SlideShare a Scribd company logo
1 of 1
Download to read offline
Crisis Management Consulting, LLC
Andrew Dailey, CPP
313.671.6123
Internet and Social Media Monitoring, Investigations & Threat Mitigation
Who’s monitoring your brand? When and how do you learn when a former or disgruntled employee is
tarnishing your brand or threatening your company’s employees? Many times a company’s social media
and internet monitoring is the responsibility of its marketing department, with understandably, little or
no experience identifying threats to company executive staff and employees or risks to the enterprise.
Crisis Management Consulting, LLC (CMC) takes a unique approach with experience in Executive
Protection, Threat Identification and Operational Risk.
With over 15 years providing intelligence to leading executive personnel CMC specializes in:
 Threat identification
 Provision of advice which enables threat mitigation
 Enterprise wide holistic Risk Management
 Identification of vulnerabilities using social media and internet
 Crisis Management & Early Warning alert mechanisms
 Collection of open source intelligence using government recognized methodology
 Consulting with leading companies developing security operation center’s intelligence
capabilities
 Athletes, Celebrities & High Net Worth Individuals (HNWI) privacy measures
 Counter-Measures providing security to HNWI to mitigate risks
As a Director of Security the last thing you want to have is your company’s operations disrupted by a
protest or demonstration you had no knowledge of in advance. CMC provides threat awareness and early
warning products when pre-established event or risk thresholds are exceeded.
 Advance vulnerability surveys complement your existing Executive Profiles
The use of social media is an adversary’s way to build momentum around grievances, be they legitimate
or otherwise. CMC does advance adversarial identification prior to company events such as shareholder
meetings, executive travel, site selection, product, new market entry, and other important revenue
generating or governance activities. Alerts and risk reports are then generated so your crisis management
team can lead an inter-agencies response to disrupt planned protests and other threats to the enterprise.
If your company has been, or is likely to be targeted by activists – or if employees, competitors or other
groups have been attempting to tarnish your image and reputation there are a wide range of options
available to you including;
 Baseline packages include vulnerability identification to identify personal information disclosure
such as home addresses, private phone numbers and personal email
 Monitoring package to include early warning notification
 Pre-employment social media investigation
 Executive and family member internet exposure and social media auditing
Contact Crisis Management Consulting to discuss your existing exposures and learn how we can mitigate
risks to your executives and enterprise.

More Related Content

Similar to Internet and Social Media Monitoring and Investigations

Module 4 - Scanning for Early Warning Signs.pptx
Module 4 - Scanning for Early Warning Signs.pptxModule 4 - Scanning for Early Warning Signs.pptx
Module 4 - Scanning for Early Warning Signs.pptxcaniceconsulting
 
Why Every Business Should Invest in a Social Media Fraud Analyst.pdf
Why Every Business Should Invest in a Social Media Fraud Analyst.pdfWhy Every Business Should Invest in a Social Media Fraud Analyst.pdf
Why Every Business Should Invest in a Social Media Fraud Analyst.pdfMilind Agarwal
 
My report_donald.docx
My report_donald.docxMy report_donald.docx
My report_donald.docxGenevieveGo3
 
Risk & Advisory Services: Quarterly Risk Advisor Nov. 2015
Risk & Advisory Services: Quarterly Risk Advisor Nov. 2015Risk & Advisory Services: Quarterly Risk Advisor Nov. 2015
Risk & Advisory Services: Quarterly Risk Advisor Nov. 2015CBIZ, Inc.
 
Third-Party Risk Management (TPRM) | Risk Assessment Questionnaires
Third-Party Risk Management (TPRM) | Risk Assessment QuestionnairesThird-Party Risk Management (TPRM) | Risk Assessment Questionnaires
Third-Party Risk Management (TPRM) | Risk Assessment QuestionnairesCorporater
 
Fraud in Social Media: Facing the Growing Threat
Fraud in Social Media: Facing the Growing ThreatFraud in Social Media: Facing the Growing Threat
Fraud in Social Media: Facing the Growing ThreatFraudBusters
 
What Small Business Can Do To Protect Themselves Now in Cybersecurity
What Small Business Can Do To Protect Themselves Now in CybersecurityWhat Small Business Can Do To Protect Themselves Now in Cybersecurity
What Small Business Can Do To Protect Themselves Now in CybersecurityReading Works Detroit
 
Sophisticated Solutions to Complex Workplace Issues
Sophisticated Solutions to Complex Workplace IssuesSophisticated Solutions to Complex Workplace Issues
Sophisticated Solutions to Complex Workplace IssuesBusiness Controls, Inc.
 
