Craig McGill, Comms for PwC in Scotland, was invited to speak at #PRFest about cyber security and how PR had to be involved from the outset. www.prfest.co.uk
Jerry Ward, MD of Press Data and a Director of AMEC, delivered a presentation and workshop on the measurement and evaluation of communication, including the Barcelona Principles and AMEC's new framework.
www.prfest.co.uk
Staying Competitive in Today's Digital Workforce: Advanced Social Media Strat...Hootsuite
Today’s widening global skills gap impacts businesses, employees, and customers. It has become more important than ever to empower professionals with social media education to provide value to business. The Advanced Social Media Strategy Certification (ASMS), created by HootSuite and Syracuse University’s S.I. Newhouse School of Public Communications—two global leaders in digital communications—provides strategic social media skills to an evolving digital workforce.
In this case study, discover how ASMS Certification provides value to businesses and professionals through the stories and key takeaways of enrolled professionals.
This is a public relations planning exercise exploring how to get more people to visit Newcastle for short breaks from around the UK. The session investigates the size of the potential audience and their motivation.
The deck was developed for a lecture to public relations students at the University of Newcastle.
Disclaimer: Free or low cost tools are never as sophisticated or robust as commercial tools and there is no guarantee of the quality of the output or continuity of service.
An outline of the relevance and significance of social media to businesses and how 'Word of Mouse' engagement has changed traditional marketing strategy.
Jerry Ward, MD of Press Data and a Director of AMEC, delivered a presentation and workshop on the measurement and evaluation of communication, including the Barcelona Principles and AMEC's new framework.
www.prfest.co.uk
Staying Competitive in Today's Digital Workforce: Advanced Social Media Strat...Hootsuite
Today’s widening global skills gap impacts businesses, employees, and customers. It has become more important than ever to empower professionals with social media education to provide value to business. The Advanced Social Media Strategy Certification (ASMS), created by HootSuite and Syracuse University’s S.I. Newhouse School of Public Communications—two global leaders in digital communications—provides strategic social media skills to an evolving digital workforce.
In this case study, discover how ASMS Certification provides value to businesses and professionals through the stories and key takeaways of enrolled professionals.
This is a public relations planning exercise exploring how to get more people to visit Newcastle for short breaks from around the UK. The session investigates the size of the potential audience and their motivation.
The deck was developed for a lecture to public relations students at the University of Newcastle.
Disclaimer: Free or low cost tools are never as sophisticated or robust as commercial tools and there is no guarantee of the quality of the output or continuity of service.
An outline of the relevance and significance of social media to businesses and how 'Word of Mouse' engagement has changed traditional marketing strategy.
Proving that proper PR measurement is just as crucial for your brand as PR itself is the quickest way to begin tracking success and evolving as a communicator.
But how do you get the C-suite to care as much about your data as you do?
We've done the legwork for you, and surveyed upper-level executives about how to get PR metrics front and center and in line with an organization's goals.
Want to download a copy of this SlideShare? Get it here: https://go.agilitypr.com/pr-measurement-matters/
Are We Engaged Yet - Measuring the Success of Social PRInfluence People
Katie Delahaye Paine explains how to measure the success of your social media PR activities, covering engagement metrics and models, processes and tools.
Airbnb's Jenna Meister shares how Airbnb measures success of their community efforts and how YOU can create a similar dashboard in your organization. This talk is from CMX Summit West 2015.
Join "PR 2.0" author Deirdre Breakenridge along with Mike Lewis, Vice President of Marketing at Awareness, Inc. as they explore successful community building initiatives anchored by solid PR programs. Learn how successful marketing agencies and PR professionals are helping their clients build online communities through PR. Agencies and PR professionals alike will learn how they can analyze and strengthen their current public relations programs to increase their impact. Brands will gain insight into what to look for from their agencies and PR professionals. The experts will offer strategies and techniques to employ effective cost-cutting measures, demonstrate PR's value to management, and incorporate the latest technology into current PR strategies.
How to integrate social media with PR, communications, and crisis management,...SocialMedia.org
In her presentation, Ariba's Senior Manager of Social & Community, Debbie Curtis-Magley, teaches a class on how to use social channels to complement your core communications functions.
She goes into detail about how social media can help you react and respond to critical crisis, employees misbehaving, and customer chaos.
Alliance for Nonprofit Excellence Training 5.4.10 Strategic Communications fo...jleigh206
Need basic training in nonprofit communications? This workshop will help you assess your organization's communications work, and give you the tools to communicate more effectively with members, donors, and other constituents, even with a small marketing and communications budget. Content will include communications planning, crafting messages, targeting audiences, and choosing tools and technology to get your message across.
Social media measurement standards: How to demonstrate social media's value t...SocialMedia.org
In her presentation, CEO of Paine Publishing, Katie Paine, discusses what it really means to measure social.
She offers some important numbers to keep in mind when thinking about reach and six tips on what you really should be looking at when measuring your social content.
What To Do In A Post Reach World (Attracting An Audience In A Competitive Fie...FeverBee Limited
Understand the evolution of the community manager - from managing and building communities to CRM specialist and paid social strategist. The main responsibilities of a community manager over the past 3-4 years have focused greatly on finding best strategies to build communities and plan content that would both entertain the existing community (engagement) and drive additional users to the brand's community. However, as both the users behaviour on social platforms has gradually changed, and the organic distribution algorithms for most social platforms, the skills and thinking required for a community manager have greatly evolved to encourage proactive engagement outside the brand community and the use of a much more hyper-targeted approach to communications. SPRINT London
How to Plan and Implement a Social PR Strategy that works for Your OrganisationInfluence People
Philip Sheldrake (Influence Crowd/Meanwhile) explains how companies should plan and implement a social PR strategy that fits their needs and structure.
Presentation on integrating email with social networks - a process called "share-to-social." From a Webinar with Penton Media, the presentation outlines 6 keys to sucessfully integrating email and social networks.
Forrester POST Model - Corporate Social Media StrategyCommunicatto Inc.
