SlideShare a Scribd company logo
1 of 39
Can We Be Faster 
Than Disaster? 
It’s a New Era 
Bill Boyd, Corporate Health and Safety Coordinator 
Coastal Industrial Services 
@chiefb2
Goals 
• Review: 
• History of the Technology 
• Impact of Change 
• New Expectations for 
Business/Agencies 
• Recent Examples 
• Action Steps
About Me 
@chiefb2 
http://chiefb2.com
Quantum Leaps 
0 to 4G
The New Reality 
129 million 
smartphone users
The New Realities 
• Facebook has 1.1 BILLION active users 
worldwide as of May, 2013 
• 250 million pictures uploaded daily to 
Facebook 
• 100 hours of video are uploaded to 
YouTube EVERY MINUTE 
• Twitter has 500 million active users 
worldwide
Impact 
• Explosive Growth 
• Changing work habits 
• Expectation of constant connection 
• Ability to instantly record and 
disseminate to the world 
• People walk into things
When something bad 
happens… 
• People turn to trusted sources to; 
• Share what they are experiencing 
• Validate their observations/feelings 
• Gather information 
• Seek help 
• And, they DO IT FAST!
Are you faster than 
these folks?
San Bruno Explosion 
September 9, 2010 
Photo: Paul Sakuma AP
Craig Fugate, FEMA 
Director @craigatFEMA 
"I got better situational 
awareness [from Twitter] 
before we got official 
word," he said. "Four or 
five years ago I wouldn't 
have gotten that quality 
of information." 
Photo: Max Whittaker, Getty Images
Osama bin laden 
Raid – May 2, 2011
Henryville, Indiana 
March 2, 2012
Asiana Airliner Crash, July 6, 2013
First Tweet
SFO Got It Right!
On the Other Hand… 
• Asiana – No social media presence for 6 hours!
LAX RESPONSE
LAX RESPONSE
LAX RESPONSE
LAX RESPONSE
SM Fail 
“Ryan found two more 4 bottle packs 
of Dogfish Head’s Midas Touch 
beer… when we drink we do it right 
#gettngslizzerd”
Red Cross Response
So, How Do You “Get 
Fast”?
You Need To 
Understand… 
• Traditional news reporting has changed 
• People now get breaking news from the 
crowd 
• You won’t be faster than the crowd 
• You can use the crowd to get valuable 
information 
• If you don’t engage, you’ll lose valuable 
opportunities
“Old School” Crisis 
Comms 
• Chain of Command 
• Message approval process 
• Reliance on media releases/briefings 
• Arrogance (“It’s MY incident”) 
• Underestimating public interest
Before 
Event Occurs Response Information to Media Media to the Crowd
New Crisis Communication 
Strategies
What is 
happening? 
(facts) 
What are we doing 
about it? 
(messages) 
“Here’s what’s 
happening” 
What is 
happening? 
(facts) 
Delegate to lowest 
who can assure 
accuracy 
Leader(s) 
PIO-Spokespersons 
Here’s what we are 
feeling, committing 
to, planning, etc.” 
Event activity 
Approvals Today
Today’s Instant News 
Dilemmas 
• Immediate demand for information 
• Time inertia in mobilizing the team 
• Initial “facts” may be wrong 
• Raising alarm vs. minimizing situation
What It Takes 
• An Open Mind 
• An Investment 
• Practice 
• People 
• Pre-existing 
presence 
• Fast Action
Today’s Crisis 
Comms 
• Use Social Media platforms to: 
• Size Up/Situational Awareness 
• Instruct and Inform 
• Identify those needing Help 
• Correct Rumors 
• Reputation/Credibility Preservation 
• Assess message effectiveness
Some Practical Tips 
• Get help! 
• Post early and often 
• Be smart with hashtags 
• Respect “The Big Two” 
• Play with 3rd party platforms 
• Request your archive 
• Don’t speak for someone else
Tools
Can we be faster than disaster   bill boyd

More Related Content

What's hot

How networked nonprofits use twitter
How networked nonprofits use twitterHow networked nonprofits use twitter
How networked nonprofits use twitterBeth Kanter
 
Social Media Presentation at Key4Women networking event
Social Media Presentation at Key4Women networking eventSocial Media Presentation at Key4Women networking event
Social Media Presentation at Key4Women networking eventNiclas Hulting
 
Deep loc.us slides
Deep loc.us slidesDeep loc.us slides
Deep loc.us slidesURLoved.com
 
