Successfully reported this slideshow.
We use your LinkedIn profile and activity data to personalize ads and to show you more relevant ads. You can change your ad preferences anytime.
Brought to you by In association with
Social Media Governance & Security:
Amplify your brand while protecting your assets
...
Today’s Speakers
Social Media Governance & Security
Christine Lenihan
Enterprise Client Services Manager
Hootsuite
Noelle ...
Interact with us
Social Media Governance & Security
Follow the conversation on twitter #AmplifySocial
Social Media in the Enterprise
SOCIAL ADVOCACY SOCIAL TEAMS SOCIAL ORGANIZATION
• Ad hoc participation
• Efforts emerge
se...
Opportunity vs Risk
“36% increase in brand
awareness”3
“30% increase in sales
team quota
achievement”1
“10% higher custome...
71,000,000
Source: Pew Research, Burson-Marsteller, Fortune
REACHSOCIAL MEDIA TEAM
SOCIAL MEDIA TEAM REACH
167,355
250,000...
What you need to know to impress
your CIO with your relationship
platform of choice.
SECURITY
GOVERNANCE
COMPLIANCE
SCALAB...
Step 1: Governance
 Organizational Flexibility
 Granular Permissions
 Secure Profiles
Step 2: Security
 Security Audit
 Single Sign On
 Secure Connections
 Real-time Security Alerts
 BYOD Security
Step 3: Compliance
 Maintain Compliance Workflow
 Automate Content Moderation
 Archive Social Communications
 Monitor ...
Step 4: Scalability
 Enterprise Scale
 Traction
 Global Reach
Step 5: Platform Integration
 CRM
 Customer Support
 Analytics
SECURITY
GOVERNANCE
COMPLIANCE
SCALABILITY
INTEGRATION
Your Questions
Social Media Governance & Security
Christine Lenihan
Enterprise Client Services Manager
Hootsuite
Noelle Mc...
Thank You
Brought to you by In association with
Social Media Governance & Security:
Amplify your brand while protecting yo...
Hootsuite slideshareSocial Media Governance & Security: Amplify Your Brand While Protecting your Assets
Upcoming SlideShare
Loading in …5
×

Hootsuite slideshareSocial Media Governance & Security: Amplify Your Brand While Protecting your Assets

330 views

Published on

Social is revolutionising the way we interact with clients and prospects, from official announcements to informal interactions. Yet fear of security breaches and decentralised control make many organisations wary of entering into the social space. Is your organisation prepared to fully leverage these new sales and client engagement opportunities?

In this exclusive webinar, experts from the leading social relationship platform, HootSuite, share how to to amplify your brand while protecting your assets. Register for the webinar now to explore must-have social media tools, policies, and workflows.

Published in: Marketing
  • Be the first to comment

Hootsuite slideshareSocial Media Governance & Security: Amplify Your Brand While Protecting your Assets

  1. 1. Brought to you by In association with Social Media Governance & Security: Amplify your brand while protecting your assets The webinar will begin shortly Listen via your computer speakers or on the phone UK: +44 (0) 20 7151 1848 Access Code: 687-760-461
  2. 2. Today’s Speakers Social Media Governance & Security Christine Lenihan Enterprise Client Services Manager Hootsuite Noelle McElhatton Consultant Editor Marketingfinder.co.uk
  3. 3. Interact with us Social Media Governance & Security Follow the conversation on twitter #AmplifySocial
  4. 4. Social Media in the Enterprise SOCIAL ADVOCACY SOCIAL TEAMS SOCIAL ORGANIZATION • Ad hoc participation • Efforts emerge separately from the bottom up • Centralized control • Social activity repots to individual departments • Cross functional team working across multiple business units • Multinational and autonomous Source: Altimeter research
  5. 5. Opportunity vs Risk “36% increase in brand awareness”3 “30% increase in sales team quota achievement”1 “10% higher customer loyalty”2 “20%-25% improvement in knowledge worker productivity”4 “Average data breach costs $5.5 million per incident”2 “Negligent insiders and malicious attacks are the main causes of data breaches”2 “The Syrian Electronic Army just hacked another big Twitter Account”2 Sources: 1: Aberdeen Group, Social Selling, Feb 2013 2: McKinsey & Dachis Group 3: Information Week, July 2013 4: McKinsey - The Social Economy, July 2012 Sources: 1: McKinsey Corporate Survey, Spring, 2013 2: Symantec & Ponemon Institute Study, March, 2012
  6. 6. 71,000,000 Source: Pew Research, Burson-Marsteller, Fortune REACHSOCIAL MEDIA TEAM SOCIAL MEDIA TEAM REACH 167,355 250,000 X EMPLOYEES 126229 Friends Followers
  7. 7. What you need to know to impress your CIO with your relationship platform of choice. SECURITY GOVERNANCE COMPLIANCE SCALABILITY INTEGRATION
  8. 8. Step 1: Governance  Organizational Flexibility  Granular Permissions  Secure Profiles
  9. 9. Step 2: Security  Security Audit  Single Sign On  Secure Connections  Real-time Security Alerts  BYOD Security
  10. 10. Step 3: Compliance  Maintain Compliance Workflow  Automate Content Moderation  Archive Social Communications  Monitor in Real-Time
  11. 11. Step 4: Scalability  Enterprise Scale  Traction  Global Reach
  12. 12. Step 5: Platform Integration  CRM  Customer Support  Analytics
  13. 13. SECURITY GOVERNANCE COMPLIANCE SCALABILITY INTEGRATION
  14. 14. Your Questions Social Media Governance & Security Christine Lenihan Enterprise Client Services Manager Hootsuite Noelle McElhatton Consultant Editor Marketingfinder.co.uk
  15. 15. Thank You Brought to you by In association with Social Media Governance & Security: Amplify your brand while protecting your assets

×