Developing a corporate social media strategy requires precision planning, thoughtful stakeholder analysis, alongside some measurable objectives. The POST model is the foundation for any digital media strategy.
Proving that proper PR measurement is just as crucial for your brand as PR itself is the quickest way to begin tracking success and evolving as a communicator.
But how do you get the C-suite to care as much about your data as you do?
We've done the legwork for you, and surveyed upper-level executives about how to get PR metrics front and center and in line with an organization's goals.
Want to download a copy of this SlideShare? Get it here: https://go.agilitypr.com/pr-measurement-matters/
Are We Engaged Yet - Measuring the Success of Social PRInfluence People
Katie Delahaye Paine explains how to measure the success of your social media PR activities, covering engagement metrics and models, processes and tools.
Airbnb's Jenna Meister shares how Airbnb measures success of their community efforts and how YOU can create a similar dashboard in your organization. This talk is from CMX Summit West 2015.
Join "PR 2.0" author Deirdre Breakenridge along with Mike Lewis, Vice President of Marketing at Awareness, Inc. as they explore successful community building initiatives anchored by solid PR programs. Learn how successful marketing agencies and PR professionals are helping their clients build online communities through PR. Agencies and PR professionals alike will learn how they can analyze and strengthen their current public relations programs to increase their impact. Brands will gain insight into what to look for from their agencies and PR professionals. The experts will offer strategies and techniques to employ effective cost-cutting measures, demonstrate PR's value to management, and incorporate the latest technology into current PR strategies.
How to integrate social media with PR, communications, and crisis management,...SocialMedia.org
In her presentation, Ariba's Senior Manager of Social & Community, Debbie Curtis-Magley, teaches a class on how to use social channels to complement your core communications functions.
She goes into detail about how social media can help you react and respond to critical crisis, employees misbehaving, and customer chaos.
Alliance for Nonprofit Excellence Training 5.4.10 Strategic Communications fo...jleigh206
Need basic training in nonprofit communications? This workshop will help you assess your organization's communications work, and give you the tools to communicate more effectively with members, donors, and other constituents, even with a small marketing and communications budget. Content will include communications planning, crafting messages, targeting audiences, and choosing tools and technology to get your message across.
Social media measurement standards: How to demonstrate social media's value t...SocialMedia.org
In her presentation, CEO of Paine Publishing, Katie Paine, discusses what it really means to measure social.
She offers some important numbers to keep in mind when thinking about reach and six tips on what you really should be looking at when measuring your social content.
What To Do In A Post Reach World (Attracting An Audience In A Competitive Fie...FeverBee Limited
Understand the evolution of the community manager - from managing and building communities to CRM specialist and paid social strategist. The main responsibilities of a community manager over the past 3-4 years have focused greatly on finding best strategies to build communities and plan content that would both entertain the existing community (engagement) and drive additional users to the brand's community. However, as both the users behaviour on social platforms has gradually changed, and the organic distribution algorithms for most social platforms, the skills and thinking required for a community manager have greatly evolved to encourage proactive engagement outside the brand community and the use of a much more hyper-targeted approach to communications. SPRINT London
How to Plan and Implement a Social PR Strategy that works for Your OrganisationInfluence People
Philip Sheldrake (Influence Crowd/Meanwhile) explains how companies should plan and implement a social PR strategy that fits their needs and structure.
Presentation on integrating email with social networks - a process called "share-to-social." From a Webinar with Penton Media, the presentation outlines 6 keys to sucessfully integrating email and social networks.
Forrester POST Model - Corporate Social Media StrategyCommunicatto Inc.
Developing a corporate social media strategy requires precision planning, thoughtful stakeholder analysis, alongside some measurable objectives. The POST model is the foundation for any digital media strategy.
Keeping an Eye On Risk - Current Concerns and Supervisory OversightCBIZ, Inc.
In this presentation, you will
-Gain an understanding of leading edge risk management practices for Credit Unions.
-Gain insight on the Board and Supervisory Committees’ role in the internal control structure.
Recognize areas of potential weakness in the organization.
Gain an understanding of the regulatory environment and impact on risk management.
The Cloud 9 - Threat & Solutions 2016 by Bobby DominguezEC-Council
Bobby Dominguez is an accomplished Internet pioneer and an acknowledged security, risk, and privacy expert. Mr. Dominguez has successfully integrated information security into top-level business initiatives at Home Shopping Network, PSCU Financial Services, and PNC Bank, where he implemented a new technology risk management framework. Under his leadership, the Sykes Global Security and Risk Management team was nominated and selected as one of the 5 best by 2008 SC Magazine “Best Security Team in the US.” Mr. Dominguez was also selected as one of the top 5 Chief Security Officers for the 2009, 2010, and 2013 SC Magazine “CSO of Year.” In 2012 he was a finalist for (ISC)2 Americas Information Security Leadership Awards.
Cyber Security 101: Training, awareness, strategies for small to medium sized...Stephen Cobb
I developed "Cyber Security 101: Training, awareness, strategies for small to medium sized business" for the second annual Small Business Summit on Security, Privacy, and Trust, co-hosted by ADP in New Jersey, October 2013.
The Avid Life Media hack is a striking example of everything that can go wrong when a company is completely breached followed by a total disclosure of the stolen information. This attack resulted in an estimated $200 million in costs, firing of the CEO, and countless lives ruined. This presentation will review the data exposed and what can be learned to prevent this from happening to your organization.
Public cloud Identity-as-a-Service (IDaaS) providers are not immune to data breaches. IDaaS companies will live and die by their appetite for innovation and speed to market.
Vendors, and Risk, and Tigers, and Bears, Oh My: How to Create a Vendor Revie...Wendy Knox Everette
ShmooCon 2020
You’ve just been tasked with creating a vendor review management process at your company, but what does that even mean, and how are you going to do this? Do you need to buy a lot of expensive GRC software and hire an army of compliance staffers? This talk will explain what a vendor review process is and walk through setting one up at your company, using nothing more complicated than email, text files, and maybe some Slack and Google Forms.
