top profile Call Girls In Dindigul [ 7014168258 ] Call Me For Genuine Models ...
Top profile Call Girls In Dindigul [ 7014168258 ] Call Me For Genuine Models ...Top profile Call Girls In Dindigul [ 7014168258 ] Call Me For Genuine Models ...
Top profile Call Girls In Dindigul [ 7014168258 ] Call Me For Genuine Models ...
 
20240509 QFM015 Engineering Leadership Reading List April 2024.pdf
20240509 QFM015 Engineering Leadership Reading List April 2024.pdf20240509 QFM015 Engineering Leadership Reading List April 2024.pdf
20240509 QFM015 Engineering Leadership Reading List April 2024.pdf
 
Trump Diapers Over Dems t shirts Sweatshirt
Trump Diapers Over Dems t shirts SweatshirtTrump Diapers Over Dems t shirts Sweatshirt
Trump Diapers Over Dems t shirts Sweatshirt
 
一比一原版(Offer)康考迪亚大学毕业证学位证靠谱定制
一比一原版(Offer)康考迪亚大学毕业证学位证靠谱定制一比一原版(Offer)康考迪亚大学毕业证学位证靠谱定制
一比一原版(Offer)康考迪亚大学毕业证学位证靠谱定制
 
Story Board.pptxrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrr
Story Board.pptxrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrStory Board.pptxrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrr
Story Board.pptxrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrr
 
"Boost Your Digital Presence: Partner with a Leading SEO Agency"
"Boost Your Digital Presence: Partner with a Leading SEO Agency""Boost Your Digital Presence: Partner with a Leading SEO Agency"
"Boost Your Digital Presence: Partner with a Leading SEO Agency"
 
20240508 QFM014 Elixir Reading List April 2024.pdf
20240508 QFM014 Elixir Reading List April 2024.pdf20240508 QFM014 Elixir Reading List April 2024.pdf
20240508 QFM014 Elixir Reading List April 2024.pdf
 
APNIC Updates presented by Paul Wilson at ARIN 53
APNIC Updates presented by Paul Wilson at ARIN 53APNIC Updates presented by Paul Wilson at ARIN 53
APNIC Updates presented by Paul Wilson at ARIN 53
 
Russian Call girls in Abu Dhabi 0508644382 Abu Dhabi Call girls
Russian Call girls in Abu Dhabi 0508644382 Abu Dhabi Call girlsRussian Call girls in Abu Dhabi 0508644382 Abu Dhabi Call girls
Russian Call girls in Abu Dhabi 0508644382 Abu Dhabi Call girls
 

