SlideShare a Scribd company logo
1 of 102
Trust is a Terrible  Thing to Waste  How to Use Communications to Protect Reputation And Advance Privacy Objectives
The Panel ,[object Object]
John BerardPrincipalCredible ContextJoe CarberryPresident, Western RegionThe MS&L Group ,[object Object],[object Object]
A formula for success Security + Privacy + Performance = Trust
What the data say
We spend a lot on security
	Businesses are substantially increasing their expenditure on security software, despite the economic slowdown. Gartner  (2008)
	Finding #3. Yet far fewer executives are 	actually “cutting security back”. And among 	the half or less that are taking action, most 	are taking the least dramatic response. Global State of Information Security Survey 	(PwC, CIO & CSO Magazines 2010)
We talk a lot about the money we spend.
Google “IT security spending” and you get 47 million results. Bing it and you get 36 million results
We spend a lot on product performance.
	Federal research & development totaled  $150 billion in 2007.
	$225 billion in annual corporate research & development spending in the U.S. Business Roundtable 2010 CEO Survey
	About 200,000 new products introduced globally each year.
We talk a lot about the money we spend.
Bing “new product research and development” and you get 2.2 million results Google it and you get 73 million results
We spend a lot on privacy.
Significant investment in privacy Technology Compliance monitoring Data collection & handling procedures Training
We DON’T talk a lot about the money we spend.
We allow our story to be told by failures.
	Since 2005, the Privacy Rights Clearinghouse says that 350 million individual records have been breached.
	In the last year, according to the Identity Theft Resource Center, 6.3 million records were affected in 218 breaches.
The business effect of misuse 	It costs $6.6 million on average when an organization suffers a data breach, and more than $200 per compromised record, according to a survey conducted by the Ponemon Institute.
	Just as with security and performance, we can get a return on our privacy investment.
The nature of online privacy Control, not anonymity
Reflected in the percentages About half of us Google ourselves That’s twice what it was a few years ago But only about 3 in 100 do it regularly 60 percent of us are not worried about the volume of online information about us More than half of us Google others ,[object Object],[object Object]
Consumer’s view We care greatly about privacy We don’t do much about it Pew, too
This is the opening for communications More than managing risk More than damage control Adding an accelerant to the formula for success Security + Privacy + Performance = Trust
Public value of the investment Communications is the key to unlocking a market return on the investment already made.
The first question to ask is: Who are you?
II. When Trust is Broken Joe Carberry, The MS&L Group
What we’re talking about 	How should I respond if/when data is misused or stolen?   Current Public Environment Managing Through Crisis  Case Study Exercise
The Environment
What we’re up against…
The Risk ,[object Object]
Hundreds of publicly reported breaches; many more not disclosed
The number of breaches continues to increase year-over-year 
Only 36% of C-suite confident they won’t suffer breach * 
Cost of breach now $6.6 million *As more and more business is conducted and recorded via electronic means, risks related to data and privacy will increase.  *Ponemon Institute
The Point? Data misuse/theft not question of “if” but “when” Crises often happen in full view, in real time – with significant impact More at risk in a data breach than just data
Bottom Line “A promise must never be broken.” - Alexander Hamilton
  Managing a Breach of Trust
What Makes a Crisis? Can be triggered by various kinds of events:  Operational failures Malfeasance  Human error Natural disasters  Business set-backs Competitor or third-party attacks An issue becomes a “crisis” when the organization’s business prospects are threatened in the eyes of its stakeholders You do not define “crisis” – someone else does Crisis rule #1: somebody always find out. Always.
A Crisis Subtracts Value Crises undermine stakeholder confidence in an organization:    Short- and long-term growth potential Sustainable return on capital Quality (focus) of management Ability to manage risk to the business Source: Adapted from McKinsey
Managing Risk Legal Risk Patchwork quilt of state and federal regulations Litigation exposure Protection: Sound legal counsel Operational Risk Validate and comply with industry standards (i.e., PCI DSS) Work with appropriate vendors, technology Protection:  Ongoing diligence, best practices Reputational Risk Reputation impacts business (customers, employees, suppliers, investors, etc.)   Reputational risk often overlooked   Protection:  Preparation, established crisis protocols *Ponemon Institute ** Harris Interactive Poll
Who Cares? 43 Customers SalesChannel Investors Organization Supply Chain Policymakers Local Community Employees On which stakeholders do you rely for success? What do they think?
What Can You Do? Be Prepared  Success proportionate  preparation   Activate crisis response at first sign of exposure Move Quickly    Early and honest communication Someone else shaping news robs you of control Take Action  Work to resolve underlying issue   People perceive data as “theirs”, not the company’s  -- demonstrate stewardship Individual should remain the “north star”   Be Responsible   Facing fear and suspicion – respond with transparency and responsibility Consumers will forgive mistakes, but failure to act responsibly.
Keep in Mind Taking Responsibility is not the same as  Taking the Blame
The Message What stakeholders generally want to hear: You’ve stopped the bleeding Make sure the problem is no longer occurring. You’re making amendsTake steps to address the impact among affected parties (not the same as admitting guilt). It’ll never happen againTake steps to ensure similar issues don’t happen in the future.
Crisis Protocol
Stage 0: Preparation ,[object Object]
Early Warning System
Crisis/Situation Protocol
Monitoring (especially digital)Objective: Prepare for Action
Stage 1: Crisis Breaks ,[object Object]
Assemble a Crisis Response Team
Put in place tracking toolsObjective: Assessment & Strategy
Stage 2: Rapid Response ,[object Object]
Identify impacted stakeholders and expectations
Disseminate info to stakeholders quickly, frequently
Correct inaccuracies quickly
Manage digital impact – address contagionObjective: Take Control
Stage 3: Ongoing Crisis ,[object Object]
Plan for additional challenges
New information
Critics
Catalog business remediation steps
CountermeasuresObjective: Focus on Solutions
Stage 4: Post-Crisis ,[object Object]
Explore business changes related to situation
Examine tactics to rebuild reputation
Conduct debrief; identify areas for improvementObjective: Rebuild
Case Study Exercise
The Environment Trust of large corporations is low Security is pervasive issue in news media  Lots of online chatter about data breaches Half of consumers cite privacy/security as a top concern Legislators eager to protect consumers
The Situation XYZ.Com is a major online retailer The company has experienced a data breach Tens of millions of accounts; three years Payment information stored in violation of PCI standards Customers’ names, card numbers and expiry dates involved Forensic investigation underway; external auditors US Secret Service investigating Card companies are aware; spotting fraud patterns
Financial Institutions Suppliers Customers XYZ Online Community Policymakers Stakeholders Employees Shareholders Law Enforcement
Your Challenge Competing stakeholder needs US Secret Service requesting delay in public disclosure Financial institutions want all available information, ASAP Federal legislators have called for immediate disclosure of all breaches Polling data show consumers want disclosure, but less likely to do business with breached organization 30 state statutes require immediate disclosure to impacted consumers High risk associated with disclosure Potential for brand damage with disclosure Litigation risk of disclosing Broad consumer disclosure drives customer services costs – at XYZ and associated parties (banks)
The Wall Street Journal calls; they have the story...  What do you do?
Your Response Who is involved? Who is most impacted? Who should be at the table internally? What do you do first? Do you disclose publicly?  When and how? What should you say? What business changes do you recommend to management? What can you do to restore trust?
Remember… Misuse/theft of data creates risk Breach reduces trust Lower trust impacts brand/reputation Tarnished brand/reputation harms business  Crisis response should be well planned, aligned   This is not about “spin”
Rahm Emanuel… “You don’t ever want a crisis to go to waste.”
QUESTIONS?
BREAK
III. Making Your Case Rosetta Jones, Visa Inc.
What is Visa? What We Are What We Are Not Global payments technology company Transaction-processing network that connects cardholders, merchants and financial institutions Credit card issuer Lender Exposed to consumer credit risk Payments technology company that helps power the global economy.
Statistical Overview Visa Inc. is the world’s largest retail electronic payments network, with more than $4.4 trillion transacted on our payment products over the four quarters ended Dec. 31, 2009. Total Volume* * Visa Cards 1.8B 16,100 1.6M ATMs*** Financial Institution Customers Visa Inc. Operates the world’s largest retail electronic payments network* $2.8T $4.4T Payments Volume Total Transactions**** Statistical data in U.S. dollars; ATMs, financial institutions and cards based on four quarters ended Sept. 30, 2009. Excludes Visa Europe, unless otherwise noted *Based on payments volume, total volume, number of transactions and number of cards in circulation.  Figures are rounded. ** Includes payments and cash transactions. *** As reported by client financial institutions and therefore may be subject to change; includes merchant outlets and ATMs in the Visa Europe territory. **** Includes payments and cash transactions. 62B Visa Confidential
Payment Security = Data Privacy Cash Perceived Safest at POS Privacy/no personal information cited as leading reason Even those very comfortable with emerging technology only give mobile phones a score of 4.2. I’m going to read you some ways you can pay for things at a store and please tell me how safe you think each form of payment is on a scale from 1 to 10 where 1 is not at all safe and 10 is very safe… 69
Integrating Security…. Print advertising
Integrating Security…. Brand advertising
Integrating Security…. Client Marketing
Integrating Security…. Corporate Social Responsibility
Debit Breach Response Visa debit is fastest growing product An integrated response program that included advertising, PR, pre and post campaign tracking, and data analysis “Security breaks could curtail debit card use….” March 13, 2006
Security is Visa Asset By a large margin more cardholders view Visa as a part of the solution on the issue of fraud than believe it is part of the problem. Visa Job Approval Total Approve      Total Disapprove      Strongly Approve      Net Approve Thinking specifically about Visa, from the same list of issues please tell me whether you approve or disapprove of the job Visa is doing to handle that issue… Highlighted Data Slides 75
Top  109 List 1 Listen. Ask questions of key internal influencers about fears, opportunities, internal product development. Get smart. Know who’s saying what about you outside the company and the vulnerabilities inside the company.  Start with the bottom-line; demonstrate growth opportunity or barrier to growth that can/should be addressed. Use reason, not passion. Only the emotion will be heard. Be the voice of the customer. Make it objective -- DATA, DATA, DATA. Bring the company along. Use the experience of the dead bodies that have forged the privacy path before you. All else fails, fear works 2 3 4 5 6 7 8 9
IV. BUILDING TRUST Dave Steer, Common Sense Media
What we’re talking about How do I market trust and privacy? Why privacy is important to marketers What you can do to make trust and privacy a differentiator
  Why is trust so important?
First, a question… 	WHAT ARE THEY DOING TO BE  MOST TRUSTED IN PRIVACY? Source: TRUSTe/Ponemon 2009
Sometimes there is tension between marketing and privacy people “I just want to be able to better target our message to the right consumer” “This will make for a better customer experience since they’ll only see what’s important to them” “Telling them about our policies is a distraction. It should be about our product benefits.”
But trust is vital for marketers. Trust = Brand Advantage Privacy creates an opportunity for a trusted relationship with consumers which enables companies to differentiate their brands