SMIM - Class 1
SMIM - Class 1SMIM - Class 1
SMIM - Class 1Joe Samra
 
Fake News and the Trouble with Facebook
Fake News and the Trouble with FacebookFake News and the Trouble with Facebook
Fake News and the Trouble with FacebookDan Kennedy
 
Week 9 - Drowning in Data
Week 9 - Drowning in DataWeek 9 - Drowning in Data
Week 9 - Drowning in DataSteven Johnson
 
10 Steps: Integrating Social Media Into Crisis Plans
10 Steps: Integrating Social Media Into Crisis Plans10 Steps: Integrating Social Media Into Crisis Plans
10 Steps: Integrating Social Media Into Crisis PlansKami Watson Huyse, APR
 
Advanced Organizing institute - Influence & Social Media
Advanced Organizing institute - Influence & Social MediaAdvanced Organizing institute - Influence & Social Media
Advanced Organizing institute - Influence & Social MediaAaron Coleman
 
SXSW 2014: Startups, Bow to Your Marketer Overlords
SXSW 2014: Startups, Bow to Your Marketer Overlords SXSW 2014: Startups, Bow to Your Marketer Overlords
SXSW 2014: Startups, Bow to Your Marketer Overlords David Berkowitz
 
Social Zombies II: Your Friends Need More Brains
Social Zombies II: Your Friends Need More BrainsSocial Zombies II: Your Friends Need More Brains
Social Zombies II: Your Friends Need More BrainsTom Eston
 
How Twitter is forcing institutions to meet organisational & cultural challen...
How Twitter is forcing institutions to meet organisational & cultural challen...How Twitter is forcing institutions to meet organisational & cultural challen...
How Twitter is forcing institutions to meet organisational & cultural challen...Martin Thomas
 
Vicariously Giving Through the Internet
Vicariously Giving Through the InternetVicariously Giving Through the Internet
Vicariously Giving Through the Internetbvukovich
 
WTF is happening 5 consumer trends for 2020
WTF is happening 5 consumer trends for 2020WTF is happening 5 consumer trends for 2020
WTF is happening 5 consumer trends for 2020Hollie Lubbock
 
Datenjournalismus - Entdecken - Erklären - Erkennen
Datenjournalismus - Entdecken - Erklären - ErkennenDatenjournalismus - Entdecken - Erklären - Erkennen
Datenjournalismus - Entdecken - Erklären - ErkennenThomas Jöchler
 
The Engaging Data Manifesto
The Engaging Data ManifestoThe Engaging Data Manifesto
The Engaging Data ManifestoAmanda Levinson
 

What's hot (19)

How networked nonprofits use twitter
How networked nonprofits use twitterHow networked nonprofits use twitter
How networked nonprofits use twitter
 
Social Media Presentation at Key4Women networking event
Social Media Presentation at Key4Women networking eventSocial Media Presentation at Key4Women networking event
Social Media Presentation at Key4Women networking event
 
Obama.Com E Você, por Joe Crump
Obama.Com E Você, por Joe CrumpObama.Com E Você, por Joe Crump
Obama.Com E Você, por Joe Crump
 
Deep loc.us slides
Deep loc.us slidesDeep loc.us slides
Deep loc.us slides
 
SMIM - Class 1
SMIM - Class 1SMIM - Class 1
SMIM - Class 1
 
The Which What And Why Of Social Media for Business
The Which What And Why Of Social Media for BusinessThe Which What And Why Of Social Media for Business
The Which What And Why Of Social Media for Business
 
Fake News and the Trouble with Facebook
Fake News and the Trouble with FacebookFake News and the Trouble with Facebook
Fake News and the Trouble with Facebook
 
Week 9 - Drowning in Data
Week 9 - Drowning in DataWeek 9 - Drowning in Data
Week 9 - Drowning in Data
 
10 Steps: Integrating Social Media Into Crisis Plans
10 Steps: Integrating Social Media Into Crisis Plans10 Steps: Integrating Social Media Into Crisis Plans
10 Steps: Integrating Social Media Into Crisis Plans
 
Advanced Organizing institute - Influence & Social Media
Advanced Organizing institute - Influence & Social MediaAdvanced Organizing institute - Influence & Social Media
Advanced Organizing institute - Influence & Social Media
 
SXSW 2014: Startups, Bow to Your Marketer Overlords
SXSW 2014: Startups, Bow to Your Marketer Overlords SXSW 2014: Startups, Bow to Your Marketer Overlords
SXSW 2014: Startups, Bow to Your Marketer Overlords
 
Extended Village
Extended VillageExtended Village
Extended Village
 
Social Zombies II: Your Friends Need More Brains
Social Zombies II: Your Friends Need More BrainsSocial Zombies II: Your Friends Need More Brains
Social Zombies II: Your Friends Need More Brains
 
amalv google
amalv googleamalv google
amalv google
 
How Twitter is forcing institutions to meet organisational & cultural challen...
How Twitter is forcing institutions to meet organisational & cultural challen...How Twitter is forcing institutions to meet organisational & cultural challen...
How Twitter is forcing institutions to meet organisational & cultural challen...
 