In this video we talk about some tools and techniques that can be used to protect your login credentials and digital identity including good password practices, adding Multi Factor Authentication (MFA), and monitoring to alert when a compromised account is found. Don’t assume your organization won’t be targeted – everyone is a target. As with all our webinars, this presentation is appropriate for an audience of varied IT and security experience.
Cyber Security and the Impact on your BusinessLucy Denver
With cyber scams costing UK businesses an estimated £4.14bn* in lost data, reputational damage and online theft every year, Cyber Security is rapidly climbing the priority list of directors across the UK. This presentation will help you to:
- spot the most common cyber attacks, defend your business and protect your critical data if the worst does happen;
- understand the impact of GDPR on your business and how to protect yourself against expensive data losses.
Today's security and privacy professionals know that breaches are a fact of life. Yet their organizations are often not prepared to respond when the time comes. They're "overweight" on prevention and detection, but "underweight" on response.
Based on a decade-plus caseload of actual breach investigations across of range of different organizations, this webinar will examine an amalgamated, anonymized breach situation and review a play-by-play of how the response went: the good, the bad, and the ugly. Attendees will gain hard-earned, battle-tested insight on what to do, and what to avoid when it's their turn to respond to an incident.
Our featured speakers for this timely webinar will be:
- Don Ulsch, CEO, ZeroPoint Risk. Distinguished Fellow at the Ponemon Institute.
- Joseph DeSalvo, Managing Director, ZeroPoint Risk. Former CSO at Mylan and Iron Mountain.
- Ted Julian, Chief Marketing Officer, Co3 Systems. Serial security and compliance entrepreneur.
Where security and privacy meet partnering tips for CSOs and privacy/complian...Compliancy Group
This webinar will identifying challenges in both the privacy and security offices, explaining the necessities of working together, and identify mutual goals, both within their departments and in the context of the rest of the business. It will include solutions and suggestions for working together and case studies/examples showing common mistakes as well as success stories of privacy and IT offices working together.
Panelists:
Gant Redmon, General Counsel and VP of Business Development, Co3 Systems
Similar to Craig McGill on Cyber Security at #PRFest (20)
PRFest - setting the scene with industry statsPRFest
The public relations and communication industry changes every year and there are numerous reports discussing the changing trends. At #PRFest in June 2019, these slides were used to set the scene, where the industry is at, and signposts where we need to be going... Visit www.prfest.co.uk for full details about the two-day festival, which aims to encourage practitioners to learn, share and collaborate.
Jenni Field spoke at PRFest 2018 and looked at research from Gatehouse and VMA Group, which told different stories. Find out what the focus for 2018 is in internal comms. For more information about PRFest visit www.prfest.co.uk
The third Festival of Public Relations (PRFest) took place 14-15 June, 2018 in Edinburgh. It's the only event of its kind in the world.
Practitioners travelled to Edinburgh to continue professional development, by learning, sharing, collaborating and networking.
This separate deck includes John Brown's presentation about the importance of authentic and trustworthy brands.
For more information about PRFest visit www.prfest.co.uk
The third Festival of Public Relations (PRFest) took place 14-15 June, 2018 in Edinburgh. It's the only event of its kind in the world.
Practitioners travelled to Edinburgh to continue professional development, by learning, sharing, collaborating and networking.
Friday's slides include:
- Lucy-Rose Walker and Gayle Mann - entrepreneurial mindset
- Emma Leech - Harnessing People Power in PR
- (John Brown's PDF will be uploaded separately due to the files not being able to be integrated within powerpoint)
- Andrew Bruce Smith - three sprints; Google Analytics, Data Studio and Tag Manager
- Laura Sutherland (PRFest Founder) - Enterprise social networking
- Betsy Reed - Communicating sustainability
For information about PRFest visit www.prfest.co.uk
Master slides from PRFest on Thursday, 14 June 2018.
Slides include:
- Laura Sutherland, PRFest Founder, opening and over view of industry developments
- Ella Minty, internationalising public relations
- Andy Barr, link building
- Jenni Fields, internal communications
- Padraig McKeon, the skills we are known for and the future of public relations
- Amanda Coleman and Jen Green, the Road to Recovery
- Anne-Marie Lacey and Laura Richards, human-led design
For full details about PRFest and to sign up to emails, check out www.prfest.co.uk
Calls for pitches to speak at PRFest 2019 will be out in September 2018. Watch #PRFest for tweets
We need to stop soiling ourselves every time we hear integrated comms and marketing. This session aimed to bring a level of calm and clarity to integrated comms and inspire practitioners to mine extra budget and work closely with the board room.
World PR Report by Francis Ingham at #PRFestPRFest
PRCA was a main sponsor of #PRFest and its Director General Francis Ingham spoke about global trends in the PR industry - as well as challenges and opportunities. www.prfest.co.uk
Sarah Hall speaks at #PRFest about public relations in businessPRFest
Sarah Hall, editor of #FuturePRoof, was invited to speak at #PRFest about her efforts in reinforcing public relations as a management discipline. Read the latest from FuturePRoof www.prfest.co.uk
Rich Leigh has just published his first book, which shot to no.1 on Amazon. He was invited to speak at #PRFest about stunts - are they still relevant? What do they achieve? www.prfest.co.uk
Nick Jones on CSR - fit for today and tomorrow at #PRFestPRFest
Nick Jones, formerly NO.10 and Visa Europe, came to #PRFest to talk about Corporate Social Responsibility. Not just a tick box exercise for corporates, but meaninful, relevant and adding value. It has to underline the value of the organisation. www.prfest.co.uk
Jim Hawker was invited to speak at #PRFest about how PR and SEO can and should work together to form a relevant and engaging strategy. www.prfest.co.uk
Andy Barr on Influencer Marketing at #PRFestPRFest
Andy Barr, 10 Yetis, came to #PRFest and spoke about influencer marketing. How to find influencers, how to dismiss the z-listers, and gave some great examples of how influential 'influencers' actually are www.prfest.co.uk
Andrew Bruce Smith - using data and analytics to inform PR strategy - #PRFestPRFest
Andrew Smith came to #PRFest to talk about using data and analytics to inform strategy. There's loads of data out there but what's useful and how should it be used. www.prfest.co.uk
Marita Kuntonen kicked off the diversity panel session with a case study on the award winning Absolut creative campaign which sought to demonstrate support to the LGBT community.