Online Course For Hazard Identification Assessment and Control
Online Course For Hazard Identification Assessment and Control Online Course For Hazard Identification Assessment and Control
Online Course For Hazard Identification Assessment and Control BIS Safety
 
Cybersecurity: How to be Proactive
Cybersecurity: How to be ProactiveCybersecurity: How to be Proactive
Cybersecurity: How to be ProactiveBrown Smith Wallace
 
Compliance_Today_2015-11-johnson-helline-fahey
Compliance_Today_2015-11-johnson-helline-faheyCompliance_Today_2015-11-johnson-helline-fahey
Compliance_Today_2015-11-johnson-helline-faheyStephanie Helline
 
Audit and Compliance BDR Knowledge Training
Audit and Compliance BDR Knowledge TrainingAudit and Compliance BDR Knowledge Training
Audit and Compliance BDR Knowledge TrainingTory Quinton
 
Fraud, bribery and corruption: Protecting reputation and value
Fraud, bribery and corruption: Protecting reputation and valueFraud, bribery and corruption: Protecting reputation and value
Fraud, bribery and corruption: Protecting reputation and valueDavid Graham
 
Brand communication Strategies & Services
Brand communication Strategies & ServicesBrand communication Strategies & Services
Brand communication Strategies & ServicesSeraphim Communications
 
CXO 2.0 Conference Reviews Ways To Strengthen Your Workforce Against Scam Off...
CXO 2.0 Conference Reviews Ways To Strengthen Your Workforce Against Scam Off...CXO 2.0 Conference Reviews Ways To Strengthen Your Workforce Against Scam Off...
CXO 2.0 Conference Reviews Ways To Strengthen Your Workforce Against Scam Off...CXO 2.0 Conference
 
It risk assessment in uae
It risk assessment in uaeIt risk assessment in uae
It risk assessment in uaeRishalHalid1
 
2016 Risk Management Workshop
2016 Risk Management Workshop2016 Risk Management Workshop
2016 Risk Management WorkshopStacy Willis
 
Risk & Advisory Services: Quarterly Risk Advisor May 2016
Risk & Advisory Services: Quarterly Risk Advisor May 2016Risk & Advisory Services: Quarterly Risk Advisor May 2016
Risk & Advisory Services: Quarterly Risk Advisor May 2016CBIZ, Inc.
 
Brunswick Intelligence - Building reputational resilience to cyber attack
Brunswick Intelligence - Building reputational resilience to cyber attackBrunswick Intelligence - Building reputational resilience to cyber attack
Brunswick Intelligence - Building reputational resilience to cyber attackBrunswick Group
 

Similar to Internet and Social Media Monitoring and Investigations (20)

Module 4 - Scanning for Early Warning Signs.pptx
Module 4 - Scanning for Early Warning Signs.pptxModule 4 - Scanning for Early Warning Signs.pptx
Module 4 - Scanning for Early Warning Signs.pptx
 
Why Every Business Should Invest in a Social Media Fraud Analyst.pdf
Why Every Business Should Invest in a Social Media Fraud Analyst.pdfWhy Every Business Should Invest in a Social Media Fraud Analyst.pdf
Why Every Business Should Invest in a Social Media Fraud Analyst.pdf
 
My report_donald.docx
My report_donald.docxMy report_donald.docx
My report_donald.docx
 
Risk & Advisory Services: Quarterly Risk Advisor Nov. 2015
Risk & Advisory Services: Quarterly Risk Advisor Nov. 2015Risk & Advisory Services: Quarterly Risk Advisor Nov. 2015
Risk & Advisory Services: Quarterly Risk Advisor Nov. 2015
 
Third-Party Risk Management (TPRM) | Risk Assessment Questionnaires
Third-Party Risk Management (TPRM) | Risk Assessment QuestionnairesThird-Party Risk Management (TPRM) | Risk Assessment Questionnaires
Third-Party Risk Management (TPRM) | Risk Assessment Questionnaires
 
Fraud in Social Media: Facing the Growing Threat
Fraud in Social Media: Facing the Growing ThreatFraud in Social Media: Facing the Growing Threat
Fraud in Social Media: Facing the Growing Threat
 
What Small Business Can Do To Protect Themselves Now in Cybersecurity
What Small Business Can Do To Protect Themselves Now in CybersecurityWhat Small Business Can Do To Protect Themselves Now in Cybersecurity
What Small Business Can Do To Protect Themselves Now in Cybersecurity
 
Sophisticated Solutions to Complex Workplace Issues
Sophisticated Solutions to Complex Workplace IssuesSophisticated Solutions to Complex Workplace Issues
Sophisticated Solutions to Complex Workplace Issues
 
