SlideShare a Scribd company logo
1 of 3
Download to read offline
22 Must Haves For
    Secure Enterprise Social
How to Avoid Common Risk, Compliance, and Governance Mistakes
The Enterprise Social Media Security Reality

       “Almost two-thirds of companies surveyed
       say that social media is a significant or
       critical risk to their brand reputation; yet
       60% of companies either never train their
       employees about their corporate social
       media policies or do so only upon hiring.
       Moreover, 43% of companies have less than
       one Full-Time Equivalent (FTE) dedicated to
       managing social media risk.”
                    Guarding the Social Gates: The Imperative
                           for Social Media Risk Management
                       (Alan Webber, Altimeter, August 2012)



       “Nearly two-thirds of security and risk
       professionals (64%) have no social media
       policy in place or if they do, they lack
       tools to sufficiently enforce and support
       the policy.”
                            Manage the Risks of Social Media
                              (Chris McClean and Nick Hayes,
                    Forrester Research, Inc., November 2012)
Social@Scale Security Checklist
22 Must Haves For Every Enterprise-wide Social Media Deployment


                 Do we have...?                                                               Yes   No
Governance
                  1. content rules that flag unacceptable outbound content?

                  2. an approval workflow for outbound content?

                  3. the legal team involved for outbound content guidelines?

                  4. a defined escalation process?

                  5. the ability to track messages from inception to resolution?

                  6. a way to handle rogue accounts?

                  7. enterprise-wide, single point password control?

                  8. a rule to disapprove sending passwords around in Excel?

                  9. Access Management?

                 10. a social media policy or guidelines?

Security
                 11. the ability to treat private messages differently?

                 12. the ability to integrate with enterprise-wide authentication systems?

                 13. only tools and platforms that are enterprise-grade security compliant?

                 14. enforced password guidelines?

                 15. the ability to differentiate influencers?

                 16. automated monitoring rules?

Compliance
                 17. the ability to retract social messages from a central location?
                 18. the ability to document internal conversations about social
                     media situations?
                 19. the ability to archive outbound content?

                 20. the ability to archive inbound content?

                 21. the ability to create audit trails for social media activities?
                 22. a Social Media Management System that meets our own corporate
                     security requirements?

           To learn more about Social@Scale Security, visit us at www.sprinklr.com

More Related Content

What's hot

Synthesio book signing marshall sponder - delivered
Synthesio book signing    marshall sponder - deliveredSynthesio book signing    marshall sponder - delivered
Synthesio book signing marshall sponder - deliveredMarshall Sponder
 
[Report] Power to the People: Identify and Empower Your Mobile Workforce, by ...
[Report] Power to the People: Identify and Empower Your Mobile Workforce, by ...[Report] Power to the People: Identify and Empower Your Mobile Workforce, by ...
[Report] Power to the People: Identify and Empower Your Mobile Workforce, by ...Altimeter, a Prophet Company
 
[Report] Social Data Intelligence, by Susan Etlinger
[Report] Social Data Intelligence, by Susan Etlinger [Report] Social Data Intelligence, by Susan Etlinger
[Report] Social Data Intelligence, by Susan Etlinger Altimeter, a Prophet Company
 
The guide to social media marketing and buisness intel.pdf
The guide to social media marketing and buisness intel.pdfThe guide to social media marketing and buisness intel.pdf
The guide to social media marketing and buisness intel.pdfAnjanette Delgado
 
[Report] The Social Media ROI Cookbook, by Susan Etlinger
[Report] The Social Media ROI Cookbook, by Susan Etlinger[Report] The Social Media ROI Cookbook, by Susan Etlinger
[Report] The Social Media ROI Cookbook, by Susan EtlingerAltimeter, a Prophet Company
 
Social monitoring bootcamp Bogota, Colobmia
Social monitoring bootcamp Bogota, ColobmiaSocial monitoring bootcamp Bogota, Colobmia
Social monitoring bootcamp Bogota, ColobmiaMarshall Sponder
 
Brands onlysocial marshall sponder - updated & delivered-v3
Brands onlysocial marshall sponder - updated & delivered-v3Brands onlysocial marshall sponder - updated & delivered-v3
Brands onlysocial marshall sponder - updated & delivered-v3Marshall Sponder
 
Best Practices from the World's Most Social Big Brands
Best Practices from the World's Most Social Big BrandsBest Practices from the World's Most Social Big Brands
Best Practices from the World's Most Social Big BrandsSprinklr
 
