SlideShare a Scribd company logo
1 of 23
Social Media: Balancing Security & Authenticity w/o Controlling the MessageCindy Kim, Dir. Of Corp Comm (@CindyKimPR)Chris Hewitt, Sr. Dir. Of Marketing Ops (@chewitt)
Social media revolution
3 PROPRIETARY & CONFIDENTIAL - NOT FOR PUBLIC DISTRIBUTION ,[object Object]
Web 2.0 opens new risk vectors to cybercriminals as they can quickly exploit the desire of the community members to “trust” each other in order to quickly gain control of passwords and further infiltrate the community and/or endpoint of the of the end-user.
As TCO pressures mount enterprises will turn increasingly towards the use of web 2.0 and laptop subsidy programs where company employees can go and purchase any PC or mobile phone they desire from retail store fronts.
IT now finds itself in the role of saying yes, and in doing so must look to educate the organization in defining what its appetite for risk is.,[object Object]
Web 2.0 The applications we use today for productivity Collaborative  /  Browser-based  /  Open Source Social Communities, Gadgets,Blogging and Widgets  open up our networks to increasing risk everyday.
6 PROPRIETARY & CONFIDENTIAL - NOT FOR PUBLIC DISTRIBUTION 38 13 4 3 Years to Reach 50M Users:
Security the Achilles Heel of Social Media?
The number of people using the Web will increase by 45% to 2.2B by 2013 Total global Internet audience is 625M 2/3 have joined social networking (427M) Security risks are equally substantial *Forrester Research, 2009
Businesses are NOW at RISK…
[object Object]
 They can quickly capture passwords toINFILTRATEsocial networks,[object Object]
Phishing Scam
Hacked
Social Networking Phishing Attacks…. …up by 240%
Authenticity without losing control
Protect the BRAND without Controlling the Message… 		Engage 		Listen & Monitor 		Educate 		Create a Policy
Trends in social media: a look at 2010 & beyond
Social Media Evolution

More Related Content

What's hot

Hootsuite 5 step guide to social media security
Hootsuite 5 step guide to social media securityHootsuite 5 step guide to social media security
Hootsuite 5 step guide to social media securityFlutterbyBarb
 
Social Media & Electronics Industry B2B Marketing
Social Media & Electronics Industry B2B MarketingSocial Media & Electronics Industry B2B Marketing
Social Media & Electronics Industry B2B MarketingJulie Wright
 
Symantec Report On Rogue Security Software
Symantec Report On Rogue Security SoftwareSymantec Report On Rogue Security Software
Symantec Report On Rogue Security SoftwareSymantec
 
Sophos Security Threat Report Jan 2010 Wpna
Sophos Security Threat Report Jan 2010 WpnaSophos Security Threat Report Jan 2010 Wpna
Sophos Security Threat Report Jan 2010 Wpnadelamm2
 
Social Media Lets Get Social for MAIA
Social Media Lets Get Social for MAIASocial Media Lets Get Social for MAIA
Social Media Lets Get Social for MAIAMelissa Murphy
 
Blue Coat 2013 Systems Mobile Malware Report
Blue Coat 2013 Systems Mobile Malware ReportBlue Coat 2013 Systems Mobile Malware Report
Blue Coat 2013 Systems Mobile Malware ReportContent Rules, Inc.
 
The Social Advisor : Social Media Secrets for Savvy Advisors
The Social Advisor : Social Media Secrets for Savvy AdvisorsThe Social Advisor : Social Media Secrets for Savvy Advisors
The Social Advisor : Social Media Secrets for Savvy AdvisorsSmarsh
 
Cybersecurity
CybersecurityCybersecurity
CybersecurityBen Liu
 
The Future Of Social Networks
The Future Of Social NetworksThe Future Of Social Networks
The Future Of Social NetworksCharlene Li
 
Top Cyber Threats of 2009
Top Cyber Threats of 2009Top Cyber Threats of 2009
Top Cyber Threats of 2009Symantec
 
The New NotCompatible
The New NotCompatibleThe New NotCompatible
The New NotCompatibleLookout
 
Symantec Internet Security Threat Report 2014 - Volume 19
Symantec Internet Security Threat Report 2014 - Volume 19Symantec Internet Security Threat Report 2014 - Volume 19
Symantec Internet Security Threat Report 2014 - Volume 19Symantec
 
6 Cybersecurity Trends to Watch in 2019
6 Cybersecurity Trends to Watch in 20196 Cybersecurity Trends to Watch in 2019
6 Cybersecurity Trends to Watch in 2019BluePayProcessing
 