More Related Content

What's hot

Securing the Digital Future
Securing the Digital FutureSecuring the Digital Future
Securing the Digital FutureCognizant
 
SANS WhatWorks - Compliance & DLP
SANS WhatWorks - Compliance & DLPSANS WhatWorks - Compliance & DLP
SANS WhatWorks - Compliance & DLPNick Selby
 
Sharing the blame: How companies are collaborating on data security breaches
Sharing the blame: How companies are collaborating on data security breachesSharing the blame: How companies are collaborating on data security breaches
Sharing the blame: How companies are collaborating on data security breachesThe Economist Media Businesses
 
Cognizant Making AI Real with Microsoft
Cognizant Making AI Real with MicrosoftCognizant Making AI Real with Microsoft
Cognizant Making AI Real with MicrosoftSteve Lennon
 
Material de apoyo Un replanteamiento masivo de la seguridad.
Material de apoyo Un replanteamiento masivo de la seguridad.Material de apoyo Un replanteamiento masivo de la seguridad.
Material de apoyo Un replanteamiento masivo de la seguridad.Universidad Cenfotec
 
STUDY: Website Vulnerability Assessment
STUDY: Website Vulnerability AssessmentSTUDY: Website Vulnerability Assessment
STUDY: Website Vulnerability AssessmentSymantec
 
FRISS_Insurance fraud report 2020
FRISS_Insurance fraud report 2020 FRISS_Insurance fraud report 2020
FRISS_Insurance fraud report 2020 FinTech Belgium
 