Vicariously Giving Through the Internet
Vicariously Giving Through the InternetVicariously Giving Through the Internet
Vicariously Giving Through the Internet
 
WTF is happening 5 consumer trends for 2020
WTF is happening 5 consumer trends for 2020WTF is happening 5 consumer trends for 2020
WTF is happening 5 consumer trends for 2020
 
Datenjournalismus - Entdecken - Erklären - Erkennen
Datenjournalismus - Entdecken - Erklären - ErkennenDatenjournalismus - Entdecken - Erklären - Erkennen
Datenjournalismus - Entdecken - Erklären - Erkennen
 
The Engaging Data Manifesto
The Engaging Data ManifestoThe Engaging Data Manifesto
The Engaging Data Manifesto
 

Viewers also liked

TAG Luncheon: Lean: FastCap Style
TAG Luncheon: Lean: FastCap StyleTAG Luncheon: Lean: FastCap Style
TAG Luncheon: Lean: FastCap StyleMeg Weber
 
State of indiana case study
State of indiana case studyState of indiana case study
State of indiana case studyMeg Weber
 
Small Business Administration Recommendations
Small Business Administration RecommendationsSmall Business Administration Recommendations
Small Business Administration RecommendationsMeg Weber
 
2012 March Luncheon: Education Summit
2012 March Luncheon: Education Summit2012 March Luncheon: Education Summit
2012 March Luncheon: Education SummitMeg Weber
 
Working with law enforcement
Working with law enforcementWorking with law enforcement
Working with law enforcementMeg Weber
 
2014 ota databreach3
2014 ota databreach32014 ota databreach3
2014 ota databreach3Meg Weber
 
Future of cyber in the board room: Michael Cockrill Presents
Future of cyber in the board room: Michael Cockrill PresentsFuture of cyber in the board room: Michael Cockrill Presents
Future of cyber in the board room: Michael Cockrill PresentsMeg Weber
 
Online Trust Alliance Recommendations
Online Trust Alliance RecommendationsOnline Trust Alliance Recommendations
Online Trust Alliance RecommendationsMeg Weber
 
TAG Luncheon: A+ Washington
TAG Luncheon: A+ WashingtonTAG Luncheon: A+ Washington
TAG Luncheon: A+ WashingtonMeg Weber
 
TAG Luncheon: 2012 Tax Update
TAG Luncheon: 2012 Tax UpdateTAG Luncheon: 2012 Tax Update
TAG Luncheon: 2012 Tax UpdateMeg Weber
 
2012 April Luncheon: Get Your Match On (Finding and Keeping the Talent You Need)
2012 April Luncheon: Get Your Match On (Finding and Keeping the Talent You Need)2012 April Luncheon: Get Your Match On (Finding and Keeping the Talent You Need)
2012 April Luncheon: Get Your Match On (Finding and Keeping the Talent You Need)Meg Weber
 
Cyber risk scorecards
Cyber risk scorecardsCyber risk scorecards
Cyber risk scorecardsMeg Weber
 
Technology Development Center Introduction
Technology Development Center IntroductionTechnology Development Center Introduction
Technology Development Center IntroductionMeg Weber
 
Reasons to be secure
Reasons to be secureReasons to be secure
Reasons to be secureMeg Weber
 
TAG Luncheon: Center for Innovation
TAG Luncheon: Center for InnovationTAG Luncheon: Center for Innovation
TAG Luncheon: Center for InnovationMeg Weber
 
TAG Luncheon: State of Technology
TAG Luncheon: State of TechnologyTAG Luncheon: State of Technology
TAG Luncheon: State of TechnologyMeg Weber
 
Working with Law Enforcement on Cyber Security Strategies
Working with Law Enforcement on Cyber Security StrategiesWorking with Law Enforcement on Cyber Security Strategies
Working with Law Enforcement on Cyber Security StrategiesMeg Weber
 

Viewers also liked (18)

TAG Luncheon: Lean: FastCap Style
TAG Luncheon: Lean: FastCap StyleTAG Luncheon: Lean: FastCap Style
TAG Luncheon: Lean: FastCap Style
 
