Social Media Policies and Practices for Emergency ServicesRommie Duckworth
The proliferation of social media and mobile technology is creating new challenges for emergency responders. On virtually every call smart phones, helmet cams and more are capturing images and information ready to be uploaded and shared with the world. New questions of personal privacy and freedom of speech for responders using social media off-duty need to be addressed. How do agencies navigate the minefield that is the new social media landscape? This program gives emergency services leaders and providers plenty of take-home resources to create or revise their social media policies and practices including the twenty points that need to be addressed in any guiding social media documents and ten recommendations for responsible social media use by responders.
www.RescueDigest.com
wwwRomDuck.com
Social Media Policies and Practices for Emergency ServicesRommie Duckworth
The proliferation of social media and mobile technology is creating new challenges for emergency responders. On virtually every call smart phones, helmet cams and more are capturing images and information ready to be uploaded and shared with the world. New questions of personal privacy and freedom of speech for responders using social media off-duty need to be addressed. How do agencies navigate the minefield that is the new social media landscape? This program gives emergency services leaders and providers plenty of take-home resources to create or revise their social media policies and practices including the twenty points that need to be addressed in any guiding social media documents and ten recommendations for responsible social media use by responders.
www.RescueDigest.com
wwwRomDuck.com
Rumors pose an increased risk to corporate reputation due to the global use of social media combined with people's natural tendency to gossip and/or share unproven or speculative information. This presentation discusses a basic methodology that organizations can use to defend themselves from potentially damaging rumors.
Rumors pose an increasing risk to corporate reputation due to the widespread use of social media and human beings natural tendency to gossip and/or share speculative information. This presentation discusses a basic approach that corporatations can use to defend their reputation from potentially damaging rumors.
This was a presentation before the Michigan Association of Community Colleges on how to respond to a crisis and what to do before their campus ever has a crisis.
A Nonprofit's Reputation: Controlling Factors That Can Destroy ItThomas Ciesielka
Presentation covers;
• How to prepare you and your team to effectively manage a communication crisis
• Help staff, board, and volunteers respond in a united and proficient way to a crisis
• Tactics to best communicate critical and privileged information to the media, stakeholders, and the public
• The importance of creating a crisis communication plan and how to start one if none exists
• Starting points for evaluating your current crisis communication plan
Crisis Management Through Social Media Monitoriingtracx
This presentation addresses the challenges and complications of crisis management in the age of social media, and the vital role of deep listening for critical business intelligence. It provides real-world insights from major disasters and crises including Katrina, Hurricane Sandy, Flint Michigan’s Water crisis, and more.
ScenarioYou are an employee at D&B Investigations, a firm that c.docxjeffsrosalyn
Scenario
You are an employee at D&B Investigations, a firm that contracts with individuals, companies, and government agencies to conduct computer forensics investigations. D&B employees are expected to observe the following tenets, which the company views as the foundation for its success:
· Give concerted attention to clients’ needs and concerns.
· Follow proper procedures and stay informed about legal issues.
· Maintain the necessary skill set to apply effective investigative techniques using the latest technologies.
Your manager has just scheduled a meeting with an important prospective client, and she has asked you to be part of the team that is preparing for the meeting. The prospective client is Brendan Oliver, a well-known celebrity. Last night, Mr. Oliver’s public relations team discovered that someone obtained three photos that were shot on his smartphone, and tried to sell the photos to the media. Due to the sensitive nature of the photos, Mr. Oliver and his team have not yet contacted law enforcement. They would like to know if D&B can provide any guidance or support related to the investigation—or, at the very least, if D&B can help them prevent similar incidents from occurring in the future. At this time, they do not know how the photos were acquired. The public relations team is wondering if a friend, family member, or employee could have gained direct access to Mr. Oliver’s phone and obtained the photos that way, although the phone is usually locked with a passcode when Mr. Oliver is not using it. In addition, Mr. Oliver emailed the photos to one other person several months ago. He has not spoken with that person in the last few weeks, but he does not believe that person would have shared the photos with anyone else.
