SlideShare a Scribd company logo
1 of 29
5 KEYS TO A GREAT NEWSJACK
How One PR Pro Used Common Tools to
Execute a Newsjack & Win Huge Media
Coverage
ANTHONY HARDMAN
SecureState Public Relations Expert
Anthony Hardman
Public Relations Expert,
SecureState
@ahardman
www.linkedin.com/in/anthonyhardman
@SecureState

THE KEY TO NEWSJACKING
Anthony Hardman, SecureState Public Relations Expert
SecureState is a global management consulting firm
focused on information security, and is one of just 11
companies authorized to investigate credit card holder
data breaches.
The significant data breaches suffered by leading
retailers at the end of 2013 generated significant news
coverage and represented an important opportunity for
SecureState.
Anthony Hardman is the company’s only public relations
employee. Here is how he pulled off an amazing
newsjack with common PR tools – all by himself.

THE KEY TO NEWSJACKING
Anthony Hardman, SecureState Public Relations Expert
Focus on standing out.

“The first key to earning media
attention is determining what
you can add to the story that no
one else is talking about.”

THE KEY TO NEWSJACKING
Anthony Hardman, SecureState Public Relations Expert
Start with the people you know.
“I pulled up all my media contacts
who I thought would be interested
in the story and started making
phone calls. When you have an
existing relationship with a
reporter, it’s okay to call.”
THE KEY TO NEWSJACKING
Anthony Hardman, SecureState Public Relations Expert
In under 30 minutes, two TV stations
had committed to on-site interviews,
and one of them also booked an instudio interview for that night’s
newscast.

THE KEY TO NEWSJACKING
Anthony Hardman, SecureState Public Relations Expert
THE KEY TO NEWSJACKING
Anthony Hardman, SecureState Public Relations Expert
Target confirmed to ABC News Friday that the additional personal information discovered stolen
in the pre-Christmas breach "was obtained through the normal course of Target's business,"
which is to say both in-store and online.
Ken Stasiak, CEO of information-based security firm Secure State, said it's common to see
security breaches at retailers right before and after the holiday season. Stasiak said companies
often don't want to add security to their payment system if it hinders customers from making a
purchase.
"They don't want the system to go down," for security reasons, said Stasiak. "They want the
money if the security gets more lax during the busy season, it's just the fact of the matter."
Stasiak said that customers with compromised credit cards can almost always have fraudulent
charges removed and be issued a new card. The real headache comes when additional data
about a customer is stolen and identity theft becomes an issue.

THE KEY TO NEWSJACKING
Anthony Hardman, SecureState Public Relations Expert
Mine your media database.
“The next step was firing up my
Agility media database and
creating a targeted list of
contacts to whom I could
distribute my pitch.”

THE KEY TO NEWSJACKING
Anthony Hardman, SecureState Public Relations Expert
“In cases where time is
limited,such as a
newsjack, a mass email is
appropriate …but be
selective about the
recipients.”
THE KEY TO NEWSJACKING
Anthony Hardman, SecureState Public Relations Expert
The emails sent to the lists
created in the Agility platform
resulted in coverage in the
LA Times, numerous trade
publications and an interview for
SecureState’s CEO on PBS
NewsHour.
THE KEY TO NEWSJACKING
Anthony Hardman, SecureState Public Relations Expert
THE KEY TO NEWSJACKING
Anthony Hardman, SecureState Public Relations Expert
Target disclosed the security breach Thursday, saying the thieves had purloined customer
names, card numbers and a security code encrypted in the magnetic strip. The theft enables
the culprits to make phony credit cards, make fraudulent purchases or siphon money from
bank accounts.

The data breach underscored the evolving sophistication of cybercriminals and the persistent
vulnerability of retailers and consumers despite dozens of past incidents at major retailers.
“How do you get 40 million credit cards and no one knows about it?” said Ken
Stasiak, chief executive of SecureState, which investigates cybercrimes. “That's a hell of
a lot of credit cards. There should have been someone inside the company who spotted this
much sooner.”
The Target attack appeared to be well thought out and executed with great precision.
The Minneapolis retailer said the hack occurred between Nov. 27, just before the annual
holiday shopping frenzy, and Dec. 15. The breach affects people who bought goods at any of
Target's 1,797 stores nationwide, but doesn't affect those who made purchases online.

THE KEY TO NEWSJACKING
Anthony Hardman, SecureState Public Relations Expert
THE KEY TO NEWSJACKING
Anthony Hardman, SecureState Public Relations Expert
Respond to journalist queries.

“I knew I had struck media
relations gold when I
responded to a query on
ProfNet from the Associated
Press.”
THE KEY TO NEWSJACKING
Anthony Hardman, SecureState Public Relations Expert
The resulting story - Tips for Consumers
Worried about the Target Breach - hit the
AP national wire, and was picked up in
media outlets from coast to coast.

THE KEY TO NEWSJACKING
Anthony Hardman, SecureState Public Relations Expert
THE KEY TO NEWSJACKING
Anthony Hardman, SecureState Public Relations Expert
Q: How did the breach occur?
A: Target isn‟t saying how it happened. Industry experts note that companies such as Target spend
millions of dollars each year on credit card security, making a theft of this magnitude particularly
alarming.
Experts disagree about how the breach might have happened.
Avivah Litan, a security analyst with Gartner Research, says given all the security, she believes the
breach may have been an inside job.
But thefts of this size are too big to be the work of company employees, says Ken Stasiak, founder
and CEO of Secure State, a Cleveland-based information security firm that investigates data
breaches like this one. Stasiak says that such breaches are generally perpetrated by organized crime or
an overseas, state-sponsored hacker group.
Stasiak‟s theory is that the hackers were able to breach Target‟s main information hub and then wrote a
code that gave them access to the company‟s point of sale system and all of its cash registers. That
access allowed the hackers to capture the data from shoppers‟ cards as they were swiped.
James Lyne, global head of security research for the computer security firm Sophos, says something
clearly went wrong with Target‟s security measures.
„„Forty million cards stolen really shows a substantial security failure,‟‟ he says. „„This shouldn‟t have
happened.‟‟

THE KEY TO NEWSJACKING
Anthony Hardman, SecureState Public Relations Expert
THE KEY TO NEWSJACKING
Anthony Hardman, SecureState Public Relations Expert
Experts disagree about how the breach might have happened.
Avivah Litan, a security analyst with Gartner Research, says given all the security, she believes
the breach may have been an inside job.

But thefts of this size are too big to be the work of company employees, says Ken
Stasiak, founder and CEO of Secure State, a Cleveland-based information security firm that
investigates data breaches like this one. Stasiak says that such breaches are generally
perpetrated by organized crime or an overseas, state-sponsored hacker group.
Stasiak's theory is that the hackers were able to breach Target's main information hub and then
wrote a code that gave them access to the company's point of sale system and all of its cash
registers. That access allowed the hackers to capture the data from shoppers' cards as they
were swiped.

THE KEY TO NEWSJACKING
Anthony Hardman, SecureState Public Relations Expert
THE KEY TO NEWSJACKING
Anthony Hardman, SecureState Public Relations Expert
Q: How did this happen?

A: Target has said that the breach was caused by malware that affected its U.S. stores.
Ken Stasiak, founder and CEO of SecureState, a Cleveland-based information security firm
that investigates data breaches like this one, says it's likely that the perpetrators infiltrated
Target's main information hub with malware and from there were able to access the store pointof-sale systems. Once the malware was in the POS systems, it could collect credit and debit
card numbers as the cards were swiped.
Stasiak notes that retailers routinely collect personal information such as addresses, emails
and phone numbers through things such as rewards cards when sales are made, so that
information is also contained on POS systems just like credit card numbers.