State of indiana case study
State of indiana case studyState of indiana case study
State of indiana case study
 
Small Business Administration Recommendations
Small Business Administration RecommendationsSmall Business Administration Recommendations
Small Business Administration Recommendations
 
2012 March Luncheon: Education Summit
2012 March Luncheon: Education Summit2012 March Luncheon: Education Summit
2012 March Luncheon: Education Summit
 
Working with law enforcement
Working with law enforcementWorking with law enforcement
Working with law enforcement
 
2014 ota databreach3
2014 ota databreach32014 ota databreach3
2014 ota databreach3
 
Future of cyber in the board room: Michael Cockrill Presents
Future of cyber in the board room: Michael Cockrill PresentsFuture of cyber in the board room: Michael Cockrill Presents
Future of cyber in the board room: Michael Cockrill Presents
 
Online Trust Alliance Recommendations
Online Trust Alliance RecommendationsOnline Trust Alliance Recommendations
Online Trust Alliance Recommendations
 
TAG Luncheon: A+ Washington
TAG Luncheon: A+ WashingtonTAG Luncheon: A+ Washington
TAG Luncheon: A+ Washington
 
Deber de ingles
Deber de inglesDeber de ingles
Deber de ingles
 
TAG Luncheon: 2012 Tax Update
TAG Luncheon: 2012 Tax UpdateTAG Luncheon: 2012 Tax Update
TAG Luncheon: 2012 Tax Update
 
2012 April Luncheon: Get Your Match On (Finding and Keeping the Talent You Need)
2012 April Luncheon: Get Your Match On (Finding and Keeping the Talent You Need)2012 April Luncheon: Get Your Match On (Finding and Keeping the Talent You Need)
2012 April Luncheon: Get Your Match On (Finding and Keeping the Talent You Need)
 
Cyber risk scorecards
Cyber risk scorecardsCyber risk scorecards
Cyber risk scorecards
 
Technology Development Center Introduction
Technology Development Center IntroductionTechnology Development Center Introduction
Technology Development Center Introduction
 
Reasons to be secure
Reasons to be secureReasons to be secure
Reasons to be secure
 
TAG Luncheon: Center for Innovation
TAG Luncheon: Center for InnovationTAG Luncheon: Center for Innovation
TAG Luncheon: Center for Innovation
 
TAG Luncheon: State of Technology
TAG Luncheon: State of TechnologyTAG Luncheon: State of Technology
TAG Luncheon: State of Technology
 
Working with Law Enforcement on Cyber Security Strategies
Working with Law Enforcement on Cyber Security StrategiesWorking with Law Enforcement on Cyber Security Strategies
Working with Law Enforcement on Cyber Security Strategies
 

Similar to Can we be faster than disaster bill boyd

Crisis Communication in the Digital Age
 Crisis Communication in the Digital Age Crisis Communication in the Digital Age
Crisis Communication in the Digital AgeJane Jordan-Meier
 
Crisis Communications in a Social Media Age
Crisis Communications in a Social Media AgeCrisis Communications in a Social Media Age
Crisis Communications in a Social Media AgeJim Rettew
 
Government communications (george mason university)
Government communications (george mason university)Government communications (george mason university)
Government communications (george mason university)jerlasich
 
Social media & crisis management handout
Social media & crisis management handoutSocial media & crisis management handout
Social media & crisis management handoutSocial Media Rockstar
 
Facts, Fake news and Facebook
Facts, Fake news and FacebookFacts, Fake news and Facebook
Facts, Fake news and FacebookJulian Matthews
 
Ali toronto november 2012 so me govt
Ali toronto november 2012 so me govtAli toronto november 2012 so me govt
Ali toronto november 2012 so me govtGenome Alberta
 
Where They Are @: or how I learned to stop worrying and love social media
Where They Are @: or how I learned to stop worrying and love social mediaWhere They Are @: or how I learned to stop worrying and love social media
Where They Are @: or how I learned to stop worrying and love social mediaJames Garrow
 
Crisis Management Through Social Media Monitoriing
Crisis Management Through Social Media MonitoriingCrisis Management Through Social Media Monitoriing
Crisis Management Through Social Media Monitoriingtracx
 
Social media for emergency management (Suzanne Bernier)
Social media for emergency management (Suzanne Bernier)Social media for emergency management (Suzanne Bernier)
Social media for emergency management (Suzanne Bernier)Learning Manager
 