[Report] Make An App For That: Mobile Strategies For Retail, by Chris Silva
[Report] Make An App For That: Mobile Strategies For Retail, by Chris Silva[Report] Make An App For That: Mobile Strategies For Retail, by Chris Silva
[Report] Make An App For That: Mobile Strategies For Retail, by Chris SilvaAltimeter, a Prophet Company
 
Social CRM the new rules of relationship management
Social CRM the new rules of relationship managementSocial CRM the new rules of relationship management
Social CRM the new rules of relationship managementPlínio Okamoto
 
The Social CEO: Executives Tell All
The Social CEO: Executives Tell AllThe Social CEO: Executives Tell All
The Social CEO: Executives Tell AllWeber Shandwick
 
Financial Institutions and Social Media
Financial Institutions and Social Media Financial Institutions and Social Media
Financial Institutions and Social Media Ogilvy Consulting
 
Social Media ROI Cycle by Jamie Turner
Social Media ROI Cycle by Jamie TurnerSocial Media ROI Cycle by Jamie Turner
Social Media ROI Cycle by Jamie TurnerSIXTY
 
2014 market-report-online-community-trends get-satisfaction
2014 market-report-online-community-trends get-satisfaction2014 market-report-online-community-trends get-satisfaction
2014 market-report-online-community-trends get-satisfactionHai Dongkixot
 
A Framework for Social Analytics
A Framework for Social AnalyticsA Framework for Social Analytics
A Framework for Social AnalyticsSusan Etlinger
 
Kreative.asia Refining the ROI Equation
Kreative.asia Refining the ROI EquationKreative.asia Refining the ROI Equation
Kreative.asia Refining the ROI EquationEsther Lim
 

What's hot (19)

Synthesio book signing marshall sponder - delivered
Synthesio book signing    marshall sponder - deliveredSynthesio book signing    marshall sponder - delivered
Synthesio book signing marshall sponder - delivered
 
[Report] Power to the People: Identify and Empower Your Mobile Workforce, by ...
[Report] Power to the People: Identify and Empower Your Mobile Workforce, by ...[Report] Power to the People: Identify and Empower Your Mobile Workforce, by ...
[Report] Power to the People: Identify and Empower Your Mobile Workforce, by ...
 
[Report] Social Data Intelligence, by Susan Etlinger
[Report] Social Data Intelligence, by Susan Etlinger [Report] Social Data Intelligence, by Susan Etlinger
[Report] Social Data Intelligence, by Susan Etlinger
 
The guide to social media marketing and buisness intel.pdf
The guide to social media marketing and buisness intel.pdfThe guide to social media marketing and buisness intel.pdf
The guide to social media marketing and buisness intel.pdf
 
[Report] The Social Media ROI Cookbook, by Susan Etlinger
[Report] The Social Media ROI Cookbook, by Susan Etlinger[Report] The Social Media ROI Cookbook, by Susan Etlinger
[Report] The Social Media ROI Cookbook, by Susan Etlinger
 
Social monitoring bootcamp Bogota, Colobmia
Social monitoring bootcamp Bogota, ColobmiaSocial monitoring bootcamp Bogota, Colobmia
Social monitoring bootcamp Bogota, Colobmia
 
Brands onlysocial marshall sponder - updated & delivered-v3
Brands onlysocial marshall sponder - updated & delivered-v3Brands onlysocial marshall sponder - updated & delivered-v3
Brands onlysocial marshall sponder - updated & delivered-v3
 
Best Practices from the World's Most Social Big Brands
Best Practices from the World's Most Social Big BrandsBest Practices from the World's Most Social Big Brands
Best Practices from the World's Most Social Big Brands
 
[Report] Make An App For That: Mobile Strategies For Retail, by Chris Silva
[Report] Make An App For That: Mobile Strategies For Retail, by Chris Silva[Report] Make An App For That: Mobile Strategies For Retail, by Chris Silva
[Report] Make An App For That: Mobile Strategies For Retail, by Chris Silva
 
Social CRM the new rules of relationship management
Social CRM the new rules of relationship managementSocial CRM the new rules of relationship management
Social CRM the new rules of relationship management
 
The Social CEO: Executives Tell All
The Social CEO: Executives Tell AllThe Social CEO: Executives Tell All
The Social CEO: Executives Tell All
 
What is the future for social media??
What is the future for social media??What is the future for social media??
What is the future for social media??
 