THE KEY TO NEWSJACKING
Anthony Hardman, SecureState Public Relations Expert
Leveraged owned media.
“Two internal experts wrote
related blog posts. I published
and promoted them through
every channel I could, which
included social media and a news
release promoting the content.”
THE KEY TO NEWSJACKING
Anthony Hardman, SecureState Public Relations Expert
The news releases SecureState has
issued are the second-largest
referrer of visitors to the company’s
web site, behind search engines.

THE KEY TO NEWSJACKING
Anthony Hardman, SecureState Public Relations Expert
THE KEY TO NEWSJACKING
Anthony Hardman, SecureState Public Relations Expert
“When you’re one person, you have
to be agile and you have to use what
you have.” – Anthony Hardman
For an in-depth discussion of Anthony’s
tactical approach, read our related blog
post:
5 Tips for Pulling Off a Newsjack with
Common PR Tools
THE KEY TO NEWSJACKING
Anthony Hardman, SecureState Public Relations Expert
Anthony Hardman
Public Relations Expert,
SecureState
@ahardman
www.linkedin.com/in/anthonyhardman
@SecureState

THE KEY TO NEWSJACKING
Anthony Hardman, SecureState Public Relations Expert
http://www.prnewswire.com/products-services/agility/

THE KEY TO NEWSJACKING
Anthony Hardman, SecureState Public Relations Expert
5 Tips for Executing a Great Newsjack

More Related Content

What's hot

Ghostery Enterprise - Best Practices White Paper
Ghostery Enterprise - Best Practices White PaperGhostery Enterprise - Best Practices White Paper
Ghostery Enterprise - Best Practices White PaperGhostery, Inc.
 
Ghostery Enterprise Security Study
Ghostery Enterprise Security StudyGhostery Enterprise Security Study
Ghostery Enterprise Security StudyGhostery, Inc.
 
ThreatMetrix Minimizes Payment Fraud Reduce Fraud and Protect Revenue Without...
ThreatMetrix Minimizes Payment Fraud Reduce Fraud and Protect Revenue Without...ThreatMetrix Minimizes Payment Fraud Reduce Fraud and Protect Revenue Without...
ThreatMetrix Minimizes Payment Fraud Reduce Fraud and Protect Revenue Without...Ken Lam
 
Business Email Compromise Scam
Business Email Compromise ScamBusiness Email Compromise Scam
Business Email Compromise ScamGuardian Analytics
 
How to Prevent ID Theft
How to Prevent ID TheftHow to Prevent ID Theft
How to Prevent ID Thefthewie
 
ThreatMetrix ARRC 2016 presentation by Ted Egan
ThreatMetrix ARRC 2016 presentation by Ted EganThreatMetrix ARRC 2016 presentation by Ted Egan
ThreatMetrix ARRC 2016 presentation by Ted EganKen Lam
 
IMC 618 - Public Relations Campaign
IMC 618 - Public Relations CampaignIMC 618 - Public Relations Campaign
IMC 618 - Public Relations CampaignStephanie Holman
 
Ftc identity theft kit
Ftc identity theft kitFtc identity theft kit
Ftc identity theft kitupsettinginfo
 
Eamonn O Raghallaigh Major Security Issues In E Commerce
Eamonn O Raghallaigh   Major Security Issues In E CommerceEamonn O Raghallaigh   Major Security Issues In E Commerce
Eamonn O Raghallaigh Major Security Issues In E CommerceEamonnORagh
 
ISTR Internet Security Threat Report 2019
ISTR Internet Security Threat Report 2019ISTR Internet Security Threat Report 2019
ISTR Internet Security Threat Report 2019- Mark - Fullbright
 
IBM X-Force Threat Intelligence Report 2016
IBM X-Force Threat Intelligence Report 2016IBM X-Force Threat Intelligence Report 2016
IBM X-Force Threat Intelligence Report 2016thinkASG
 
Identity Theft and Data Compromise - TWCA Fall 2012
Identity Theft and Data Compromise - TWCA Fall 2012Identity Theft and Data Compromise - TWCA Fall 2012
Identity Theft and Data Compromise - TWCA Fall 2012The Texas Network, LLC
 
RSA Monthly Online Fraud Report -- May 2013
RSA Monthly Online Fraud Report -- May 2013RSA Monthly Online Fraud Report -- May 2013
RSA Monthly Online Fraud Report -- May 2013EMC
 
ThreatMetrix Fraud Network Presentation
ThreatMetrix Fraud Network PresentationThreatMetrix Fraud Network Presentation
ThreatMetrix Fraud Network PresentationThreatMetrix
 
Break Through the Noise: Find Your Audience with Data-Driven Advertising
Break Through the Noise: Find Your Audience with Data-Driven AdvertisingBreak Through the Noise: Find Your Audience with Data-Driven Advertising
Break Through the Noise: Find Your Audience with Data-Driven Advertising4Cinsights
 
SucessfulInsiderThreat
SucessfulInsiderThreatSucessfulInsiderThreat
SucessfulInsiderThreatHammerNJ
 
Securing information in the New Digital Economy- Oracle Verizon WP
Securing information in the New Digital Economy- Oracle Verizon WPSecuring information in the New Digital Economy- Oracle Verizon WP
Securing information in the New Digital Economy- Oracle Verizon WPPhilippe Boivineau
 

What's hot (19)

Ghostery Enterprise - Best Practices White Paper
Ghostery Enterprise - Best Practices White PaperGhostery Enterprise - Best Practices White Paper
Ghostery Enterprise - Best Practices White Paper
 
Ghostery Enterprise Security Study
Ghostery Enterprise Security StudyGhostery Enterprise Security Study
Ghostery Enterprise Security Study
 
ThreatMetrix Minimizes Payment Fraud Reduce Fraud and Protect Revenue Without...
ThreatMetrix Minimizes Payment Fraud Reduce Fraud and Protect Revenue Without...ThreatMetrix Minimizes Payment Fraud Reduce Fraud and Protect Revenue Without...
ThreatMetrix Minimizes Payment Fraud Reduce Fraud and Protect Revenue Without...
 
Business Email Compromise Scam
Business Email Compromise ScamBusiness Email Compromise Scam
Business Email Compromise Scam
 
Critical Update Needed: Cybersecurity Expertise in the Boardroom
Critical Update Needed: Cybersecurity Expertise in the BoardroomCritical Update Needed: Cybersecurity Expertise in the Boardroom
Critical Update Needed: Cybersecurity Expertise in the Boardroom
 
How to Prevent ID Theft
How to Prevent ID TheftHow to Prevent ID Theft
How to Prevent ID Theft
 
ThreatMetrix ARRC 2016 presentation by Ted Egan
ThreatMetrix ARRC 2016 presentation by Ted EganThreatMetrix ARRC 2016 presentation by Ted Egan
ThreatMetrix ARRC 2016 presentation by Ted Egan
 
Cyber Crime is Wreaking Havoc
Cyber Crime is Wreaking HavocCyber Crime is Wreaking Havoc
Cyber Crime is Wreaking Havoc
 
IMC 618 - Public Relations Campaign
IMC 618 - Public Relations CampaignIMC 618 - Public Relations Campaign
IMC 618 - Public Relations Campaign
 
Ftc identity theft kit
Ftc identity theft kitFtc identity theft kit
Ftc identity theft kit
 
Eamonn O Raghallaigh Major Security Issues In E Commerce
Eamonn O Raghallaigh   Major Security Issues In E CommerceEamonn O Raghallaigh   Major Security Issues In E Commerce
Eamonn O Raghallaigh Major Security Issues In E Commerce
 