Sourcing and Verifying Social Content
Sourcing and Verifying Social ContentSourcing and Verifying Social Content
Sourcing and Verifying Social ContentJill Hopke
 
Long, J. & Hicks, J. Think Before you Link, a Fake News Redux: Identifying bi...
Long, J. & Hicks, J. Think Before you Link, a Fake News Redux: Identifying bi...Long, J. & Hicks, J. Think Before you Link, a Fake News Redux: Identifying bi...
Long, J. & Hicks, J. Think Before you Link, a Fake News Redux: Identifying bi...IL Group (CILIP Information Literacy Group)
 
Hijacking the news - Meningitis Now. South West Regional Group, 5 June 2015
Hijacking the news - Meningitis Now. South West Regional Group, 5 June 2015Hijacking the news - Meningitis Now. South West Regional Group, 5 June 2015
Hijacking the news - Meningitis Now. South West Regional Group, 5 June 2015CharityComms
 
Public Health Preparedness Conference
Public Health Preparedness ConferencePublic Health Preparedness Conference
Public Health Preparedness ConferenceCrisisCommons
 
Movement proposal (2012)
Movement proposal (2012) Movement proposal (2012)
Movement proposal (2012) Joseph Serwach
 
Debunking Social Media Myths - A Guide for Media Executives
Debunking Social Media Myths - A Guide for Media ExecutivesDebunking Social Media Myths - A Guide for Media Executives
Debunking Social Media Myths - A Guide for Media ExecutivesNeil Foote
 
Social Media Marketing for your Department
Social Media Marketing for your DepartmentSocial Media Marketing for your Department
Social Media Marketing for your DepartmentRommie Duckworth
 

Similar to Can we be faster than disaster bill boyd (20)

Crisis Communication in the Digital Age
 Crisis Communication in the Digital Age Crisis Communication in the Digital Age
Crisis Communication in the Digital Age
 
Situational Awareness Through Social Media
 Situational Awareness Through Social Media  Situational Awareness Through Social Media
Situational Awareness Through Social Media
 
Crisis Communications in a Social Media Age
Crisis Communications in a Social Media AgeCrisis Communications in a Social Media Age
Crisis Communications in a Social Media Age
 
Government communications (george mason university)
Government communications (george mason university)Government communications (george mason university)
Government communications (george mason university)
 
Social media & crisis management handout
Social media & crisis management handoutSocial media & crisis management handout
Social media & crisis management handout
 
Facts, Fake news and Facebook
Facts, Fake news and FacebookFacts, Fake news and Facebook
Facts, Fake news and Facebook
 
Ali toronto november 2012 so me govt
Ali toronto november 2012 so me govtAli toronto november 2012 so me govt
Ali toronto november 2012 so me govt
 
Charlotte & The Convention
Charlotte & The ConventionCharlotte & The Convention
Charlotte & The Convention
 
OC Sheriff 10 Commandments of Crisis
OC Sheriff 10 Commandments of CrisisOC Sheriff 10 Commandments of Crisis
OC Sheriff 10 Commandments of Crisis
 
Where They Are @: or how I learned to stop worrying and love social media
Where They Are @: or how I learned to stop worrying and love social mediaWhere They Are @: or how I learned to stop worrying and love social media
Where They Are @: or how I learned to stop worrying and love social media
 
Crisis Management Through Social Media Monitoriing
Crisis Management Through Social Media MonitoriingCrisis Management Through Social Media Monitoriing
Crisis Management Through Social Media Monitoriing
 
Social media for emergency management (Suzanne Bernier)
Social media for emergency management (Suzanne Bernier)Social media for emergency management (Suzanne Bernier)
Social media for emergency management (Suzanne Bernier)
 
Sourcing and Verifying Social Content
Sourcing and Verifying Social ContentSourcing and Verifying Social Content
Sourcing and Verifying Social Content
 
Unplug Yourself
Unplug YourselfUnplug Yourself
Unplug Yourself
 
Long, J. & Hicks, J. Think Before you Link, a Fake News Redux: Identifying bi...
Long, J. & Hicks, J. Think Before you Link, a Fake News Redux: Identifying bi...Long, J. & Hicks, J. Think Before you Link, a Fake News Redux: Identifying bi...
Long, J. & Hicks, J. Think Before you Link, a Fake News Redux: Identifying bi...
 
