SlideShare a Scribd company logo
What do I do now?
The Beginner’s Guide to Reputation
Management
   Issues Management                    Crisis Management
    – Ask the hard ?s                     – Get a contact list NOW
    – Review reputation of                – Get all phones, faxes, etc.
      principles                          – ID THE spokesperson
    – Employees and affiliations =        – ID THE technical
      friends or foe?                       spokesperson (if diff.)
    – Ask what would happen if            – Get the “lists” for impt. calls
           DoS (denial of service)
           Hacker attacks
                                                 Investors
           Web graffiti                         Media
           Credit card theft
           Layoffs
                                                 Analysts
           Stock drops                          Champions
           Loss of VC
           CEO dies                      – Develop the content
           Code stolen
           Unhappy employees
           Unhappy customers



                                                           Copyright 2003, Roberta Silverstein
Key for Success
 Make   sure U in the        Communicate with your
  loop                         PR agency
 If company is a “need
                              Honesty is best policy
                              Make sure understand the
  to know”, ask if you
                               goals for the company
  are one of the “knows”       – Get bought out?
 Find someone who can         – Long haul to IPO?
  be your deep throat if       – Secure relationships with
                                 investors?
  not a “know” person          – Customers are king?



                                             Copyright 2003, Roberta Silverstein
What do I do now?
The Beginner’s Guide to Reputation
Management
   Issues Management                    Crisis Management
    – Ask the hard ?s                     – Get a contact list NOW
    – Review reputation of                – Get all phones, faxes, etc.
      principles                          – ID THE spokesperson
    – Employees and affiliations =        – ID THE technical
      friends or foe?                       spokesperson (if diff.)
    – Ask what would happen if            – Get the “lists” for impt. calls
           DoS (denial of service)
           Hacker attacks
                                                 Investors
           Web graffiti                         Media
           Credit card theft
           Layoffs
                                                 Analysts
           Stock drops                          Champions
           Loss of VC
           CEO dies                      – Develop the content
           Code stolen
           Unhappy employees
           Unhappy customers



                                                           Copyright 2003, Roberta Silverstein
Play What Ifs
   Sit down with CEO and            Every month – have a
    senior management                 different “what if”
   Ask “what if” ?s                  scenario day (could be on
   Tell them you are                 email and take three
    preparing for the un-             minutes)
    preparatory                      Play “devil’s advocate”
   Ask what is their preferred      Play “media demon”
    mode (offense or                 Play investor from Hell
    defense?)



                                                   Copyright 2003, Roberta Silverstein
“Problem” or “Crisis”?
 Problems:  commonplace;
  predictable; quickly resolved; and
  may go unnoticed.
 Crises: less predictable; time-
  consuming; costly; and bring
  unwanted public attention.



                                       Copyright 2003, Roberta Silverstein
Crises Run the Risk of:
 escalating in intensity.
 falling under close scrutiny.
 interfering with operations.
 jeopardizing image.
 damaging the bottom line.




                                  Copyright 2003, Roberta Silverstein
A Crisis:
 isa major event that has
  potentially negative results.
 may significantly damage an
  organization and its employees,
  products, services, financial
  condition, and reputation.



                                    Copyright 2003, Roberta Silverstein
The Warning Stage
     Warning Stage




                     Copyright © Allyn & Bacon 2000
Point of No Return
                   Warning Stage




Point of No
  Return




                                   Copyright © Allyn & Bacon 2000
Cleanup Phase
                 Warning Stage




Point of No
  Return



                   Cleanup
                    Phase        Copyright © Allyn & Bacon 2000
Things Return to Normal...
But Have We Learned Anything?
              Warning Stage




Point of No                   Things Return
  Return                       to Normal