Your manager plans to use this initial meeting with Mr. Oliver and his public relations team to establish rapport, learn more about the case, and demonstrate the firm’s expertise. The company sees this as an opportunity to build future business, regardless of whether they are retained to help with the investigation of this case.
Tasks
To help the team prepare for the meeting, your manager asks you (and your colleagues) to consider and record your responses the following questions:
· What is the nature of the alleged crime, and how does the nature of the crime influence a prospective investigation?
· Based on the limited information provided in the scenario, what is the rationale for launching an investigation that uses computer forensic activities? Would D&B and/or law enforcement need
· additional information in order to determine if they should proceed with an investigation? Why or why not?
· What would you share with the client about how investigators prepare for and conduct a computer forensics investigation? Identify three to five key points that are most relevant to this case.
· What sources of evidence would investigators likely examine in this case? Provide concrete examples and explain your rationale.
.
This presentation, created by Syed Faiz ul Hassan, explores the profound influence of media on public perception and behavior. It delves into the evolution of media from oral traditions to modern digital and social media platforms. Key topics include the role of media in information propagation, socialization, crisis awareness, globalization, and education. The presentation also examines media influence through agenda setting, propaganda, and manipulative techniques used by advertisers and marketers. Furthermore, it highlights the impact of surveillance enabled by media technologies on personal behavior and preferences. Through this comprehensive overview, the presentation aims to shed light on how media shapes collective consciousness and public opinion.
Rumors pose an increased risk to corporate reputation due to the global use of social media combined with people's natural tendency to gossip and/or share unproven or speculative information. This presentation discusses a basic methodology that organizations can use to defend themselves from potentially damaging rumors.
Rumors pose an increasing risk to corporate reputation due to the widespread use of social media and human beings natural tendency to gossip and/or share speculative information. This presentation discusses a basic approach that corporatations can use to defend their reputation from potentially damaging rumors.
This was a presentation before the Michigan Association of Community Colleges on how to respond to a crisis and what to do before their campus ever has a crisis.
A Nonprofit's Reputation: Controlling Factors That Can Destroy ItThomas Ciesielka
Presentation covers;
• How to prepare you and your team to effectively manage a communication crisis
• Help staff, board, and volunteers respond in a united and proficient way to a crisis
• Tactics to best communicate critical and privileged information to the media, stakeholders, and the public
• The importance of creating a crisis communication plan and how to start one if none exists
• Starting points for evaluating your current crisis communication plan
Crisis Management Through Social Media Monitoriingtracx
This presentation addresses the challenges and complications of crisis management in the age of social media, and the vital role of deep listening for critical business intelligence. It provides real-world insights from major disasters and crises including Katrina, Hurricane Sandy, Flint Michigan’s Water crisis, and more.
ScenarioYou are an employee at D&B Investigations, a firm that c.docxjeffsrosalyn
Scenario
You are an employee at D&B Investigations, a firm that contracts with individuals, companies, and government agencies to conduct computer forensics investigations. D&B employees are expected to observe the following tenets, which the company views as the foundation for its success:
· Give concerted attention to clients’ needs and concerns.
· Follow proper procedures and stay informed about legal issues.
· Maintain the necessary skill set to apply effective investigative techniques using the latest technologies.
Your manager has just scheduled a meeting with an important prospective client, and she has asked you to be part of the team that is preparing for the meeting. The prospective client is Brendan Oliver, a well-known celebrity. Last night, Mr. Oliver’s public relations team discovered that someone obtained three photos that were shot on his smartphone, and tried to sell the photos to the media. Due to the sensitive nature of the photos, Mr. Oliver and his team have not yet contacted law enforcement. They would like to know if D&B can provide any guidance or support related to the investigation—or, at the very least, if D&B can help them prevent similar incidents from occurring in the future. At this time, they do not know how the photos were acquired. The public relations team is wondering if a friend, family member, or employee could have gained direct access to Mr. Oliver’s phone and obtained the photos that way, although the phone is usually locked with a passcode when Mr. Oliver is not using it. In addition, Mr. Oliver emailed the photos to one other person several months ago. He has not spoken with that person in the last few weeks, but he does not believe that person would have shared the photos with anyone else.
