SlideShare ist ein Scribd-Unternehmen logo
1 von 37
Downloaden Sie, um offline zu lesen
SOCIAL MEDIA:
  INFILTRATING THE
      ENTERPRISE	

     MIDTECH IT Summit	

       June 27th, 2011	


     JAY A. MCLAUGHLIN, CISSP	

SVP, CHIEF INFORMATION OFFICER
DISCLAIMER	

 The materials, thoughts, comments, ideas
  and opinions expressed throughout this
 presentation are entirely my own and do
 not necessarily represent the thoughts or
opinions of my employer (past or present).
AGENDA	

•    Defining social media	

•    Embracing the Inevitable	

•    Understanding the Benefits  Risks	

•    Friending your Customers	

•    Preventing social media disasters	

•    Building a strategy
: forms of electronic communication (as Web sites
                 for social networking and microblogging) through
                 which users create online communities to share
                 information, ideas, personal messages, and other
                 content	



What is Social
  Media?	

                 Social media is media for social interaction using
                 highly accessible and scalable communication
                 techniques. Social media is the use of web-based
                 and mobile technologies to turn communication
                 into interactive dialogue.
•  500 Million	

•  250 Million	

•  700 Billion	

              Source: Facebook.com April 2011
It s Corporate
•  6939	

•  319	

•  140 Million	

             Source: Twitter. com March 2011
It s Mainstream
•  100 Million	

•  2 Million	

•  4.3 Billion	

               Source: LinkedIn.com May 2011
WHY SHOULD WE CARE?	

•  It's   where your customers are 	


•  It's   where your prospects are	


•  It's
    reach stretches further broader than any
  marketing channel	


•  It's   relevant to be in the game
We don t have a choice
  on whether we will DO
social media, the question
 is how WELL we DO it. 	

               	

               	

   - Erik Qualman, Author
         Socialnomics	





                        http://www.youtube.com/user/Socialnomics09?blend=1ob=5
* companies that have 100 or more employees	

             Source: eMarketer, Nov
             2010
Enhanced
                      Collaboration	

               Shared         Faster access to
BUSINESS      Workspaces	

     Information	


BENEFITS	

   Extended Organizational Reach	

                        Compete	

                        Ability to
• When   leveraged effectively,
 social networks become an
                                       THE
 equalizer, leveling the playing     EQUALIZER	

 field	

• Itallows organizations both
 large and small to compete
 and be relevant in their space	

• Ability
        to influence with little
 or not cost
UNANTICIPATED DISASTERS
PREVENTING DISASTERS
IS YOUR ORGANIZATION
       PREPARED FOR...?	

• Employees    posting opinions about the organization	


• Managing    brand reputation and public opinion/
exposure	


• Responding    to positive and negative feedback from
customers	


• Standing   by the decision NOT to get engaged....?
SOCIAL MEDIA SWOT	

•  Strength - ability to build •  Weakness - silo-ed as a
   relationships with your         business function and not
   target audience like never      integrated in overall
   before.	

                      business strategy.	



•  Opportunities - its          •  Threat - fear of losing
   where our customers             control. Seeks risk aversion.
   are. Integration with the       Non-innovative.	

   business is key.
ESTABLISHING A POLICY	





             ?
THE BASICS	

• Doyour employees know what is acceptable or
 permitted?	


• How    may (or not) employees identify themselves?	


• To   what degree can corporate content be used?	


• Hasyour organization determined what is can do
 with information obtained through social media?	


           Establishing a policy is critical! 	

             
ESTABLISH A STRATEGY	

• Governance  required implement and enforce acceptable
 usage policy covering social networking sites	


• It
   is key that all staff receive security awareness training
 covering your acceptable usage policy for social
 networking	


• Promote  good practices to help improve users behavior
 ultimately reducing and/or mitigating some of the risks	


• Permit access only to social networking sites that have
 obvious business benefits only to users with a business
 need
ESTABLISH A STRATEGY	

• Institute   processes to manage and monitor activity	


• Be flexible - overall uncertainty about what strategies and
 tactics to adopt to security social media	


• Understand and identify which users create the most
 amount of risk?	


• Create   reasonable guidelines that can be followed	


• Review sites terms and conditions to understand risks
 associated with each site
REGULATION is coming	

For regulated industries, what
requirements do you face?	

ex. FINRA	


Employers know ALOT about
their employees/candidates
HR: OBTAINING INFORMATION FROM
          SOCIAL NETWORKS	

• HRis tempted to peak at these sites to gather information
 about employees and potential candidates	


• Consider     discrimination lawsuits! Proceed with caution.	

- ex: viewing the online photo/picture of a candidate	


• Consistency      is KING - it will minimize your risk. 	