Hijacking the news - Meningitis Now. South West Regional Group, 5 June 2015
Hijacking the news - Meningitis Now. South West Regional Group, 5 June 2015Hijacking the news - Meningitis Now. South West Regional Group, 5 June 2015
Hijacking the news - Meningitis Now. South West Regional Group, 5 June 2015
 
Public Health Preparedness Conference
Public Health Preparedness ConferencePublic Health Preparedness Conference
Public Health Preparedness Conference
 
Movement proposal (2012)
Movement proposal (2012) Movement proposal (2012)
Movement proposal (2012)
 
Debunking Social Media Myths - A Guide for Media Executives
Debunking Social Media Myths - A Guide for Media ExecutivesDebunking Social Media Myths - A Guide for Media Executives
Debunking Social Media Myths - A Guide for Media Executives
 
Social Media Marketing for your Department
Social Media Marketing for your DepartmentSocial Media Marketing for your Department
Social Media Marketing for your Department
 

More from Meg Weber

Ri cyber-security-for-your-small-business
Ri cyber-security-for-your-small-businessRi cyber-security-for-your-small-business
Ri cyber-security-for-your-small-businessMeg Weber
 
Department of Homeland Security Guidance
Department of Homeland Security GuidanceDepartment of Homeland Security Guidance
Department of Homeland Security GuidanceMeg Weber
 
FCC Guidelines on Cyber Security
FCC Guidelines on Cyber SecurityFCC Guidelines on Cyber Security
FCC Guidelines on Cyber SecurityMeg Weber
 
DHS Guidelines
DHS GuidelinesDHS Guidelines
DHS GuidelinesMeg Weber
 
Cybersecurity brochure flyer version-small
Cybersecurity brochure flyer version-smallCybersecurity brochure flyer version-small
Cybersecurity brochure flyer version-smallMeg Weber
 
2014 ota databreachguide4
2014 ota databreachguide42014 ota databreachguide4
2014 ota databreachguide4Meg Weber
 
5 questions ce os should ask about cyber risks
5 questions ce os should ask about cyber risks5 questions ce os should ask about cyber risks
5 questions ce os should ask about cyber risksMeg Weber
 
Welcome to the Cyber Risk Summit
Welcome to the Cyber Risk SummitWelcome to the Cyber Risk Summit
Welcome to the Cyber Risk SummitMeg Weber
 
WCC Programs Overview
WCC Programs OverviewWCC Programs Overview
WCC Programs OverviewMeg Weber
 
Audit summary from security solutions and ovation tech
Audit summary from security solutions and ovation techAudit summary from security solutions and ovation tech
Audit summary from security solutions and ovation techMeg Weber
 
Jb hunt case study
Jb hunt case studyJb hunt case study
Jb hunt case studyMeg Weber
 
Nemours case study nemours embraces app innovation with mobile iron
Nemours case study  nemours embraces app innovation with mobile ironNemours case study  nemours embraces app innovation with mobile iron
Nemours case study nemours embraces app innovation with mobile ironMeg Weber
 
Mark Anderson on Cyber Security
Mark Anderson on Cyber SecurityMark Anderson on Cyber Security
Mark Anderson on Cyber SecurityMeg Weber
 
Jimmy johns infractions
Jimmy johns infractionsJimmy johns infractions
Jimmy johns infractionsMeg Weber
 
2014 Economic Forecast: Leadership's Role in a Changing Economy
2014 Economic Forecast: Leadership's Role in a Changing Economy2014 Economic Forecast: Leadership's Role in a Changing Economy
2014 Economic Forecast: Leadership's Role in a Changing EconomyMeg Weber
 

More from Meg Weber (15)

Ri cyber-security-for-your-small-business
Ri cyber-security-for-your-small-businessRi cyber-security-for-your-small-business
Ri cyber-security-for-your-small-business
 
Department of Homeland Security Guidance
Department of Homeland Security GuidanceDepartment of Homeland Security Guidance
Department of Homeland Security Guidance
 
FCC Guidelines on Cyber Security
FCC Guidelines on Cyber SecurityFCC Guidelines on Cyber Security
FCC Guidelines on Cyber Security
 
DHS Guidelines
DHS GuidelinesDHS Guidelines
DHS Guidelines
 
Cybersecurity brochure flyer version-small
Cybersecurity brochure flyer version-smallCybersecurity brochure flyer version-small
Cybersecurity brochure flyer version-small
 
2014 ota databreachguide4
2014 ota databreachguide42014 ota databreachguide4
2014 ota databreachguide4
 
5 questions ce os should ask about cyber risks
5 questions ce os should ask about cyber risks5 questions ce os should ask about cyber risks
5 questions ce os should ask about cyber risks
 