ISTR Internet Security Threat Report 2019
ISTR Internet Security Threat Report 2019ISTR Internet Security Threat Report 2019
ISTR Internet Security Threat Report 2019
 
IBM X-Force Threat Intelligence Report 2016
IBM X-Force Threat Intelligence Report 2016IBM X-Force Threat Intelligence Report 2016
IBM X-Force Threat Intelligence Report 2016
 
Identity Theft and Data Compromise - TWCA Fall 2012
Identity Theft and Data Compromise - TWCA Fall 2012Identity Theft and Data Compromise - TWCA Fall 2012
Identity Theft and Data Compromise - TWCA Fall 2012
 
RSA Monthly Online Fraud Report -- May 2013
RSA Monthly Online Fraud Report -- May 2013RSA Monthly Online Fraud Report -- May 2013
RSA Monthly Online Fraud Report -- May 2013
 
ThreatMetrix Fraud Network Presentation
ThreatMetrix Fraud Network PresentationThreatMetrix Fraud Network Presentation
ThreatMetrix Fraud Network Presentation
 
Break Through the Noise: Find Your Audience with Data-Driven Advertising
Break Through the Noise: Find Your Audience with Data-Driven AdvertisingBreak Through the Noise: Find Your Audience with Data-Driven Advertising
Break Through the Noise: Find Your Audience with Data-Driven Advertising
 
SucessfulInsiderThreat
SucessfulInsiderThreatSucessfulInsiderThreat
SucessfulInsiderThreat
 
Securing information in the New Digital Economy- Oracle Verizon WP
Securing information in the New Digital Economy- Oracle Verizon WPSecuring information in the New Digital Economy- Oracle Verizon WP
Securing information in the New Digital Economy- Oracle Verizon WP
 

Viewers also liked

Press Releases: The Content Marketer's Not-So-Hidden Treasure
Press Releases: The Content Marketer's Not-So-Hidden TreasurePress Releases: The Content Marketer's Not-So-Hidden Treasure
Press Releases: The Content Marketer's Not-So-Hidden Treasureprnewswire
 
Research for the team presentations
Research for the team presentationsResearch for the team presentations
Research for the team presentationsDanielle Carlock
 
California Titles Practice Procedure Senator N W Thompson
California Titles Practice Procedure Senator N W ThompsonCalifornia Titles Practice Procedure Senator N W Thompson
California Titles Practice Procedure Senator N W Thompsonrealestatehistory
 
Robotics Fall 2009
Robotics  Fall 2009Robotics  Fall 2009
Robotics Fall 2009Anna Donskoy
 
CAPITULO VI, VII, VIII, IX Y X
CAPITULO VI, VII, VIII, IX Y XCAPITULO VI, VII, VIII, IX Y X
CAPITULO VI, VII, VIII, IX Y XUPN 153 ECATEPEC
 
Pfm Measure 2008
Pfm Measure 2008Pfm Measure 2008
Pfm Measure 2008euweben01
 
19.10.2009, Vindmølleindustrien: Indsigelse Akt nr. 48 drift, 7 møller af 250...
19.10.2009, Vindmølleindustrien: Indsigelse Akt nr. 48 drift, 7 møller af 250...19.10.2009, Vindmølleindustrien: Indsigelse Akt nr. 48 drift, 7 møller af 250...
19.10.2009, Vindmølleindustrien: Indsigelse Akt nr. 48 drift, 7 møller af 250...is gone
 
специфика каналов продвижения интернет магазина
специфика каналов продвижения интернет магазинаспецифика каналов продвижения интернет магазина
специфика каналов продвижения интернет магазинаIngria. Technopark St. Petersburg
 
Петр Тищенко - Проблемы подготовски кадров для реализации транснациональных п...
Петр Тищенко - Проблемы подготовски кадров для реализации транснациональных п...Петр Тищенко - Проблемы подготовски кадров для реализации транснациональных п...
Петр Тищенко - Проблемы подготовски кадров для реализации транснациональных п...Ingria. Technopark St. Petersburg
 
Терхи Янтунен, Вирма Лаппеенранта ЛТД - Лаппеенранта - город устойчивого разв...
Терхи Янтунен, Вирма Лаппеенранта ЛТД - Лаппеенранта - город устойчивого разв...Терхи Янтунен, Вирма Лаппеенранта ЛТД - Лаппеенранта - город устойчивого разв...
Терхи Янтунен, Вирма Лаппеенранта ЛТД - Лаппеенранта - город устойчивого разв...Ingria. Technopark St. Petersburg
 
R-Baby Introductory Presentation
R-Baby Introductory PresentationR-Baby Introductory Presentation
R-Baby Introductory PresentationErik Shwarts
 
McAfee Data Protection
McAfee Data ProtectionMcAfee Data Protection
McAfee Data ProtectionAndrei Novikau
 
Salmonella Water. Malaysia
Salmonella Water. MalaysiaSalmonella Water. Malaysia
Salmonella Water. MalaysiaCITREX
 
NTTデータグループウェブサイトのマルチデバイス対応
NTTデータグループウェブサイトのマルチデバイス対応NTTデータグループウェブサイトのマルチデバイス対応
NTTデータグループウェブサイトのマルチデバイス対応力也 伊原
 
Serving The Community By Using The Private Sector
Serving The Community By Using The Private SectorServing The Community By Using The Private Sector
Serving The Community By Using The Private Sectoreuweben01
 
Wolf Llc Market Presentation
Wolf Llc Market PresentationWolf Llc Market Presentation
Wolf Llc Market PresentationWolfLLC
 

Viewers also liked (20)

Press Releases: The Content Marketer's Not-So-Hidden Treasure
Press Releases: The Content Marketer's Not-So-Hidden TreasurePress Releases: The Content Marketer's Not-So-Hidden Treasure
Press Releases: The Content Marketer's Not-So-Hidden Treasure
 
Research for the team presentations
Research for the team presentationsResearch for the team presentations
Research for the team presentations
 
California Titles Practice Procedure Senator N W Thompson
California Titles Practice Procedure Senator N W ThompsonCalifornia Titles Practice Procedure Senator N W Thompson
California Titles Practice Procedure Senator N W Thompson
 
Robotics Fall 2009
Robotics  Fall 2009Robotics  Fall 2009
Robotics Fall 2009
 
Gap
GapGap
Gap
 
CAPITULO VI, VII, VIII, IX Y X
CAPITULO VI, VII, VIII, IX Y XCAPITULO VI, VII, VIII, IX Y X
CAPITULO VI, VII, VIII, IX Y X
 
Futureprodmarketing (2)
Futureprodmarketing (2)Futureprodmarketing (2)
Futureprodmarketing (2)
 
Pfm Measure 2008
Pfm Measure 2008Pfm Measure 2008
Pfm Measure 2008
 
19.10.2009, Vindmølleindustrien: Indsigelse Akt nr. 48 drift, 7 møller af 250...
19.10.2009, Vindmølleindustrien: Indsigelse Akt nr. 48 drift, 7 møller af 250...19.10.2009, Vindmølleindustrien: Indsigelse Akt nr. 48 drift, 7 møller af 250...
19.10.2009, Vindmølleindustrien: Indsigelse Akt nr. 48 drift, 7 møller af 250...
 
специфика каналов продвижения интернет магазина
специфика каналов продвижения интернет магазинаспецифика каналов продвижения интернет магазина
специфика каналов продвижения интернет магазина
 
Петр Тищенко - Проблемы подготовски кадров для реализации транснациональных п...
Петр Тищенко - Проблемы подготовски кадров для реализации транснациональных п...Петр Тищенко - Проблемы подготовски кадров для реализации транснациональных п...
Петр Тищенко - Проблемы подготовски кадров для реализации транснациональных п...
 
