This document discusses social media infiltration in enterprises. It begins by defining social media and highlighting its widespread adoption, with billions of users on Facebook, Twitter and LinkedIn. The presenter argues that enterprises must embrace social media as that is where customers and prospects are increasingly engaging. Both opportunities and risks of social media for businesses are covered. The presentation emphasizes establishing social media policies and strategies to manage risks and prevent potential disasters, while leveraging benefits like improved collaboration and marketing reach. It concludes by arguing that doing nothing is not an option for enterprises, and a formal approach is needed to mitigate new security risks introduced by social media.
This presentation describes how you can use social technologies to transform key business processes, but also required governance to reduce risks. For more information www.aiim.org
Ibm Swg Social Media Marketing Delphine Remy Boutang 3rd Marchguestca2060b
Social Networking and the Employment Relationship
One-day conference: 3rd March 2010, Central London
· How you use social media – your internal social media network
· The benefits of social media
· Key learnings: What has gone wrong? How have you rectified the problems?
· How do you monitor employee use of social media?
· Your policy/guidelines – discussion and how are these enforced?
IBM Case Study: "Guiding Your Organization Through The Social Media Landscape”
- IBM Social engagement strategy
- how we have addressed social media governance from both an internal and external perspective at IBM.
-insights on IBM’s social computing guidelines
- Education on how IBMers can successfully leverage social technologies for improved business results.
- Best practices example
The world is constantly changing at a rapid pace. The impact of these global changes are impacting all facets of the workplace. People, technology and infrastructure are organically changing. Changes include how we communicate, the design of our physical office spaces, where we decide to work from, business tools, technology, social media technology, organizational structure and hierarchy, work/life blending, role of job satisfaction, information access and the generational make-up of our workforces. How organizations manage these interconnected workplace changes will impact their ability to engage their employees.
The key drivers of employee engagement are, always knowing what employees are thinking, intentional creation of a desired culture, recognition and value, open and transparent communication + strong leadership, career pathing and opportunities, social good and positive and real employer branding.
Changing workplaces require a change in how we conduct our day-to-day business. Social Technology is how we successfully and effectively deal with these changes. Social collaboration, social learning, social recognition, access to real-time and useful data, social recruitment and strategic employer branding. Integration of the right social technology tools will positively impact employee engagement. People are social beings, and social technology allows, enables and promotes people to be social in the workplace.
This presentation was delivered on Friday, January 10, 2014 to the delegates who competed at the 9th Annual Organizational Behaviour Case Competition at Ryerson University in Toronto. 10 Canadian business schools attended and competed. This session was meant to inspire, educate and help delegates infuse creative ideas in their presentations the following day.
Leveraging social media in employee engagementParker LePla
Social media tools have added more visibility to your brand, providing a channel for anyone’s unique thoughts, opinions and experiences to be distributed to the world almost instantaneously. Given this new reality, what do you do? Do you become the online police of your brand? Instead, let's consider a different approach.
Enabling Business with Social Media Tools at CiscoAyelet Baron
There is a lot of hype about social media right now, which has created some confusion around when to strategically use it. The key is to realize that for any organization, social media is another channel to drive trusted relationships and community interactions. It’s important for any organization to have a plan that maps out their overall journey through a vision, strategy and an executable roadmap.
Using Social Media to Drive Employee Engagement Michael Specht
Enterprise 2.0 uses social media tools internally to drive employee engagement. It focuses on collaboration, transparency, trust and authenticity to make employees feel more valued through involvement in decision making and an open sharing of ideas. While implementation faces challenges like cultural barriers, examples show benefits like reduced turnover and improved customer service. The key is applying social media principles strategically for business outcomes rather than just the tools.
This document discusses how some B2B companies have successfully used social media. It provides examples of how SAP created an online community of over 3 million customers and partners to crowdsource ideas and support. It also discusses how ShipServ implemented social media to increase sales leads 400% and lower marketing costs 80% by creating an industry forum. Finally, it discusses how Dell embraced social media by launching IdeaStorm to collect over 400 product ideas, and trained 24,000 employees to engage on social media. The document advocates that social media can significantly change how businesses interact with their supply chain and customers when implemented systematically rather than randomly.