Welcome to the Cyber Risk Summit
Welcome to the Cyber Risk SummitWelcome to the Cyber Risk Summit
Welcome to the Cyber Risk Summit
 
WCC Programs Overview
WCC Programs OverviewWCC Programs Overview
WCC Programs Overview
 
Audit summary from security solutions and ovation tech
Audit summary from security solutions and ovation techAudit summary from security solutions and ovation tech
Audit summary from security solutions and ovation tech
 
Jb hunt case study
Jb hunt case studyJb hunt case study
Jb hunt case study
 
Nemours case study nemours embraces app innovation with mobile iron
Nemours case study  nemours embraces app innovation with mobile ironNemours case study  nemours embraces app innovation with mobile iron
Nemours case study nemours embraces app innovation with mobile iron
 
Mark Anderson on Cyber Security
Mark Anderson on Cyber SecurityMark Anderson on Cyber Security
Mark Anderson on Cyber Security
 
Jimmy johns infractions
Jimmy johns infractionsJimmy johns infractions
Jimmy johns infractions
 
2014 Economic Forecast: Leadership's Role in a Changing Economy
2014 Economic Forecast: Leadership's Role in a Changing Economy2014 Economic Forecast: Leadership's Role in a Changing Economy
2014 Economic Forecast: Leadership's Role in a Changing Economy
 

Recently uploaded

SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxNavinnSomaal
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyAlfredo García Lavilla
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLScyllaDB
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxhariprasad279825
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 

Recently uploaded (20)

SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptx
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easy
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptx
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort ServiceHot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 

Can we be faster than disaster bill boyd

  • 1. Can We Be Faster Than Disaster? It’s a New Era Bill Boyd, Corporate Health and Safety Coordinator Coastal Industrial Services @chiefb2
  • 2.
  • 3. Goals • Review: • History of the Technology • Impact of Change • New Expectations for Business/Agencies • Recent Examples • Action Steps
  • 4. About Me @chiefb2 http://chiefb2.com
  • 6. The New Reality 129 million smartphone users
  • 7. The New Realities • Facebook has 1.1 BILLION active users worldwide as of May, 2013 • 250 million pictures uploaded daily to Facebook • 100 hours of video are uploaded to YouTube EVERY MINUTE • Twitter has 500 million active users worldwide
  • 8. Impact • Explosive Growth • Changing work habits • Expectation of constant connection • Ability to instantly record and disseminate to the world • People walk into things
  • 9. When something bad happens… • People turn to trusted sources to; • Share what they are experiencing • Validate their observations/feelings • Gather information • Seek help • And, they DO IT FAST!
  • 10. Are you faster than these folks?
  • 11. San Bruno Explosion September 9, 2010 Photo: Paul Sakuma AP
  • 12. Craig Fugate, FEMA Director @craigatFEMA "I got better situational awareness [from Twitter] before we got official word," he said. "Four or five years ago I wouldn't have gotten that quality of information." Photo: Max Whittaker, Getty Images
  • 13. Osama bin laden Raid – May 2, 2011
  • 15. Asiana Airliner Crash, July 6, 2013
  • 17. SFO Got It Right!
  • 18. On the Other Hand… • Asiana – No social media presence for 6 hours!
  • 19.
  • 24.
  • 25. SM Fail “Ryan found two more 4 bottle packs of Dogfish Head’s Midas Touch beer… when we drink we do it right #gettngslizzerd”
  • 27. So, How Do You “Get Fast”?
  • 28. You Need To Understand… • Traditional news reporting has changed • People now get breaking news from the crowd • You won’t be faster than the crowd • You can use the crowd to get valuable information • If you don’t engage, you’ll lose valuable opportunities
  • 29. “Old School” Crisis Comms • Chain of Command • Message approval process • Reliance on media releases/briefings • Arrogance (“It’s MY incident”) • Underestimating public interest
  • 30. Before Event Occurs Response Information to Media Media to the Crowd
  • 32.
  • 33. What is happening? (facts) What are we doing about it? (messages) “Here’s what’s happening” What is happening? (facts) Delegate to lowest who can assure accuracy Leader(s) PIO-Spokespersons Here’s what we are feeling, committing to, planning, etc.” Event activity Approvals Today
  • 34. Today’s Instant News Dilemmas • Immediate demand for information • Time inertia in mobilizing the team • Initial “facts” may be wrong • Raising alarm vs. minimizing situation
  • 35. What It Takes • An Open Mind • An Investment • Practice • People • Pre-existing presence • Fast Action
  • 36. Today’s Crisis Comms • Use Social Media platforms to: • Size Up/Situational Awareness • Instruct and Inform • Identify those needing Help • Correct Rumors • Reputation/Credibility Preservation • Assess message effectiveness
  • 37. Some Practical Tips • Get help! • Post early and often • Be smart with hashtags • Respect “The Big Two” • Play with 3rd party platforms • Request your archive • Don’t speak for someone else
  • 38. Tools

