230 likes | 452 Views
Slide Heading. Social Media: Awareness, Audit and Assurance. Tom Snyder Trivera Interactive November 16 th 2011. Introductions. Trivera Interactive Web site development, Email Marketing, SEO and Social Media Social Media Strategies and Policies. Tom Snyder Founded Trivera in 1996
E N D
Slide Heading Social Media: Awareness, Audit and Assurance Tom Snyder Trivera Interactive November 16th 2011
Introductions • Trivera Interactive • Web site development, Email Marketing, SEO and Social Media • Social Media Strategies and Policies. • Tom Snyder • Founded Trivera in 1996 • Working with businesses and organizations to find the acceptable level of balance between visionary possibilities and technological and organizational realities.
Social Media Usage • Top 100 most valuable brands in the world are experiencing a direct correlation between top financial performance and deep social media engagement • ~ ENGAGEMENTdb, The World’s Most Valuable Brands • Fortune Global 100 companies • 65% have active Twitter accounts • 54% have Facebook fan pages • 50% have YouTube video channels • 33% have corporate blogs • ~Burson-Marsteller, The Global Social Media Check-up Insights
Social Media Usage 95% of social media users now use it for business reasons 61%use public social media sites like LinkedIn, Twitter, Facebook, and YouTube every day (up from 51% in 2008). 15% use these sites "constantly throughout the day. 56% work for companies that have no policies that cover use at work and outside work
Social Media Usage 76% of companies now use Social Media for business purposes 43% have experienced employee misuse 31% have disciplined employees for misuse 29%block employee access 27%monitor employee use 25%ban use for non-business purposes
Risks for Business • Internal/Infrastructure • Viruses/malware • Non-compliance with record management regulations (PCI-DSS, HIPAA) • Employee Inefficiency • Employee Headhunting
Malware and Chain Exploitation • Malicious profile generation • Exploitation of “Social Human Touch” • Worm Generation – Chain Infection and Reaction • Drive-by-Download Browser Attacks • Exploitation of Custom Code and APIs • Exploitation of URL Shorteners or Hidden Links • QR Codes
Risks for Business • External/Customer Facing • Lack of control over publicly-generated content • Lack of control over internally-generated content • Customer expectations • Brand hijacking
Addressing Risk Tactics without strategy is the noise before defeat Strategy without tacticsis the slowest route to victory -Sun Tzu
Addressing Risk • Social Media Strategy • Set your Goals • Identify your Target • Choose your Tools • Craft your Voice • Define your Roles • Commit to Consistency • Measure and Improve
Addressing Risk • Social Media Policy • “Official” Voices • Associated Voices • Everyone Else • Work and Non-Work Usage • Process • Technology
Mitigating Risk Source: Social Media: Business Benefits and Security, Governance and Assurance Perspectives , ISACA Emerging Technology Whitepaper, May 2010
Social Media Audit/Assurance • ISACA's Social Media Audit Assurance Program released February 2011 and is available to members only • Objective • The objective of the social media audit/assurance review is to provide management with an independent assessment relating to the effectiveness of controls over the enterprise’s social media policies and processes. • Scope • The review will focus on governance, policies, procedures, training and awareness functions related to social media. Specifically, it will address: • Strategy and governance—policies and frameworks • People—training and awareness • Processes • Technology
Resources and References • 5 low-risk, high-reward experiments that could turn IT people into heroes • FaceTimeSurvey Reveals 38% of IT Managers Ignoring Web 2.0 Risks • IT departments in dark over social media use • Social Media in Healthcare Marketing: Making the Case • Data breaches and the erosion of consumer trust in brands • Top Five Social Media Risks for Business: New ISACA White Paper • Social Media: Business Benefits and Security, Governance and Assurance Perspectives • Chain Exploitation - Social Media Malware • ISACA's Social Media Audit Assurance Programreleased February 2011 and is available to members only
Tom Snyder – tom@trivera.comhttp://www.triveraguy.comTrivera Interactive http://www.trivera.com