380 likes | 444 Views
SOCIAL MEDIA RISK: Prepare and Protect your Organization Thursday, September 30th. Today’s Speakers.
E N D
SOCIAL MEDIA RISK: Prepare and Protect your Organization Thursday, September 30th
Today’s Speakers Rob Stroud is international vice president of ISACA and a member of the COBIT 5 development team. Mr. Stroud is considered a global authority on governance and risk management. He has contributed to multiple industry publications, including COBIT 4.1, and is a frequent speaker at business and IT events worldwide. As an IT service management expert, he also has contributed to several titles on ITIL and was a member of the ITIL refresh process. Michael Kiefer, an active speaker regarding Enterprise Internet Risk Mitigation (EIRM) and has spoken across North America to the HTCIA, ISACA, the ISAC’s, National and Regional financial associations and authored numerous papers on Internet Risk & Opportunity. Previously, he was President, North America, AVAYA and directed the CISCO US service providers.
Agenda Rob Stroud: Social Media Risks and Benefits -Statistics: Facebook, LinkedIn, Twitter -Value: Fortune 100 companies -Uses and Impact -Social Media Risks Michael Kiefer: General Manager, BrandProtect -Market Risk -What is Social Media -The Good -The Anatomy of Internet Crime -The Bad -Solutions and Tools
Social Media Risks and BenefitsRobert E. Stroud, CGEITISACA International Vice President
Social Media Statistics • Facebook currently has in excess of 500 million active users worldwide, with 50% of them logging into the site each day. 150 million access the site through their mobile devices. (Source: Facebook) • Twitter now has 105 million user accounts, with 50 million tweets per day. (Source: Twitter) • LinkedIn has more than 75 million members worldwide. (Source: LinkedIn)
Social Media Drives Value • Enterprises are enjoying numerous tangible benefits of social media: • Enhancing brand recognition • Better sales • Improved search engine optimization (SEO) • Higher web traffic • Rapid feedback and insight from customers • Better ability to monitor the competition • Easier ability to search for and communicate with potential employees • Of the Fortune Global 100 companies, • 65% have active Twitter accounts • 54% have Facebook fan pages • 50% have YouTube video channels • 33% have blogs
Trust With Verification • The greatest risks posed by social media are all tied to violations of trust and people not following policy. If you don’t have a policy on Internet activity, write one and keep it current! • Social media is built on the assumption of a network of trusted friends and colleagues. • Continual education program is critical.
Free Guidance Free download of ISACA white paper: www.isaca.org/socialmedia. Social Media: Business Benefits With Security, Governance and Assurance Perspectives addresses the benefits, risks and privacy issues surrounding social media and provides guidance on implementing controls, managing usage, maximizing value and minimizing risk.
Internet Social MediaOpportunities & RiskMichael KieferGeneral Managermkiefer@brandprotect.com224.766.3000
Agenda • Market Risk • What is Social Media • The Good • The Anatomy of Internet Crime • The Bad • Solutions and Tools
Quote of the Day There are known known's. These are things we know that we know. There are known unknowns. That is to say, there are things that we know we don't know. But there are also unknown unknowns. There are things we don't know we don't know. --Donald Rumsfeld--
Internet Crime is growing exponentially... $559 Million in Online Fraud (Source: The Internet Crime Complaint Center ) $221 Billion in Identity Theft (Source: Aberdeen Group) $400 Billion in counterfeit goods sold (Source: Havacscope.com) But Cyber Criminals are no longer the only threat! The emergence of Social Media and Blogs have increased the risk significantly. Threats can now come from competitors, dissatisfied employees or even just careless practices.
In the Beginning…simple emails FUNDS FOR YOU! [KFRENCH@burnsville.k12.mn.us] Sent: Wednesday, September 15, 2010 6:34 AM FUNDS FOR YOUI am Mrs Stella Ethan, a Christian. I have picked you for an inheritance, Everything is available. Please contact me for more details. Private contact email: mrs.stallaethan@jpwind.com
or…Corporate espionage via Social Media Corporations targeted by crime group or government Background research done on individuals of importance Social media personas created Network requests from old friends or associates Sharing of some type of file (get s/w on target machine) Secretary of State Hillary Clinton asked China to launch an investigation into the hackers who broke into Google’s network in search of email account data on human rights activists.