Терхи Янтунен, Вирма Лаппеенранта ЛТД - Лаппеенранта - город устойчивого разв...
Терхи Янтунен, Вирма Лаппеенранта ЛТД - Лаппеенранта - город устойчивого разв...Терхи Янтунен, Вирма Лаппеенранта ЛТД - Лаппеенранта - город устойчивого разв...
Терхи Янтунен, Вирма Лаппеенранта ЛТД - Лаппеенранта - город устойчивого разв...
 
R-Baby Introductory Presentation
R-Baby Introductory PresentationR-Baby Introductory Presentation
R-Baby Introductory Presentation
 
Unit 3d Job interviews
Unit 3d Job interviewsUnit 3d Job interviews
Unit 3d Job interviews
 
McAfee Data Protection
McAfee Data ProtectionMcAfee Data Protection
McAfee Data Protection
 
Salmonella Water. Malaysia
Salmonella Water. MalaysiaSalmonella Water. Malaysia
Salmonella Water. Malaysia
 
NTTデータグループウェブサイトのマルチデバイス対応
NTTデータグループウェブサイトのマルチデバイス対応NTTデータグループウェブサイトのマルチデバイス対応
NTTデータグループウェブサイトのマルチデバイス対応
 
Serving The Community By Using The Private Sector
Serving The Community By Using The Private SectorServing The Community By Using The Private Sector
Serving The Community By Using The Private Sector
 
iPad меняет представление о ПК
iPad меняет представление о ПКiPad меняет представление о ПК
iPad меняет представление о ПК
 
Wolf Llc Market Presentation
Wolf Llc Market PresentationWolf Llc Market Presentation
Wolf Llc Market Presentation
 

Similar to 5 Tips for Executing a Great Newsjack

Abney and Associates Security 2014 News: Big Returns from Big Data for Security
Abney and Associates Security 2014 News: Big Returns from Big Data for SecurityAbney and Associates Security 2014 News: Big Returns from Big Data for Security
Abney and Associates Security 2014 News: Big Returns from Big Data for Securitylewisfinn
 
We are living in a world where cyber security is a top priority for .pdf
We are living in a world where cyber security is a top priority for .pdfWe are living in a world where cyber security is a top priority for .pdf
We are living in a world where cyber security is a top priority for .pdfgalagirishp
 
Verizon 2014 data breach investigation report and the target breach
Verizon 2014 data breach investigation report and the target breachVerizon 2014 data breach investigation report and the target breach
Verizon 2014 data breach investigation report and the target breachUlf Mattsson
 
Forrester no more chewy centers- the zero trust model
Forrester   no more chewy centers- the zero trust modelForrester   no more chewy centers- the zero trust model
Forrester no more chewy centers- the zero trust modelCristian Garcia G.
 
Who is the next target and how is big data related ulf mattsson
Who is the next target and how is big data related   ulf mattssonWho is the next target and how is big data related   ulf mattsson
Who is the next target and how is big data related ulf mattssonUlf Mattsson
 
November 2017: Part 6
November 2017: Part 6November 2017: Part 6
November 2017: Part 6seadeloitte
 
You Are the Target
You Are the TargetYou Are the Target
You Are the TargetEMC
 
TEACHING CASETargeting Target with a 100 million dollar da.docx
TEACHING CASETargeting Target with a 100 million dollar da.docxTEACHING CASETargeting Target with a 100 million dollar da.docx
TEACHING CASETargeting Target with a 100 million dollar da.docxdeanmtaylor1545
 
TEACHING CASETargeting Target with a 100 million dollar da.docx
TEACHING CASETargeting Target with a 100 million dollar da.docxTEACHING CASETargeting Target with a 100 million dollar da.docx
TEACHING CASETargeting Target with a 100 million dollar da.docxbradburgess22840
 
TEACHING CASETargeting Target with a 100 million dollar da.docx
TEACHING CASETargeting Target with a 100 million dollar da.docxTEACHING CASETargeting Target with a 100 million dollar da.docx
TEACHING CASETargeting Target with a 100 million dollar da.docxerlindaw
 
cybersecurity-250
cybersecurity-250cybersecurity-250
cybersecurity-250Chris Crowe
 
Intro to Information AssuranceModule 3Chaston Carter0417.docx
Intro to Information AssuranceModule 3Chaston Carter0417.docxIntro to Information AssuranceModule 3Chaston Carter0417.docx
Intro to Information AssuranceModule 3Chaston Carter0417.docxnormanibarber20063
 
Fraudsters Hackers & Thieves
Fraudsters Hackers & ThievesFraudsters Hackers & Thieves
Fraudsters Hackers & ThievesLorena Magee
 
140707_Cyber-Security
140707_Cyber-Security140707_Cyber-Security
140707_Cyber-SecurityTara Gravel
 
iStart - Cybercrime scene investigation
iStart - Cybercrime scene investigationiStart - Cybercrime scene investigation
iStart - Cybercrime scene investigationHayden McCall
 
Forthright Security Lunch and Learn - Ransomware Focus 2
Forthright Security Lunch and Learn - Ransomware Focus 2Forthright Security Lunch and Learn - Ransomware Focus 2
Forthright Security Lunch and Learn - Ransomware Focus 2David Dubree
 
How Cyber-Secure is your Family Enterprise? A special report for clients of P...
How Cyber-Secure is your Family Enterprise? A special report for clients of P...How Cyber-Secure is your Family Enterprise? A special report for clients of P...
How Cyber-Secure is your Family Enterprise? A special report for clients of P...Declan Winston Ramsaran
 

Similar to 5 Tips for Executing a Great Newsjack (20)

Abney and Associates Security 2014 News: Big Returns from Big Data for Security
Abney and Associates Security 2014 News: Big Returns from Big Data for SecurityAbney and Associates Security 2014 News: Big Returns from Big Data for Security
Abney and Associates Security 2014 News: Big Returns from Big Data for Security
 
We are living in a world where cyber security is a top priority for .pdf
We are living in a world where cyber security is a top priority for .pdfWe are living in a world where cyber security is a top priority for .pdf
We are living in a world where cyber security is a top priority for .pdf
 
Verizon 2014 data breach investigation report and the target breach
Verizon 2014 data breach investigation report and the target breachVerizon 2014 data breach investigation report and the target breach
Verizon 2014 data breach investigation report and the target breach
 
Forrester no more chewy centers- the zero trust model
Forrester   no more chewy centers- the zero trust modelForrester   no more chewy centers- the zero trust model
Forrester no more chewy centers- the zero trust model
 
Who is the next target and how is big data related ulf mattsson
Who is the next target and how is big data related   ulf mattssonWho is the next target and how is big data related   ulf mattsson
Who is the next target and how is big data related ulf mattsson
 
November 2017: Part 6
November 2017: Part 6November 2017: Part 6
November 2017: Part 6
 
You Are the Target
You Are the TargetYou Are the Target
You Are the Target
 
TEACHING CASETargeting Target with a 100 million dollar da.docx
TEACHING CASETargeting Target with a 100 million dollar da.docxTEACHING CASETargeting Target with a 100 million dollar da.docx
TEACHING CASETargeting Target with a 100 million dollar da.docx
 
TEACHING CASETargeting Target with a 100 million dollar da.docx
TEACHING CASETargeting Target with a 100 million dollar da.docxTEACHING CASETargeting Target with a 100 million dollar da.docx
TEACHING CASETargeting Target with a 100 million dollar da.docx
 