Open Group Panel Explores Changing Field of Risk Management and Analysis in t...
Open Group Panel Explores Changing Field of Risk Management and Analysis in t...Open Group Panel Explores Changing Field of Risk Management and Analysis in t...
Open Group Panel Explores Changing Field of Risk Management and Analysis in t...Dana Gardner
 
Insuring your future: Cybersecurity and the insurance industry
Insuring your future: Cybersecurity and the insurance industryInsuring your future: Cybersecurity and the insurance industry
Insuring your future: Cybersecurity and the insurance industryAccenture Insurance
 
Treat a Breach Like a Customer, Not a Compliance Issue
Treat a Breach Like a Customer, Not a Compliance IssueTreat a Breach Like a Customer, Not a Compliance Issue
Treat a Breach Like a Customer, Not a Compliance IssueResilient Systems
 
cybersecurity-in-the-c-suite-a-matt
cybersecurity-in-the-c-suite-a-mattcybersecurity-in-the-c-suite-a-matt
cybersecurity-in-the-c-suite-a-mattYigal Behar
 
Issue Paper Year Of The Breach Final 021706
Issue Paper Year Of The Breach Final 021706Issue Paper Year Of The Breach Final 021706
Issue Paper Year Of The Breach Final 021706Carolyn Kopf
 
2016-Black-Hat-Attendee-Survey
2016-Black-Hat-Attendee-Survey2016-Black-Hat-Attendee-Survey
2016-Black-Hat-Attendee-SurveyRob Raleigh
 
The Open Group July Conference Emphasizes Value of Placing Structure and Agil...
The Open Group July Conference Emphasizes Value of Placing Structure and Agil...The Open Group July Conference Emphasizes Value of Placing Structure and Agil...
The Open Group July Conference Emphasizes Value of Placing Structure and Agil...Dana Gardner
 
200606_NWC_Strategic Security
200606_NWC_Strategic Security200606_NWC_Strategic Security
200606_NWC_Strategic SecurityChad Korosec
 
Cybersecurity the new metrics
Cybersecurity the new metricsCybersecurity the new metrics
Cybersecurity the new metricsAbhishek Sood
 
The case for a Cybersecurity Expert on the Board of an SEC firm
The case for a Cybersecurity Expert on the Board of an SEC firmThe case for a Cybersecurity Expert on the Board of an SEC firm
The case for a Cybersecurity Expert on the Board of an SEC firmDavid Sweigert
 

What's hot (19)

Securing the Digital Future
Securing the Digital FutureSecuring the Digital Future
Securing the Digital Future
 
SANS WhatWorks - Compliance & DLP
SANS WhatWorks - Compliance & DLPSANS WhatWorks - Compliance & DLP
SANS WhatWorks - Compliance & DLP
 
Sharing the blame: How companies are collaborating on data security breaches
Sharing the blame: How companies are collaborating on data security breachesSharing the blame: How companies are collaborating on data security breaches
Sharing the blame: How companies are collaborating on data security breaches
 
Cognizant Making AI Real with Microsoft
Cognizant Making AI Real with MicrosoftCognizant Making AI Real with Microsoft
Cognizant Making AI Real with Microsoft
 
Material de apoyo Un replanteamiento masivo de la seguridad.
Material de apoyo Un replanteamiento masivo de la seguridad.Material de apoyo Un replanteamiento masivo de la seguridad.
Material de apoyo Un replanteamiento masivo de la seguridad.
 
STUDY: Website Vulnerability Assessment
STUDY: Website Vulnerability AssessmentSTUDY: Website Vulnerability Assessment
STUDY: Website Vulnerability Assessment
 
FRISS_Insurance fraud report 2020
FRISS_Insurance fraud report 2020 FRISS_Insurance fraud report 2020
FRISS_Insurance fraud report 2020
 
Digital Resilience flipbook
Digital Resilience flipbookDigital Resilience flipbook
Digital Resilience flipbook
 
Open Group Panel Explores Changing Field of Risk Management and Analysis in t...
Open Group Panel Explores Changing Field of Risk Management and Analysis in t...Open Group Panel Explores Changing Field of Risk Management and Analysis in t...
Open Group Panel Explores Changing Field of Risk Management and Analysis in t...
 
Insuring your future: Cybersecurity and the insurance industry
Insuring your future: Cybersecurity and the insurance industryInsuring your future: Cybersecurity and the insurance industry
Insuring your future: Cybersecurity and the insurance industry
 
Treat a Breach Like a Customer, Not a Compliance Issue
Treat a Breach Like a Customer, Not a Compliance IssueTreat a Breach Like a Customer, Not a Compliance Issue
Treat a Breach Like a Customer, Not a Compliance Issue
 
cybersecurity-in-the-c-suite-a-matt
cybersecurity-in-the-c-suite-a-mattcybersecurity-in-the-c-suite-a-matt
cybersecurity-in-the-c-suite-a-matt
 
Issue Paper Year Of The Breach Final 021706
Issue Paper Year Of The Breach Final 021706Issue Paper Year Of The Breach Final 021706
Issue Paper Year Of The Breach Final 021706
 
03 Malcolm Crompton
03 Malcolm Crompton03 Malcolm Crompton
03 Malcolm Crompton
 
2016-Black-Hat-Attendee-Survey
2016-Black-Hat-Attendee-Survey2016-Black-Hat-Attendee-Survey
2016-Black-Hat-Attendee-Survey
 
The Open Group July Conference Emphasizes Value of Placing Structure and Agil...
The Open Group July Conference Emphasizes Value of Placing Structure and Agil...The Open Group July Conference Emphasizes Value of Placing Structure and Agil...
The Open Group July Conference Emphasizes Value of Placing Structure and Agil...
 