Project_casia_alchemist
Project_casia_alchemistProject_casia_alchemist
Project_casia_alchemistmitesh gajjar
 
Wiretap 5-collaboration-security-risks-revealed
Wiretap 5-collaboration-security-risks-revealedWiretap 5-collaboration-security-risks-revealed
Wiretap 5-collaboration-security-risks-revealedBritt Newton
 
Social Media Training for Non-Profits
Social Media Training for Non-ProfitsSocial Media Training for Non-Profits
Social Media Training for Non-Profitstambourinecreative
 
Facebook and the CIO
Facebook and the CIOFacebook and the CIO
Facebook and the CIOdltcahill
 

What's hot (20)

Hootsuite 5 step guide to social media security
Hootsuite 5 step guide to social media securityHootsuite 5 step guide to social media security
Hootsuite 5 step guide to social media security
 
Social Media & Electronics Industry B2B Marketing
Social Media & Electronics Industry B2B MarketingSocial Media & Electronics Industry B2B Marketing
Social Media & Electronics Industry B2B Marketing
 
Trends_in_my_profession(revised)
Trends_in_my_profession(revised)Trends_in_my_profession(revised)
Trends_in_my_profession(revised)
 
Symantec Report On Rogue Security Software
Symantec Report On Rogue Security SoftwareSymantec Report On Rogue Security Software
Symantec Report On Rogue Security Software
 
Sophos Security Threat Report Jan 2010 Wpna
Sophos Security Threat Report Jan 2010 WpnaSophos Security Threat Report Jan 2010 Wpna
Sophos Security Threat Report Jan 2010 Wpna
 
Social Media Lets Get Social for MAIA
Social Media Lets Get Social for MAIASocial Media Lets Get Social for MAIA
Social Media Lets Get Social for MAIA
 
Blue Coat 2013 Systems Mobile Malware Report
Blue Coat 2013 Systems Mobile Malware ReportBlue Coat 2013 Systems Mobile Malware Report
Blue Coat 2013 Systems Mobile Malware Report
 
The Social Advisor : Social Media Secrets for Savvy Advisors
The Social Advisor : Social Media Secrets for Savvy AdvisorsThe Social Advisor : Social Media Secrets for Savvy Advisors
The Social Advisor : Social Media Secrets for Savvy Advisors
 
Twitter inc
Twitter incTwitter inc
Twitter inc
 
Cybersecurity
CybersecurityCybersecurity
Cybersecurity
 
The Future Of Social Networks
The Future Of Social NetworksThe Future Of Social Networks
The Future Of Social Networks
 
Top Cyber Threats of 2009
Top Cyber Threats of 2009Top Cyber Threats of 2009
Top Cyber Threats of 2009
 
The New NotCompatible
The New NotCompatibleThe New NotCompatible
The New NotCompatible
 
Symantec Internet Security Threat Report 2014 - Volume 19
Symantec Internet Security Threat Report 2014 - Volume 19Symantec Internet Security Threat Report 2014 - Volume 19
Symantec Internet Security Threat Report 2014 - Volume 19
 
6 Cybersecurity Trends to Watch in 2019
6 Cybersecurity Trends to Watch in 20196 Cybersecurity Trends to Watch in 2019
6 Cybersecurity Trends to Watch in 2019
 
Project_casia_alchemist
Project_casia_alchemistProject_casia_alchemist
Project_casia_alchemist
 
Vodqa why cybersecurity
Vodqa   why cybersecurityVodqa   why cybersecurity
Vodqa why cybersecurity
 
Wiretap 5-collaboration-security-risks-revealed
Wiretap 5-collaboration-security-risks-revealedWiretap 5-collaboration-security-risks-revealed
Wiretap 5-collaboration-security-risks-revealed
 
Social Media Training for Non-Profits
Social Media Training for Non-ProfitsSocial Media Training for Non-Profits
Social Media Training for Non-Profits
 
Facebook and the CIO
Facebook and the CIOFacebook and the CIO
Facebook and the CIO
 

Viewers also liked

GSS Session II Mr. S K Anantha Krishnan -- Engagement of Industry for Impleme...
GSS Session II Mr. S K Anantha Krishnan -- Engagement of Industry for Impleme...GSS Session II Mr. S K Anantha Krishnan -- Engagement of Industry for Impleme...
GSS Session II Mr. S K Anantha Krishnan -- Engagement of Industry for Impleme...4th_Global_Skills_Summit
 