- ex: if conducting a search for ONE candidate, then do so for ALL	


• Evenif employers have the technical capability to gain access
 to social networking information of their employees or
 candidates, it does not imply the legal right to do so.
consider ALL risks	





Is there a need to address how to evaluate the risk of
sharing too much information online in relation to the
            value it brings to the business?
Security Concerns	

• There is a continued growth in social networking sites
      being used as an attack distribution platform	

	


• Users are less likely to see malware when it is passed
      on by a friend as it has a certain level of authenticity
      and a level of trust	

	


• Social networks give attackers a potentially powerful
      point of leverage, sometimes allowing them to launch
      sophisticated attacks against businesses	

	


• Known weaknesses exist in the security of the
      networks themselves, which limit our control
Threatscape of sites	

•  Session-hijacking / authentication weaknesses	

•  Profile harvesting leading to social engineering	

                  -  ex: phishing / spear-phishing	

	

•  Cross-site scripting (XSS) / Cross-site request forgery
      (CSRF)	


•  Malicious code / Malware	

                  -  ex: drive-by downloads
XSS Example	

        iframe id= CrazyDaVinci
        style= display:none; src= http://
        m.facebook.com/connect/prompt_feed.php?
        display=wapuser_message_prompt= script
        window.onload=function(){document.forms
        [0].message.value= Just visited
        http://y.ahoo.it/gajeBA Wow.. cool! nice page
        dude!!! ;document.forms[0].submit();}/
        script /iframe
• this bit of HTML/Javascript would be included in a viral page. 	

	

• the code sets the content of the wall post to a message that
includes a link to a viral page, then submits the prompt automatically.
Microsoft has documented a
steady rise in the number of
attacks targeting social networks 	



   Primary vectors: 	

   	


   • Phishing attempts	

   	


   • Social engineering tactics	

   	

   	

   Instances of Phishing impressions increased from 8.3% to 84.5%
Verizon highlighted in its 2011
DBIR, that malware and social
engineering to have been the
culprit for 60% of all reported
attacks/breaches	


  Contribution of malware:	

  	


  • 49% of breaches	

  	


  • 79% of records stolen
PROTECT  SERVE	





            Policing Social Media: 	

How do we protect the usage of social networks?
Policing Social Media	

•  Is it possible to establish and implement a standard set
      of guidelines for enterprise users?	

	

•  ...that would help to not only prevent data leaks, but
      also keep emerging social networking malware at bay?	

	

	

        •  It requires a combination of technical, behavioral
                   and organizational security controls
CONCLUSION	

• Social media isn t a choice anyone….recognize it is
      a business transformation tool	

	

• Perform a comprehensive risk assessment against all
      social networks that will be considered for use	


• Social networks DO introduce new security risks -
      take a formal approach to mitigate them through
      policy enforcement and user education	

	

• Doing nothing is not an option...will you take that
      risk?
QUESTIONS?	

   Contact Info:	


                      linkedin.com/
                      jaymclaughlin	





                 @jaymclaughlin

Weitere ähnliche Inhalte

Was ist angesagt?

Death of the Newspaper Industy: Bad News for You
Death of the Newspaper Industy: Bad News for YouDeath of the Newspaper Industy: Bad News for You
Death of the Newspaper Industy: Bad News for YouTaleo Research
 
Social Media and HR
Social Media and HRSocial Media and HR
Social Media and HRLance Haun
 
Increasing Employee Engagement using Social Media
Increasing Employee Engagement using Social MediaIncreasing Employee Engagement using Social Media
Increasing Employee Engagement using Social MediaVirtual EyeSee
 
Social Networking Fundamentals
Social Networking FundamentalsSocial Networking Fundamentals
Social Networking FundamentalsAyelet Baron
 
Spcial Networking Part I. "Differentiate Yourself on Social Networks"
Spcial Networking Part I. "Differentiate Yourself on Social Networks"Spcial Networking Part I. "Differentiate Yourself on Social Networks"
Spcial Networking Part I. "Differentiate Yourself on Social Networks"Wise Career Move LLC
 
How Collaboration Can Change the World: Getting Networked in the Networking Age
How Collaboration Can Change the World: Getting Networked in the Networking Age How Collaboration Can Change the World: Getting Networked in the Networking Age
How Collaboration Can Change the World: Getting Networked in the Networking Age Ayelet Baron
 
Social Media: Perspectives from the Trenches
Social Media: Perspectives from the TrenchesSocial Media: Perspectives from the Trenches
Social Media: Perspectives from the TrenchesJim Cahill
 
Leverage social media for customer interaction
Leverage social media for customer interactionLeverage social media for customer interaction
Leverage social media for customer interactionInfo-Tech Research Group
 
Getting Started with Enterprise Social Networking
Getting Started with Enterprise Social NetworkingGetting Started with Enterprise Social Networking
Getting Started with Enterprise Social NetworkingDavid Stephens
 
How Social Media Changes Business, Technology, and Society
How Social Media Changes Business, Technology, and SocietyHow Social Media Changes Business, Technology, and Society
How Social Media Changes Business, Technology, and SocietyKanda Runapongsa Saikaew
 
Social Media: Should We, Should We Not, or Should We Ignore the Whole Thing
Social Media: Should We, Should We Not, or Should We Ignore the Whole ThingSocial Media: Should We, Should We Not, or Should We Ignore the Whole Thing
Social Media: Should We, Should We Not, or Should We Ignore the Whole ThingJim Cahill
 