200606_NWC_Strategic Security
200606_NWC_Strategic Security200606_NWC_Strategic Security
200606_NWC_Strategic Security
 
Cybersecurity the new metrics
Cybersecurity the new metricsCybersecurity the new metrics
Cybersecurity the new metrics
 
The case for a Cybersecurity Expert on the Board of an SEC firm
The case for a Cybersecurity Expert on the Board of an SEC firmThe case for a Cybersecurity Expert on the Board of an SEC firm
The case for a Cybersecurity Expert on the Board of an SEC firm
 

Similar to IAPP - Trust is Terrible Thing to Waste

Protecting the brand—cyber-attacks and the reputation of the enterprise
Protecting the brand—cyber-attacks and the reputation of the enterprise Protecting the brand—cyber-attacks and the reputation of the enterprise
Protecting the brand—cyber-attacks and the reputation of the enterprise The Economist Media Businesses
 
Data Security Regulatory Lansdcape
Data Security Regulatory LansdcapeData Security Regulatory Lansdcape
Data Security Regulatory LansdcapeBrian Bauer
 
Data Breaches: The Cost of Being Unprepared
Data Breaches: The Cost of Being UnpreparedData Breaches: The Cost of Being Unprepared
Data Breaches: The Cost of Being Unpreparedhaynormania
 
Powerpoint mack jackson
Powerpoint   mack jacksonPowerpoint   mack jackson
Powerpoint mack jacksonaiimnevada
 
Responding to a Company-Wide PII Data Breach
Responding to a Company-Wide PII Data BreachResponding to a Company-Wide PII Data Breach
Responding to a Company-Wide PII Data BreachCBIZ, Inc.
 
ZoomLens - Loveland, Subramanian -Tackling Info Risk
ZoomLens - Loveland, Subramanian -Tackling Info RiskZoomLens - Loveland, Subramanian -Tackling Info Risk
ZoomLens - Loveland, Subramanian -Tackling Info RiskJohn Loveland
 
11 19-2015 - iasaca membership conference - the state of security
11 19-2015 - iasaca membership conference - the state of security11 19-2015 - iasaca membership conference - the state of security
11 19-2015 - iasaca membership conference - the state of securityMatthew Pascucci
 
Gbl report risk-value_2018_us_uea_v1
Gbl report risk-value_2018_us_uea_v1Gbl report risk-value_2018_us_uea_v1
Gbl report risk-value_2018_us_uea_v1Paperjam_redaction
 
How close is your organization to being breached | Safe Security
How close is your organization to being breached | Safe SecurityHow close is your organization to being breached | Safe Security
How close is your organization to being breached | Safe SecurityRahul Tyagi
 
wp-analyzing-breaches-by-industry
wp-analyzing-breaches-by-industrywp-analyzing-breaches-by-industry
wp-analyzing-breaches-by-industryNumaan Huq
 
HBR - Zurich - FERMAZ - PRIMO Cyber Risks Report
HBR - Zurich - FERMAZ - PRIMO Cyber Risks ReportHBR - Zurich - FERMAZ - PRIMO Cyber Risks Report
HBR - Zurich - FERMAZ - PRIMO Cyber Risks ReportFERMA
 
Bug Bounties, Ransomware, and Other Cyber Hype for Legal Counsel
Bug Bounties, Ransomware, and Other Cyber Hype for Legal CounselBug Bounties, Ransomware, and Other Cyber Hype for Legal Counsel
Bug Bounties, Ransomware, and Other Cyber Hype for Legal CounselCasey Ellis
 
Bug Bounties, Ransomware, and Other Cyber Hype for Legal Counsel
Bug Bounties, Ransomware, and Other Cyber Hype for Legal CounselBug Bounties, Ransomware, and Other Cyber Hype for Legal Counsel
Bug Bounties, Ransomware, and Other Cyber Hype for Legal Counselbugcrowd
 
MCCA Global TEC Forum - Bug Bounties, Ransomware, and Other Cyber Hype for Le...
MCCA Global TEC Forum - Bug Bounties, Ransomware, and Other Cyber Hype for Le...MCCA Global TEC Forum - Bug Bounties, Ransomware, and Other Cyber Hype for Le...
MCCA Global TEC Forum - Bug Bounties, Ransomware, and Other Cyber Hype for Le...Casey Ellis
 
We are living in a world where cyber security is a top priority for .pdf
We are living in a world where cyber security is a top priority for .pdfWe are living in a world where cyber security is a top priority for .pdf
We are living in a world where cyber security is a top priority for .pdfgalagirishp
 
2015 cost of data breach study global analysis
2015 cost of data breach study global analysis2015 cost of data breach study global analysis
2015 cost of data breach study global analysisxband
 

Similar to IAPP - Trust is Terrible Thing to Waste (20)

Protecting the brand—cyber-attacks and the reputation of the enterprise
Protecting the brand—cyber-attacks and the reputation of the enterprise Protecting the brand—cyber-attacks and the reputation of the enterprise
Protecting the brand—cyber-attacks and the reputation of the enterprise
 
BEA Presentation
BEA PresentationBEA Presentation
BEA Presentation
 
Data Security Regulatory Lansdcape
Data Security Regulatory LansdcapeData Security Regulatory Lansdcape
Data Security Regulatory Lansdcape
 
Data Breaches: The Cost of Being Unprepared
Data Breaches: The Cost of Being UnpreparedData Breaches: The Cost of Being Unprepared
Data Breaches: The Cost of Being Unprepared
 
Powerpoint mack jackson
Powerpoint   mack jacksonPowerpoint   mack jackson
Powerpoint mack jackson
 
Responding to a Company-Wide PII Data Breach
Responding to a Company-Wide PII Data BreachResponding to a Company-Wide PII Data Breach
Responding to a Company-Wide PII Data Breach
 
ZoomLens - Loveland, Subramanian -Tackling Info Risk
ZoomLens - Loveland, Subramanian -Tackling Info RiskZoomLens - Loveland, Subramanian -Tackling Info Risk
ZoomLens - Loveland, Subramanian -Tackling Info Risk
 
Cybersecurity and liability your david willson
Cybersecurity and liability your   david willsonCybersecurity and liability your   david willson
Cybersecurity and liability your david willson
 
11 19-2015 - iasaca membership conference - the state of security
11 19-2015 - iasaca membership conference - the state of security11 19-2015 - iasaca membership conference - the state of security
11 19-2015 - iasaca membership conference - the state of security
 
Gbl report risk-value_2018_us_uea_v1
Gbl report risk-value_2018_us_uea_v1Gbl report risk-value_2018_us_uea_v1
Gbl report risk-value_2018_us_uea_v1
 
How close is your organization to being breached | Safe Security
How close is your organization to being breached | Safe SecurityHow close is your organization to being breached | Safe Security
How close is your organization to being breached | Safe Security
 
wp-analyzing-breaches-by-industry
wp-analyzing-breaches-by-industrywp-analyzing-breaches-by-industry
wp-analyzing-breaches-by-industry
 