Making the Quantum Leap: UPS Social Media Recruitment ROI 2012MikeVangel
UPS adapted its recruitment strategies to reach passive job candidates on social media. It launched UPSjobs pages on Facebook and Twitter in 2007-2009 that grew organically without paid promotion. Videos of UPS employees went viral, driving over 1.5 million views in 2009. By 2011, UPS saw a 328% increase in applicant flow from social media compared to 2010. It expanded its presence on LinkedIn, launched a mobile-friendly site, and saw strong engagement across platforms. Social media recruitment required ongoing resources but provided a measurable return on investment.
This presentation describes how you can use social technologies to transform key business processes, but also required governance to reduce risks. For more information www.aiim.org
Ibm Swg Social Media Marketing Delphine Remy Boutang 3rd Marchguestca2060b
Social Networking and the Employment Relationship
One-day conference: 3rd March 2010, Central London
· How you use social media – your internal social media network
· The benefits of social media
· Key learnings: What has gone wrong? How have you rectified the problems?
· How do you monitor employee use of social media?
· Your policy/guidelines – discussion and how are these enforced?
IBM Case Study: "Guiding Your Organization Through The Social Media Landscape”
- IBM Social engagement strategy
- how we have addressed social media governance from both an internal and external perspective at IBM.
-insights on IBM’s social computing guidelines
- Education on how IBMers can successfully leverage social technologies for improved business results.
- Best practices example
The world is constantly changing at a rapid pace. The impact of these global changes are impacting all facets of the workplace. People, technology and infrastructure are organically changing. Changes include how we communicate, the design of our physical office spaces, where we decide to work from, business tools, technology, social media technology, organizational structure and hierarchy, work/life blending, role of job satisfaction, information access and the generational make-up of our workforces. How organizations manage these interconnected workplace changes will impact their ability to engage their employees.
The key drivers of employee engagement are, always knowing what employees are thinking, intentional creation of a desired culture, recognition and value, open and transparent communication + strong leadership, career pathing and opportunities, social good and positive and real employer branding.
Changing workplaces require a change in how we conduct our day-to-day business. Social Technology is how we successfully and effectively deal with these changes. Social collaboration, social learning, social recognition, access to real-time and useful data, social recruitment and strategic employer branding. Integration of the right social technology tools will positively impact employee engagement. People are social beings, and social technology allows, enables and promotes people to be social in the workplace.
This presentation was delivered on Friday, January 10, 2014 to the delegates who competed at the 9th Annual Organizational Behaviour Case Competition at Ryerson University in Toronto. 10 Canadian business schools attended and competed. This session was meant to inspire, educate and help delegates infuse creative ideas in their presentations the following day.
Leveraging social media in employee engagementParker LePla
Social media tools have added more visibility to your brand, providing a channel for anyone’s unique thoughts, opinions and experiences to be distributed to the world almost instantaneously. Given this new reality, what do you do? Do you become the online police of your brand? Instead, let's consider a different approach.
Enabling Business with Social Media Tools at CiscoAyelet Baron
There is a lot of hype about social media right now, which has created some confusion around when to strategically use it. The key is to realize that for any organization, social media is another channel to drive trusted relationships and community interactions. It’s important for any organization to have a plan that maps out their overall journey through a vision, strategy and an executable roadmap.
Using Social Media to Drive Employee Engagement Michael Specht
Enterprise 2.0 uses social media tools internally to drive employee engagement. It focuses on collaboration, transparency, trust and authenticity to make employees feel more valued through involvement in decision making and an open sharing of ideas. While implementation faces challenges like cultural barriers, examples show benefits like reduced turnover and improved customer service. The key is applying social media principles strategically for business outcomes rather than just the tools.
This document discusses how some B2B companies have successfully used social media. It provides examples of how SAP created an online community of over 3 million customers and partners to crowdsource ideas and support. It also discusses how ShipServ implemented social media to increase sales leads 400% and lower marketing costs 80% by creating an industry forum. Finally, it discusses how Dell embraced social media by launching IdeaStorm to collect over 400 product ideas, and trained 24,000 employees to engage on social media. The document advocates that social media can significantly change how businesses interact with their supply chain and customers when implemented systematically rather than randomly.
Making the Quantum Leap: UPS Social Media Recruitment ROI 2012MikeVangel
UPS adapted its recruitment strategies to reach passive job candidates on social media. It launched UPSjobs pages on Facebook and Twitter in 2007-2009 that grew organically without paid promotion. Videos of UPS employees went viral, driving over 1.5 million views in 2009. By 2011, UPS saw a 328% increase in applicant flow from social media compared to 2010. It expanded its presence on LinkedIn, launched a mobile-friendly site, and saw strong engagement across platforms. Social media recruitment required ongoing resources but provided a measurable return on investment.