Social Media & Employee Engagement
Social Media & Employee EngagementSocial Media & Employee Engagement
Social Media & Employee EngagementMichael Specht
 
CIO's Web 2 0 In The Enterprise
CIO's Web 2 0 In The EnterpriseCIO's Web 2 0 In The Enterprise
CIO's Web 2 0 In The EnterpriseAbbie Lundberg
 
Social Media for Sustainable Business [Fall 2010 Refresh]
Social Media for Sustainable Business [Fall 2010 Refresh]Social Media for Sustainable Business [Fall 2010 Refresh]
Social Media for Sustainable Business [Fall 2010 Refresh]Earthsite
 
Wave 5 The Socialisation of Brands
Wave 5 The Socialisation of BrandsWave 5 The Socialisation of Brands
Wave 5 The Socialisation of Brandsmediabrandsfrance
 
Socializing Your CEO : Présence numérique des grands partons
Socializing Your CEO : Présence numérique des grands partons Socializing Your CEO : Présence numérique des grands partons
Socializing Your CEO : Présence numérique des grands partons Laurent de Personnalité
 
Social Media Recruitment PPT
Social Media Recruitment PPTSocial Media Recruitment PPT
Social Media Recruitment PPTSuman Banerjee
 
Measuring Value Of New Media Channels While Combining Them With Traditional C...
Measuring Value Of New Media Channels While Combining Them With Traditional C...Measuring Value Of New Media Channels While Combining Them With Traditional C...
Measuring Value Of New Media Channels While Combining Them With Traditional C...Shael Sharma
 

Was ist angesagt? (19)

Death of the Newspaper Industy: Bad News for You
Death of the Newspaper Industy: Bad News for YouDeath of the Newspaper Industy: Bad News for You
Death of the Newspaper Industy: Bad News for You
 
Social Media and HR
Social Media and HRSocial Media and HR
Social Media and HR
 
Increasing Employee Engagement using Social Media
Increasing Employee Engagement using Social MediaIncreasing Employee Engagement using Social Media
Increasing Employee Engagement using Social Media
 
Social Networking Fundamentals
Social Networking FundamentalsSocial Networking Fundamentals
Social Networking Fundamentals
 
Spcial Networking Part I. "Differentiate Yourself on Social Networks"
Spcial Networking Part I. "Differentiate Yourself on Social Networks"Spcial Networking Part I. "Differentiate Yourself on Social Networks"
Spcial Networking Part I. "Differentiate Yourself on Social Networks"
 
How Collaboration Can Change the World: Getting Networked in the Networking Age
How Collaboration Can Change the World: Getting Networked in the Networking Age How Collaboration Can Change the World: Getting Networked in the Networking Age
How Collaboration Can Change the World: Getting Networked in the Networking Age
 
Social Media: Perspectives from the Trenches
Social Media: Perspectives from the TrenchesSocial Media: Perspectives from the Trenches
Social Media: Perspectives from the Trenches
 
Leverage social media for customer interaction
Leverage social media for customer interactionLeverage social media for customer interaction
Leverage social media for customer interaction
 
Getting Started with Enterprise Social Networking
Getting Started with Enterprise Social NetworkingGetting Started with Enterprise Social Networking
Getting Started with Enterprise Social Networking
 
How Social Media Changes Business, Technology, and Society
How Social Media Changes Business, Technology, and SocietyHow Social Media Changes Business, Technology, and Society
How Social Media Changes Business, Technology, and Society
 
Social Media: Should We, Should We Not, or Should We Ignore the Whole Thing
Social Media: Should We, Should We Not, or Should We Ignore the Whole ThingSocial Media: Should We, Should We Not, or Should We Ignore the Whole Thing
Social Media: Should We, Should We Not, or Should We Ignore the Whole Thing
 
Social Media & Employee Engagement
Social Media & Employee EngagementSocial Media & Employee Engagement
Social Media & Employee Engagement
 
CIO's Web 2 0 In The Enterprise
CIO's Web 2 0 In The EnterpriseCIO's Web 2 0 In The Enterprise
CIO's Web 2 0 In The Enterprise
 
Social Media for Sustainable Business [Fall 2010 Refresh]
Social Media for Sustainable Business [Fall 2010 Refresh]Social Media for Sustainable Business [Fall 2010 Refresh]
Social Media for Sustainable Business [Fall 2010 Refresh]
 
Wave 5 The Socialisation of Brands
Wave 5 The Socialisation of BrandsWave 5 The Socialisation of Brands
Wave 5 The Socialisation of Brands
 
Socializing Your CEO : Présence numérique des grands partons
Socializing Your CEO : Présence numérique des grands partons Socializing Your CEO : Présence numérique des grands partons
Socializing Your CEO : Présence numérique des grands partons
 
Philly.com4
Philly.com4Philly.com4
Philly.com4
 
Social Media Recruitment PPT
Social Media Recruitment PPTSocial Media Recruitment PPT
Social Media Recruitment PPT
 
Measuring Value Of New Media Channels While Combining Them With Traditional C...
Measuring Value Of New Media Channels While Combining Them With Traditional C...Measuring Value Of New Media Channels While Combining Them With Traditional C...
Measuring Value Of New Media Channels While Combining Them With Traditional C...
 