HBR - Zurich - FERMAZ - PRIMO Cyber Risks Report
HBR - Zurich - FERMAZ - PRIMO Cyber Risks ReportHBR - Zurich - FERMAZ - PRIMO Cyber Risks Report
HBR - Zurich - FERMAZ - PRIMO Cyber Risks Report
 
Bug Bounties, Ransomware, and Other Cyber Hype for Legal Counsel
Bug Bounties, Ransomware, and Other Cyber Hype for Legal CounselBug Bounties, Ransomware, and Other Cyber Hype for Legal Counsel
Bug Bounties, Ransomware, and Other Cyber Hype for Legal Counsel
 
Bug Bounties, Ransomware, and Other Cyber Hype for Legal Counsel
Bug Bounties, Ransomware, and Other Cyber Hype for Legal CounselBug Bounties, Ransomware, and Other Cyber Hype for Legal Counsel
Bug Bounties, Ransomware, and Other Cyber Hype for Legal Counsel
 
MCCA Global TEC Forum - Bug Bounties, Ransomware, and Other Cyber Hype for Le...
MCCA Global TEC Forum - Bug Bounties, Ransomware, and Other Cyber Hype for Le...MCCA Global TEC Forum - Bug Bounties, Ransomware, and Other Cyber Hype for Le...
MCCA Global TEC Forum - Bug Bounties, Ransomware, and Other Cyber Hype for Le...
 
Accounting
AccountingAccounting
Accounting
 
We are living in a world where cyber security is a top priority for .pdf
We are living in a world where cyber security is a top priority for .pdfWe are living in a world where cyber security is a top priority for .pdf
We are living in a world where cyber security is a top priority for .pdf
 
2015 cost of data breach study
2015 cost of data breach study2015 cost of data breach study
2015 cost of data breach study
 
2015 cost of data breach study global analysis
2015 cost of data breach study global analysis2015 cost of data breach study global analysis
2015 cost of data breach study global analysis
 

Recently uploaded

8447779800, Low rate Call girls in Tughlakabad Delhi NCR
8447779800, Low rate Call girls in Tughlakabad Delhi NCR8447779800, Low rate Call girls in Tughlakabad Delhi NCR
8447779800, Low rate Call girls in Tughlakabad Delhi NCRashishs7044
 
APRIL2024_UKRAINE_xml_0000000000000 .pdf
APRIL2024_UKRAINE_xml_0000000000000 .pdfAPRIL2024_UKRAINE_xml_0000000000000 .pdf
APRIL2024_UKRAINE_xml_0000000000000 .pdfRbc Rbcua
 
FULL ENJOY Call girls in Paharganj Delhi | 8377087607
FULL ENJOY Call girls in Paharganj Delhi | 8377087607FULL ENJOY Call girls in Paharganj Delhi | 8377087607
FULL ENJOY Call girls in Paharganj Delhi | 8377087607dollysharma2066
 
Market Sizes Sample Report - 2024 Edition
Market Sizes Sample Report - 2024 EditionMarket Sizes Sample Report - 2024 Edition
Market Sizes Sample Report - 2024 EditionMintel Group
 
(Best) ENJOY Call Girls in Faridabad Ex | 8377087607
(Best) ENJOY Call Girls in Faridabad Ex | 8377087607(Best) ENJOY Call Girls in Faridabad Ex | 8377087607
(Best) ENJOY Call Girls in Faridabad Ex | 8377087607dollysharma2066
 
Flow Your Strategy at Flight Levels Day 2024
Flow Your Strategy at Flight Levels Day 2024Flow Your Strategy at Flight Levels Day 2024
Flow Your Strategy at Flight Levels Day 2024Kirill Klimov
 
8447779800, Low rate Call girls in New Ashok Nagar Delhi NCR
8447779800, Low rate Call girls in New Ashok Nagar Delhi NCR8447779800, Low rate Call girls in New Ashok Nagar Delhi NCR
8447779800, Low rate Call girls in New Ashok Nagar Delhi NCRashishs7044
 
Ten Organizational Design Models to align structure and operations to busines...
Ten Organizational Design Models to align structure and operations to busines...Ten Organizational Design Models to align structure and operations to busines...
Ten Organizational Design Models to align structure and operations to busines...Seta Wicaksana
 
Digital Transformation in the PLM domain - distrib.pdf
Digital Transformation in the PLM domain - distrib.pdfDigital Transformation in the PLM domain - distrib.pdf
Digital Transformation in the PLM domain - distrib.pdfJos Voskuil
 
BEST Call Girls In Greater Noida ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,
BEST Call Girls In Greater Noida ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,BEST Call Girls In Greater Noida ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,
BEST Call Girls In Greater Noida ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,noida100girls
 
Innovation Conference 5th March 2024.pdf
Innovation Conference 5th March 2024.pdfInnovation Conference 5th March 2024.pdf
Innovation Conference 5th March 2024.pdfrichard876048
 
Intro to BCG's Carbon Emissions Benchmark_vF.pdf
Intro to BCG's Carbon Emissions Benchmark_vF.pdfIntro to BCG's Carbon Emissions Benchmark_vF.pdf
Intro to BCG's Carbon Emissions Benchmark_vF.pdfpollardmorgan
 
Independent Call Girls Andheri Nightlaila 9967584737
Independent Call Girls Andheri Nightlaila 9967584737Independent Call Girls Andheri Nightlaila 9967584737
Independent Call Girls Andheri Nightlaila 9967584737Riya Pathan
 
Organizational Structure Running A Successful Business
Organizational Structure Running A Successful BusinessOrganizational Structure Running A Successful Business
Organizational Structure Running A Successful BusinessSeta Wicaksana
 
Keppel Ltd. 1Q 2024 Business Update Presentation Slides
Keppel Ltd. 1Q 2024 Business Update  Presentation SlidesKeppel Ltd. 1Q 2024 Business Update  Presentation Slides
Keppel Ltd. 1Q 2024 Business Update Presentation SlidesKeppelCorporation
 
8447779800, Low rate Call girls in Saket Delhi NCR
8447779800, Low rate Call girls in Saket Delhi NCR8447779800, Low rate Call girls in Saket Delhi NCR
8447779800, Low rate Call girls in Saket Delhi NCRashishs7044
 
International Business Environments and Operations 16th Global Edition test b...
International Business Environments and Operations 16th Global Edition test b...International Business Environments and Operations 16th Global Edition test b...
International Business Environments and Operations 16th Global Edition test b...ssuserf63bd7
 