Death of the Newspaper Industy: Bad News for YouTaleo Research
This is a session I did at Training 2012. The key argument in this presentation is that there are key parallels between newspaper reporters and learning professionals and that in order to avoid a similar fate, we need to rethink our roles and soon. The key shift is from instructional conduit to platform and strategy design.
Lance Haun presented on social networking tools and their use. He discussed major platforms like blogs, YouTube, Facebook, Twitter, and LinkedIn. He noted both hype around social networking claiming it can solve everything versus facts about reasonable employee use and companies finding success. Haun shared his personal experience blogging and using social networks. He provided advice on getting engaged, including reading regularly, sharing, commenting, creating content, and networking both online and offline.
Increasing Employee Engagement using Social MediaVirtual EyeSee
"29 percent of employees are engaged, 54 percent are not engaged and 17 percent are actively disengaged”
An engaged employee has the same attitude, drive, passion and belief as the head of the organization
Social media can shorten the gap between the leaders of organizations and employees
The document discusses the rise of social media and its impact. Some key points include:
- Social media usage has grown significantly, with billions of thoughts shared online daily through photos, videos, reviews and more.
- Younger generations especially trust peer recommendations from social networks more than traditional media.
- For organizations, embracing social media is important to engage communities and remain relevant, as these tools will continue growing in importance.
Spcial Networking Part I. "Differentiate Yourself on Social Networks"Wise Career Move LLC
Pros Communities Viewletter - Process on how to be effective on Social Networking by developing your own unique offering and differentiating yourself on Social Networks.
How Collaboration Can Change the World: Getting Networked in the Networking Age Ayelet Baron
The document discusses how collaboration and social media can change the world by connecting people online. It provides examples of how social media has grown exponentially in recent years and how people now trust recommendations from strangers online. The presentation argues that social media allows for more equitable participation and can help create opportunities for remote communities. It calls on the audience to consider how they can leverage social media to achieve their goals and define success.
Organizations successfully leveraging social media are seeing benefits for sales, marketing, and customer service. Yet most organizations are struggling to define a business strategy that makes the most of these opportunities. This storyboard will help you:
* Identify achievable social media opportunities
* Evaluate the risks of social media versus the benefits
* Understand IT’s role in the deployment and maintenance of a social media project
Social media continues to grow at a breakneck pace, and businesses need to get on board or they will be left behind. This storyboard, complete with real-world case studies of social media at work, will help you build a foundation for the successful integration of social media into your CRM strategy.
Getting Started with Enterprise Social NetworkingDavid Stephens
This presentation is to introduce social software and social networking. It includes a demo of Lotus Connections and some information on how to get started quickly with a Lotus Connections deployment.
In this slide, first we understand what social media is and what applications that are viewed as social media tools and services.
Then, we learn about how social media can be used for business and the success stories of the businesses that have used social media.
Next, we look at the implication of the technology that needs to be developed in order to support social media data creation, edition, and search.
We also look at how social media changes the way we live in society. Like any other technologies, social media also has side effects which we will discuss some of those.
Social Media: Should We, Should We Not, or Should We Ignore the Whole ThingJim Cahill
Jim Cahill discusses the debate around social media use for businesses. He argues that companies should use social media to connect with customers and demonstrate their expertise. Cahill outlines Emerson's social media strategy of using blogs, Twitter, Facebook and LinkedIn to promote thought leadership, build communities around their brands, and increase their search engine visibility in order to drive more business opportunities. While social media requires resources and comes with legal risks, Cahill believes the ability to connect directly with potential customers outweighs these challenges.
The slides of a talk I gave for the Australian Metals & Mining Association in May 2010. Looking at home social media/enterprise 2.0 can help drive an engaged workforce.
1. The document discusses the growing adoption of Web 2.0 technologies by enterprises for both internal collaboration and external customer engagement.
2. It provides statistics on the use of blogs, wikis, instant messaging and other Web 2.0 tools by employees and discusses how companies are using these technologies.
3. The trends indicate companies will increasingly use social media and Web 2.0 technologies to engage customers as younger digital native employees and consumers demand more participation and sharing.