Andere mochten auch

Exploring DDoS Attacks: Impact to Community Financial Institutions
Exploring DDoS Attacks: Impact to Community Financial InstitutionsExploring DDoS Attacks: Impact to Community Financial Institutions
Exploring DDoS Attacks: Impact to Community Financial InstitutionsJay McLaughlin
 
National Shipbuilding Procurement Strategy: Economic Impact, Nova Scotia
National Shipbuilding Procurement Strategy: Economic Impact, Nova ScotiaNational Shipbuilding Procurement Strategy: Economic Impact, Nova Scotia
National Shipbuilding Procurement Strategy: Economic Impact, Nova ScotiaShipsStartHere.ca
 
Securing the Virtual Branch
Securing the Virtual BranchSecuring the Virtual Branch
Securing the Virtual BranchJay McLaughlin
 
ملف اليهود فى مصر الحيثة
ملف اليهود فى مصر الحيثةملف اليهود فى مصر الحيثة
ملف اليهود فى مصر الحيثةalsoefy
 
Evaluating your Cybersecurity Preparedness - FFIEC Assessment
Evaluating your Cybersecurity Preparedness - FFIEC AssessmentEvaluating your Cybersecurity Preparedness - FFIEC Assessment
Evaluating your Cybersecurity Preparedness - FFIEC AssessmentJay McLaughlin
 
Todorov’s theory
Todorov’s theoryTodorov’s theory
Todorov’s theoryjessgregson
 
Asesõna
AsesõnaAsesõna
Asesõnasgrig
 
Protecting the Information Infrastructure
Protecting the Information InfrastructureProtecting the Information Infrastructure
Protecting the Information InfrastructureJay McLaughlin
 
10 Ways Buildium Has Used Video
10 Ways Buildium Has Used Video10 Ways Buildium Has Used Video
10 Ways Buildium Has Used VideoThad Peterson
 
Securing 3-Mode Mobile Banking
Securing 3-Mode Mobile BankingSecuring 3-Mode Mobile Banking
Securing 3-Mode Mobile BankingJay McLaughlin
 
ShipsStartHere.ca: Nova Scotia’s response to the National Shipbuilding Procur...
ShipsStartHere.ca: Nova Scotia’s response to the National Shipbuilding Procur...ShipsStartHere.ca: Nova Scotia’s response to the National Shipbuilding Procur...
ShipsStartHere.ca: Nova Scotia’s response to the National Shipbuilding Procur...ShipsStartHere.ca
 
BYOD: Device Control in the Wild, Wild, West
BYOD: Device Control in the Wild, Wild, WestBYOD: Device Control in the Wild, Wild, West
BYOD: Device Control in the Wild, Wild, WestJay McLaughlin
 
Phil's Senior Seminar Slide Show
Phil's Senior Seminar Slide ShowPhil's Senior Seminar Slide Show
Phil's Senior Seminar Slide Showphillycheez
 

Andere mochten auch (17)

Pumkin
Pumkin Pumkin
Pumkin
 
Exploring DDoS Attacks: Impact to Community Financial Institutions
Exploring DDoS Attacks: Impact to Community Financial InstitutionsExploring DDoS Attacks: Impact to Community Financial Institutions
Exploring DDoS Attacks: Impact to Community Financial Institutions
 
National Shipbuilding Procurement Strategy: Economic Impact, Nova Scotia
National Shipbuilding Procurement Strategy: Economic Impact, Nova ScotiaNational Shipbuilding Procurement Strategy: Economic Impact, Nova Scotia
National Shipbuilding Procurement Strategy: Economic Impact, Nova Scotia
 
Securing the Virtual Branch
Securing the Virtual BranchSecuring the Virtual Branch
Securing the Virtual Branch
 
-Pass it on--
 -Pass it on-- -Pass it on--
-Pass it on--
 
ملف اليهود فى مصر الحيثة
ملف اليهود فى مصر الحيثةملف اليهود فى مصر الحيثة
ملف اليهود فى مصر الحيثة
 
Evaluating your Cybersecurity Preparedness - FFIEC Assessment
Evaluating your Cybersecurity Preparedness - FFIEC AssessmentEvaluating your Cybersecurity Preparedness - FFIEC Assessment
Evaluating your Cybersecurity Preparedness - FFIEC Assessment
 
Ngou CV - for dlink
Ngou CV - for dlinkNgou CV - for dlink
Ngou CV - for dlink
 
-Pass it on--
 -Pass it on-- -Pass it on--
-Pass it on--
 
Todorov’s theory
Todorov’s theoryTodorov’s theory
Todorov’s theory
 
Asesõna
AsesõnaAsesõna
Asesõna
 
Protecting the Information Infrastructure
Protecting the Information InfrastructureProtecting the Information Infrastructure
Protecting the Information Infrastructure
 
10 Ways Buildium Has Used Video
10 Ways Buildium Has Used Video10 Ways Buildium Has Used Video
10 Ways Buildium Has Used Video
 
Securing 3-Mode Mobile Banking
Securing 3-Mode Mobile BankingSecuring 3-Mode Mobile Banking
Securing 3-Mode Mobile Banking
 
ShipsStartHere.ca: Nova Scotia’s response to the National Shipbuilding Procur...
ShipsStartHere.ca: Nova Scotia’s response to the National Shipbuilding Procur...ShipsStartHere.ca: Nova Scotia’s response to the National Shipbuilding Procur...
ShipsStartHere.ca: Nova Scotia’s response to the National Shipbuilding Procur...
 