Your manager plans to use this initial meeting with Mr. Oliver and his public relations team to establish rapport, learn more about the case, and demonstrate the firm’s expertise. The company sees this as an opportunity to build future business, regardless of whether they are retained to help with the investigation of this case.
Tasks
To help the team prepare for the meeting, your manager asks you (and your colleagues) to consider and record your responses the following questions:
· What is the nature of the alleged crime, and how does the nature of the crime influence a prospective investigation?
· Based on the limited information provided in the scenario, what is the rationale for launching an investigation that uses computer forensic activities? Would D&B and/or law enforcement need
· additional information in order to determine if they should proceed with an investigation? Why or why not?
· What would you share with the client about how investigators prepare for and conduct a computer forensics investigation? Identify three to five key points that are most relevant to this case.
· What sources of evidence would investigators likely examine in this case? Provide concrete examples and explain your rationale.
.
This presentation, created by Syed Faiz ul Hassan, explores the profound influence of media on public perception and behavior. It delves into the evolution of media from oral traditions to modern digital and social media platforms. Key topics include the role of media in information propagation, socialization, crisis awareness, globalization, and education. The presentation also examines media influence through agenda setting, propaganda, and manipulative techniques used by advertisers and marketers. Furthermore, it highlights the impact of surveillance enabled by media technologies on personal behavior and preferences. Through this comprehensive overview, the presentation aims to shed light on how media shapes collective consciousness and public opinion.
Acorn Recovery: Restore IT infra within minutesIP ServerOne
Introducing Acorn Recovery as a Service, a simple, fast, and secure managed disaster recovery (DRaaS) by IP ServerOne. A DR solution that helps restore your IT infra within minutes.
Have you ever wondered how search works while visiting an e-commerce site, internal website, or searching through other types of online resources? Look no further than this informative session on the ways that taxonomies help end-users navigate the internet! Hear from taxonomists and other information professionals who have first-hand experience creating and working with taxonomies that aid in navigation, search, and discovery across a range of disciplines.
This presentation by Morris Kleiner (University of Minnesota), was made during the discussion “Competition and Regulation in Professions and Occupations” held at the Working Party No. 2 on Competition and Regulation on 10 June 2024. More papers and presentations on the topic can be found out at oe.cd/crps.
This presentation was uploaded with the author’s consent.
0x01 - Newton's Third Law: Static vs. Dynamic AbusersOWASP Beja
f you offer a service on the web, odds are that someone will abuse it. Be it an API, a SaaS, a PaaS, or even a static website, someone somewhere will try to figure out a way to use it to their own needs. In this talk we'll compare measures that are effective against static attackers and how to battle a dynamic attacker who adapts to your counter-measures.
About the Speaker
===============
Diogo Sousa, Engineering Manager @ Canonical
An opinionated individual with an interest in cryptography and its intersection with secure software development.
Sharpen existing tools or get a new toolbox? Contemporary cluster initiatives...Orkestra
UIIN Conference, Madrid, 27-29 May 2024
James Wilson, Orkestra and Deusto Business School
Emily Wise, Lund University
Madeline Smith, The Glasgow School of Art
Sharpen existing tools or get a new toolbox? Contemporary cluster initiatives...
Crisis comm
1. Crisis Communication Plan:
IT Breach Presented by 4 Points PR
Paola Behena
Ashley Jablonski
Morgan Mendoza
Verliz Williams
2. Media Contacts & Resources
PRIMARY MEDIA CONTACT
Adam Freeman, Director of Media Relations
Main: 813-974-9047
Cell: 813-404-3857
adamfreeman@usf.edu
Additional USF Media
Contact
Althea Paul, Media Relations Manager
Main: 813-974-1665
Cell: 305-495-0306
altheapaul@usf.edu
USF IT Web Services
Christopher Akin, Director
Main: 813-974-0898
cakin@usf.edu
3. Assess and Identify Potential Risks
CRISIS
❖ USF’s BOX was breached, which contains personal data of presidential candidates.