Social Media for Sustainable Business [Fall 2010 Refresh]Earthsite
[UPDATED with extensive 'applications' section and new 'trends' information]
Social media has changed marketing and sustainable business is perfectly positioned to leverage this technology.
This is a presentation given to the Presidio MBA program by JoeyShepp.com, new media maven. It covers social media trends, principles, case studies, and how-to topics.
Twitter @JoeyShepp your question about new media and sustainability.
1. Social networks are becoming powerful hubs that connect both people and brands. There is huge demand for more social and interactive relationships between consumers and brands.
2. Nearly half of internet users have already joined a brand community. These communities clearly benefit brands by driving loyalty, endorsements, and sales.
3. Understanding consumer needs, motives, and the nature of social demand for each market is key to creating a successful social media experience for brands. The changing social media landscape requires a deeper understanding of these dynamics.
Many hurdles traditionally stood in the way of CEOs’ entry into the world of social media. Top barriers cited in prior Weber
Shandwick research on “unsocial” CEOs in 2013 included: social media usage by CEOs was unusual for the industry or region,
there was no proof that it returns value, there was no demand, and it was too risky. Interestingly, barriers such as legal
obstruction and industry regulation were infrequently raised (The Social CEO: Executives Tell All, Weber Shandwick and KRC
Research). Much to their credit, CEOs are overcoming these challenges and, to a growing degree, embracing the opportunities
that come from being social.
Operating in an increasingly connected and transparent digital world where the general public is acutely attuned to what CEOs
say and do, executives see online engagement as a prime opportunity for their chief executives to share their companies’
stories and elevate the reputation of their companies. With eight in 10 global executives reporting that it is important for
CEOs to have a visible public profile for a company to be highly regarded, online channels and social media become one set of
tools for CEOs to increase their external equity. And doing so comes with reputational rewards: highly regarded companies
are more than three times as likely as those with weak reputations to have a CEO who participates in social media. (The CEO
Reputation Premium: Gaining Advantage in the Engagement Era, Weber Shandwick and KRC Research.)
The document discusses strategies for using social media in recruiting. It recommends discussing what social media is, choosing sites that fit organizational goals like Facebook, Twitter and LinkedIn, customizing programs to reach candidates, and maintaining programs over time. It provides statistics on popular sites, how recruiters use each site, and case studies of companies using social media successfully to engage candidates and reduce turnover.
The document provides information about the DirectEmployers Association, a non-profit organization comprised of over 650 member companies. It details the association's history and role in pioneering online recruitment in the 1990s. The association aims to provide cost-effective recruitment solutions and reach a diverse global talent pool for its members. It is a leader in recruitment technology and compliance with OFCCP regulations.
Measuring Value Of New Media Channels While Combining Them With Traditional C...Shael Sharma
4th Annual Corporate Communications ForumBombay 14-15 May’09:
Measuring Value Of New Media Channels While Combining Them With Traditional Channels To Manage Reputation In A Digitally Connected World
Exploring DDoS Attacks: Impact to Community Financial InstitutionsJay McLaughlin
DDoS attacks have catapulted to the forefront of banking security news after the industry experienced a series of multi-phased attacks beginning back in September of 2012. Hackers launch DDoS attacks prompted by one of two common motives. Protest attacks, like OpUSA, target large, high-profile banks and are often launched for social or political purposes. Attacks on community banks are usually used to as a distraction in conjunction with account takeover attacks. This event is designed to strengthen the awareness and defenses of participants. Jay McLaughlin, this session's presenter, fights cybercrime aimed at financial institutions on a daily basis as Q2ebanking's Chief Security Officer. Jay will break down conceptual and technical aspects of DDoS attack types, clarify the differing attacker motives, and discuss how community banks can build a layered security model to prevent DDoS attacks.
National Shipbuilding Procurement Strategy: Economic Impact, Nova ScotiaShipsStartHere.ca
Infographic: Building Canada’s next generation of naval vessels at Irving Shipbuilding’s Halifax Shipyard is
a once-in-a-generation opportunity to secure thousands of long-term jobs, bolster Nova Scotia’s
economy for a quarter-of-a-century and provide substantial economic benefits across Canada.
If Halifax Wins, Everyone Wins.
Death of the Newspaper Industy: Bad News for YouTaleo Research
This is a session I did at Training 2012. The key argument in this presentation is that there are key parallels between newspaper reporters and learning professionals and that in order to avoid a similar fate, we need to rethink our roles and soon. The key shift is from instructional conduit to platform and strategy design.