BYOD: Device Control in the Wild, Wild, West
BYOD: Device Control in the Wild, Wild, WestBYOD: Device Control in the Wild, Wild, West
BYOD: Device Control in the Wild, Wild, West
 
Phil's Senior Seminar Slide Show
Phil's Senior Seminar Slide ShowPhil's Senior Seminar Slide Show
Phil's Senior Seminar Slide Show
 

Ähnlich wie Social Media Strategy: Managing Risks and Security Concerns

Social media in recruiting
Social media in recruitingSocial media in recruiting
Social media in recruitingSneha Joy
 
Digital mindset for Social HR
Digital mindset for Social HRDigital mindset for Social HR
Digital mindset for Social HRRuchi Bhatia
 
Social networks and social media analysis in the context of the enterprise
Social networks and social media analysis in the context of the enterpriseSocial networks and social media analysis in the context of the enterprise
Social networks and social media analysis in the context of the enterpriseRamez Al-Fayez
 
Risks of social media for businesses (and how to manage them)
Risks of social media for businesses (and how to manage them)Risks of social media for businesses (and how to manage them)
Risks of social media for businesses (and how to manage them)CrowdControlHQ
 
Effective Training and Policy Takes the Fear out of Social Networking - Shawn...
Effective Training and Policy Takes the Fear out of Social Networking - Shawn...Effective Training and Policy Takes the Fear out of Social Networking - Shawn...
Effective Training and Policy Takes the Fear out of Social Networking - Shawn...sdavis532
 
Social Media Presentation Gt Vfinal
Social Media Presentation Gt VfinalSocial Media Presentation Gt Vfinal
Social Media Presentation Gt VfinalDanny Miller
 
Leveraging the Power of Social Media - For Cisco Partners
Leveraging the Power of Social Media - For Cisco PartnersLeveraging the Power of Social Media - For Cisco Partners
Leveraging the Power of Social Media - For Cisco PartnersSquareOne|Consulting
 
Starting Clients with Digital and Social Media Marketing
Starting Clients with Digital and Social Media MarketingStarting Clients with Digital and Social Media Marketing
Starting Clients with Digital and Social Media MarketingSusan Chesley Fant
 
Communication Strategies for Leveraging Social Media
Communication Strategies for Leveraging Social Media Communication Strategies for Leveraging Social Media
Communication Strategies for Leveraging Social Media Sazed Monsur
 
Desarrollo de social media en los canales de venta
Desarrollo de social media en los canales de ventaDesarrollo de social media en los canales de venta
Desarrollo de social media en los canales de ventaEmpresas 2.0
 
Social business: from #buzz to #benefits
Social business: from #buzz to #benefitsSocial business: from #buzz to #benefits
Social business: from #buzz to #benefitsVelrada
 
Employee Advocacy - The Next Step in Digital Transformation
Employee Advocacy - The Next Step in Digital Transformation Employee Advocacy - The Next Step in Digital Transformation
Employee Advocacy - The Next Step in Digital Transformation Sociabble
 
Recruitment through Social Media
Recruitment through Social MediaRecruitment through Social Media
Recruitment through Social MediaArindam Ghose
 
Understanding Social Media Networks for Financial Advisors - A Webinar for Ac...
Understanding Social Media Networks for Financial Advisors - A Webinar for Ac...Understanding Social Media Networks for Financial Advisors - A Webinar for Ac...
Understanding Social Media Networks for Financial Advisors - A Webinar for Ac...Jay Palter Social Advisory
 
Social Media 101: Understanding Social Media Channels, Demographics, and Usage
Social Media 101: Understanding Social Media Channels, Demographics, and UsageSocial Media 101: Understanding Social Media Channels, Demographics, and Usage
Social Media 101: Understanding Social Media Channels, Demographics, and UsageDebra Askanase
 
Maz @ SoAmpli social media crash course
Maz @ SoAmpli social media crash course Maz @ SoAmpli social media crash course
Maz @ SoAmpli social media crash course Mishel Cordes
 
Social Media Hands-On Workshop - Sept 2010
Social Media Hands-On Workshop - Sept 2010Social Media Hands-On Workshop - Sept 2010
Social Media Hands-On Workshop - Sept 2010Donny Shimamoto
 

Ähnlich wie Social Media Strategy: Managing Risks and Security Concerns (20)

Social media in recruiting
Social media in recruitingSocial media in recruiting
Social media in recruiting
 
Digital mindset for Social HR
Digital mindset for Social HRDigital mindset for Social HR
Digital mindset for Social HR
 
Social networks and social media analysis in the context of the enterprise
Social networks and social media analysis in the context of the enterpriseSocial networks and social media analysis in the context of the enterprise
Social networks and social media analysis in the context of the enterprise
 
Risks of social media for businesses (and how to manage them)
Risks of social media for businesses (and how to manage them)Risks of social media for businesses (and how to manage them)
Risks of social media for businesses (and how to manage them)
 
Effective Training and Policy Takes the Fear out of Social Networking - Shawn...
Effective Training and Policy Takes the Fear out of Social Networking - Shawn...Effective Training and Policy Takes the Fear out of Social Networking - Shawn...
Effective Training and Policy Takes the Fear out of Social Networking - Shawn...
 