Online Course For Hazard Identification Assessment and Control
Online Course For Hazard Identification Assessment and Control Online Course For Hazard Identification Assessment and Control
Online Course For Hazard Identification Assessment and Control
 
Cybersecurity: How to be Proactive
Cybersecurity: How to be ProactiveCybersecurity: How to be Proactive
Cybersecurity: How to be Proactive
 
Compliance_Today_2015-11-johnson-helline-fahey
Compliance_Today_2015-11-johnson-helline-faheyCompliance_Today_2015-11-johnson-helline-fahey
Compliance_Today_2015-11-johnson-helline-fahey
 
Audit and Compliance BDR Knowledge Training
Audit and Compliance BDR Knowledge TrainingAudit and Compliance BDR Knowledge Training
Audit and Compliance BDR Knowledge Training
 
Fraud, bribery and corruption: Protecting reputation and value
Fraud, bribery and corruption: Protecting reputation and valueFraud, bribery and corruption: Protecting reputation and value
Fraud, bribery and corruption: Protecting reputation and value
 
Brand communication Strategies & Services
Brand communication Strategies & ServicesBrand communication Strategies & Services
Brand communication Strategies & Services
 
Crisis
CrisisCrisis
Crisis
 
CXO 2.0 Conference Reviews Ways To Strengthen Your Workforce Against Scam Off...
CXO 2.0 Conference Reviews Ways To Strengthen Your Workforce Against Scam Off...CXO 2.0 Conference Reviews Ways To Strengthen Your Workforce Against Scam Off...
CXO 2.0 Conference Reviews Ways To Strengthen Your Workforce Against Scam Off...
 
It risk assessment in uae
It risk assessment in uaeIt risk assessment in uae
It risk assessment in uae
 
2016 Risk Management Workshop
2016 Risk Management Workshop2016 Risk Management Workshop
2016 Risk Management Workshop
 
Risk & Advisory Services: Quarterly Risk Advisor May 2016
Risk & Advisory Services: Quarterly Risk Advisor May 2016Risk & Advisory Services: Quarterly Risk Advisor May 2016
Risk & Advisory Services: Quarterly Risk Advisor May 2016
 
Brunswick Intelligence - Building reputational resilience to cyber attack
Brunswick Intelligence - Building reputational resilience to cyber attackBrunswick Intelligence - Building reputational resilience to cyber attack
Brunswick Intelligence - Building reputational resilience to cyber attack
 

Internet and Social Media Monitoring and Investigations

  • 1. Crisis Management Consulting, LLC Andrew Dailey, CPP 313.671.6123 Internet and Social Media Monitoring, Investigations & Threat Mitigation Who’s monitoring your brand? When and how do you learn when a former or disgruntled employee is tarnishing your brand or threatening your company’s employees? Many times a company’s social media and internet monitoring is the responsibility of its marketing department, with understandably, little or no experience identifying threats to company executive staff and employees or risks to the enterprise. Crisis Management Consulting, LLC (CMC) takes a unique approach with experience in Executive Protection, Threat Identification and Operational Risk. With over 15 years providing intelligence to leading executive personnel CMC specializes in:  Threat identification  Provision of advice which enables threat mitigation  Enterprise wide holistic Risk Management  Identification of vulnerabilities using social media and internet  Crisis Management & Early Warning alert mechanisms  Collection of open source intelligence using government recognized methodology  Consulting with leading companies developing security operation center’s intelligence capabilities  Athletes, Celebrities & High Net Worth Individuals (HNWI) privacy measures  Counter-Measures providing security to HNWI to mitigate risks As a Director of Security the last thing you want to have is your company’s operations disrupted by a protest or demonstration you had no knowledge of in advance. CMC provides threat awareness and early warning products when pre-established event or risk thresholds are exceeded.  Advance vulnerability surveys complement your existing Executive Profiles The use of social media is an adversary’s way to build momentum around grievances, be they legitimate or otherwise. CMC does advance adversarial identification prior to company events such as shareholder meetings, executive travel, site selection, product, new market entry, and other important revenue generating or governance activities. Alerts and risk reports are then generated so your crisis management team can lead an inter-agencies response to disrupt planned protests and other threats to the enterprise. If your company has been, or is likely to be targeted by activists – or if employees, competitors or other groups have been attempting to tarnish your image and reputation there are a wide range of options available to you including;  Baseline packages include vulnerability identification to identify personal information disclosure such as home addresses, private phone numbers and personal email  Monitoring package to include early warning notification  Pre-employment social media investigation  Executive and family member internet exposure and social media auditing Contact Crisis Management Consulting to discuss your existing exposures and learn how we can mitigate risks to your executives and enterprise.