Marketplace and Quality Assurance Presentation - Vincent Chirchir
Marketplace and Quality Assurance Presentation - Vincent ChirchirMarketplace and Quality Assurance Presentation - Vincent Chirchir
Marketplace and Quality Assurance Presentation - Vincent Chirchirictsugar
 
Islamabad Escorts | Call 03070433345 | Escort Service in Islamabad
Islamabad Escorts | Call 03070433345 | Escort Service in IslamabadIslamabad Escorts | Call 03070433345 | Escort Service in Islamabad
Islamabad Escorts | Call 03070433345 | Escort Service in IslamabadAyesha Khan
 

Recently uploaded (20)

8447779800, Low rate Call girls in Tughlakabad Delhi NCR
8447779800, Low rate Call girls in Tughlakabad Delhi NCR8447779800, Low rate Call girls in Tughlakabad Delhi NCR
8447779800, Low rate Call girls in Tughlakabad Delhi NCR
 
Corporate Profile 47Billion Information Technology
Corporate Profile 47Billion Information TechnologyCorporate Profile 47Billion Information Technology
Corporate Profile 47Billion Information Technology
 
APRIL2024_UKRAINE_xml_0000000000000 .pdf
APRIL2024_UKRAINE_xml_0000000000000 .pdfAPRIL2024_UKRAINE_xml_0000000000000 .pdf
APRIL2024_UKRAINE_xml_0000000000000 .pdf
 
FULL ENJOY Call girls in Paharganj Delhi | 8377087607
FULL ENJOY Call girls in Paharganj Delhi | 8377087607FULL ENJOY Call girls in Paharganj Delhi | 8377087607
FULL ENJOY Call girls in Paharganj Delhi | 8377087607
 
Market Sizes Sample Report - 2024 Edition
Market Sizes Sample Report - 2024 EditionMarket Sizes Sample Report - 2024 Edition
Market Sizes Sample Report - 2024 Edition
 
(Best) ENJOY Call Girls in Faridabad Ex | 8377087607
(Best) ENJOY Call Girls in Faridabad Ex | 8377087607(Best) ENJOY Call Girls in Faridabad Ex | 8377087607
(Best) ENJOY Call Girls in Faridabad Ex | 8377087607
 
Flow Your Strategy at Flight Levels Day 2024
Flow Your Strategy at Flight Levels Day 2024Flow Your Strategy at Flight Levels Day 2024
Flow Your Strategy at Flight Levels Day 2024
 
8447779800, Low rate Call girls in New Ashok Nagar Delhi NCR
8447779800, Low rate Call girls in New Ashok Nagar Delhi NCR8447779800, Low rate Call girls in New Ashok Nagar Delhi NCR
8447779800, Low rate Call girls in New Ashok Nagar Delhi NCR
 
Ten Organizational Design Models to align structure and operations to busines...
Ten Organizational Design Models to align structure and operations to busines...Ten Organizational Design Models to align structure and operations to busines...
Ten Organizational Design Models to align structure and operations to busines...
 
Digital Transformation in the PLM domain - distrib.pdf
Digital Transformation in the PLM domain - distrib.pdfDigital Transformation in the PLM domain - distrib.pdf
Digital Transformation in the PLM domain - distrib.pdf
 
BEST Call Girls In Greater Noida ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,
BEST Call Girls In Greater Noida ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,BEST Call Girls In Greater Noida ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,
BEST Call Girls In Greater Noida ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,
 
Innovation Conference 5th March 2024.pdf
Innovation Conference 5th March 2024.pdfInnovation Conference 5th March 2024.pdf
Innovation Conference 5th March 2024.pdf
 
Intro to BCG's Carbon Emissions Benchmark_vF.pdf
Intro to BCG's Carbon Emissions Benchmark_vF.pdfIntro to BCG's Carbon Emissions Benchmark_vF.pdf
Intro to BCG's Carbon Emissions Benchmark_vF.pdf
 
Independent Call Girls Andheri Nightlaila 9967584737
Independent Call Girls Andheri Nightlaila 9967584737Independent Call Girls Andheri Nightlaila 9967584737
Independent Call Girls Andheri Nightlaila 9967584737
 
Organizational Structure Running A Successful Business
Organizational Structure Running A Successful BusinessOrganizational Structure Running A Successful Business
Organizational Structure Running A Successful Business
 
Keppel Ltd. 1Q 2024 Business Update Presentation Slides
Keppel Ltd. 1Q 2024 Business Update  Presentation SlidesKeppel Ltd. 1Q 2024 Business Update  Presentation Slides
Keppel Ltd. 1Q 2024 Business Update Presentation Slides
 
8447779800, Low rate Call girls in Saket Delhi NCR
8447779800, Low rate Call girls in Saket Delhi NCR8447779800, Low rate Call girls in Saket Delhi NCR
8447779800, Low rate Call girls in Saket Delhi NCR
 
International Business Environments and Operations 16th Global Edition test b...
International Business Environments and Operations 16th Global Edition test b...International Business Environments and Operations 16th Global Edition test b...
International Business Environments and Operations 16th Global Edition test b...
 
Marketplace and Quality Assurance Presentation - Vincent Chirchir
Marketplace and Quality Assurance Presentation - Vincent ChirchirMarketplace and Quality Assurance Presentation - Vincent Chirchir
Marketplace and Quality Assurance Presentation - Vincent Chirchir
 
Islamabad Escorts | Call 03070433345 | Escort Service in Islamabad
Islamabad Escorts | Call 03070433345 | Escort Service in IslamabadIslamabad Escorts | Call 03070433345 | Escort Service in Islamabad
Islamabad Escorts | Call 03070433345 | Escort Service in Islamabad
 