Social media risks guide
Social media risks guideSocial media risks guide
Social media risks guide
 
Social Media Presentation Gt Vfinal
Social Media Presentation Gt VfinalSocial Media Presentation Gt Vfinal
Social Media Presentation Gt Vfinal
 
Philly.com5
Philly.com5Philly.com5
Philly.com5
 
Social media-assessment
Social media-assessmentSocial media-assessment
Social media-assessment
 
Leveraging the Power of Social Media - For Cisco Partners
Leveraging the Power of Social Media - For Cisco PartnersLeveraging the Power of Social Media - For Cisco Partners
Leveraging the Power of Social Media - For Cisco Partners
 
Starting Clients with Digital and Social Media Marketing
Starting Clients with Digital and Social Media MarketingStarting Clients with Digital and Social Media Marketing
Starting Clients with Digital and Social Media Marketing
 
Communication Strategies for Leveraging Social Media
Communication Strategies for Leveraging Social Media Communication Strategies for Leveraging Social Media
Communication Strategies for Leveraging Social Media
 
Desarrollo de social media en los canales de venta
Desarrollo de social media en los canales de ventaDesarrollo de social media en los canales de venta
Desarrollo de social media en los canales de venta
 
Social business: from #buzz to #benefits
Social business: from #buzz to #benefitsSocial business: from #buzz to #benefits
Social business: from #buzz to #benefits
 
Employee Advocacy - The Next Step in Digital Transformation
Employee Advocacy - The Next Step in Digital Transformation Employee Advocacy - The Next Step in Digital Transformation
Employee Advocacy - The Next Step in Digital Transformation
 
Recruitment through Social Media
Recruitment through Social MediaRecruitment through Social Media
Recruitment through Social Media
 
Understanding Social Media Networks for Financial Advisors - A Webinar for Ac...
Understanding Social Media Networks for Financial Advisors - A Webinar for Ac...Understanding Social Media Networks for Financial Advisors - A Webinar for Ac...
Understanding Social Media Networks for Financial Advisors - A Webinar for Ac...
 
Social Media 101: Understanding Social Media Channels, Demographics, and Usage
Social Media 101: Understanding Social Media Channels, Demographics, and UsageSocial Media 101: Understanding Social Media Channels, Demographics, and Usage
Social Media 101: Understanding Social Media Channels, Demographics, and Usage
 
Maz @ SoAmpli social media crash course
Maz @ SoAmpli social media crash course Maz @ SoAmpli social media crash course
Maz @ SoAmpli social media crash course
 
Social Media Hands-On Workshop - Sept 2010
Social Media Hands-On Workshop - Sept 2010Social Media Hands-On Workshop - Sept 2010
Social Media Hands-On Workshop - Sept 2010
 

Kürzlich hochgeladen

TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024Lonnie McRorey
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...Fwdays
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity PlanDatabarracks
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteDianaGray10
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .Alan Dix
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLScyllaDB
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Manik S Magar
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenHervé Boutemy
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.Curtis Poe
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clashcharlottematthew16
 

Kürzlich hochgeladen (20)

TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity Plan
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test Suite
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache Maven
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clash
 