Lance Haun presented on social networking tools and their use. He discussed major platforms like blogs, YouTube, Facebook, Twitter, and LinkedIn. He noted both hype around social networking claiming it can solve everything versus facts about reasonable employee use and companies finding success. Haun shared his personal experience blogging and using social networks. He provided advice on getting engaged, including reading regularly, sharing, commenting, creating content, and networking both online and offline.
Increasing Employee Engagement using Social MediaVirtual EyeSee
"29 percent of employees are engaged, 54 percent are not engaged and 17 percent are actively disengaged”
An engaged employee has the same attitude, drive, passion and belief as the head of the organization
Social media can shorten the gap between the leaders of organizations and employees
The document discusses the rise of social media and its impact. Some key points include:
- Social media usage has grown significantly, with billions of thoughts shared online daily through photos, videos, reviews and more.
- Younger generations especially trust peer recommendations from social networks more than traditional media.
- For organizations, embracing social media is important to engage communities and remain relevant, as these tools will continue growing in importance.
Spcial Networking Part I. "Differentiate Yourself on Social Networks"Wise Career Move LLC
Pros Communities Viewletter - Process on how to be effective on Social Networking by developing your own unique offering and differentiating yourself on Social Networks.
How Collaboration Can Change the World: Getting Networked in the Networking Age Ayelet Baron
The document discusses how collaboration and social media can change the world by connecting people online. It provides examples of how social media has grown exponentially in recent years and how people now trust recommendations from strangers online. The presentation argues that social media allows for more equitable participation and can help create opportunities for remote communities. It calls on the audience to consider how they can leverage social media to achieve their goals and define success.
Organizations successfully leveraging social media are seeing benefits for sales, marketing, and customer service. Yet most organizations are struggling to define a business strategy that makes the most of these opportunities. This storyboard will help you:
* Identify achievable social media opportunities
* Evaluate the risks of social media versus the benefits
* Understand IT’s role in the deployment and maintenance of a social media project
Social media continues to grow at a breakneck pace, and businesses need to get on board or they will be left behind. This storyboard, complete with real-world case studies of social media at work, will help you build a foundation for the successful integration of social media into your CRM strategy.
Getting Started with Enterprise Social NetworkingDavid Stephens
This presentation is to introduce social software and social networking. It includes a demo of Lotus Connections and some information on how to get started quickly with a Lotus Connections deployment.
In this slide, first we understand what social media is and what applications that are viewed as social media tools and services.
Then, we learn about how social media can be used for business and the success stories of the businesses that have used social media.
Next, we look at the implication of the technology that needs to be developed in order to support social media data creation, edition, and search.
We also look at how social media changes the way we live in society. Like any other technologies, social media also has side effects which we will discuss some of those.
Social Media: Should We, Should We Not, or Should We Ignore the Whole ThingJim Cahill
Jim Cahill discusses the debate around social media use for businesses. He argues that companies should use social media to connect with customers and demonstrate their expertise. Cahill outlines Emerson's social media strategy of using blogs, Twitter, Facebook and LinkedIn to promote thought leadership, build communities around their brands, and increase their search engine visibility in order to drive more business opportunities. While social media requires resources and comes with legal risks, Cahill believes the ability to connect directly with potential customers outweighs these challenges.
The slides of a talk I gave for the Australian Metals & Mining Association in May 2010. Looking at home social media/enterprise 2.0 can help drive an engaged workforce.
1. The document discusses the growing adoption of Web 2.0 technologies by enterprises for both internal collaboration and external customer engagement.
2. It provides statistics on the use of blogs, wikis, instant messaging and other Web 2.0 tools by employees and discusses how companies are using these technologies.
3. The trends indicate companies will increasingly use social media and Web 2.0 technologies to engage customers as younger digital native employees and consumers demand more participation and sharing.
Social Media for Sustainable Business [Fall 2010 Refresh]Earthsite
[UPDATED with extensive 'applications' section and new 'trends' information]
Social media has changed marketing and sustainable business is perfectly positioned to leverage this technology.
This is a presentation given to the Presidio MBA program by JoeyShepp.com, new media maven. It covers social media trends, principles, case studies, and how-to topics.
Twitter @JoeyShepp your question about new media and sustainability.
1. Social networks are becoming powerful hubs that connect both people and brands. There is huge demand for more social and interactive relationships between consumers and brands.