Redefining Resolution: Employe Engagement. Cathy brown
Redefining Resolution: Employe Engagement. Cathy brownRedefining Resolution: Employe Engagement. Cathy brown
Redefining Resolution: Employe Engagement. Cathy brownDavid Liddle
 
CORPORATE EVOLUTION OF DIGITAL COMMUNICATION
CORPORATE EVOLUTION OF DIGITAL COMMUNICATIONCORPORATE EVOLUTION OF DIGITAL COMMUNICATION
CORPORATE EVOLUTION OF DIGITAL COMMUNICATIONTheProjectNZ
 
Communication Planning Seminar - LUISS ENLABS
Communication Planning Seminar - LUISS ENLABSCommunication Planning Seminar - LUISS ENLABS
Communication Planning Seminar - LUISS ENLABSEmilia Maria Pezzini
 
The Evolution of Corporate Communications
The Evolution of Corporate CommunicationsThe Evolution of Corporate Communications
The Evolution of Corporate CommunicationsKenny Ong
 
How Genentech developed its employee advocacy program | Talent Connect 2016
How Genentech developed its employee advocacy program | Talent Connect 2016How Genentech developed its employee advocacy program | Talent Connect 2016
How Genentech developed its employee advocacy program | Talent Connect 2016LinkedIn Talent Solutions
 
Customer acquisition strategy for 2017
Customer acquisition strategy for 2017Customer acquisition strategy for 2017
Customer acquisition strategy for 2017Sherif Makhlouf
 
Social Media Strategy Workshop - 2017
Social Media Strategy Workshop - 2017Social Media Strategy Workshop - 2017
Social Media Strategy Workshop - 2017Chris Snider
 
Software Stacks to enable SDN and NFV
Software Stacks to enable SDN and NFVSoftware Stacks to enable SDN and NFV
Software Stacks to enable SDN and NFVYoshihiro Nakajima
 

Viewers also liked (9)

GSS Session II Mr. S K Anantha Krishnan -- Engagement of Industry for Impleme...
GSS Session II Mr. S K Anantha Krishnan -- Engagement of Industry for Impleme...GSS Session II Mr. S K Anantha Krishnan -- Engagement of Industry for Impleme...
GSS Session II Mr. S K Anantha Krishnan -- Engagement of Industry for Impleme...
 
Redefining Resolution: Employe Engagement. Cathy brown
Redefining Resolution: Employe Engagement. Cathy brownRedefining Resolution: Employe Engagement. Cathy brown
Redefining Resolution: Employe Engagement. Cathy brown
 
CORPORATE EVOLUTION OF DIGITAL COMMUNICATION
CORPORATE EVOLUTION OF DIGITAL COMMUNICATIONCORPORATE EVOLUTION OF DIGITAL COMMUNICATION
CORPORATE EVOLUTION OF DIGITAL COMMUNICATION
 
Communication Planning Seminar - LUISS ENLABS
Communication Planning Seminar - LUISS ENLABSCommunication Planning Seminar - LUISS ENLABS
Communication Planning Seminar - LUISS ENLABS
 
The Evolution of Corporate Communications
The Evolution of Corporate CommunicationsThe Evolution of Corporate Communications
The Evolution of Corporate Communications
 
How Genentech developed its employee advocacy program | Talent Connect 2016
How Genentech developed its employee advocacy program | Talent Connect 2016How Genentech developed its employee advocacy program | Talent Connect 2016
How Genentech developed its employee advocacy program | Talent Connect 2016
 
Customer acquisition strategy for 2017
Customer acquisition strategy for 2017Customer acquisition strategy for 2017
Customer acquisition strategy for 2017
 
Social Media Strategy Workshop - 2017
Social Media Strategy Workshop - 2017Social Media Strategy Workshop - 2017
Social Media Strategy Workshop - 2017
 
Software Stacks to enable SDN and NFV
Software Stacks to enable SDN and NFVSoftware Stacks to enable SDN and NFV
Software Stacks to enable SDN and NFV
 

Similar to Balancing Security & Authenticity in Social Media w/o Controlling Message

Social Media & Enterprise Security Whitepaper
Social Media & Enterprise Security WhitepaperSocial Media & Enterprise Security Whitepaper
Social Media & Enterprise Security WhitepaperSchleighS
 
Social media privacy threats that you need to keep an eye on in 2021
Social media privacy threats that you need to keep an eye on in 2021Social media privacy threats that you need to keep an eye on in 2021
Social media privacy threats that you need to keep an eye on in 2021Impulse Digital
 