                Cleanup
                 Phase         Copyright © Allyn & Bacon 2000
The Crisis Grid
 Developed       by Steven Fink, Crisis communications
  consultant
 Created a Crisis Grid design for risk assessment
 Vertical axis – crisis impact value
    –   Crisis escalates – how intense can it get?
    –   Crisis catch notice of stakeholders and audiences?
    –   Crisis interfere with normal operations?
    –   Crisis impact bottom line?
    –   (add total and divide by 5)
 Horizontalaxis – crisis probability factor
 Way of organizing potential crises
                                           Copyright 2003, Roberta Silverstein
The Crisis Grid
                              CIV
High/Low             10             High/High
(amber zone)                        (red zone)


                                                           CPF
 0%                                                100%
      Low/Low                        Low/High
      (green zone)                   (gray zone)
                          0




                                                     Copyright 2003, Roberta Silverstein

More Related Content

Similar to Reputation Management, the Basics

Reputation management in a cyclone
Reputation management in a cycloneReputation management in a cyclone
Reputation management in a cyclone
David Kassnoff
 
Positioning project, programme and portfolio risk
Positioning project, programme and portfolio risk Positioning project, programme and portfolio risk
Positioning project, programme and portfolio risk
Dr David Hancock
 
The Stakeholder Engagement Imperative. Seminar Paper: Oxford University Cent...
The Stakeholder Engagement Imperative. Seminar Paper:  Oxford University Cent...The Stakeholder Engagement Imperative. Seminar Paper:  Oxford University Cent...
The Stakeholder Engagement Imperative. Seminar Paper: Oxford University Cent...
Terence Lyons
 
Preparing for Your Next Crisis
Preparing for Your Next CrisisPreparing for Your Next Crisis
Preparing for Your Next Crisis
Roger Friedensen, APR
 
Eugene Pilyankevich - Getting Secure Against Challenges Or Getting Security C...
Eugene Pilyankevich - Getting Secure Against Challenges Or Getting Security C...Eugene Pilyankevich - Getting Secure Against Challenges Or Getting Security C...
Eugene Pilyankevich - Getting Secure Against Challenges Or Getting Security C...
NoNameCon
 
Risk assessment as "The Art of Prevention"
Risk assessment as "The Art of Prevention"Risk assessment as "The Art of Prevention"
Risk assessment as "The Art of Prevention"
Gabriel (Gaby) Bar Giora
 
Google Firestarters Conference: An Emerging Agency OS
Google Firestarters Conference: An Emerging Agency OSGoogle Firestarters Conference: An Emerging Agency OS
Google Firestarters Conference: An Emerging Agency OS
Martin Bailie
 
WealthDNA & The Master Entrepreneur
WealthDNA & The Master EntrepreneurWealthDNA & The Master Entrepreneur
WealthDNA & The Master Entrepreneur
brevete
 
Clear and present danger: Cyber Threats and Trends 2017
Clear and present danger: Cyber Threats and Trends 2017Clear and present danger: Cyber Threats and Trends 2017
Clear and present danger: Cyber Threats and Trends 2017
Morakinyo Animasaun
 
Selling Data Security Technology
Selling Data Security TechnologySelling Data Security Technology
Selling Data Security Technology
Flaskdata.io
 
Effective communication skills
Effective communication skillsEffective communication skills
Effective communication skills
Veeda Clinical Research
 
Triangulum - Ransomware Evolved - Why your backups arent good enough
Triangulum - Ransomware Evolved - Why your backups arent good enoughTriangulum - Ransomware Evolved - Why your backups arent good enough
Triangulum - Ransomware Evolved - Why your backups arent good enough
Martin Opsahl
 
Circles of influence - Tom Kosnik
Circles of influence - Tom KosnikCircles of influence - Tom Kosnik
Circles of influence - Tom KosnikN_Connect
 
From your Pocket to your Heart and Back
From your Pocket to your Heart and BackFrom your Pocket to your Heart and Back
From your Pocket to your Heart and Back
Iftach Ian Amit
 
Opsec for security researchers
Opsec for security researchersOpsec for security researchers
Opsec for security researchers
vicenteDiaz_KL
 