Editor's Notes

  1. Who has a Personal Facebook Account? Who manages a Facebook Fan Page? Who has a Twitter Account? Anyone Blog? Who does NONE of the above? For those of you who do none of the above, have you ever watched a YouTube video? Who does Facebook, Blogging or Twitter for their Company?
  2. It’s Not My Emergency http://chiefb2.com
  3. 0g 1947 1g 1978 2g 1990-2000 3g 2001 4g 2009 Biggest leaps have come with 3 and 4 g as it relates to smartphone use and apps
  4. The convergence of mobile technology, wireless infrastructure and applications has rapidly changed our culture and expectations, especially with the new generation.
  5. Along with the explosion of technology, software and applications have exploded as well. Social media sites like Facebook, YouTube, Twitter and blogs fundamentally have changed how we communicate.
  6. “Smartphonatic” Someone who changes their shopping, banking and payment behaviors after switching to a smartphone 20% of US smartphone users are smartphoantics. 43% of mobile users use smartphones Blurring of the lines between work and personal life due to the connection (email forwarding for example)
  7. So, it should be no surprise when cell networks become overloaded during high visibility events. Skagit I-5 bridge collapse brought local cell carriers to their knees. Twitter is the fastest of them all.
  8. No way, as crisis managers and communicators we will never be as fast as a witness with a smartphone.
  9. Time stamp on tweet was 30 seconds after the crash! Now that’s fast!
  10. 6% dip in stock in 1 day Their PR response roundly criticized and used as an example of what not to do, both here and abroad. A spokesperson stated “It’s not the proper time to manage the company’s image.”
  11. Nov 1, Lone gunman Targeted TSA agents 1 agent killed – several (7) wounded Airport shut down for several hours – affecting worldwide air travel
  12. Airport response on Twitter Note; very cryptic, fluid situation “fog of war”
  13. They also used Facebook, but very sparingly. Almost all information and hyperlinks were posted on Twitter. Much more nimble and faster.
  14. Bill February 15th 2011, an employee of the Red Cross tweeted from the @RedCross account:
  15. Bill
  16. First, understand the following: Accept the fact that social media is how many people are getting their news, especially breaking news on Twitter Take a hard look at your internal media statement approval process (more on that in a minute Address the legal/institutional barriers Educate key staff Engage before the event – Use the platforms! (if you don’t use it regularly, you won’t use it during crisis)
  17. Conflicting mixed messaging – especially in high profile/”policitical” type incidents (Unified Command) Deep Water Horizon example (ask Gerald to comment) Thad Allen had a tough time! Can a JIS/JIC help this? YES! If key agencies are committed to working together.
  18. Transition to how integration of social media can – and should – support the emergency response coordination and credibility.
  19. Bill - Mention Reuters and other Cable news channels who passed along false information about subject being captured during Boston Marathon bombing - Reddit used to identify WRONG people as suspects, etc…
  20. So, what does it take as a person in charge of incident response/agency response to effectively communicate during an incident? The next question is; Where should social media monitoring reside within the incident command system?
  21. When it comes to using Twitter during emergencies, ICs and PIOs should consider the following: Post early and post often. Even if the situation is unclear and rapidly evolving, simply saying crews are on scene working on the problem can buy you time in the initial stages. This message will be rapidly shared, and likely will generate comments that can lead to early engagement. Insert a geographical and/or agency hashtag with every post. Your town or location name (or abbreviation if the name is really long) can help others follow your tweets, and may end up being the default hashtag for the incident if your posts are retweeted enough. Prolific hashtags used during an incident often combine location and incident type (for example, #joplintornado, #sanbrunoexplosion, #chirstchurcheq, #I5bridgecollapse). However, the proliferation of a specific hashtag during an emergency incident is a crowd-sourced organic process. Make sure you have the “big two”: reliable Internet access and power. Phone chargers, spare batteries and robust Internet connectivity are critical to sustaining a strong SM presence during long-duration incidents. Try out some of the third-party Twitter platforms. TweetDeck, Hootsuite, GeoFeedia and Twitterfall, just to name a few, make it extremely easy to monitor multiple SM platforms, hashtags and posts from specific locations.