Managing Social Media Risks
Managing Social Media RisksManaging Social Media Risks
Managing Social Media Risks
 
Financial Institutions and Social Media
Financial Institutions and Social Media Financial Institutions and Social Media
Financial Institutions and Social Media
 
Social Media ROI Cycle by Jamie Turner
Social Media ROI Cycle by Jamie TurnerSocial Media ROI Cycle by Jamie Turner
Social Media ROI Cycle by Jamie Turner
 
2014 market-report-online-community-trends get-satisfaction
2014 market-report-online-community-trends get-satisfaction2014 market-report-online-community-trends get-satisfaction
2014 market-report-online-community-trends get-satisfaction
 
A Framework for Social Analytics
A Framework for Social AnalyticsA Framework for Social Analytics
A Framework for Social Analytics
 
Kreative.asia Refining the ROI Equation
Kreative.asia Refining the ROI EquationKreative.asia Refining the ROI Equation
Kreative.asia Refining the ROI Equation
 
RESEARCH_PRINT
RESEARCH_PRINTRESEARCH_PRINT
RESEARCH_PRINT
 

Similar to Best Practices for Secure Enterprise Social Media Deployments

3852 Socialnetworking Bk
3852 Socialnetworking Bk3852 Socialnetworking Bk
3852 Socialnetworking BkLeo Greeley
 
Social Media Security Risk Slide Share Version
Social Media Security Risk Slide Share VersionSocial Media Security Risk Slide Share Version
Social Media Security Risk Slide Share Versionfamudal
 
Cyber security: five leadership issues worthy of Board and executive attention
Cyber security: five leadership issues worthy of Board and executive attentionCyber security: five leadership issues worthy of Board and executive attention
Cyber security: five leadership issues worthy of Board and executive attentionRamón Gómez de Olea y Bustinza
 
Cyber security: Five leadership issues worthy of board and executive attention
Cyber security: Five leadership issues worthy of board and executive attentionCyber security: Five leadership issues worthy of board and executive attention
Cyber security: Five leadership issues worthy of board and executive attentionRamón Gómez de Olea y Bustinza
 
D'souza social content
D'souza social contentD'souza social content
D'souza social contentactkm
 
Risksense: 7 Experts on Threat and Vulnerability Management
Risksense: 7 Experts on Threat and Vulnerability ManagementRisksense: 7 Experts on Threat and Vulnerability Management
Risksense: 7 Experts on Threat and Vulnerability ManagementMighty Guides, Inc.
 
InfoSec's Guide to Social Media [WHITEPAPER]
InfoSec's Guide to Social Media [WHITEPAPER]InfoSec's Guide to Social Media [WHITEPAPER]
InfoSec's Guide to Social Media [WHITEPAPER]Josh Stein
 
Cloud Cybersecurity: Strategies for Managing Vendor Risk
Cloud Cybersecurity: Strategies for Managing Vendor RiskCloud Cybersecurity: Strategies for Managing Vendor Risk
Cloud Cybersecurity: Strategies for Managing Vendor RiskHealth Catalyst
 
FORUM 2013 Social media - a risk management challenge
FORUM 2013 Social media - a risk management challengeFORUM 2013 Social media - a risk management challenge
FORUM 2013 Social media - a risk management challengeFERMA
 
Insider threats
Insider threatsInsider threats
Insider threatsizoologic
 
Managing Online Reputation. How to Protect Your Company on Social Media
Managing Online Reputation. How to Protect Your Company on Social MediaManaging Online Reputation. How to Protect Your Company on Social Media
Managing Online Reputation. How to Protect Your Company on Social MediaCharlie Pownall
 
Rothke rsa 2012 what happens in vegas goes on youtube using social networks...
Rothke rsa 2012   what happens in vegas goes on youtube using social networks...Rothke rsa 2012   what happens in vegas goes on youtube using social networks...
Rothke rsa 2012 what happens in vegas goes on youtube using social networks...Ben Rothke
 
Essential guide to social media for executives
Essential guide to social media for executivesEssential guide to social media for executives
Essential guide to social media for executivesKwazi Communications
 
Social Media & Enterprise Security Whitepaper
Social Media & Enterprise Security WhitepaperSocial Media & Enterprise Security Whitepaper
Social Media & Enterprise Security WhitepaperSchleighS
 