Social Media Strategy: Managing Risks and Security Concerns

  • 1. SOCIAL MEDIA: INFILTRATING THE ENTERPRISE MIDTECH IT Summit June 27th, 2011 JAY A. MCLAUGHLIN, CISSP SVP, CHIEF INFORMATION OFFICER
  • 2. DISCLAIMER The materials, thoughts, comments, ideas and opinions expressed throughout this presentation are entirely my own and do not necessarily represent the thoughts or opinions of my employer (past or present).
  • 3. AGENDA •  Defining social media •  Embracing the Inevitable •  Understanding the Benefits Risks •  Friending your Customers •  Preventing social media disasters •  Building a strategy
  • 4. : forms of electronic communication (as Web sites for social networking and microblogging) through which users create online communities to share information, ideas, personal messages, and other content What is Social Media? Social media is media for social interaction using highly accessible and scalable communication techniques. Social media is the use of web-based and mobile technologies to turn communication into interactive dialogue.
  • 5.
  • 6. •  500 Million •  250 Million •  700 Billion Source: Facebook.com April 2011
  • 8. •  6939 •  319 •  140 Million Source: Twitter. com March 2011
  • 10. •  100 Million •  2 Million •  4.3 Billion Source: LinkedIn.com May 2011
  • 11.
  • 12. WHY SHOULD WE CARE? •  It's where your customers are •  It's where your prospects are •  It's reach stretches further broader than any marketing channel •  It's relevant to be in the game
  • 13. We don t have a choice on whether we will DO social media, the question is how WELL we DO it. - Erik Qualman, Author Socialnomics http://www.youtube.com/user/Socialnomics09?blend=1ob=5
  • 14. * companies that have 100 or more employees Source: eMarketer, Nov 2010
  • 15. Enhanced Collaboration Shared Faster access to BUSINESS Workspaces Information BENEFITS Extended Organizational Reach Compete Ability to
  • 16. • When leveraged effectively, social networks become an THE equalizer, leveling the playing EQUALIZER field • Itallows organizations both large and small to compete and be relevant in their space • Ability to influence with little or not cost
  • 19. IS YOUR ORGANIZATION PREPARED FOR...? • Employees posting opinions about the organization • Managing brand reputation and public opinion/ exposure • Responding to positive and negative feedback from customers • Standing by the decision NOT to get engaged....?
  • 20. SOCIAL MEDIA SWOT •  Strength - ability to build •  Weakness - silo-ed as a relationships with your business function and not target audience like never integrated in overall before. business strategy. •  Opportunities - its •  Threat - fear of losing where our customers control. Seeks risk aversion. are. Integration with the Non-innovative. business is key.
  • 22. THE BASICS • Doyour employees know what is acceptable or permitted? • How may (or not) employees identify themselves? • To what degree can corporate content be used? • Hasyour organization determined what is can do with information obtained through social media? Establishing a policy is critical!  
  • 23. ESTABLISH A STRATEGY • Governance required implement and enforce acceptable usage policy covering social networking sites • It is key that all staff receive security awareness training covering your acceptable usage policy for social networking • Promote good practices to help improve users behavior ultimately reducing and/or mitigating some of the risks • Permit access only to social networking sites that have obvious business benefits only to users with a business need
  • 24. ESTABLISH A STRATEGY • Institute processes to manage and monitor activity • Be flexible - overall uncertainty about what strategies and tactics to adopt to security social media • Understand and identify which users create the most amount of risk? • Create reasonable guidelines that can be followed • Review sites terms and conditions to understand risks associated with each site
  • 25. REGULATION is coming For regulated industries, what requirements do you face? ex. FINRA Employers know ALOT about their employees/candidates
  • 26. HR: OBTAINING INFORMATION FROM SOCIAL NETWORKS • HRis tempted to peak at these sites to gather information about employees and potential candidates • Consider discrimination lawsuits! Proceed with caution. - ex: viewing the online photo/picture of a candidate • Consistency is KING - it will minimize your risk. - ex: if conducting a search for ONE candidate, then do so for ALL • Evenif employers have the technical capability to gain access to social networking information of their employees or candidates, it does not imply the legal right to do so.
  • 27. consider ALL risks Is there a need to address how to evaluate the risk of sharing too much information online in relation to the value it brings to the business?
  • 28. Security Concerns • There is a continued growth in social networking sites being used as an attack distribution platform • Users are less likely to see malware when it is passed on by a friend as it has a certain level of authenticity and a level of trust • Social networks give attackers a potentially powerful point of leverage, sometimes allowing them to launch sophisticated attacks against businesses • Known weaknesses exist in the security of the networks themselves, which limit our control
  • 29.
  • 30. Threatscape of sites •  Session-hijacking / authentication weaknesses •  Profile harvesting leading to social engineering -  ex: phishing / spear-phishing •  Cross-site scripting (XSS) / Cross-site request forgery (CSRF) •  Malicious code / Malware -  ex: drive-by downloads
  • 31. XSS Example iframe id= CrazyDaVinci style= display:none; src= http:// m.facebook.com/connect/prompt_feed.php? display=wapuser_message_prompt= script window.onload=function(){document.forms [0].message.value= Just visited http://y.ahoo.it/gajeBA Wow.. cool! nice page dude!!! ;document.forms[0].submit();}/ script /iframe • this bit of HTML/Javascript would be included in a viral page. • the code sets the content of the wall post to a message that includes a link to a viral page, then submits the prompt automatically.
  • 32. Microsoft has documented a steady rise in the number of attacks targeting social networks Primary vectors: • Phishing attempts • Social engineering tactics Instances of Phishing impressions increased from 8.3% to 84.5%
  • 33. Verizon highlighted in its 2011 DBIR, that malware and social engineering to have been the culprit for 60% of all reported attacks/breaches Contribution of malware: • 49% of breaches • 79% of records stolen
  • 34. PROTECT SERVE Policing Social Media: How do we protect the usage of social networks?
  • 35. Policing Social Media •  Is it possible to establish and implement a standard set of guidelines for enterprise users? •  ...that would help to not only prevent data leaks, but also keep emerging social networking malware at bay? •  It requires a combination of technical, behavioral and organizational security controls
  • 36. CONCLUSION • Social media isn t a choice anyone….recognize it is a business transformation tool • Perform a comprehensive risk assessment against all social networks that will be considered for use • Social networks DO introduce new security risks - take a formal approach to mitigate them through policy enforcement and user education • Doing nothing is not an option...will you take that risk?
  • 37. QUESTIONS? Contact Info: linkedin.com/ jaymclaughlin @jaymclaughlin