Security essentials for CIOs - Navigating the risks and rewards of social media
Security essentials for CIOs - Navigating the risks and rewards of social mediaSecurity essentials for CIOs - Navigating the risks and rewards of social media
Security essentials for CIOs - Navigating the risks and rewards of social mediaJoao Perez
 
Maximizing Knowledge-Sharing
Maximizing Knowledge-SharingMaximizing Knowledge-Sharing
Maximizing Knowledge-SharingNeville Hobson
 
InfoSec's Guide to Social Media [WHITEPAPER]
InfoSec's Guide to Social Media [WHITEPAPER]InfoSec's Guide to Social Media [WHITEPAPER]
InfoSec's Guide to Social Media [WHITEPAPER]Josh Stein
 
September 2019 part 9
September 2019 part 9September 2019 part 9
September 2019 part 9seadeloitte
 
From Social Media to Social Business - Marketing in the 'Social Age'
From Social Media to Social Business - Marketing in the 'Social Age'From Social Media to Social Business - Marketing in the 'Social Age'
From Social Media to Social Business - Marketing in the 'Social Age'Stefan Pfeiffer
 
Mapping Organizational Roles and Responsibilities for Social Media Risk
Mapping Organizational Roles and Responsibilities for Social Media RiskMapping Organizational Roles and Responsibilities for Social Media Risk
Mapping Organizational Roles and Responsibilities for Social Media RiskMohamed Mahdy
 
SMAC - The paradigm shift : Creating future of the Enterprise
SMAC - The paradigm shift : Creating future of the EnterpriseSMAC - The paradigm shift : Creating future of the Enterprise
SMAC - The paradigm shift : Creating future of the EnterpriseNikhil Kulkarni
 
Mapping Organizational Roles & Responsibilities for Social Media Risk
Mapping Organizational Roles & Responsibilities for Social Media RiskMapping Organizational Roles & Responsibilities for Social Media Risk
Mapping Organizational Roles & Responsibilities for Social Media Risk- Mark - Fullbright
 
Benefits and Risks of Social Technologies
Benefits and Risks of Social TechnologiesBenefits and Risks of Social Technologies
Benefits and Risks of Social TechnologiesAtle Skjekkeland
 
Corporate Social Media Guidelines - Protecting Your Organization From Hidden ...
Corporate Social Media Guidelines - Protecting Your Organization From Hidden ...Corporate Social Media Guidelines - Protecting Your Organization From Hidden ...
Corporate Social Media Guidelines - Protecting Your Organization From Hidden ...Raul Colon
 
Zetta.pdf
Zetta.pdfZetta.pdf
Zetta.pdfRonDosh
 
Social media Risk Management Presentation Sample (Animations don't work in sl...
Social media Risk Management Presentation Sample (Animations don't work in sl...Social media Risk Management Presentation Sample (Animations don't work in sl...
Social media Risk Management Presentation Sample (Animations don't work in sl...Alexander Larsen
 
Tactical Misinformation-Disinformation in your Organization
Tactical Misinformation-Disinformation in your OrganizationTactical Misinformation-Disinformation in your Organization
Tactical Misinformation-Disinformation in your OrganizationEyesOpen Association
 
Social Networking In The Workplace Public Version
Social Networking In The Workplace Public VersionSocial Networking In The Workplace Public Version
Social Networking In The Workplace Public VersionBolin Digital
 
FORUM 2013 Social media - a risk management challenge
FORUM 2013 Social media - a risk management challengeFORUM 2013 Social media - a risk management challenge
FORUM 2013 Social media - a risk management challengeFERMA
 
KM World 2009 Developing Enterprise 2.0 For Employee And Customer Engagement
KM World 2009 Developing Enterprise 2.0 For Employee And Customer EngagementKM World 2009 Developing Enterprise 2.0 For Employee And Customer Engagement
KM World 2009 Developing Enterprise 2.0 For Employee And Customer EngagementJessica Muhlbier
 
Rx for Ad Agencies Suffering From Direct, Digital and Social Media Confusion...
Rx for Ad Agencies Suffering From Direct,  Digital and Social Media Confusion...Rx for Ad Agencies Suffering From Direct,  Digital and Social Media Confusion...
Rx for Ad Agencies Suffering From Direct, Digital and Social Media Confusion...Clive Maclean
 
Why is cyber security a disruption in the digital economy
Why is cyber security a disruption in the digital economyWhy is cyber security a disruption in the digital economy
Why is cyber security a disruption in the digital economyMark Albala
 

Similar to Balancing Security & Authenticity in Social Media w/o Controlling Message (20)