Guarding the Social Gates: The Imperative for Social Media Risk Management
 Guarding the Social Gates: The Imperative for Social Media Risk Management Guarding the Social Gates: The Imperative for Social Media Risk Management
Guarding the Social Gates: The Imperative for Social Media Risk ManagementUzzi Ohana
 
Excelsior College Webinar: Human Resources & Social Media Governance
Excelsior College Webinar: Human Resources & Social Media GovernanceExcelsior College Webinar: Human Resources & Social Media Governance
Excelsior College Webinar: Human Resources & Social Media GovernanceMike Lesczinski
 
How to prevent data leaks with application security testing strategy
How to prevent data leaks with application security testing strategyHow to prevent data leaks with application security testing strategy
How to prevent data leaks with application security testing strategyCigniti Technologies Ltd
 

Similar to Best Practices for Secure Enterprise Social Media Deployments (20)

3852 Socialnetworking Bk
3852 Socialnetworking Bk3852 Socialnetworking Bk
3852 Socialnetworking Bk
 
Social Media Security Risk Slide Share Version
Social Media Security Risk Slide Share VersionSocial Media Security Risk Slide Share Version
Social Media Security Risk Slide Share Version
 
Cyber security: five leadership issues worthy of Board and executive attention
Cyber security: five leadership issues worthy of Board and executive attentionCyber security: five leadership issues worthy of Board and executive attention
Cyber security: five leadership issues worthy of Board and executive attention
 
Cyber security: Five leadership issues worthy of board and executive attention
Cyber security: Five leadership issues worthy of board and executive attentionCyber security: Five leadership issues worthy of board and executive attention
Cyber security: Five leadership issues worthy of board and executive attention
 
D'souza social content
D'souza social contentD'souza social content
D'souza social content
 
Risksense: 7 Experts on Threat and Vulnerability Management
Risksense: 7 Experts on Threat and Vulnerability ManagementRisksense: 7 Experts on Threat and Vulnerability Management
Risksense: 7 Experts on Threat and Vulnerability Management
 
InfoSec's Guide to Social Media [WHITEPAPER]
InfoSec's Guide to Social Media [WHITEPAPER]InfoSec's Guide to Social Media [WHITEPAPER]
InfoSec's Guide to Social Media [WHITEPAPER]
 
Avoiding The Seven Deadly Sins of IT
Avoiding The Seven Deadly Sins of ITAvoiding The Seven Deadly Sins of IT
Avoiding The Seven Deadly Sins of IT
 
Cloud Cybersecurity: Strategies for Managing Vendor Risk
Cloud Cybersecurity: Strategies for Managing Vendor RiskCloud Cybersecurity: Strategies for Managing Vendor Risk
Cloud Cybersecurity: Strategies for Managing Vendor Risk
 
FORUM 2013 Social media - a risk management challenge
FORUM 2013 Social media - a risk management challengeFORUM 2013 Social media - a risk management challenge
FORUM 2013 Social media - a risk management challenge
 
Insider threats
Insider threatsInsider threats
Insider threats
 
Managing Online Reputation. How to Protect Your Company on Social Media
Managing Online Reputation. How to Protect Your Company on Social MediaManaging Online Reputation. How to Protect Your Company on Social Media
Managing Online Reputation. How to Protect Your Company on Social Media
 
Rothke rsa 2012 what happens in vegas goes on youtube using social networks...
Rothke rsa 2012   what happens in vegas goes on youtube using social networks...Rothke rsa 2012   what happens in vegas goes on youtube using social networks...
Rothke rsa 2012 what happens in vegas goes on youtube using social networks...
 
Essential guide to social media for executives
Essential guide to social media for executivesEssential guide to social media for executives
Essential guide to social media for executives
 
Social Media & Enterprise Security Whitepaper
Social Media & Enterprise Security WhitepaperSocial Media & Enterprise Security Whitepaper
Social Media & Enterprise Security Whitepaper
 
Social Media and Identity
Social Media and IdentitySocial Media and Identity
Social Media and Identity
 
Social Media and Identity
Social Media and IdentitySocial Media and Identity
Social Media and Identity
 
Guarding the Social Gates: The Imperative for Social Media Risk Management
 Guarding the Social Gates: The Imperative for Social Media Risk Management Guarding the Social Gates: The Imperative for Social Media Risk Management
Guarding the Social Gates: The Imperative for Social Media Risk Management
 