Being creative in public relations is essential. This presentation from Now Go Create was used to get people thinking creatively. What tools can we use? Where can we draw inspiration from? Creativity is the use of imagination and ideas. In PR, being original and imaginative gets you everywhere.
Grow up or get out! Stephen Waddington at PRFestPRFest
Ketchum's Stephen Waddington asserts the value of public relations and the opportunity for practitioners to get ahead.
The author, former CIPR President, and Visiting Professor will challenge the progress the profession is making in creativity, measurement, professionalism and technology.
Master slides from Scotland's first PR festival, day two. #PRfest www.prfest.co.uk
The festival was designed to bring together Scottish PR practitioners to share best practice, learn, get creative and collaborate. A host of speakers were invited based on their expertise and the two day festival was filled with short presentations, workshops and networking.
Master slides from Scotland's first PR festival. 16-17 June. www.prfest.co.uk #PRFest
The festival was designed to help practitioners in Scotland learn, share and be inspired by leading developers, thinkers, doers and from those who are leading the way.
Core Web Vitals SEO Workshop - improve your performance [pdf]Peter Mead
Core Web Vitals to improve your website performance for better SEO results with CWV.
CWV Topics include:
- Understanding the latest Core Web Vitals including the significance of LCP, INP and CLS + their impact on SEO
- Optimisation techniques from our experts on how to improve your CWV on platforms like WordPress and WP Engine
- The impact of user experience and SEO
The Forgotten Secret Weapon of Digital Marketing: Email
Digital marketing is a rapidly changing, ever evolving industry--Influencers, Threads, X, AI, etc. But one of the most effective digital marketing tools is also one of the oldest: Email. Find out from two Houston-based digital experts how to maximize your results from email.
Key Takeaways:
Email has the best ROI of any digital tactic
It can be used at any stage of the customer journey
It is increasingly important as the cookie-less future gets closer and closer
How to Run Landing Page Tests On and Off Paid Social PlatformsVWO
Join us for an exclusive webinar featuring Mariate, Alexandra and Nima where we will unveil a comprehensive blueprint for crafting a successful paid media strategy focused on landing page testing.With escalating costs in paid advertising, understanding how to maximize each visitor’s experience is crucial for retention and conversion.
This session will dive into the methodologies for executing and analyzing landing page tests within paid social channels, offering a blend of theoretical knowledge and practical insights.
The Pearmill team will guide you through the nuances of setting up and managing landing page experiments on paid social platforms. You will learn about the critical rules to follow, the structure of effective tests, optimal conversion duration and budget allocation.
The session will also cover data analysis techniques and criteria for graduating landing pages.
In the second part of the webinar, Pearmill will explore the use of A/B testing platforms. Discover common pitfalls to avoid in A/B testing and gain insights into analyzing A/B tests results effectively.
The session includes a brief history of the evolution of search before diving into the roles technology, content, and links play in developing a powerful SEO strategy in a world of Generative AI and social search. Discover how to optimize for TikTok searches, Google's Gemini, and Search Generative Experience while developing a powerful arsenal of tools and templates to help maximize the effectiveness of your SEO initiatives.
Key Takeaways:
Understand how search engines work
Be able to find out where your users search
Know what is required for each discipline of SEO
Feel confident creating an SEO Plan
Confidently measure SEO performance
Come learn how YOU can Animate and Illuminate the World with Generative AI's Explosive Power. Come sit in the driver's seat and learn to harness this great technology.
Is AI-Generated Content the Future of Content Creation?Cut-the-SaaS
Discover the transformative power of AI in content creation with our presentation, "Is AI-Generated Content the Future of Content Creation?" by Puran Parsani, CEO & Editor of Cut-The-SaaS. Learn how AI-generated content is revolutionizing marketing, publishing, education, healthcare, and finance by offering unprecedented efficiency, creativity, and scalability.
Understanding
AI-Generated Content:
AI-generated content includes text, images, videos, and audio produced by AI without direct human involvement. This technology leverages large datasets to create contextually relevant and coherent material, streamlining content production.
Key Benefits:
Content Creation: Rapidly generate high-quality content for blogs, articles, and social media.
Brainstorming: AI simulates conversations to inspire creative ideas.
Research Assistance: Efficiently summarize and research information.
Market Insights:
The content marketing industry is projected to grow to $17.6 billion by 2032, with AI-generated content expected to dominate over 55% of the market.
Case Study: CNET’s AI Content Controversy:
CNET’s use of AI for news articles led to public scrutiny due to factual inaccuracies, highlighting the need for transparency and human oversight.
Benefits Across Industries:
Marketing: Personalize content at scale and optimize engagement with predictive analytics.
Publishing: Automate content creation for faster publication cycles.
Education: Efficiently generate educational materials.
Healthcare: Create accurate content for patients and professionals.
Finance: Produce timely financial content for decision-making.
Challenges and Ethical Considerations:
Transparency: Disclose AI use to maintain trust.
Bias: Address potential AI biases with diverse datasets.
SEO: Ensure AI content meets SEO standards.
Quality: Maintain high standards to prevent misinformation.
Conclusion:
AI-generated content offers significant benefits in efficiency, personalization, and scalability. However, ethical considerations and quality assurance are crucial for responsible use. Explore the future of content creation with us and see how AI is transforming various industries.
Connect with Us:
Follow Cut-The-SaaS on LinkedIn, Instagram, YouTube, Twitter, and Medium. Visit cut-the-saas.com for more insights and resources.
Short video marketing has sweeped the nation and is the fastest way to build an online brand on social media in 2024. In this session you will learn:- What is short video marketing- Which platforms work best for your business- Content strategies that are on brand for your business- How to sell organically without paying for ads.