TEACHING CASETargeting Target with a 100 million dollar da.docx
TEACHING CASETargeting Target with a 100 million dollar da.docxTEACHING CASETargeting Target with a 100 million dollar da.docx
TEACHING CASETargeting Target with a 100 million dollar da.docx
 
cybersecurity-250
cybersecurity-250cybersecurity-250
cybersecurity-250
 
Intro to Information AssuranceModule 3Chaston Carter0417.docx
Intro to Information AssuranceModule 3Chaston Carter0417.docxIntro to Information AssuranceModule 3Chaston Carter0417.docx
Intro to Information AssuranceModule 3Chaston Carter0417.docx
 
Cybercrime issue
Cybercrime issueCybercrime issue
Cybercrime issue
 
Challenge Accepted
Challenge AcceptedChallenge Accepted
Challenge Accepted
 
Fraudsters Hackers & Thieves
Fraudsters Hackers & ThievesFraudsters Hackers & Thieves
Fraudsters Hackers & Thieves
 
140707_Cyber-Security
140707_Cyber-Security140707_Cyber-Security
140707_Cyber-Security
 
iStart - Cybercrime scene investigation
iStart - Cybercrime scene investigationiStart - Cybercrime scene investigation
iStart - Cybercrime scene investigation
 
LifeLock Javelin Presentation
LifeLock Javelin PresentationLifeLock Javelin Presentation
LifeLock Javelin Presentation
 
Forthright Security Lunch and Learn - Ransomware Focus 2
Forthright Security Lunch and Learn - Ransomware Focus 2Forthright Security Lunch and Learn - Ransomware Focus 2
Forthright Security Lunch and Learn - Ransomware Focus 2
 
How Cyber-Secure is your Family Enterprise? A special report for clients of P...
How Cyber-Secure is your Family Enterprise? A special report for clients of P...How Cyber-Secure is your Family Enterprise? A special report for clients of P...
How Cyber-Secure is your Family Enterprise? A special report for clients of P...
 

More from prnewswire

5 Top Tips for Top Social Media Channels
5 Top Tips for Top Social Media Channels5 Top Tips for Top Social Media Channels
5 Top Tips for Top Social Media Channelsprnewswire
 
Video creation and strategy for today’s modern content marketer final
Video creation and strategy for today’s modern content marketer finalVideo creation and strategy for today’s modern content marketer final
Video creation and strategy for today’s modern content marketer finalprnewswire
 
PR Trends for 2016: How Modern PR is being defined by the industry
PR Trends for 2016: How Modern PR is being defined by the industryPR Trends for 2016: How Modern PR is being defined by the industry
PR Trends for 2016: How Modern PR is being defined by the industryprnewswire
 
Crisis Communications Planning in the Social Media Age
Crisis Communications Planning in the Social Media AgeCrisis Communications Planning in the Social Media Age
Crisis Communications Planning in the Social Media Ageprnewswire
 
2016 Editorial Calendar: A Year-Long Guide to Planning Your Brand Content
2016 Editorial Calendar: A Year-Long Guide to Planning Your Brand Content2016 Editorial Calendar: A Year-Long Guide to Planning Your Brand Content
2016 Editorial Calendar: A Year-Long Guide to Planning Your Brand Contentprnewswire
 
Balancing Content & Big Data to Power PR Results
Balancing Content & Big Data to Power PR ResultsBalancing Content & Big Data to Power PR Results
Balancing Content & Big Data to Power PR Resultsprnewswire
 
Expanding Engagement & Inspiring Action with Your Next Product Launch Webinar
Expanding Engagement & Inspiring Action with Your Next Product Launch WebinarExpanding Engagement & Inspiring Action with Your Next Product Launch Webinar
Expanding Engagement & Inspiring Action with Your Next Product Launch Webinarprnewswire
 
Setting the Record Straight: Press Releases that Stand Out in the Digital Age
Setting the Record Straight: Press Releases that Stand Out in the Digital AgeSetting the Record Straight: Press Releases that Stand Out in the Digital Age
Setting the Record Straight: Press Releases that Stand Out in the Digital Ageprnewswire
 
Pass the Content: Getting Others to Share Your Brand Messages
Pass the Content: Getting Others to Share Your Brand MessagesPass the Content: Getting Others to Share Your Brand Messages
Pass the Content: Getting Others to Share Your Brand Messagesprnewswire
 
Brand Monitoring to the C-Suite
Brand Monitoring to the C-SuiteBrand Monitoring to the C-Suite
Brand Monitoring to the C-Suiteprnewswire
 
Content Sharing: Building a Recipe for Success
Content Sharing: Building a Recipe for SuccessContent Sharing: Building a Recipe for Success
Content Sharing: Building a Recipe for Successprnewswire
 
77 Types of Content to Feed Your Audience
77 Types of Content to Feed Your Audience77 Types of Content to Feed Your Audience
77 Types of Content to Feed Your Audienceprnewswire
 
Beyond Social: Blog Marketing Tips to Reach and Engage New Audiences
Beyond Social: Blog Marketing Tips to Reach and Engage New AudiencesBeyond Social: Blog Marketing Tips to Reach and Engage New Audiences
Beyond Social: Blog Marketing Tips to Reach and Engage New Audiencesprnewswire
 
Going the Distance: How to Find Your Blog's Focus and Avoid Blogger Burn Out
Going the Distance: How to Find Your Blog's Focus and Avoid Blogger Burn OutGoing the Distance: How to Find Your Blog's Focus and Avoid Blogger Burn Out
Going the Distance: How to Find Your Blog's Focus and Avoid Blogger Burn Outprnewswire
 
Staying Ahead of the Game - The Steps to Effective Crisis Communications Plan...
Staying Ahead of the Game - The Steps to Effective Crisis Communications Plan...Staying Ahead of the Game - The Steps to Effective Crisis Communications Plan...
Staying Ahead of the Game - The Steps to Effective Crisis Communications Plan...prnewswire
 
You Had Me at Hello: Tips for Building Relationships with Media and Influence...
You Had Me at Hello: Tips for Building Relationships with Media and Influence...You Had Me at Hello: Tips for Building Relationships with Media and Influence...
You Had Me at Hello: Tips for Building Relationships with Media and Influence...prnewswire
 
The Modern PR Trends Every Communicator Should Know
The Modern PR Trends Every Communicator Should KnowThe Modern PR Trends Every Communicator Should Know
The Modern PR Trends Every Communicator Should Knowprnewswire
 
Communications Trends For 2015 - Creative Approaches to Content Promotion
Communications Trends For 2015 - Creative Approaches to Content PromotionCommunications Trends For 2015 - Creative Approaches to Content Promotion
Communications Trends For 2015 - Creative Approaches to Content Promotionprnewswire
 
Demand Attention Now: Create Your Visual Moment of Truth
Demand Attention Now: Create Your Visual Moment of Truth Demand Attention Now: Create Your Visual Moment of Truth
Demand Attention Now: Create Your Visual Moment of Truth prnewswire
 
PR Trends for 2015: Focus on Visual Storytelling
PR Trends for 2015: Focus on Visual StorytellingPR Trends for 2015: Focus on Visual Storytelling
PR Trends for 2015: Focus on Visual Storytellingprnewswire
 

More from prnewswire (20)

5 Top Tips for Top Social Media Channels
5 Top Tips for Top Social Media Channels5 Top Tips for Top Social Media Channels
5 Top Tips for Top Social Media Channels
 
Video creation and strategy for today’s modern content marketer final
Video creation and strategy for today’s modern content marketer finalVideo creation and strategy for today’s modern content marketer final
Video creation and strategy for today’s modern content marketer final
 
PR Trends for 2016: How Modern PR is being defined by the industry
PR Trends for 2016: How Modern PR is being defined by the industryPR Trends for 2016: How Modern PR is being defined by the industry
PR Trends for 2016: How Modern PR is being defined by the industry
 