Excelsior College Webinar: Human Resources & Social Media Governance
Excelsior College Webinar: Human Resources & Social Media GovernanceExcelsior College Webinar: Human Resources & Social Media Governance
Excelsior College Webinar: Human Resources & Social Media Governance
 
How to prevent data leaks with application security testing strategy
How to prevent data leaks with application security testing strategyHow to prevent data leaks with application security testing strategy
How to prevent data leaks with application security testing strategy
 

More from Sprinklr

Care Is The New Marketing
Care Is The New MarketingCare Is The New Marketing
Care Is The New MarketingSprinklr
 
Engaging New Audiences with Twitter
Engaging New Audiences with TwitterEngaging New Audiences with Twitter
Engaging New Audiences with TwitterSprinklr
 
Succeeding with Instagram Ads
Succeeding with Instagram AdsSucceeding with Instagram Ads
Succeeding with Instagram AdsSprinklr
 
Calculate Your ROI at SXSW
Calculate Your ROI at SXSWCalculate Your ROI at SXSW
Calculate Your ROI at SXSWSprinklr
 
How Groupon Manages 15 Million Social Relationships
How Groupon Manages 15 Million Social Relationships How Groupon Manages 15 Million Social Relationships
How Groupon Manages 15 Million Social Relationships Sprinklr
 
Content Management Best Practices by Josh Pines | Medidata Solutions
Content Management Best Practices by Josh Pines | Medidata SolutionsContent Management Best Practices by Josh Pines | Medidata Solutions
Content Management Best Practices by Josh Pines | Medidata SolutionsSprinklr
 
How Zillow Connected Thousands of Homeowners With President Obama
How Zillow Connected Thousands of Homeowners With President ObamaHow Zillow Connected Thousands of Homeowners With President Obama
How Zillow Connected Thousands of Homeowners With President ObamaSprinklr
 
Webinar: Can Google+ Help Enterprise Brands?
Webinar: Can Google+ Help Enterprise Brands?Webinar: Can Google+ Help Enterprise Brands?
Webinar: Can Google+ Help Enterprise Brands?Sprinklr
 
How Virgin America Soared During #Snowmageddon
How Virgin America Soared During #SnowmageddonHow Virgin America Soared During #Snowmageddon
How Virgin America Soared During #SnowmageddonSprinklr
 
Best Practices for Enterprise Social Media Management by the Social Media Dre...
Best Practices for Enterprise Social Media Management by the Social Media Dre...Best Practices for Enterprise Social Media Management by the Social Media Dre...
Best Practices for Enterprise Social Media Management by the Social Media Dre...Sprinklr
 
Build it before you need it -Social@Scale: Crisis Management
Build it before you need it -Social@Scale: Crisis ManagementBuild it before you need it -Social@Scale: Crisis Management
Build it before you need it -Social@Scale: Crisis ManagementSprinklr
 
Sprinklr overview of Facebook Timeline
Sprinklr overview of Facebook TimelineSprinklr overview of Facebook Timeline
Sprinklr overview of Facebook TimelineSprinklr
 

More from Sprinklr (12)

Care Is The New Marketing
Care Is The New MarketingCare Is The New Marketing
Care Is The New Marketing
 
Engaging New Audiences with Twitter
Engaging New Audiences with TwitterEngaging New Audiences with Twitter
Engaging New Audiences with Twitter
 
Succeeding with Instagram Ads
Succeeding with Instagram AdsSucceeding with Instagram Ads
Succeeding with Instagram Ads
 
Calculate Your ROI at SXSW
Calculate Your ROI at SXSWCalculate Your ROI at SXSW
Calculate Your ROI at SXSW
 
How Groupon Manages 15 Million Social Relationships
How Groupon Manages 15 Million Social Relationships How Groupon Manages 15 Million Social Relationships
How Groupon Manages 15 Million Social Relationships
 
Content Management Best Practices by Josh Pines | Medidata Solutions
Content Management Best Practices by Josh Pines | Medidata SolutionsContent Management Best Practices by Josh Pines | Medidata Solutions
Content Management Best Practices by Josh Pines | Medidata Solutions
 
How Zillow Connected Thousands of Homeowners With President Obama
How Zillow Connected Thousands of Homeowners With President ObamaHow Zillow Connected Thousands of Homeowners With President Obama
How Zillow Connected Thousands of Homeowners With President Obama
 
Webinar: Can Google+ Help Enterprise Brands?
Webinar: Can Google+ Help Enterprise Brands?Webinar: Can Google+ Help Enterprise Brands?
Webinar: Can Google+ Help Enterprise Brands?
 