BEST/WORST CASE SCENARIO
❖ Best: personal data was not made public and the safety of information for students,
faculty and future USF stakeholders wasn’t compromised.
❖ Worst: personal data was made public and safety of USF system was compromised.
HOLDING STATEMENTS AND RESPONSES
❖ “... Safety is of the university’s utmost priority. The breach in the USF system is of our
top concern.”
❖ “... Keeping the integrity of the school, our presidential candidates, and all the
students, faculty and staff at all three university locations, is our main focus alongside
ending the breach and preventing an event like this from happening again.”
❖ “... We’re hearing everyone’s concerns and lack of satisfaction with the university. We
hear you. We see you. We are fixing this and will keep you updated every step of the
way.”
4. Identify and Know Stakeholders
Stakeholders
❖ The University of South Florida System
❖ USF Board of Trustees
❖ Presidential search nominees
❖ Students, faculty, staff, parents
❖ Public outside of the University who may be interested in the University
(business partners, potential students, professors, etc)
5. Define Communications Guidelines
The Five W’s
❖ Who will talk on behalf of your organization: The response team:
Adam Freeman (Media Relations), Christopher Akin (IT Director), a
cybersecurity company & a public relations firm
❖ What they will say: They will reassure the stakeholders that the situation is
being controlled, a sweep is being made to figure out the extent of the
breech and improvements are being made to try and prevent this from
happening again.
❖ When and how often they will address the public: Once information is
clearly known so as to not get ahead of the facts & then updating when they
have new important information
❖ Why they would speak: To bring clarity to the situation
❖ Where they will communicate: via USF email, local tv and radio, bulls radio
6. Have A Set of Key Actions
❖ Address perceptions: Maintain a positive perception by ensuring the public
that the University of South Florida is just as interested and concerned
about the issue as they are, through a press release. Also, keep them updated
on progressions in the case and any combative action being taken.
❖ Listen to the people who are complaining.
❖ Tune in emotionally: The University of South Florida will address concerns
and complaints personally as opposed to generic and automated responses.
❖ Reason from the point of view of those USF represents.
❖ Distinguish between law and public opinion: USF will be in close
communication with lawyers, the authorities and a highly qualified cyber
security firm due to the personal information breached in this crisis.
7. Establish Notification and
Monitoring Systems
❖ Figure out where the conversations are happening: Who’s talking about the
information? Who already knows? By finding out these answers, it can be
easier to contain the problem before it gets out to more people than it needs
to.
❖ Listen in and understand what topics are being discussed:Figure out the
main concerns to better plan how to properly address them.
❖ Relate them to your brand: Need to reassure the public and stakeholders
that the University system takes cyber security very seriously and will be
taking measures to try and prevent it from happening again.
❖ See the crisis coming before it does: Stay in-tuned with response team to
set forth a plan for addressing the issue before it gets out. Have a plan set in
place for addressing the issue before the stakeholders start “panicking” and
asking questions.
❖ Give fact sheet to journalists
8. Fact Sheet
Fact Sheet
❖ The BOX containing all of the USF
presidential search information, including
personal data and financial information,
was breached by a group of hackers.
❖ No records have allegedly been made
public.
❖ USF is in close communication with:
➢ Lawyers
➢ The authorities
➢ A highly qualified cyber security firm
10. Execute and Review
❖ Meet with important speakers and executives: It is important to address
executives who could have been affected as well as those who will be
communicating to the public
❖ Test the plan for efficiency
❖ Modify if needed: As the situation plays out, adjust communication
strategies to better suit those involved
❖ Execute clear communication strategies: make sure that the response team
is on the same page and clear with how the situation should be
communicated.
11. What did we learn?
❖ Successful crisis communication is dependent upon
the team involved
❖ Words only matter if action is followed behind
❖ Don’t speak before knowing that what you’re saying
is backed up by facts
❖ Take responsibility for the situation and don’t deny
or apologize