Crisis Communications Planning in the Social Media Age
Crisis Communications Planning in the Social Media AgeCrisis Communications Planning in the Social Media Age
Crisis Communications Planning in the Social Media Age
 
2016 Editorial Calendar: A Year-Long Guide to Planning Your Brand Content
2016 Editorial Calendar: A Year-Long Guide to Planning Your Brand Content2016 Editorial Calendar: A Year-Long Guide to Planning Your Brand Content
2016 Editorial Calendar: A Year-Long Guide to Planning Your Brand Content
 
Balancing Content & Big Data to Power PR Results
Balancing Content & Big Data to Power PR ResultsBalancing Content & Big Data to Power PR Results
Balancing Content & Big Data to Power PR Results
 
Expanding Engagement & Inspiring Action with Your Next Product Launch Webinar
Expanding Engagement & Inspiring Action with Your Next Product Launch WebinarExpanding Engagement & Inspiring Action with Your Next Product Launch Webinar
Expanding Engagement & Inspiring Action with Your Next Product Launch Webinar
 
Setting the Record Straight: Press Releases that Stand Out in the Digital Age
Setting the Record Straight: Press Releases that Stand Out in the Digital AgeSetting the Record Straight: Press Releases that Stand Out in the Digital Age
Setting the Record Straight: Press Releases that Stand Out in the Digital Age
 
Pass the Content: Getting Others to Share Your Brand Messages
Pass the Content: Getting Others to Share Your Brand MessagesPass the Content: Getting Others to Share Your Brand Messages
Pass the Content: Getting Others to Share Your Brand Messages
 
Brand Monitoring to the C-Suite
Brand Monitoring to the C-SuiteBrand Monitoring to the C-Suite
Brand Monitoring to the C-Suite
 
Content Sharing: Building a Recipe for Success
Content Sharing: Building a Recipe for SuccessContent Sharing: Building a Recipe for Success
Content Sharing: Building a Recipe for Success
 
77 Types of Content to Feed Your Audience
77 Types of Content to Feed Your Audience77 Types of Content to Feed Your Audience
77 Types of Content to Feed Your Audience
 
Beyond Social: Blog Marketing Tips to Reach and Engage New Audiences
Beyond Social: Blog Marketing Tips to Reach and Engage New AudiencesBeyond Social: Blog Marketing Tips to Reach and Engage New Audiences
Beyond Social: Blog Marketing Tips to Reach and Engage New Audiences
 
Going the Distance: How to Find Your Blog's Focus and Avoid Blogger Burn Out
Going the Distance: How to Find Your Blog's Focus and Avoid Blogger Burn OutGoing the Distance: How to Find Your Blog's Focus and Avoid Blogger Burn Out
Going the Distance: How to Find Your Blog's Focus and Avoid Blogger Burn Out
 
Staying Ahead of the Game - The Steps to Effective Crisis Communications Plan...
Staying Ahead of the Game - The Steps to Effective Crisis Communications Plan...Staying Ahead of the Game - The Steps to Effective Crisis Communications Plan...
Staying Ahead of the Game - The Steps to Effective Crisis Communications Plan...
 
You Had Me at Hello: Tips for Building Relationships with Media and Influence...
You Had Me at Hello: Tips for Building Relationships with Media and Influence...You Had Me at Hello: Tips for Building Relationships with Media and Influence...
You Had Me at Hello: Tips for Building Relationships with Media and Influence...
 
The Modern PR Trends Every Communicator Should Know
The Modern PR Trends Every Communicator Should KnowThe Modern PR Trends Every Communicator Should Know
The Modern PR Trends Every Communicator Should Know
 
Communications Trends For 2015 - Creative Approaches to Content Promotion
Communications Trends For 2015 - Creative Approaches to Content PromotionCommunications Trends For 2015 - Creative Approaches to Content Promotion
Communications Trends For 2015 - Creative Approaches to Content Promotion
 
Demand Attention Now: Create Your Visual Moment of Truth
Demand Attention Now: Create Your Visual Moment of Truth Demand Attention Now: Create Your Visual Moment of Truth
Demand Attention Now: Create Your Visual Moment of Truth
 
PR Trends for 2015: Focus on Visual Storytelling
PR Trends for 2015: Focus on Visual StorytellingPR Trends for 2015: Focus on Visual Storytelling
PR Trends for 2015: Focus on Visual Storytelling
 

Recently uploaded

Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...
Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...
Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...Dipal Arora
 
Call Girls In Holiday Inn Express Gurugram➥99902@11544 ( Best price)100% Genu...
Call Girls In Holiday Inn Express Gurugram➥99902@11544 ( Best price)100% Genu...Call Girls In Holiday Inn Express Gurugram➥99902@11544 ( Best price)100% Genu...
Call Girls In Holiday Inn Express Gurugram➥99902@11544 ( Best price)100% Genu...lizamodels9
 
Call Girls Pune Just Call 9907093804 Top Class Call Girl Service Available
Call Girls Pune Just Call 9907093804 Top Class Call Girl Service AvailableCall Girls Pune Just Call 9907093804 Top Class Call Girl Service Available
Call Girls Pune Just Call 9907093804 Top Class Call Girl Service AvailableDipal Arora
 
Regression analysis: Simple Linear Regression Multiple Linear Regression
Regression analysis:  Simple Linear Regression Multiple Linear RegressionRegression analysis:  Simple Linear Regression Multiple Linear Regression
Regression analysis: Simple Linear Regression Multiple Linear RegressionRavindra Nath Shukla
 
The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...
The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...
The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...Aggregage
 
Progress Report - Oracle Database Analyst Summit
Progress  Report - Oracle Database Analyst SummitProgress  Report - Oracle Database Analyst Summit
Progress Report - Oracle Database Analyst SummitHolger Mueller
 
MONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRL
MONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRLMONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRL
MONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRLSeo
 
Mysore Call Girls 8617370543 WhatsApp Number 24x7 Best Services
Mysore Call Girls 8617370543 WhatsApp Number 24x7 Best ServicesMysore Call Girls 8617370543 WhatsApp Number 24x7 Best Services
Mysore Call Girls 8617370543 WhatsApp Number 24x7 Best ServicesDipal Arora
 
Ensure the security of your HCL environment by applying the Zero Trust princi...
Ensure the security of your HCL environment by applying the Zero Trust princi...Ensure the security of your HCL environment by applying the Zero Trust princi...
Ensure the security of your HCL environment by applying the Zero Trust princi...Roland Driesen
 
Boost the utilization of your HCL environment by reevaluating use cases and f...
Boost the utilization of your HCL environment by reevaluating use cases and f...Boost the utilization of your HCL environment by reevaluating use cases and f...
Boost the utilization of your HCL environment by reevaluating use cases and f...Roland Driesen
 
Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...
Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...
Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...anilsa9823
 
Creating Low-Code Loan Applications using the Trisotech Mortgage Feature Set
Creating Low-Code Loan Applications using the Trisotech Mortgage Feature SetCreating Low-Code Loan Applications using the Trisotech Mortgage Feature Set
Creating Low-Code Loan Applications using the Trisotech Mortgage Feature SetDenis Gagné
 
Value Proposition canvas- Customer needs and pains
Value Proposition canvas- Customer needs and painsValue Proposition canvas- Customer needs and pains
Value Proposition canvas- Customer needs and painsP&CO
 
Mondelez State of Snacking and Future Trends 2023
Mondelez State of Snacking and Future Trends 2023Mondelez State of Snacking and Future Trends 2023
Mondelez State of Snacking and Future Trends 2023Neil Kimberley
 
