340 likes | 361 Views
Join this enlightening webinar to discover effective methods for identifying and addressing the risks associated with hyperconnectivity in social media. Chris McClean, Principal Analyst, and Research Director Nick Hayes will delve into enterprise challenges, risk management best practices, classifying social media risks, and technologies to monitor and enforce controls. Learn from industry insights and practical strategies to safeguard your organization's online presence. Don't miss this crucial discussion on mitigating risks in the digital landscape.
E N D
WebinarEmbrace Social Media Safely: Effective Methods To Identify And Address The Risks Of Hyperconnectivity Chris McClean, Principal Analyst, Research Director Nick Hayes, Researcher November 27, 2012. Call in at 12:55 p.m. Eastern time
Agenda • Enterprise challenges with social media • Risk management best practices • Classifying social media risks • Technologies to help monitor and enforce controls
Agenda • Enterprise challenges with social media • Risk management best practices • Classifying social media risks • Technologies to help monitor and enforce controls
Social media is a top concern “How concerned are you with the risk that the following initiatives or technologies could introduce in your firm?" Base: 1,124 North American and European security and risk decision-makers at companies with 1,000 or more employees; Source: Forrsights Security Survey, Q2 2012 5
New challenges for the enterprise SOCIAL MEDIA IS A NEW MEDIA FORMAT WITH NEW RISKS TO THE COMPANY It disseminates information to the general public. It’s available anywhere at any time. It blurs the lines between professional and private lives. Accounts are easy to start and difficult to track. It evolves rapidly. It’s not always static, modifications are easily made — and the data is not always company-owned.
Blocking social isn’t practical (cont.) THE BUSINESS OPPORTUNITY IS TOO GREAT The number of new client touchpoints are vast: Over 1 billion active Facebook accounts Over 500 million Twitter accounts (unofficially) Over 175 million LinkedIn members The business opportunity for Twitter alone could reach $1.3 trillion?!? “[Social media] has the potential to be the best lead generation tool in the financial advisor business, ever!”
Blocking social isn’t practical (cont.) THERE ARE TOO MANY BUSINESS USE-CASES
Blocking social isn’t practical (cont.) THERE’S NO EASY APPROACH; OVERSIGHT IS DIFFICULT, BUT CRITICAL 11
Agenda • Enterprise challenges with social media • Risk management best practices • Classifying social media risks • Technologies to help monitor and enforce controls
Incorporate risk mgmt best practices Source: October 12, 2010, “The Risk Manager’s Handbook: How To Explain The Role Of Risk Management” Forrester report
Agenda • Enterprise challenges with social media • Risk management best practices • Classifying social media risks • Technologies to help monitor and enforce controls
Classify the major types of risk Brand and reputational Information security Legal and regulatory Operational Physical security
Classify the major types of risk (cont.) Brand and reputational PR gaffes affect company image. Inappropriate posts, social account sprawl, negative client sentiment, use of profanity
Classify the major types of risk (cont.) Brand and reputational examples They are often slip-ups by employees, and even executives. Can include profanity Result from inexperienced users
Classify the major types of risk (cont.) Information security Information security risks are external and internal. Access control, malware, social account hijacking, data loss, account hacking
Classify the major types of risk (cont.) Information security example
Classify the major types of risk (cont.) Legal and regulatory Regulators look for effective process and controls. Consider government regulations Disclosure and archiving: Financial Industry Regulatory Authority (FINRA), Financial Trade Commission (FTC), Securities and Exchange Commission (SEC) Privacy: Health Insurance Portability and Accountability Act (HIPAA), Gramm Leach Bliley Act (GLBA) Employee rights: National Relations Labor Act (NLRA)
Classify the major types of risk (cont.) Legal and regulatory example
Classify the major types of risk (cont.) Legal and regulatory example Costco’s social media policy was recently found to be in violation of the National Labor Relations Act (NLRA). The NLRB ruled it inhibited employees rights to “engage in protected concerted activities” around collective bargaining and “other mutual aid or protection.”
Classify the major types of risk (cont.) Operational Operational risks diminish efficiency and performance. Service unavailability, productivity losses, process redundancies, gaps in oversight Includes risks of not using social media, competitive disadvantages, ability to recruit and retain talent
Classify the major types of risk (cont.) Physical security Physical security risks expose corporate assets and neglect employee safety. Disclosure of facility locations, corporate datacenters, or personal information Failure to effectively communicate crisis messages or disseminate critical information
Agenda • Enterprise challenges with social media • Risk management best practices • Classifying social media risks • Technologies to help monitor and enforce controls
Determine high priorities and treat them Source: October 12, 2010, “The Risk Manager’s Handbook: How To Explain The Role Of Risk Management” Forrester report
Existing security technology can help Web filtering Block content, block access to sites, allow access with exception request DLP tools Control data, search for leakage via web channels, network analysis and visibility (NAV) Manual web searches Perform ad-hoc web searches, identify policy breaches, inappropriate conduct
Emerging tools offer more support THEY CAN CONNECT THE DOTS AND MANAGE SOCIAL MORE HOLISTICALLY
Social control systems Standalone products that enforce policy controls
Social engagement platforms Engagement suites that cover compliance requirements
Social marketing management platforms Systems to establish and streamline social marketing processes
Social listening platforms Analytics tools and services that monitor activity and develop social intelligence
Recommendations • Technologies are critical, but it starts with establishing the effective processes and policies, and building the right culture. • Try to manage social media risks on your own first; it will help identify issues for your organization and help justify budget. • Piggyback on other team’s budgets where you can. • Don’t become the department of “no.” Use this as an opportunity to demonstrate your value to the business.
Chris McClean cmcclean@forrester.com Nick Hayes nhayes@forrester.com