The Good – Wins • Wine Library grew the business from $4 million to $50 million using social media. Stats: $15,000 in direct mail = 200 new customers; $7,500 billboard = 300 new customers; $0 Twitter = 1,800 new customers. A Wetpaint/Altimeter Study found companies that are both deeply and widely engaged in social media significantly surpass their peers in both revenue and profit. The study also found the company sales with the highest levels of social media activity grew on average by +18 percent, while those companies with the least amount of social activity saw their sales decline -6%.
The Good – Ford • "You can't just say it. You have to get the people to say it to each other," says James Farley, CMO Ford. • Gave away 100 Ford Fiestas to influential bloggers. • 37 percent of Generation Y were aware of the Ford Fiesta before its launch in the United States. • 25 percent of Ford's marketing spend has been shifted to digital/social media initiatives • The only U.S. auto company that didn't take a government loan.
The Good – Intuit • Introduced "Live Community" into its TurboTax products two years ago. • Due in part to the resulting word-of-mouth, it has seen unit sales increase +30 percent each year and has now integrated "Live Community" into its other products like QuickBooks, Quicken, etc. "Live Community" allows customers to ask other customers questions, which has proved both beneficial to the customer and to Intuit. • In some instances, the customer can answer questions that Intuit isn't allowed to answer because of regulatory restrictions.
Top FIVE Tips • Define for employees, partners and suppliers what is social media. • Have employee, partner and supplier internet use policies. • Notice employees, partners and suppliers of policy enforcement. • Monitor your social media policy and enforce. • Keep policies up to date as internet applications re-invent themselves!
Special skills are required to…. • Monitor, manage and Mitigate Social Media. • Respond to threats by your customers, suppliers or employees. • Remove inaccurate content from the Internet. • Stop competitors from diverting your customers. • Shut down inappropriate sites or Facebook commentary. What would you sayif your boss, auditor or shareholders asked what you had done to address Internet threats? Who will you callfor help or expert advice? When every second counts, are you protected?
Contract Experts On-Call Hire a seasoned and knowledgeable team to be available to: Engage experts to help write policy and roll out Provide a realistic assessment of your online threats Suggest tangible solutions Guide you through the required actions Provide a tailored “shutdown” program for serious offences
Listen to the Internet continuously in host languages Internet Data Mining capability Understand & Embrace Social Media Track Internet Linkages & Associations 24x7 Internet Incident Response Relationship with Global Internet Service Providers & CERTs Monitoring of your marks and messaging (IP and Images) Global Enterprise visibility & workflow Recovery Capabilities Vendor Requirements 30
Auction Fraud Counterfeit Cashier's Check Credit Card Fraud Debt Elimination DHL/UPS Employment/Business Opportunities Escrow Services Fraud Identity Fraud Internet Extortion Government Classifications of Internet Fraud • Investment Fraud • Lotteries • Nigerian Letter or "419” • Phishing/Spoofing • Ponzi/Pyramid • Reshipping • Spam • Third Party Receiver of Funds 31
http://www.ic3.gov/preventiontips.aspx http://www.fbi.gov/majcases/fraud/internetschemes.htm http://www.justice.gov/criminal/cybercrime/reporting.htm https://postalinspectors.uspis.gov/radDocs/consumer/ReshippingScam.html http://www.ftc.gov/bcp/edu/microsites/phonefraud/identity.shtml http://www.treas.gov/inspector-general/fraud-alerts/ http://www.fsisac.com/ Government help and reporting 32
www.BrandProtect.com http://www.isaca.org/Knowledge-Center/Research/ResearchDeliverables/Pages/Social-Media-Business-Benefits-and-Security-Governance-and-Assurance-Perspectives.aspx https://www.internet911.com/Site/internet-reputation-management-guidelines.html Bottom Line. NO policy/NO enforcement. Corporate Resources 34
Q & A Expand question box Type question here
Thank you • Michael Kiefer, General Manager, BrandProtect mkiefer@brandprotect.com • Rob Stroud, International Vice-President, ISACA Rob.stroud@ca.com • Kevin Joy, Vice-President, BrandProtect kjoy@brandprotect.com