How Virgin America Soared During #Snowmageddon
How Virgin America Soared During #SnowmageddonHow Virgin America Soared During #Snowmageddon
How Virgin America Soared During #Snowmageddon
 
Best Practices for Enterprise Social Media Management by the Social Media Dre...
Best Practices for Enterprise Social Media Management by the Social Media Dre...Best Practices for Enterprise Social Media Management by the Social Media Dre...
Best Practices for Enterprise Social Media Management by the Social Media Dre...
 
Build it before you need it -Social@Scale: Crisis Management
Build it before you need it -Social@Scale: Crisis ManagementBuild it before you need it -Social@Scale: Crisis Management
Build it before you need it -Social@Scale: Crisis Management
 
Sprinklr overview of Facebook Timeline
Sprinklr overview of Facebook TimelineSprinklr overview of Facebook Timeline
Sprinklr overview of Facebook Timeline
 

Recently uploaded

WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your BudgetHyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your BudgetEnjoy Anytime
 
Next-generation AAM aircraft unveiled by Supernal, S-A2
Next-generation AAM aircraft unveiled by Supernal, S-A2Next-generation AAM aircraft unveiled by Supernal, S-A2
Next-generation AAM aircraft unveiled by Supernal, S-A2Hyundai Motor Group
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxMaking_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxnull - The Open Security Community
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Alan Dix
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraDeakin University
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhisoniya singh
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksSoftradix Technologies
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 

Recently uploaded (20)

WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your BudgetHyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
 
Next-generation AAM aircraft unveiled by Supernal, S-A2
Next-generation AAM aircraft unveiled by Supernal, S-A2Next-generation AAM aircraft unveiled by Supernal, S-A2
Next-generation AAM aircraft unveiled by Supernal, S-A2
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxMaking_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning era
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other Frameworks
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
The transition to renewables in India.pdf
The transition to renewables in India.pdfThe transition to renewables in India.pdf
The transition to renewables in India.pdf
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 

Best Practices for Secure Enterprise Social Media Deployments

  • 1. 22 Must Haves For Secure Enterprise Social How to Avoid Common Risk, Compliance, and Governance Mistakes
  • 2. The Enterprise Social Media Security Reality “Almost two-thirds of companies surveyed say that social media is a significant or critical risk to their brand reputation; yet 60% of companies either never train their employees about their corporate social media policies or do so only upon hiring. Moreover, 43% of companies have less than one Full-Time Equivalent (FTE) dedicated to managing social media risk.” Guarding the Social Gates: The Imperative for Social Media Risk Management (Alan Webber, Altimeter, August 2012) “Nearly two-thirds of security and risk professionals (64%) have no social media policy in place or if they do, they lack tools to sufficiently enforce and support the policy.” Manage the Risks of Social Media (Chris McClean and Nick Hayes, Forrester Research, Inc., November 2012)
  • 3. Social@Scale Security Checklist 22 Must Haves For Every Enterprise-wide Social Media Deployment Do we have...? Yes No Governance 1. content rules that flag unacceptable outbound content? 2. an approval workflow for outbound content? 3. the legal team involved for outbound content guidelines? 4. a defined escalation process? 5. the ability to track messages from inception to resolution? 6. a way to handle rogue accounts? 7. enterprise-wide, single point password control? 8. a rule to disapprove sending passwords around in Excel? 9. Access Management? 10. a social media policy or guidelines? Security 11. the ability to treat private messages differently? 12. the ability to integrate with enterprise-wide authentication systems? 13. only tools and platforms that are enterprise-grade security compliant? 14. enforced password guidelines? 15. the ability to differentiate influencers? 16. automated monitoring rules? Compliance 17. the ability to retract social messages from a central location? 18. the ability to document internal conversations about social media situations? 19. the ability to archive outbound content? 20. the ability to archive inbound content? 21. the ability to create audit trails for social media activities? 22. a Social Media Management System that meets our own corporate security requirements? To learn more about Social@Scale Security, visit us at www.sprinklr.com