Issa Charlotte 2009 Patching Your Users
Issa Charlotte 2009   Patching Your UsersIssa Charlotte 2009   Patching Your Users
Issa Charlotte 2009 Patching Your UsersMike Murray
 
Startup Metrics for Convicts
Startup Metrics for ConvictsStartup Metrics for Convicts
Startup Metrics for Convicts
David Jones
 

Similar to Reputation Management, the Basics (20)

Reputation management in a cyclone
Reputation management in a cycloneReputation management in a cyclone
Reputation management in a cyclone
 
Positioning project, programme and portfolio risk
Positioning project, programme and portfolio risk Positioning project, programme and portfolio risk
Positioning project, programme and portfolio risk
 
The Stakeholder Engagement Imperative. Seminar Paper: Oxford University Cent...
The Stakeholder Engagement Imperative. Seminar Paper:  Oxford University Cent...The Stakeholder Engagement Imperative. Seminar Paper:  Oxford University Cent...
The Stakeholder Engagement Imperative. Seminar Paper: Oxford University Cent...
 
Preparing for Your Next Crisis
Preparing for Your Next CrisisPreparing for Your Next Crisis
Preparing for Your Next Crisis
 
Eugene Pilyankevich - Getting Secure Against Challenges Or Getting Security C...
Eugene Pilyankevich - Getting Secure Against Challenges Or Getting Security C...Eugene Pilyankevich - Getting Secure Against Challenges Or Getting Security C...
Eugene Pilyankevich - Getting Secure Against Challenges Or Getting Security C...
 
Sexy defense
Sexy defenseSexy defense
Sexy defense
 
Risk assessment as "The Art of Prevention"
Risk assessment as "The Art of Prevention"Risk assessment as "The Art of Prevention"
Risk assessment as "The Art of Prevention"
 
Google Firestarters Conference: An Emerging Agency OS
Google Firestarters Conference: An Emerging Agency OSGoogle Firestarters Conference: An Emerging Agency OS
Google Firestarters Conference: An Emerging Agency OS
 
WealthDNA & The Master Entrepreneur
WealthDNA & The Master EntrepreneurWealthDNA & The Master Entrepreneur
WealthDNA & The Master Entrepreneur
 
Clear and present danger: Cyber Threats and Trends 2017
Clear and present danger: Cyber Threats and Trends 2017Clear and present danger: Cyber Threats and Trends 2017
Clear and present danger: Cyber Threats and Trends 2017
 
Selling Data Security Technology
Selling Data Security TechnologySelling Data Security Technology
Selling Data Security Technology
 
Tech inno3.0
Tech inno3.0Tech inno3.0
Tech inno3.0
 
Effective communication skills
Effective communication skillsEffective communication skills
Effective communication skills
 
Triangulum - Ransomware Evolved - Why your backups arent good enough
Triangulum - Ransomware Evolved - Why your backups arent good enoughTriangulum - Ransomware Evolved - Why your backups arent good enough
Triangulum - Ransomware Evolved - Why your backups arent good enough
 
Circles of influence - Tom Kosnik
Circles of influence - Tom KosnikCircles of influence - Tom Kosnik
Circles of influence - Tom Kosnik
 
From your Pocket to your Heart and Back
From your Pocket to your Heart and BackFrom your Pocket to your Heart and Back
From your Pocket to your Heart and Back
 
Opsec for security researchers
Opsec for security researchersOpsec for security researchers
Opsec for security researchers
 
6 f
6 f6 f
6 f
 
Issa Charlotte 2009 Patching Your Users
Issa Charlotte 2009   Patching Your UsersIssa Charlotte 2009   Patching Your Users
Issa Charlotte 2009 Patching Your Users
 
Startup Metrics for Convicts
Startup Metrics for ConvictsStartup Metrics for Convicts
Startup Metrics for Convicts
 