Hinweis der Redaktion

  1. 1. 500 Million active users 2. 250 Million mobile users 700 Billions minutes per month users spend 300,000 businesses have a presence on Facebook - Socialnomics;
  2. 1. 6939 tweets per second 2. 319 signups per second / 300,000 per day 3. 140 Million tweets per day
  3. Websites lag for information sharing, but using Twitter, businesses now have access to hundreds/thousands/millions of followers through a system designed to reach people across the globe in real time in a matter of seconds. 
  4. 1. 100 Million professional users 2. 2 Million companies have LinkedIn company pages 3. 4.3 Billion initial value for IPO
  5. Q-The ROI is often raised - how do we measure? A-The ROI of doing it is that you ’ re company will be in business in five yrs...
  6. Why are we trying to measure social media like a traditional channel?  Social media can touch every facet of business and is more an extension of good business.  When asked what the ROI of social media, he responds, "what's the ROI of your phone?"- What is the cost of doing nothing?  - Do you really want to take that risk?
  7. Basically, by the end of this year, 4 out of 5 businesses will adopt in some form.
  8. 1-Taco Bell - 2 million views on YouTube when NYC restaurant infested with rats 2-The microphone is always on! if you wouldn ’ t say something to everyone, don ’ t say it at all. 3-American Red Cross - accidental mixup by employee thinking he was posting a personal tweet
  9. This past February, Southwest Airlines kicked director Kevin Smith off a flight from San Francisco headed to Los Angeles for being too fat. Southwest was quick to respond — 16 minutes after Smith ’ s first tweet regarding the incident. TechCrunch - heavily followed tech blog - experience slowness which impacted site visitors. After tweeting, they received a call from a Comcast manager that and the problem was resolved within 20 minutes.
  10. 1-Identify the collaboration hot-spots 2-Select technologies that will improve or accelerate existing process workflows 3-Identify the high-value business outcomes you want to achieve 4-The benefits and employments of social media tools are different for every organization. The ROI may not be as identifiable for your company.
  11. Not having a policy is no longer optional. And it is a good place to start. You need to give your employees a guide on how to successfully engage online. These guidelines should be supported by training on how to use social media tools effectively.
  12. Social media demands new technology and a fresh business approach. IT must make sure any traffic generated doesn ’ t bring the business applications your organization depends on to its knees. Your network needs to be told to give ‘ real work ’ the priority it deserves.
  13. the Genetic Information Nondiscrimination Act ("GINA") that went into effect on November 21, 2009, prohibits employers from utilizing genetic tests or considering an applicant or employee's genetic background in hiring, firing, or promotions. with the explosion in the use of social media, the EEOC is worried that health insurers and employers will data mine an applicant or employee's social media accounts and utilize the information obtained to discriminate against them -- may result in expensive litigation!
  14. 1-Although this practice is common, employers that rely on social media websites to obtain information regarding applicants ’ employment histories and personal lives should proceed with caution. 2-failure to hire the applicant because of his or her race, ethnicity, gender, or any other protected classification that might be perceived from the picture. 4-What are the employee ’ s rights?  Visiting  www.privacyrights.org ,which is a self-proclaimed Privacy Rights Clearinghouse, doesn ’ t mention social sites.  There is no precedence.
  15. Social networking is a haven for marketers AND a collaboration between colleagues. But it can put corporate information assets and reputations at risk. Social networking platforms, such as Facebook, Twitter and LinkedIn, are becoming an integral part of people's personal and business worlds. The lines are blurring…
  16. 1-Recent study by Symantec 2-We need to educate - example - when reading emails they're kind of aware of looking out for in unsafe looking attachments or spelling or grammar mistakes 3-Corporations are increasingly being exposed to hacking by savvy attackers who glean information about their employees from social networks. 4-HTTPS at the point of authentication, then the connection is switched to HTTP
  17. 1-Lack of SSL - recommend using ForceTLS to obtain a secure connection when offered 1-HTTPS at the point of authentication, then the connection is switched to HTTP 3-Critical XSS vulnerability that would make it possible for attackers to infect users with spyware, adware, and just maybe anything else they want. 3-One in five web-based attacks are aimed at social networks 4-Automatic infection without intentional user request
  18. Anyone clicking the link would get the same code executed on their account.
  19. The report found a steady increase in social engineering attacks and an influx of rogue security software, designed to trick users into installing phony antivirus programs containing keyloggers, backdoors and other nasty malware...why? There is an increased level of trust people have on SNs.
  20. More attacks targeting the username and passwords of social networking users..why? These are passwords that they might be using for other sites, such as financial sites. A Social Network Fraud survey in 2010 by Harris Interactive showed that nearly 75% (sample of 1,103) of Americans use the same password for their social sites and email.
  21. Requires a combination of technical, behavioral and organizational security controls