0183760ssssssssssssssssssssssssssss00101011 (27).pdf
0183760ssssssssssssssssssssssssssss00101011 (27).pdf0183760ssssssssssssssssssssssssssss00101011 (27).pdf
0183760ssssssssssssssssssssssssssss00101011 (27).pdfRenandantas16
 
Yaroslav Rozhankivskyy: Три складові і три передумови максимальної продуктивн...
Yaroslav Rozhankivskyy: Три складові і три передумови максимальної продуктивн...Yaroslav Rozhankivskyy: Три складові і три передумови максимальної продуктивн...
Yaroslav Rozhankivskyy: Три складові і три передумови максимальної продуктивн...Lviv Startup Club
 
HONOR Veterans Event Keynote by Michael Hawkins
HONOR Veterans Event Keynote by Michael HawkinsHONOR Veterans Event Keynote by Michael Hawkins
HONOR Veterans Event Keynote by Michael HawkinsMichael W. Hawkins
 
VIP Call Girls In Saharaganj ( Lucknow ) 🔝 8923113531 🔝 Cash Payment (COD) 👒
VIP Call Girls In Saharaganj ( Lucknow  ) 🔝 8923113531 🔝  Cash Payment (COD) 👒VIP Call Girls In Saharaganj ( Lucknow  ) 🔝 8923113531 🔝  Cash Payment (COD) 👒
VIP Call Girls In Saharaganj ( Lucknow ) 🔝 8923113531 🔝 Cash Payment (COD) 👒anilsa9823
 

Recently uploaded (20)

Forklift Operations: Safety through Cartoons
Forklift Operations: Safety through CartoonsForklift Operations: Safety through Cartoons
Forklift Operations: Safety through Cartoons
 
Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...
Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...
Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...
 
Call Girls In Holiday Inn Express Gurugram➥99902@11544 ( Best price)100% Genu...
Call Girls In Holiday Inn Express Gurugram➥99902@11544 ( Best price)100% Genu...Call Girls In Holiday Inn Express Gurugram➥99902@11544 ( Best price)100% Genu...
Call Girls In Holiday Inn Express Gurugram➥99902@11544 ( Best price)100% Genu...
 
Call Girls Pune Just Call 9907093804 Top Class Call Girl Service Available
Call Girls Pune Just Call 9907093804 Top Class Call Girl Service AvailableCall Girls Pune Just Call 9907093804 Top Class Call Girl Service Available
Call Girls Pune Just Call 9907093804 Top Class Call Girl Service Available
 
Regression analysis: Simple Linear Regression Multiple Linear Regression
Regression analysis:  Simple Linear Regression Multiple Linear RegressionRegression analysis:  Simple Linear Regression Multiple Linear Regression
Regression analysis: Simple Linear Regression Multiple Linear Regression
 
The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...
The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...
The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...
 
Progress Report - Oracle Database Analyst Summit
Progress  Report - Oracle Database Analyst SummitProgress  Report - Oracle Database Analyst Summit
Progress Report - Oracle Database Analyst Summit
 
MONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRL
MONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRLMONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRL
MONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRL
 
Mysore Call Girls 8617370543 WhatsApp Number 24x7 Best Services
Mysore Call Girls 8617370543 WhatsApp Number 24x7 Best ServicesMysore Call Girls 8617370543 WhatsApp Number 24x7 Best Services
Mysore Call Girls 8617370543 WhatsApp Number 24x7 Best Services
 
Ensure the security of your HCL environment by applying the Zero Trust princi...
Ensure the security of your HCL environment by applying the Zero Trust princi...Ensure the security of your HCL environment by applying the Zero Trust princi...
Ensure the security of your HCL environment by applying the Zero Trust princi...
 
Boost the utilization of your HCL environment by reevaluating use cases and f...
Boost the utilization of your HCL environment by reevaluating use cases and f...Boost the utilization of your HCL environment by reevaluating use cases and f...
Boost the utilization of your HCL environment by reevaluating use cases and f...
 
Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...
Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...
Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...
 
Creating Low-Code Loan Applications using the Trisotech Mortgage Feature Set
Creating Low-Code Loan Applications using the Trisotech Mortgage Feature SetCreating Low-Code Loan Applications using the Trisotech Mortgage Feature Set
Creating Low-Code Loan Applications using the Trisotech Mortgage Feature Set
 
unwanted pregnancy Kit [+918133066128] Abortion Pills IN Dubai UAE Abudhabi
unwanted pregnancy Kit [+918133066128] Abortion Pills IN Dubai UAE Abudhabiunwanted pregnancy Kit [+918133066128] Abortion Pills IN Dubai UAE Abudhabi
unwanted pregnancy Kit [+918133066128] Abortion Pills IN Dubai UAE Abudhabi
 
Value Proposition canvas- Customer needs and pains
Value Proposition canvas- Customer needs and painsValue Proposition canvas- Customer needs and pains
Value Proposition canvas- Customer needs and pains
 
Mondelez State of Snacking and Future Trends 2023
Mondelez State of Snacking and Future Trends 2023Mondelez State of Snacking and Future Trends 2023
Mondelez State of Snacking and Future Trends 2023
 
0183760ssssssssssssssssssssssssssss00101011 (27).pdf
0183760ssssssssssssssssssssssssssss00101011 (27).pdf0183760ssssssssssssssssssssssssssss00101011 (27).pdf
0183760ssssssssssssssssssssssssssss00101011 (27).pdf
 
Yaroslav Rozhankivskyy: Три складові і три передумови максимальної продуктивн...
Yaroslav Rozhankivskyy: Три складові і три передумови максимальної продуктивн...Yaroslav Rozhankivskyy: Три складові і три передумови максимальної продуктивн...
Yaroslav Rozhankivskyy: Три складові і три передумови максимальної продуктивн...
 
HONOR Veterans Event Keynote by Michael Hawkins
HONOR Veterans Event Keynote by Michael HawkinsHONOR Veterans Event Keynote by Michael Hawkins
HONOR Veterans Event Keynote by Michael Hawkins
 
VIP Call Girls In Saharaganj ( Lucknow ) 🔝 8923113531 🔝 Cash Payment (COD) 👒
VIP Call Girls In Saharaganj ( Lucknow  ) 🔝 8923113531 🔝  Cash Payment (COD) 👒VIP Call Girls In Saharaganj ( Lucknow  ) 🔝 8923113531 🔝  Cash Payment (COD) 👒
VIP Call Girls In Saharaganj ( Lucknow ) 🔝 8923113531 🔝 Cash Payment (COD) 👒
 