When most people in the industry talk about online or digital reputation management, what they're really saying is Google search and PPC. And it's usually reactive, left dealing with the aftermath of negative information published somewhere online. That's outdated. It leaves executives, organizations and other high-profile individuals at a high risk of a digital reputation attack that spans channels and tactics. But the tools needed to safeguard against an attack are more cybersecurity-oriented than most marketing and communications professionals can manage. Business leaders Leaders grasp the importance; 83% of executives place reputation in their top five areas of risk, yet only 23% are confident in their ability to address it. To succeed in 2024 and beyond, you need to turn online reputation on its axis and think like an attacker.
Key Takeaways:
- New framework for examining and safeguarding an online reputation
- Tools and techniques to keep you a step ahead
- Practical examples that demonstrate when to act, how to act and how to recover
In this presentation, Danny Leibrandt explains the impact of AI on SEO and what Google has been doing about it. Learn how to take your SEO game to the next level and win over Google with his new strategy anyone can use. Get actionable steps to rank your name, your business, and your clients on Google - the right way.
Key Takeaways:
1. Real content is king
2. Find ways to show EEAT
3. Repurpose across all platforms
Most small businesses struggle to see marketing results. In this session, we will eliminate any confusion about what to do next, solving your marketing problems so your business can thrive. You’ll learn how to create a foundational marketing OS (operating system) based on neuroscience and backed by real-world results. You’ll be taught how to develop deep customer connections, and how to have your CRM dynamically segment and sell at any stage in the customer’s journey. By the end of the session, you’ll remove confusion and chaos and replace it with clarity and confidence for long-term marketing success.
Key Takeaways:
• Uncover the power of a foundational marketing system that dynamically communicates with prospects and customers on autopilot.
• Harness neuroscience and Tribal Alignment to transform your communication strategies, turning potential clients into fans and those fans into loyal customers.
• Discover the art of automated segmentation, pinpointing your most lucrative customers and identifying the optimal moments for successful conversions.
• Streamline your business with a content production plan that eliminates guesswork, wasted time, and money.
The What, Why & How of 3D and AR in Digital CommercePushON Ltd
Vladimir Mulhem has over 20 years of experience in commercialising cutting edge creative technology across construction, marketing and retail.
Previously the founder and Tech and Innovation Director of Creative Content Works working with the likes of Next, John Lewis and JD Sport, he now helps retailers, brands and agencies solve challenges of applying the emerging technologies 3D, AR, VR and Gen AI to real-world problems.
In this webinar, Vladimir will be covering the following topics:
Applications of 3D and AR in Digital Commerce,
Benefits of 3D and AR,
Tools to create, manage and publish 3D and AR in Digital Commerce.
Most small businesses struggle to see marketing results. In this session, we will eliminate any confusion about what to do next, solving your marketing problems so your business can thrive. You’ll learn how to create a foundational marketing OS (operating system) based on neuroscience and backed by real-world results. You’ll be taught how to develop deep customer connections, and how to have your CRM dynamically segment and sell at any stage in the customer’s journey. By the end of the session, you’ll remove confusion and chaos and replace it with clarity and confidence for long-term marketing success.
Key Takeaways:
• Uncover the power of a foundational marketing system that dynamically communicates with prospects and customers on autopilot.
• Harness neuroscience and Tribal Alignment to transform your communication strategies, turning potential clients into fans and those fans into loyal customers.
• Discover the art of automated segmentation, pinpointing your most lucrative customers and identifying the optimal moments for successful conversions.
• Streamline your business with a content production plan that eliminates guesswork, wasted time, and money.
Digital Commerce Lecture for Advanced Digital & Social Media Strategy at UCLA...Valters Lauzums
E-commerce in 2024 is characterized by a dynamic blend of opportunities and significant challenges. Supply chain disruptions and inventory shortages are critical issues, leading to increased shipping delays and rising costs, which impact timely delivery and squeeze profit margins. Efficient logistics management is essential, yet it is often hampered by these external factors. Payment processing, while needing to ensure security and user convenience, grapples with preventing fraud and integrating diverse payment methods, adding another layer of complexity. Furthermore, fulfillment operations require a streamlined approach to handle volume spikes and maintain accuracy in order picking, packing, and shipping, all while meeting customers' heightened expectations for faster delivery times.
Amid these operational challenges, customer data has emerged as an important strategy. By focusing on personalization and enhancing customer experience from historical behavior, businesses can deliver improved website and brand experienced, better product recommendations, optimal promotions, and content to meet individual preferences. Better data analytics can also help in effectively creating marketing campaigns, improving customer retention, and driving product development and inventory management.
Innovative formats such as social commerce and live shopping are beginning to impact the digital commerce landscape, offering new ways to engage with customers and drive sales, and may provide opportunity for brands that have been priced out or seen a downturn with post-pandemic shopping behavior. Social commerce integrates shopping experiences directly into social media platforms, tapping into the massive user bases of these networks to increase reach and engagement. Live shopping, on the other hand, combines entertainment and real-time interaction, providing a dynamic platform for showcasing products and encouraging immediate purchases. These innovations not only enhance customer engagement but also provide valuable data for businesses to refine their strategies and deliver superior shopping experiences.
The e-commerce sector is evolving rapidly, and businesses that effectively manage operational challenges and implement innovative strategies are best positioned for long-term success.
The digital marketing industry is changing faster than ever and those who don’t adapt with the times are losing market share. Where should marketers be focusing their efforts? What strategies are the experts seeing get the best results? Get up-to-speed with the latest industry insights, trends and predictions for the future in this panel discussion with some leading digital marketing experts.
For too many years marketing and sales have operated in silos...while in some forward thinking companies, the two organizations work together to drive new opportunity development and revenue. This session will explore the lessons learned in that beautiful dance that can occur when marketing and sales work together...to drive new opportunity development, account expansion and customer satisfaction.
No, this is not a conversation about MQLs and SQLs. Instead we will focus on a framework that allows the two organizations to drive company success together.