Social media data leakage and data accountability risks

  • 1. SOCIAL MEDIA: WHY SHOULD IT BE ON YOUR AUDIT PLAN? Shivangi Nadkarni, CISA, CIPT, DCPP Co-Founder & CEO – Arrka Consulting
  • 2. The Social Media Ecosystem 15-Feb-17Arrka Consulting - Confidential 2 This is a placeholder text. It can be replaced by your own one. Communication Apps: Gmail, Skype, Whatsapp... Organizational sites, apps, games, pages Games, Interactive Media Popular Apps: Facebook, Linked In, Twitter...
  • 3. The Risks: Category #1 15-Feb-17 3 Arrka Consulting - Confidential
  • 4. How things can go wrong… 15-Feb-17Arrka Consulting - Confidential 4 Twitter:  Who: Their own CFO – Anthony Noto  What: Accidently tweeted instead of sending a private message  What was it about: An M&A plan  "I still think we should buy them. He is on your schedule for Dec 15 or 16 -- we will need to sell him. i have a plan.“
  • 5. How things can go wrong… 15-Feb-17Arrka Consulting - Confidential 5 Across Social Media:  Who: UK Armed Forces  What: Disclosed details of Britain’s submarines, posted videos of people & equipment in Afghanistan & Libya, details of sensitive visits, etc
  • 6. How things can go wrong 15-Feb-17Arrka Consulting - Confidential 6  …Am sure each of you has a story to tell from your own organization…
  • 7. Data Leakage on Social Media – How? 15-Feb-17Arrka Consulting - Confidential 7 Leakage The DELIBERATE The VICTIM The ‘OOPS’! Data leaked by mistake • Very Common • Eg: putting great details in Linked In profiles, uploading sensitive documents on public cloud, posting internal plans on Facebook, etc The Malicious Insider Victimised by Cybercrime • 40 percent of social media users have fallen victim to cybercrime • One in six users believe their accounts have been compromised* * Norton Study
  • 8. At the Organizational Level 15-Feb-17Arrka Consulting - Confidential 8  Impersonation/ spoofing of organization’s properties  Fake pages, handles etc  Fake domains  Fake apps
  • 9. The Risks: Category #2 15-Feb-17 9 Arrka Consulting - Confidential
  • 10. When you are Online – what happens in the background? 15-Feb-17Arrka Consulting - Confidential 10 Types of data collected: - Device id, location data, browser history, your OS, - Anything else you may have given ‘permission’ to access – eg, contact info, etc Your Profile & Identity is built
  • 11. What happens to this data? 15-Feb-17Arrka Consulting - Confidential 11 ANALYTICS is done on this SOLD to data networks/ ad networks/ other agencies -Who use it to sell products & services to you Used to SYNC UP with other channels to do omni-channel reach Fed into ALGORITHMS and used to make automated decisions about you
  • 12. In Short, When You Are Online….
  • 13. What happens when you use a mobile app? 15-Feb-17Arrka Consulting - Confidential 13 You give ‘Permissions’
  • 14. What happens when you use… 15-Feb-17Arrka Consulting - Confidential 14 APP or Website Gets access to your account
  • 15. So How and Why is all this relevant to an organization? 15-Feb-17 15 Arrka Consulting - Confidential
  • 16. 15-Feb-17Arrka Consulting - Confidential 16  Your organization is engaging in all these digital interactions  Online  Mobile apps  Applications like FB/ Instagram/ Linked in/ etc
  • 17. Data: Today’s Reality 15-Feb-17Arrka Consulting - Confidential 17 Explosion of Data • Tracking • Online Behavioural Advertising (OBA) • Ad / Data Networks Individuals as Data Generators Social, Mobile, Analytics, Cloud, IOT… Personal Data is the New Currency
  • 18. Types of Personal Data 15-Feb-17Arrka Consulting - Confidential 18 PERSONAL DATA Knowingly provided by a user Unknowingly provided by a user Observed Data Derived or Inferred Data Harvested From 3P sources Eg: Filling in account details Eg: Device identifiers, Location Data, etc Eg: Data generated from analysis and/or deploying algorithms. Like online behaviour profiles
  • 19. What does the law say? 15-Feb-17Arrka Consulting - Confidential 19  Data Protection & Privacy laws in most countries:  Define personal data to include all device data, meta data, location data, etc  Anything from a device that can be used to identify an individual  The laws have some strict curbs on how this data should be treated and used  With some stiff penalties and liabilities  Eg:  EU GDPR: upto 2% to 4% of global turnover  Most countries have criminal liabilities
  • 20. So Who Owns What Data? 15-Feb-17Arrka Consulting - Confidential 20 Dedicated 3rd Parties 3P’s using their own platforms/ products Personal Data Personal Data 3P’s own usage 4th Parties Where Does Accountability lie? Who takes on the liabilities? Who carries the reputation risk?
  • 21. What can go wrong?: InMobi 15-Feb-17Arrka Consulting - Confidential 21  One of the world’s largest Mobile Ad Network  Tracked a customer’s location using surrounding wi-fi networks  EVEN when the customer had turned off location services on her mobile  Hauled up and fined by the US FTC  InMobi: Basically from India!
  • 22. What can go wrong: Silverpush 15-Feb-17Arrka Consulting - Confidential 22  A technology that tracks ‘audio beacons’ from Televisions  Captured on a mobile device  Sent to a central server  Profiles what exactly you have watched on tv  Feeds to ad networks to deliver ads  Not even a standalone app  Embedded in other mobile apps  Hauled up by US FTC
  • 23. Think of this scenario 15-Feb-17Arrka Consulting - Confidential 23  Your organization ties up with a third party to co-brand a mobile app  Hosts it on the third party’s platform  Third party uses the data from the customer to do analytics and sell to an ad network  Meanwhile, your orgn has promised the customer that you wont sell her personal data to anyone  What happens in this scenario? Who is accountable?
  • 24. To Summarise 15-Feb-17Arrka Consulting - Confidential 24 Data Leakage related risks Data Accountability related risks Risks from the Social Media Ecosystem
  • 25. What can you do to address this? 15-Feb-17 25 Arrka Consulting - Confidential
  • 26. What can you do to address this 15-Feb-17Arrka Consulting - Confidential 26  Create Awareness  That these risks exist  They are real  They are an integral part of business – not a ‘tech-only’ problem  They have to be urgently addressed  Assess  What is your organization’s risk exposure vis-à-vis the social media ecosystem  Assess the gaps
  • 27. What can you do to address this 15-Feb-17Arrka Consulting - Confidential 27  Review existing programs/ initiatives that address these risks  Likely that existing risk management initiatives may be addressing some parts of these risks  Initiate new programs/ initiatives to take care of unaddressed gaps  Do this on a continual basis  Pace of change is explosive  Risk profiles keep changing  Global developments affect local ecosystems- although you may not be dealing with outside markets
  • 28. 15-Feb-17Arrka Consulting - Confidential 28  It is an exciting world out there….full of opportunities….just make sure you have your risks covered as you make the most of the opportunities
  • 29. Shivangi Nadkarni, CISA, DCPP, CIPT Co-Founder & CEO – Arrka Consulting shivangi.nadkarni@arrka.com www.arrka.com @shivanginadkarn Questions? 15-Feb-17 29 Arrka Consulting - Confidential