Reputation Management, the Basics

  • 1. What do I do now? The Beginner’s Guide to Reputation Management  Issues Management  Crisis Management – Ask the hard ?s – Get a contact list NOW – Review reputation of – Get all phones, faxes, etc. principles – ID THE spokesperson – Employees and affiliations = – ID THE technical friends or foe? spokesperson (if diff.) – Ask what would happen if – Get the “lists” for impt. calls  DoS (denial of service)  Hacker attacks  Investors  Web graffiti  Media  Credit card theft  Layoffs  Analysts  Stock drops  Champions  Loss of VC  CEO dies – Develop the content  Code stolen  Unhappy employees  Unhappy customers Copyright 2003, Roberta Silverstein
  • 2. Key for Success  Make sure U in the  Communicate with your loop PR agency  If company is a “need  Honesty is best policy  Make sure understand the to know”, ask if you goals for the company are one of the “knows” – Get bought out?  Find someone who can – Long haul to IPO? be your deep throat if – Secure relationships with investors? not a “know” person – Customers are king? Copyright 2003, Roberta Silverstein
  • 3. What do I do now? The Beginner’s Guide to Reputation Management  Issues Management  Crisis Management – Ask the hard ?s – Get a contact list NOW – Review reputation of – Get all phones, faxes, etc. principles – ID THE spokesperson – Employees and affiliations = – ID THE technical friends or foe? spokesperson (if diff.) – Ask what would happen if – Get the “lists” for impt. calls  DoS (denial of service)  Hacker attacks  Investors  Web graffiti  Media  Credit card theft  Layoffs  Analysts  Stock drops  Champions  Loss of VC  CEO dies – Develop the content  Code stolen  Unhappy employees  Unhappy customers Copyright 2003, Roberta Silverstein
  • 4. Play What Ifs  Sit down with CEO and  Every month – have a senior management different “what if”  Ask “what if” ?s scenario day (could be on  Tell them you are email and take three preparing for the un- minutes) preparatory  Play “devil’s advocate”  Ask what is their preferred  Play “media demon” mode (offense or  Play investor from Hell defense?) Copyright 2003, Roberta Silverstein
  • 5. “Problem” or “Crisis”?  Problems: commonplace; predictable; quickly resolved; and may go unnoticed.  Crises: less predictable; time- consuming; costly; and bring unwanted public attention. Copyright 2003, Roberta Silverstein
  • 6. Crises Run the Risk of:  escalating in intensity.  falling under close scrutiny.  interfering with operations.  jeopardizing image.  damaging the bottom line. Copyright 2003, Roberta Silverstein
  • 7. A Crisis:  isa major event that has potentially negative results.  may significantly damage an organization and its employees, products, services, financial condition, and reputation. Copyright 2003, Roberta Silverstein
  • 8. The Warning Stage Warning Stage Copyright © Allyn & Bacon 2000
  • 9. Point of No Return Warning Stage Point of No Return Copyright © Allyn & Bacon 2000
  • 10. Cleanup Phase Warning Stage Point of No Return Cleanup Phase Copyright © Allyn & Bacon 2000
  • 11. Things Return to Normal... But Have We Learned Anything? Warning Stage Point of No Things Return Return to Normal Cleanup Phase Copyright © Allyn & Bacon 2000
  • 12. The Crisis Grid  Developed by Steven Fink, Crisis communications consultant  Created a Crisis Grid design for risk assessment  Vertical axis – crisis impact value – Crisis escalates – how intense can it get? – Crisis catch notice of stakeholders and audiences? – Crisis interfere with normal operations? – Crisis impact bottom line? – (add total and divide by 5)  Horizontalaxis – crisis probability factor  Way of organizing potential crises Copyright 2003, Roberta Silverstein
  • 13. The Crisis Grid CIV High/Low 10 High/High (amber zone) (red zone) CPF 0% 100% Low/Low Low/High (green zone) (gray zone) 0 Copyright 2003, Roberta Silverstein