2. Nearly half of internet users have already joined a brand community. These communities clearly benefit brands by driving loyalty, endorsements, and sales.
3. Understanding consumer needs, motives, and the nature of social demand for each market is key to creating a successful social media experience for brands. The changing social media landscape requires a deeper understanding of these dynamics.
Many hurdles traditionally stood in the way of CEOs’ entry into the world of social media. Top barriers cited in prior Weber
Shandwick research on “unsocial” CEOs in 2013 included: social media usage by CEOs was unusual for the industry or region,
there was no proof that it returns value, there was no demand, and it was too risky. Interestingly, barriers such as legal
obstruction and industry regulation were infrequently raised (The Social CEO: Executives Tell All, Weber Shandwick and KRC
Research). Much to their credit, CEOs are overcoming these challenges and, to a growing degree, embracing the opportunities
that come from being social.
Operating in an increasingly connected and transparent digital world where the general public is acutely attuned to what CEOs
say and do, executives see online engagement as a prime opportunity for their chief executives to share their companies’
stories and elevate the reputation of their companies. With eight in 10 global executives reporting that it is important for
CEOs to have a visible public profile for a company to be highly regarded, online channels and social media become one set of
tools for CEOs to increase their external equity. And doing so comes with reputational rewards: highly regarded companies
are more than three times as likely as those with weak reputations to have a CEO who participates in social media. (The CEO
Reputation Premium: Gaining Advantage in the Engagement Era, Weber Shandwick and KRC Research.)
The document discusses strategies for using social media in recruiting. It recommends discussing what social media is, choosing sites that fit organizational goals like Facebook, Twitter and LinkedIn, customizing programs to reach candidates, and maintaining programs over time. It provides statistics on popular sites, how recruiters use each site, and case studies of companies using social media successfully to engage candidates and reduce turnover.
The document provides information about the DirectEmployers Association, a non-profit organization comprised of over 650 member companies. It details the association's history and role in pioneering online recruitment in the 1990s. The association aims to provide cost-effective recruitment solutions and reach a diverse global talent pool for its members. It is a leader in recruitment technology and compliance with OFCCP regulations.
Measuring Value Of New Media Channels While Combining Them With Traditional C...Shael Sharma
4th Annual Corporate Communications ForumBombay 14-15 May’09:
Measuring Value Of New Media Channels While Combining Them With Traditional Channels To Manage Reputation In A Digitally Connected World
Exploring DDoS Attacks: Impact to Community Financial InstitutionsJay McLaughlin
DDoS attacks have catapulted to the forefront of banking security news after the industry experienced a series of multi-phased attacks beginning back in September of 2012. Hackers launch DDoS attacks prompted by one of two common motives. Protest attacks, like OpUSA, target large, high-profile banks and are often launched for social or political purposes. Attacks on community banks are usually used to as a distraction in conjunction with account takeover attacks. This event is designed to strengthen the awareness and defenses of participants. Jay McLaughlin, this session's presenter, fights cybercrime aimed at financial institutions on a daily basis as Q2ebanking's Chief Security Officer. Jay will break down conceptual and technical aspects of DDoS attack types, clarify the differing attacker motives, and discuss how community banks can build a layered security model to prevent DDoS attacks.
National Shipbuilding Procurement Strategy: Economic Impact, Nova ScotiaShipsStartHere.ca
Infographic: Building Canada’s next generation of naval vessels at Irving Shipbuilding’s Halifax Shipyard is
a once-in-a-generation opportunity to secure thousands of long-term jobs, bolster Nova Scotia’s
economy for a quarter-of-a-century and provide substantial economic benefits across Canada.
If Halifax Wins, Everyone Wins.
The virtual branch is the financial institution’s franchise. But satisfying the experience of your valuable customers while protecting against the latest threats brings new challenges in securing this critical channel. Cybercrime has transformed into a sophisticated, billion-dollar industry, and high-risk targets need to develop a security posture that can scale to the volume and maturity of cyber-attacks being carried out. Multi-layered security solutions are needed to protect your virtual branch from fraud - but what does this even mean? This presentation highlights tools and best practices on pressing issues - account takeover, social engineering, neural network monitoring, and emerging payments.
The document outlines a success formula to help people live more positively and meaningfully. It discusses developing confidence, believing you can achieve your goals, setting goals and plans, and taking consistent action. Key aspects of the formula are having passion for your work, using your talents, and taking inspired action on a daily basis. Factors like gratitude, forgiveness, and stress management can also contribute to happiness and success.