Mastering Local SEO for Service Businesses in the AI Era is tailored specifically for local service providers like plumbers, dentists, and others seeking to dominate their local search landscape. This session delves into leveraging AI advancements to enhance your online visibility and search rankings through the Content Factory model, designed for creating high-impact, SEO-driven content. Discover the Dollar-a-Day advertising strategy, a cost-effective approach to boost your local SEO efforts and attract more customers with minimal investment. Gain practical insights on optimizing your online presence to meet the specific needs of local service seekers, ensuring your business not only appears but stands out in local searches. This concise, action-oriented workshop is your roadmap to navigating the complexities of digital marketing in the AI age, driving more leads, conversions, and ultimately, success for your local service business.
Key Takeaways:
Embrace AI for Local SEO: Learn to harness the power of AI technologies to optimize your website and content for local search. Understand the pivotal role AI plays in analyzing search trends and consumer behavior, enabling you to tailor your SEO strategies to meet the specific demands of your target local audience. Leverage the Content Factory Model: Discover the step-by-step process of creating SEO-optimized content at scale. This approach ensures a steady stream of high-quality content that engages local customers and boosts your search rankings. Get an action guide on implementing this model, complete with templates and scheduling strategies to maintain a consistent online presence. Maximize ROI with Dollar-a-Day Advertising: Dive into the cost-effective Dollar-a-Day advertising strategy that amplifies your visibility in local searches without breaking the bank. Learn how to strategically allocate your budget across platforms to target potential local customers effectively. The session includes an action guide on setting up, monitoring, and optimizing your ad campaigns to ensure maximum impact with minimal investment.
2. PwC
Annoying but not the end of the
world and relatively easy to fix –
unless defamatory material or
phishing links posted:
• Change passwords and login details
• Enable – where possible – two-factor
or multi-factor login
• Check access privileges
• Inform relevant stakeholders
• Inform media if necessary
• Apologise where necessary – either to
groups or at individual level –
• Remove offensive material
• Work with law-enforcement and cyber
security teams if necessary
• Remind staff of user guidelines for
social media accounts
Where is cyber security an issue?
Quite simply: everywhere
PwC
REPUTATION
Social media accounts
hacked and off-brand
messaging posted
STAKEHOLDER AND
CUSTOMER
INFLUENCE
Website breached and
defaced
FINANCIAL
Corporate network
breached and company data
accessed by unauthorised
third party/parties
Irritating, embarrassing with
potential for far more serious
consequences:
• Same actions as for social media
account issues
• Double check all links, code and
material on site
• Ensure website plugins, CMS are at
latest versions
• Work with experts to ensure no
further data – customer credit cards
for example – was stolen
• If necessary, inform authorities
• Upgrade to HTTPS if not already done
so
• Consider a reward/bounty scheme to
prevent future incidents
The worst kind of attack:
• All information, including emails, on a
network may have been copied
• Staff details, including addresses and
banking information
• Customer details inc cards, personal
data and passwords
• Company plans including product
timelines and intellectual property
• Confidential material company would
have preferred to remain discrete
• Access codes
• Information relating to any third-
parties the company works with,
which may also include IP
• May have been breached via third-
party
#prfest
9. PwC
Who would do this and what is their capability?
PwC
Disgruntled
customers or
competitors who want
to embarrass you or
steal your data –
potentially even
media
Script kiddies, bored
people and
wannabee Mr Robot
types just looking for
something to do or to
make a name for
themselves
Professional
breachers looking for
data to either steal or
hold a firm to ransom
for
Staff – either current
or ex-staff who are
disgruntled and want
access to information
for personal gain or
those duped into
giving access
• The sad reality is that in 2017 there are multiple people with multiple reasons to want unauthorised access to
your data
• The even more inconvenient fact is that even with the best systems in the world the odds are you cannot stop
people accessing
• What you can do is ensure you have multiple systems to try and deter them in the hope they go away and
have the best tools so that when a breach happens you are ready to react. Better to be prepared and it never
happens than the alternative
People or bots who
want control of your
machine so they can
use it for things like
DDoS attacks
#prfest
10. PwC
Source: Verizon Data Breach Report 2016
It’s as much an internal issue as external…
Harder to spot
malicious activity
when user access is
authorised
Legal hurdles to
monitoring all staff
interactions
Why are they so hard to manage?
Insiders remain the biggest threat….
#prfest
12. PwC
What does an attack look like?
Reconnaissance Infiltrate Execute attack &
Cover tracks
www
Embed &
Orientate
>_ DLL
Attacker gathers intelligence
on the target organisation and
it‘s customers to refine their
attack and increase their
chances of success.
• Social media analysis
• Digital footprinting
• Network scanning
Attacker tricks a user into
executing malicious software
to compromise their machine
or gain unauthorised access to
the network.
• Targeted phishing emails
• Social engineering
Attacker gains more access
and installs tools to monitor
systems and business
processes, increasing the
potential impact or financial
rewards for their attack.
• Privilege escalation
• Network traversal
• Passive monitoring
Attacker quickly executes the
attack and the remove
evidence in order to stop the
target identifying the attacker
and preventing future attacks.
• Data extraction
• Financial fraud
• Denial of Service (DoS)
StageTactic/Technique
The majority of attacks target poor security behaviours by individuals to gain initial access, they then
use this access to prepare and then execute their attack for maximum impact/financial gain.