5 Tips for Executing a Great Newsjack

  • 1. 5 KEYS TO A GREAT NEWSJACK How One PR Pro Used Common Tools to Execute a Newsjack & Win Huge Media Coverage ANTHONY HARDMAN SecureState Public Relations Expert
  • 2. Anthony Hardman Public Relations Expert, SecureState @ahardman www.linkedin.com/in/anthonyhardman @SecureState THE KEY TO NEWSJACKING Anthony Hardman, SecureState Public Relations Expert
  • 3. SecureState is a global management consulting firm focused on information security, and is one of just 11 companies authorized to investigate credit card holder data breaches. The significant data breaches suffered by leading retailers at the end of 2013 generated significant news coverage and represented an important opportunity for SecureState. Anthony Hardman is the company’s only public relations employee. Here is how he pulled off an amazing newsjack with common PR tools – all by himself. THE KEY TO NEWSJACKING Anthony Hardman, SecureState Public Relations Expert
  • 4. Focus on standing out. “The first key to earning media attention is determining what you can add to the story that no one else is talking about.” THE KEY TO NEWSJACKING Anthony Hardman, SecureState Public Relations Expert
  • 5. Start with the people you know. “I pulled up all my media contacts who I thought would be interested in the story and started making phone calls. When you have an existing relationship with a reporter, it’s okay to call.” THE KEY TO NEWSJACKING Anthony Hardman, SecureState Public Relations Expert
  • 6. In under 30 minutes, two TV stations had committed to on-site interviews, and one of them also booked an instudio interview for that night’s newscast. THE KEY TO NEWSJACKING Anthony Hardman, SecureState Public Relations Expert
  • 7. THE KEY TO NEWSJACKING Anthony Hardman, SecureState Public Relations Expert
  • 8. Target confirmed to ABC News Friday that the additional personal information discovered stolen in the pre-Christmas breach "was obtained through the normal course of Target's business," which is to say both in-store and online. Ken Stasiak, CEO of information-based security firm Secure State, said it's common to see security breaches at retailers right before and after the holiday season. Stasiak said companies often don't want to add security to their payment system if it hinders customers from making a purchase. "They don't want the system to go down," for security reasons, said Stasiak. "They want the money if the security gets more lax during the busy season, it's just the fact of the matter." Stasiak said that customers with compromised credit cards can almost always have fraudulent charges removed and be issued a new card. The real headache comes when additional data about a customer is stolen and identity theft becomes an issue. THE KEY TO NEWSJACKING Anthony Hardman, SecureState Public Relations Expert
  • 9. Mine your media database. “The next step was firing up my Agility media database and creating a targeted list of contacts to whom I could distribute my pitch.” THE KEY TO NEWSJACKING Anthony Hardman, SecureState Public Relations Expert
  • 10. “In cases where time is limited,such as a newsjack, a mass email is appropriate …but be selective about the recipients.” THE KEY TO NEWSJACKING Anthony Hardman, SecureState Public Relations Expert
  • 11. The emails sent to the lists created in the Agility platform resulted in coverage in the LA Times, numerous trade publications and an interview for SecureState’s CEO on PBS NewsHour. THE KEY TO NEWSJACKING Anthony Hardman, SecureState Public Relations Expert
  • 12. THE KEY TO NEWSJACKING Anthony Hardman, SecureState Public Relations Expert
  • 13. Target disclosed the security breach Thursday, saying the thieves had purloined customer names, card numbers and a security code encrypted in the magnetic strip. The theft enables the culprits to make phony credit cards, make fraudulent purchases or siphon money from bank accounts. The data breach underscored the evolving sophistication of cybercriminals and the persistent vulnerability of retailers and consumers despite dozens of past incidents at major retailers. “How do you get 40 million credit cards and no one knows about it?” said Ken Stasiak, chief executive of SecureState, which investigates cybercrimes. “That's a hell of a lot of credit cards. There should have been someone inside the company who spotted this much sooner.” The Target attack appeared to be well thought out and executed with great precision. The Minneapolis retailer said the hack occurred between Nov. 27, just before the annual holiday shopping frenzy, and Dec. 15. The breach affects people who bought goods at any of Target's 1,797 stores nationwide, but doesn't affect those who made purchases online. THE KEY TO NEWSJACKING Anthony Hardman, SecureState Public Relations Expert
  • 14. THE KEY TO NEWSJACKING Anthony Hardman, SecureState Public Relations Expert
  • 15. Respond to journalist queries. “I knew I had struck media relations gold when I responded to a query on ProfNet from the Associated Press.” THE KEY TO NEWSJACKING Anthony Hardman, SecureState Public Relations Expert
  • 16. The resulting story - Tips for Consumers Worried about the Target Breach - hit the AP national wire, and was picked up in media outlets from coast to coast. THE KEY TO NEWSJACKING Anthony Hardman, SecureState Public Relations Expert
  • 17. THE KEY TO NEWSJACKING Anthony Hardman, SecureState Public Relations Expert
  • 18. Q: How did the breach occur? A: Target isn‟t saying how it happened. Industry experts note that companies such as Target spend millions of dollars each year on credit card security, making a theft of this magnitude particularly alarming. Experts disagree about how the breach might have happened. Avivah Litan, a security analyst with Gartner Research, says given all the security, she believes the breach may have been an inside job. But thefts of this size are too big to be the work of company employees, says Ken Stasiak, founder and CEO of Secure State, a Cleveland-based information security firm that investigates data breaches like this one. Stasiak says that such breaches are generally perpetrated by organized crime or an overseas, state-sponsored hacker group. Stasiak‟s theory is that the hackers were able to breach Target‟s main information hub and then wrote a code that gave them access to the company‟s point of sale system and all of its cash registers. That access allowed the hackers to capture the data from shoppers‟ cards as they were swiped. James Lyne, global head of security research for the computer security firm Sophos, says something clearly went wrong with Target‟s security measures. „„Forty million cards stolen really shows a substantial security failure,‟‟ he says. „„This shouldn‟t have happened.‟‟ THE KEY TO NEWSJACKING Anthony Hardman, SecureState Public Relations Expert
  • 19. THE KEY TO NEWSJACKING Anthony Hardman, SecureState Public Relations Expert
  • 20. Experts disagree about how the breach might have happened. Avivah Litan, a security analyst with Gartner Research, says given all the security, she believes the breach may have been an inside job. But thefts of this size are too big to be the work of company employees, says Ken Stasiak, founder and CEO of Secure State, a Cleveland-based information security firm that investigates data breaches like this one. Stasiak says that such breaches are generally perpetrated by organized crime or an overseas, state-sponsored hacker group. Stasiak's theory is that the hackers were able to breach Target's main information hub and then wrote a code that gave them access to the company's point of sale system and all of its cash registers. That access allowed the hackers to capture the data from shoppers' cards as they were swiped. THE KEY TO NEWSJACKING Anthony Hardman, SecureState Public Relations Expert
  • 21. THE KEY TO NEWSJACKING Anthony Hardman, SecureState Public Relations Expert
  • 22. Q: How did this happen? A: Target has said that the breach was caused by malware that affected its U.S. stores. Ken Stasiak, founder and CEO of SecureState, a Cleveland-based information security firm that investigates data breaches like this one, says it's likely that the perpetrators infiltrated Target's main information hub with malware and from there were able to access the store pointof-sale systems. Once the malware was in the POS systems, it could collect credit and debit card numbers as the cards were swiped. Stasiak notes that retailers routinely collect personal information such as addresses, emails and phone numbers through things such as rewards cards when sales are made, so that information is also contained on POS systems just like credit card numbers. THE KEY TO NEWSJACKING Anthony Hardman, SecureState Public Relations Expert
  • 23. Leveraged owned media. “Two internal experts wrote related blog posts. I published and promoted them through every channel I could, which included social media and a news release promoting the content.” THE KEY TO NEWSJACKING Anthony Hardman, SecureState Public Relations Expert
  • 24. The news releases SecureState has issued are the second-largest referrer of visitors to the company’s web site, behind search engines. THE KEY TO NEWSJACKING Anthony Hardman, SecureState Public Relations Expert
  • 25. THE KEY TO NEWSJACKING Anthony Hardman, SecureState Public Relations Expert
  • 26. “When you’re one person, you have to be agile and you have to use what you have.” – Anthony Hardman For an in-depth discussion of Anthony’s tactical approach, read our related blog post: 5 Tips for Pulling Off a Newsjack with Common PR Tools THE KEY TO NEWSJACKING Anthony Hardman, SecureState Public Relations Expert
  • 27. Anthony Hardman Public Relations Expert, SecureState @ahardman www.linkedin.com/in/anthonyhardman @SecureState THE KEY TO NEWSJACKING Anthony Hardman, SecureState Public Relations Expert
  • 28. http://www.prnewswire.com/products-services/agility/ THE KEY TO NEWSJACKING Anthony Hardman, SecureState Public Relations Expert