IAPP - Trust is Terrible Thing to Waste

  • 1. Trust is a Terrible Thing to Waste How to Use Communications to Protect Reputation And Advance Privacy Objectives
  • 2.
  • 3.
  • 4. A formula for success Security + Privacy + Performance = Trust
  • 6. We spend a lot on security
  • 7. Businesses are substantially increasing their expenditure on security software, despite the economic slowdown. Gartner (2008)
  • 8. Finding #3. Yet far fewer executives are actually “cutting security back”. And among the half or less that are taking action, most are taking the least dramatic response. Global State of Information Security Survey (PwC, CIO & CSO Magazines 2010)
  • 9. We talk a lot about the money we spend.
  • 10. Google “IT security spending” and you get 47 million results. Bing it and you get 36 million results
  • 11. We spend a lot on product performance.
  • 12. Federal research & development totaled $150 billion in 2007.
  • 13. $225 billion in annual corporate research & development spending in the U.S. Business Roundtable 2010 CEO Survey
  • 14. About 200,000 new products introduced globally each year.
  • 15. We talk a lot about the money we spend.
  • 16. Bing “new product research and development” and you get 2.2 million results Google it and you get 73 million results
  • 17. We spend a lot on privacy.
  • 18. Significant investment in privacy Technology Compliance monitoring Data collection & handling procedures Training
  • 19. We DON’T talk a lot about the money we spend.
  • 20. We allow our story to be told by failures.
  • 21. Since 2005, the Privacy Rights Clearinghouse says that 350 million individual records have been breached.
  • 22. In the last year, according to the Identity Theft Resource Center, 6.3 million records were affected in 218 breaches.
  • 23. The business effect of misuse It costs $6.6 million on average when an organization suffers a data breach, and more than $200 per compromised record, according to a survey conducted by the Ponemon Institute.
  • 24. Just as with security and performance, we can get a return on our privacy investment.
  • 25. The nature of online privacy Control, not anonymity
  • 26.
  • 27. Consumer’s view We care greatly about privacy We don’t do much about it Pew, too
  • 28. This is the opening for communications More than managing risk More than damage control Adding an accelerant to the formula for success Security + Privacy + Performance = Trust
  • 29. Public value of the investment Communications is the key to unlocking a market return on the investment already made.
  • 30. The first question to ask is: Who are you?
  • 31. II. When Trust is Broken Joe Carberry, The MS&L Group
  • 32. What we’re talking about How should I respond if/when data is misused or stolen? Current Public Environment Managing Through Crisis Case Study Exercise
  • 34. What we’re up against…
  • 35.
  • 36. Hundreds of publicly reported breaches; many more not disclosed
  • 37. The number of breaches continues to increase year-over-year 
  • 38. Only 36% of C-suite confident they won’t suffer breach * 
  • 39. Cost of breach now $6.6 million *As more and more business is conducted and recorded via electronic means, risks related to data and privacy will increase.  *Ponemon Institute
  • 40. The Point? Data misuse/theft not question of “if” but “when” Crises often happen in full view, in real time – with significant impact More at risk in a data breach than just data
  • 41. Bottom Line “A promise must never be broken.” - Alexander Hamilton
  • 42. Managing a Breach of Trust
  • 43. What Makes a Crisis? Can be triggered by various kinds of events: Operational failures Malfeasance Human error Natural disasters Business set-backs Competitor or third-party attacks An issue becomes a “crisis” when the organization’s business prospects are threatened in the eyes of its stakeholders You do not define “crisis” – someone else does Crisis rule #1: somebody always find out. Always.
  • 44. A Crisis Subtracts Value Crises undermine stakeholder confidence in an organization: Short- and long-term growth potential Sustainable return on capital Quality (focus) of management Ability to manage risk to the business Source: Adapted from McKinsey
  • 45. Managing Risk Legal Risk Patchwork quilt of state and federal regulations Litigation exposure Protection: Sound legal counsel Operational Risk Validate and comply with industry standards (i.e., PCI DSS) Work with appropriate vendors, technology Protection: Ongoing diligence, best practices Reputational Risk Reputation impacts business (customers, employees, suppliers, investors, etc.)  Reputational risk often overlooked  Protection: Preparation, established crisis protocols *Ponemon Institute ** Harris Interactive Poll
  • 46. Who Cares? 43 Customers SalesChannel Investors Organization Supply Chain Policymakers Local Community Employees On which stakeholders do you rely for success? What do they think?
  • 47. What Can You Do? Be Prepared Success proportionate preparation  Activate crisis response at first sign of exposure Move Quickly   Early and honest communication Someone else shaping news robs you of control Take Action  Work to resolve underlying issue  People perceive data as “theirs”, not the company’s  -- demonstrate stewardship Individual should remain the “north star”  Be Responsible  Facing fear and suspicion – respond with transparency and responsibility Consumers will forgive mistakes, but failure to act responsibly.
  • 48. Keep in Mind Taking Responsibility is not the same as Taking the Blame
  • 49. The Message What stakeholders generally want to hear: You’ve stopped the bleeding Make sure the problem is no longer occurring. You’re making amendsTake steps to address the impact among affected parties (not the same as admitting guilt). It’ll never happen againTake steps to ensure similar issues don’t happen in the future.
  • 51.
  • 55.
  • 56. Assemble a Crisis Response Team
  • 57. Put in place tracking toolsObjective: Assessment & Strategy
  • 58.
  • 60. Disseminate info to stakeholders quickly, frequently
  • 62. Manage digital impact – address contagionObjective: Take Control
  • 63.
  • 64. Plan for additional challenges
  • 69.
  • 70. Explore business changes related to situation
  • 71. Examine tactics to rebuild reputation
  • 72. Conduct debrief; identify areas for improvementObjective: Rebuild
  • 74. The Environment Trust of large corporations is low Security is pervasive issue in news media Lots of online chatter about data breaches Half of consumers cite privacy/security as a top concern Legislators eager to protect consumers
  • 75. The Situation XYZ.Com is a major online retailer The company has experienced a data breach Tens of millions of accounts; three years Payment information stored in violation of PCI standards Customers’ names, card numbers and expiry dates involved Forensic investigation underway; external auditors US Secret Service investigating Card companies are aware; spotting fraud patterns
  • 76. Financial Institutions Suppliers Customers XYZ Online Community Policymakers Stakeholders Employees Shareholders Law Enforcement