Evaluating your Cybersecurity Preparedness - FFIEC AssessmentJay McLaughlin
The document discusses the FFIEC's cybersecurity assessment of financial institutions. It notes that cyber threats are rapidly evolving and attackers are becoming more adept at defeating security practices. The FFIEC assessment examines an institution's risk management and oversight, threat intelligence and information sharing, security controls, incident detection and response, and business continuity/resiliency. Financial institutions should expect to demonstrate understanding of cyber risks, articulate controls to address risks, and show maturity and preparation to adapt to threats. Executive management and boards must also be engaged in cybersecurity.
Athanas Ngou's CV summarizes his personal and professional experience. He holds a Bachelor of Veterinary Medicine degree from Sokoine University of Agriculture in Tanzania. His experience includes working as a resident veterinarian at the Zanzibar Animals Affection Society and conducting field training and research on animal health, diseases, and husbandry during his studies. He is proficient in Swahili and English and has leadership and computer skills. His hobbies include animal care, public health, and research.
The document outlines a success formula to help people live more positively and meaningfully. It discusses developing confidence, believing you can achieve your goals, setting goals and planning actions to achieve them. Key factors in the success formula include passion, talent, and taking consistent action. Associating with others and having a positive mindset by reducing negative automatic thoughts are also emphasized.
Todorov's theory suggests that narratives follow a 5-stage structure: 1) an initial state of equilibrium, 2) a disruption to the equilibrium, 3) recognition of the disruption, 4) an attempt to repair the disruption, and 5) a reinstatement of the equilibrium. The human mind seeks narrative patterns like a beginning, middle, and end to make sense of events and connect facts into a coherent story.
This document is a presentation about how CIOs and CSOs are becoming mission-critical business partners. The presentation covers how information is the lifeblood of organizations and how events involving data loss are rising. It discusses moving to an information-centric security approach and developing critical partnerships across organizations. The presentation emphasizes that security is not about checking boxes for compliance, but rather focusing on behavior change through education and building relationships.
The document discusses 10 examples of how a company called Buildium has used video marketing for various purposes such as announcing acquisitions, explaining features, sales outreach, customer stories, testimonials, and new products. For each example, the results and lessons learned are presented. Overall lessons include taking chances with new video ideas, leveraging company personality, and ensuring good execution and equipment for video production.
This document discusses securing mobile banking. It begins by outlining the growth of mobile technology and consumer adoption of mobile devices and apps. It then discusses the threats posed by mobile malware, insecure devices, and user exploitation. The document advocates for a layered security model for mobile banking that includes multi-factor authentication, transaction authorization, behavioral monitoring, and secure development practices. It emphasizes the need for financial institutions to get ahead of threats and secure the mobile channel as consumer usage increases.
ShipsStartHere.ca: Nova Scotia’s response to the National Shipbuilding Procur...ShipsStartHere.ca
In June 2010, the Government of Canada initiated the National Shipbuilding Procurement Strategy: a formal process to select two Canadian shipyards for construction of large vessels. ShipsStartHere.ca -- and this presentation -- is about Nova Scotia’s response to the NSPS opportunity.
The document discusses the history and influences of hard rock and heavy metal music. It covers early influences like Black Sabbath, Judas Priest, and Metallica. The style of heavy metal is described as using fuzz-tone and wah-wah effects. Various genres like thrash, power metal, and metalcore are also mentioned. The popularity of bands like Led Zeppelin at festivals in the 1960s-70s helped spread metal worldwide. The future of metal is described as remaining underground but with many popular foreign bands and the rise of the "New Wave of American Heavy Metal".
Social media provides many opportunities for companies to leverage their networks and engage with candidates as part of their recruitment strategy. It allows companies to source candidates, build their employer brand, engage in conversations, and complement their existing careers sites. While social media platforms like LinkedIn, Facebook, Twitter, and YouTube can help advertise jobs and research prospects, companies must develop a clear strategy to understand where relevant talent engages online and how to effectively connect with them. Any social media recruitment effort also comes with challenges around legal issues, privacy, and maintaining honest and realistic communications.