#prfest
15. PwC
Annoying but not the end of the
world and relatively easy to fix –
unless defamatory material or
phishing links posted:
• Change passwords and login details
• Enable – where possible – two-factor
or multi-factor login
• Check access privileges
• Inform stakeholders inc media
• Check what links where shared
• Apologise where necessary – either to
groups or at individual level –
• Remove offensive material
• Work with law-enforcement and cyber
security teams if necessary
• Remind staff of user guidelines for
social media accounts
REPUTATION
Social media accounts
hacked and off-brand
messaging posted
STAKEHOLDER AND
CUSTOMER
INFLUENCE
Website breached and
defaced
FINANCIAL
Corporate network
breached and company data
accessed by unauthorised
third party/parties
Irritating, embarrassing with
potential for far more serious
consequences:
• Same actions as for social media
account issues
• Double check all links, code and
material on site
• Ensure website plugins, CMS are at
latest versions
• Work with experts to ensure no
further data – customer credit
cards for example – was stolen
• If necessary, inform authorities
• Upgrade to HTTPS if not already done
so
• Consider a reward/bounty scheme to
prevent future incidents
The worst kind of attack:
• All information, including emails, on a
network may have been copied
• Staff details, including addresses and
banking information
• Customer details inc cards, personal
data and passwords
• Company plans including product
timelines and intellectual property
• Confidential material company would
have preferred to remain discrete
• Access codes
• Information relating to any third-
parties the company works with,
which may also include IP
• May have been breached via third-
party
From the moment you detect a breach, the battle for
comms is to save and restore the company’s reputation
After the technical team, there is no-one more important
#prfest
16. PwC
Annoying but not the end of the
world and relatively easy to fix –
unless defamatory material or
phishing links posted:
• Check what links where shared
The more serious breach
REPUTATION
Social media accounts
hacked and off-brand
messaging posted
STAKEHOLDER AND
CUSTOMER
INFLUENCE
Website breached and
defaced
FINANCIAL
Corporate network
breached and company data
accessed by unauthorised
third party/parties
Irritating, embarrassing with
potential for far more serious
consequences:
• Work with experts to ensure no
further data – customer credit
cards for example – was stolen
The worst kind of attack:
• All information, including emails, on a
network may have been copied
• Staff details, including addresses and
banking information
• Customer details inc cards, personal
data and passwords
• Company plans including product
timelines and intellectual property
• Confidential material company would
have preferred to remain discrete
• Access codes
• Information relating to any third-
parties the company works with,
which may also include IP
• May have been breached via third-
party
#prfest
17. PwC
Most companies have a relatively
conservative and reactive stance –
but in a crisis that needs to flip and
quickly
• Are the C Suite and other seniors able
to see the value in going from their
traditional approach to a far faster,
proactive pace – especially when most
don’t speak tech or cyber?
• Has that been tested to ensure the
company is able to demonstrate
control (or as much as is possible)
• A company’s stance is not just a
comms issue but is one that comms
need to be heavily involved with
Comms informing the bigger picture proactively
STANCE CORPORATE VALUES TRAINING
Despite the nature of a crisis,
leadership teams need to be able to
hold fast to some, if not all,
corporate values
• Ensure the C Suite and other seniors
are able to align to the company
corporate values and use them in time
of crisis
• Crisis situations are when leaders are
often defined – their actions
remembered for months if not years.
Will they be remembered for putting
customers first, for pulling down the
hatches or some other action?
• Will they agree to stick to the
corporate values and not suddenly
flipflop in the heat of the crisis?
Most media training these days is
relatively benign
• Do the relevant people have proper,
hardened crisis training?
• Can they speak professionally and
with authority without falling back on
jargon?
• Could they sustain a tense live
atmosphere where every action or
utterance – even if meant to be off-
record – could dictate the fate of the
company?
• Will they hold the lines – and the
corporate values – when under
sustained pressure?
• Have they been tested?
#prfest
18. PwC
The first big decisions
The sort of issues a crisis comms plans around cyber security include the
following…
• Who do we call if informed of a breach or it is detected?
• Who makes the call?
• Who is our spokesperson? Do we need more than one?
• Do we drop the website? Even at 2am in the morning?
• Who authorises pulling all the pipes – especially at 2am?
• Do we close the social channels?
• Do we cancel our advertising?
• How do we balance business needs with customer needs?
• How often can we get an update from the technical team?
#prfest
19. PwC
So what to do?
What’s the one
process you see in the
company that
instinctively doesn’t
feel right?
Challenge it.
On projects you are
involved in– challenge
how security – and
privacy - is being built
in
Look for opportunities
to share data with
colleagues in financial
crime, risk, physical
security
Raise awareness of
phishing, data leakage
through interactions
with business contacts
‘Hook’ interest with
strategic links
Where you see
datasets being held in
shared drives, ask
‘why are we doing
that?’, and ‘who has
access?’
Are your security risks
raised, logged and
prioritised?
Do they have the
correct priority?
Inform customers and staff first – but only
when certain a breach has confirmed. Do not
broadcast a breach when it is ongoing
Ensure customers are reached in as many
ways as possible – think PESO but do not
just think digital - and if data has potentially
been stolen, that they understand this
Ensure social and customer teams know
exactly what to say (and what not to say) to
customers
Regular updates on website and social.
Encourage media to get material from these
sites to minimise duplication of effort
One narrative for every channel, updates on
a regular basis
Have a Comms ‘war room’ and have Comms
at heart of decision making
Ensure legal and tech teams understand the
urgency involved – but heed their advice too
Best way to restore that
reputation is by being
transparent
This starts internally
(including legal and tech
teams) but spreads to
external, customer service,
social
Stakeholders will go to four
places when they find out:
• website
• social
• customer phone lines
• media
Only two of those four
channels can be directly
controlled
#prfest
20. PwC
As the technical teams get, well, technical, the role of comms is to
communicate
Customers Regulators Investors
Politicians Media
Third-
party orgs
Security
orgs
Legal
Staff and
C Suite
#prfest
21. PwC
What sort of comms should be going out – and who do you
prioritise?
Customer
emails
Media
statements
Website
– front
page
Visuals
Customer
video(s)
Postal
letters
Intranet
Staff email,
Slack, etc
Video(s)
for others
Info for
suppliers,
third
parties,
FAQ and
responses
Script for
phone
customer
teams
PPC and
social
spend
Advertising
#prfest
22. PwC
How will it play out?