Social Media & Enterprise Security Whitepaper
Social Media & Enterprise Security WhitepaperSocial Media & Enterprise Security Whitepaper
Social Media & Enterprise Security Whitepaper
 
Social media privacy threats that you need to keep an eye on in 2021
Social media privacy threats that you need to keep an eye on in 2021Social media privacy threats that you need to keep an eye on in 2021
Social media privacy threats that you need to keep an eye on in 2021
 
Security essentials for CIOs - Navigating the risks and rewards of social media
Security essentials for CIOs - Navigating the risks and rewards of social mediaSecurity essentials for CIOs - Navigating the risks and rewards of social media
Security essentials for CIOs - Navigating the risks and rewards of social media
 
Maximizing Knowledge-Sharing
Maximizing Knowledge-SharingMaximizing Knowledge-Sharing
Maximizing Knowledge-Sharing
 
InfoSec's Guide to Social Media [WHITEPAPER]
InfoSec's Guide to Social Media [WHITEPAPER]InfoSec's Guide to Social Media [WHITEPAPER]
InfoSec's Guide to Social Media [WHITEPAPER]
 
September 2019 part 9
September 2019 part 9September 2019 part 9
September 2019 part 9
 
From Social Media to Social Business - Marketing in the 'Social Age'
From Social Media to Social Business - Marketing in the 'Social Age'From Social Media to Social Business - Marketing in the 'Social Age'
From Social Media to Social Business - Marketing in the 'Social Age'
 
Mapping Organizational Roles and Responsibilities for Social Media Risk
Mapping Organizational Roles and Responsibilities for Social Media RiskMapping Organizational Roles and Responsibilities for Social Media Risk
Mapping Organizational Roles and Responsibilities for Social Media Risk
 
SMAC - The paradigm shift : Creating future of the Enterprise
SMAC - The paradigm shift : Creating future of the EnterpriseSMAC - The paradigm shift : Creating future of the Enterprise
SMAC - The paradigm shift : Creating future of the Enterprise
 
Mapping Organizational Roles & Responsibilities for Social Media Risk
Mapping Organizational Roles & Responsibilities for Social Media RiskMapping Organizational Roles & Responsibilities for Social Media Risk
Mapping Organizational Roles & Responsibilities for Social Media Risk
 
Benefits and Risks of Social Technologies
Benefits and Risks of Social TechnologiesBenefits and Risks of Social Technologies
Benefits and Risks of Social Technologies
 
Corporate Social Media Guidelines - Protecting Your Organization From Hidden ...
Corporate Social Media Guidelines - Protecting Your Organization From Hidden ...Corporate Social Media Guidelines - Protecting Your Organization From Hidden ...
Corporate Social Media Guidelines - Protecting Your Organization From Hidden ...
 
Zetta.pdf
Zetta.pdfZetta.pdf
Zetta.pdf
 
Social media Risk Management Presentation Sample (Animations don't work in sl...
Social media Risk Management Presentation Sample (Animations don't work in sl...Social media Risk Management Presentation Sample (Animations don't work in sl...
Social media Risk Management Presentation Sample (Animations don't work in sl...
 
Tactical Misinformation-Disinformation in your Organization
Tactical Misinformation-Disinformation in your OrganizationTactical Misinformation-Disinformation in your Organization
Tactical Misinformation-Disinformation in your Organization
 
Social Networking In The Workplace Public Version
Social Networking In The Workplace Public VersionSocial Networking In The Workplace Public Version
Social Networking In The Workplace Public Version
 
FORUM 2013 Social media - a risk management challenge
FORUM 2013 Social media - a risk management challengeFORUM 2013 Social media - a risk management challenge
FORUM 2013 Social media - a risk management challenge
 
KM World 2009 Developing Enterprise 2.0 For Employee And Customer Engagement
KM World 2009 Developing Enterprise 2.0 For Employee And Customer EngagementKM World 2009 Developing Enterprise 2.0 For Employee And Customer Engagement
KM World 2009 Developing Enterprise 2.0 For Employee And Customer Engagement
 
Rx for Ad Agencies Suffering From Direct, Digital and Social Media Confusion...
Rx for Ad Agencies Suffering From Direct,  Digital and Social Media Confusion...Rx for Ad Agencies Suffering From Direct,  Digital and Social Media Confusion...
Rx for Ad Agencies Suffering From Direct, Digital and Social Media Confusion...
 
Why is cyber security a disruption in the digital economy
Why is cyber security a disruption in the digital economyWhy is cyber security a disruption in the digital economy
Why is cyber security a disruption in the digital economy
 

Balancing Security & Authenticity in Social Media w/o Controlling Message