  • 77. Your Challenge Competing stakeholder needs US Secret Service requesting delay in public disclosure Financial institutions want all available information, ASAP Federal legislators have called for immediate disclosure of all breaches Polling data show consumers want disclosure, but less likely to do business with breached organization 30 state statutes require immediate disclosure to impacted consumers High risk associated with disclosure Potential for brand damage with disclosure Litigation risk of disclosing Broad consumer disclosure drives customer services costs – at XYZ and associated parties (banks)
  • 78. The Wall Street Journal calls; they have the story... What do you do?
  • 79.
  • 80. Your Response Who is involved? Who is most impacted? Who should be at the table internally? What do you do first? Do you disclose publicly? When and how? What should you say? What business changes do you recommend to management? What can you do to restore trust?
  • 81. Remember… Misuse/theft of data creates risk Breach reduces trust Lower trust impacts brand/reputation Tarnished brand/reputation harms business Crisis response should be well planned, aligned  This is not about “spin”
  • 82. Rahm Emanuel… “You don’t ever want a crisis to go to waste.”
  • 84. BREAK
  • 85. III. Making Your Case Rosetta Jones, Visa Inc.
  • 86.
  • 87. What is Visa? What We Are What We Are Not Global payments technology company Transaction-processing network that connects cardholders, merchants and financial institutions Credit card issuer Lender Exposed to consumer credit risk Payments technology company that helps power the global economy.
  • 88. Statistical Overview Visa Inc. is the world’s largest retail electronic payments network, with more than $4.4 trillion transacted on our payment products over the four quarters ended Dec. 31, 2009. Total Volume* * Visa Cards 1.8B 16,100 1.6M ATMs*** Financial Institution Customers Visa Inc. Operates the world’s largest retail electronic payments network* $2.8T $4.4T Payments Volume Total Transactions**** Statistical data in U.S. dollars; ATMs, financial institutions and cards based on four quarters ended Sept. 30, 2009. Excludes Visa Europe, unless otherwise noted *Based on payments volume, total volume, number of transactions and number of cards in circulation. Figures are rounded. ** Includes payments and cash transactions. *** As reported by client financial institutions and therefore may be subject to change; includes merchant outlets and ATMs in the Visa Europe territory. **** Includes payments and cash transactions. 62B Visa Confidential
  • 89. Payment Security = Data Privacy Cash Perceived Safest at POS Privacy/no personal information cited as leading reason Even those very comfortable with emerging technology only give mobile phones a score of 4.2. I’m going to read you some ways you can pay for things at a store and please tell me how safe you think each form of payment is on a scale from 1 to 10 where 1 is not at all safe and 10 is very safe… 69
  • 93. Integrating Security…. Corporate Social Responsibility
  • 94. Debit Breach Response Visa debit is fastest growing product An integrated response program that included advertising, PR, pre and post campaign tracking, and data analysis “Security breaks could curtail debit card use….” March 13, 2006
  • 95. Security is Visa Asset By a large margin more cardholders view Visa as a part of the solution on the issue of fraud than believe it is part of the problem. Visa Job Approval Total Approve Total Disapprove Strongly Approve Net Approve Thinking specifically about Visa, from the same list of issues please tell me whether you approve or disapprove of the job Visa is doing to handle that issue… Highlighted Data Slides 75
  • 96. Top 109 List 1 Listen. Ask questions of key internal influencers about fears, opportunities, internal product development. Get smart. Know who’s saying what about you outside the company and the vulnerabilities inside the company. Start with the bottom-line; demonstrate growth opportunity or barrier to growth that can/should be addressed. Use reason, not passion. Only the emotion will be heard. Be the voice of the customer. Make it objective -- DATA, DATA, DATA. Bring the company along. Use the experience of the dead bodies that have forged the privacy path before you. All else fails, fear works 2 3 4 5 6 7 8 9
  • 97. IV. BUILDING TRUST Dave Steer, Common Sense Media
  • 98. What we’re talking about How do I market trust and privacy? Why privacy is important to marketers What you can do to make trust and privacy a differentiator
  • 99. Why is trust so important?
  • 100. First, a question… WHAT ARE THEY DOING TO BE MOST TRUSTED IN PRIVACY? Source: TRUSTe/Ponemon 2009
  • 101. Sometimes there is tension between marketing and privacy people “I just want to be able to better target our message to the right consumer” “This will make for a better customer experience since they’ll only see what’s important to them” “Telling them about our policies is a distraction. It should be about our product benefits.”
  • 102. But trust is vital for marketers. Trust = Brand Advantage Privacy creates an opportunity for a trusted relationship with consumers which enables companies to differentiate their brands
  • 103. “The Great Trust Offensive” “…trust is the number one driver of any brand at the most fundamental level. We buy what we trust and keep buying; familiarity and trust are big, big drivers of loyalty and brand value.” Andy Bates, CEO, Interbrand
  • 104. But with privacy, it’s complicated
  • 105. Which is why most companies play defense “I can’t help noticing that more and more technology companies are exposing people’s information publicly and then backpedaling a few weeks out.” danahboyd, Harvard Berkman Center
  • 106. Building trust
  • 107. Brands focus on building credibility The Credibility Lifecycle Source: Stanford, B.J. Fogg, 2002
  • 108. A ‘trust lens’ of messaging & programs Reassurance: Show the protections that are in place, the company, what others say, etc. Education: Enable people to protect themselves, show what you are doing Support: ‘Being there’ when something goes wrong. Source: Stanford, B.J. Fogg, 2002
  • 109. So, how can you build trust?
  • 110. 1. LISTEN TO your customers and embrace two-way communication The proposed Facebook privacy policy received thousands of comments
  • 111. 2. Have a clear, compelling message Start by answering these questions… Who is the target audience? What is your single key message? What is the benefit of your privacy program? Why should they care? What are the barriers to them understanding your message The toughest part is balancing simplicity with transparency
  • 112. 3. BUILD privacy messaging into the EXPERIENCE A typical customer experience What privacy questions will they ask? When will they ask? How can you reassure, support, and educate?
  • 113. 4. Educate, educate, educate About safe, responsible BEHAVIOR About safe uses of your PRODUCT
  • 114. 4. Safe, responsible behaviors…
  • 116. 5. Tell people what you’re doing to protect them
  • 117. Summing it up Listen to your customers – and embrace 2-way communication Develop a clear, compelling message Build privacy messaging and support into the brand experience Educate, educate, educate Tell them how you are protecting them
  • 118. Remember Trust = Brand Advantage Privacy creates an opportunity for a trusted relationship with consumers which enables companies to differentiate their brands
  • 119. V. Putting it all together John Berard, Credible Context
  • 120. Bringing it all together Security + Privacy + Performance = Trust Trust = Brand Advantage
  • 122.
  • 123.

Editor's Notes

  1. 5 MINS
  2. 15 MINS
  3. 15 MINS