Every scenario is different but there can be similarities…
DAY ONE
• Attack discovered
• Motive understood –
publicity, cash, IP theft,
credit card/login theft
• Technical investigation
launched
• Initial alert to customers
• Update to customers
• Media informed and
updated across rolling
news cycle
• CEO and C-Suite aligned
to corporate values and
do not stray
WEEK ONE
• All customers reached
• Technical issues resolved
– or ongoing to be
resolved
• Review begins – internal
and independent
• Ongoing updates
• Ensure functionality of
websites is restored
• Never say you are now
breach-proof
• Review internal security
procedures and remind
staff
MONTH ONE
• Ensure customers have
done all they can to
protect data
• Campaign to try and
minimise customer losses
• Review processes
• Share as much as
possible to rebuild
confidence by all
stakeholders
• Remind staff cyber
security is not just an
IT matter
#prfest
23. PwC
Preventing a next time – from comms perspective
Disgruntled customers or competitors
who
want to embarrass you or steal your
data – potentially even media
Script kiddies, bored
people and
wannabee Mr Robot
types just looking for
something to do or to
make a name for
themselves
Professional
breachers looking for
data to either steal or
hold a firm to ransom
for
Staff – either current or ex-staff who are
disgruntled and want access to information
for personal gain or those duped into giving
access
• Ensure staff are up to date
with cyber security
policy/process
• Have an up to date policy
• Introduce no-blame policy
• Run drills
• Treat staff and ex-staff in
the best way possible –
salaries, holidays, perks,
place of work and so on
• Offer bounties and rewards for those
who find weaknesses
• Be more involved in cyber community
• Befriend as many as possible
• Hide comms in the code that only
hackers would see
• Be honest and be authentic
• Be the best company you
can be
• Engage with audience and
change things for them
• Treat customers as
partners, not as a cash
grab
• Monitor and respond to
everything
• Use key dates to ensure all
stakeholders are aware of
improvements
#prfest
24. PwC
The checklist
Does your crisis comms plan have all of these covered?
• Do we have standing
statements ready to go
for the most common
and most likely
scenarios?
• Is the crisis comms plan
integrated into the
master crisis document?
• What budgets have been
agreed for emergency
spend?
• Who can approach who
when a situation arises?
• Are there pre-agreed
time periods for comms
to get updates,
minimising intrusion on
tech team time?
• Do we have all the
relevant contact details
– for media, internally
and other stakeholders?
• Are we monitoring all
the right channels on a
24/7 basis
• Do we have a response
plan in place for when
we are informed of a
breach by a third-party?
• Does the comms plan
include us contacting
external orgs that trust
us with their data?
• Have we recently tested
our crisis comms
scenarios?
• Do we accept we will be
on the back foot for a lot
of this and do the
relevant powers that be
accept that?
• Do we have holding
statement webpages and
imagery ready to go?
• Is our data as secure as
can be?
• Is the leadership sure
this is aligned to core
values and can respond
in that way in a live
crisis?
• How good is our crisis
media training?
#prfest
25. PwC
Cyber security is not going away…
Digital revolution
Growing cyber risk
More regulation
Cloud“IoTs” Big DataSocial Media
Evolving
threats
More
connections
Talent
shortage
Arms
race
#prfest
26. PwC
General Data Protection Regulation (GDPR) is coming…
GDPR is built around 3 key pillars:
Transparency Framework Compliance Journey Punishment Regime
• Prior information must be clearer
• Consent rules toughened up
• Access rights are boosted
• Mandatory breach disclosure
• Enhanced rights of regulatory
inspection and audit
• Privacy by Design
• Privacy Impact
Assessments
• Accountability
• Data Portability
• Right to be Forgotten
• Tougher enforcement
powers for regulators
• Financial penalties at 4%
Group Annual
Worldwide Turnover
• Compensation rights for
distress
• Litigation rights for Civil
Society Organisations
• Data Processors liable
#prfest
27. PwC
In summary…
What’s the one
process you see in the
company that
instinctively doesn’t
feel right?
Challenge it.
On projects you are
involved in– challenge
how security – and
privacy - is being built
in
Look for opportunities
to share data with
colleagues in financial
crime, risk, physical
security
Raise awareness of
phishing, data leakage
through interactions
with business contacts
‘Hook’ interest with
strategic links
Where you see
datasets being held in
shared drives, ask
‘why are we doing
that?’, and ‘who has
access?’
Are your security risks
raised, logged and
prioritised?
Do they have the
correct priority?
• Identify – What are our crown jewels
and biggest threats?
• Protect – Implement controls in line
with risk appetite
• Detect – Implement monitoring
processes
• Respond – Have tried and tested
response plan. Learn from past
incidents.
Treat cyber security as you would any other
risk
Understand your exposure and appetite –
set controls accordingly
#prfest
28. PwC
The key messages…
• Cyber security has become a key risk for businesses of all sizes and across all industries
• Cyber security goes beyond the realms of IT and should involve the entire organisation
• People remain the biggest weakness in Cyber security defences – education & awareness programs
should be a key strategic priority
• External cyber attacks are becoming ever increasingly indiscriminate – assuming you will not be a
target is no longer an option. You may even be collateral damage
• Those organisations who have tried and tested responses processes are those least impacted by an
incident
• The cost of failure is huge – Comprises not just business disruption and remedial activity, but
reputational and increasingly punitive damages…
#prfest
Digital Revolution: means that companies are increasingly operating in an environment where they do not own the systems they use nor do they control the data they rely on.
Growing Cyber Risk: When assessing third party dependencies and hence risks, companies must consider not only suppliers, but also brand partners who are likely to be handling your customers’ data.
Growing Cyber Risk: Target hack which cost the company over $260m is perfect example of the interconnected business ecosystem we operate in. Retailers in Asia suffer increased fraud due to hack of HVAC company based in Pennsylvania (ultimately cost banks $200m replacing cards and covering fraudulent purchases).
Growing Cyber Risk: In essence, you cannot outsource cyber risk; you are always accountable for the security of your sensitive data no matter who handles it.
More Regulation: We can expect to see financial services regulators around the globe to adopt some of the measures deployed by the Bank of England to assess and manage systemic risk to the markets posed by cyber.