Social networks and social media analysis in the context of the enterpriseRamez Al-Fayez
Social networks and social media have become important tools for enterprises to interact with employees and customers. Enterprises should build internal social networks to facilitate collaboration between employees. They should also focus on external social networks where customers engage in order to understand them better and market products. Analyzing social media can provide insights into customer behavior, market trends, and hiring opportunities. Setting up an enterprise social network requires defining goals, policies, and measuring success through key performance indicators. It is important to understand business benefits and provide training and support for adoption.
Risks of social media for businesses (and how to manage them)CrowdControlHQ
In a meeting with Security specialists held at the University of Loughborough we discussed the risks of social media and how they can be managed. This is our contribution to the topic.
Effective Training and Policy Takes the Fear out of Social Networking - Shawn...sdavis532
The document discusses how social networks pose risks like revealing personally identifiable information and social engineering attacks. It emphasizes that organizations need effective social media policies and engaging training programs to exercise due care and diligence. Without these, employees may unintentionally damage an organization's reputation or fall victim to attacks. The presentation argues that blocking social media access is not enough and that policies and training are needed to mitigate risks while allowing organizations to benefit from social networking.
This document discusses the risks associated with organizational use of social media and the need to evaluate these risks as part of the audit process. It provides examples of social media risks including malware, data leakage, customer exposure, loss of content rights, and inadequate response to customer expectations. The document also discusses security risks like phishing attacks. It emphasizes that social media policies need to provide clear guidance to employees and be regularly updated. Key questions for organizations to consider include how mobile commerce and social media policies are integrated, monitored, and how information security measures apply to different data sensitivities.
Social media provides opportunities for businesses but also risks that must be managed. It allows enhanced communication, branding and insights but could spread information quickly in a crisis. Most executives see risks but few have formal incident or policy plans. Governance is key to harness social media benefits while avoiding issues through training, monitoring and defined strategies.
The document provides an overview of using social media for recruiting. It discusses defining goals, choosing appropriate social media sites like Facebook, Twitter, YouTube and LinkedIn, customizing programs to fit organizational brands, and maintaining a presence on sites. Case studies show how companies like Ernst & Young and Best Buy have reduced turnover through social media engagement. The document also covers security concerns, reporting metrics, and future opportunities in mobile, retargeting and monitoring.
This document provides an overview of conducting a social media risk assessment. It begins with definitions of social media and describes the key opportunities and risks of social media use. It then outlines the regulatory environment for social media from organizations like the FTC, SEC, FINRA and NLRB. The document proposes a 5-phase approach to conducting a social media risk assessment: 1) Planning and scoping, 2) Social listening, 3) Design and discovery, 4) Assess and analyze, and 5) Collaboration and reporting. It emphasizes understanding an organization's social media perspective before assessing risks.
This document provides an overview of social media strategies and best practices for Cisco partners. It discusses listening to customers and insights, seeding and participating in social networks, using social media for visibility, education and communication, crowdsourcing, and addressing risks. Specific platforms and metrics are mentioned for various strategies. Best practices include alignment with business objectives and having a strategic plan that includes listening, learning, planning, participation and measuring initiatives.
Starting Clients with Digital and Social Media MarketingSusan Chesley Fant
This presentation focuses on creating social media campaigns for businesses and starting new clients with using digital and social media. Social media is not a one size fits all for many organizations and this presentation focuses students on being able to introduce social media to best fit an organization by size, time and energy, budget, and industry.
Communication Strategies for Leveraging Social Media Sazed Monsur
I presented this during a Business Communication course.
Here is the Agenda:
>> why social media?
>> How to use different social media to leverage communication?
>> what strategies we can use?
Desarrollo de social media en los canales de ventaEmpresas 2.0
This document discusses developing social media as a sales channel. It covers topics like what social media is, leveraging it as a sales channel, developing a strong framework, measuring results, and recommendations. Examples are provided of travel companies using social media campaigns successfully. The document emphasizes developing integrated social media solutions to enable product discovery, research, sharing, and transactions. It also stresses the importance of social media analytics and measuring the impact on organizations and customers.
The document discusses social business and implementing social strategies within organizations. It defines social business as the deep integration of social media and social methodologies into an organization to drive business impact. Some key benefits identified include greater alignment with goals, improved collaboration and productivity, and faster access to information. The document provides frameworks and considerations for developing a social business plan and strategy, including addressing challenges, identifying opportunities, and measuring outcomes. It also examines lessons learned from organizations that have implemented social strategies, including the importance of executive support and aligning social initiatives with business needs.
Employee Advocacy - The Next Step in Digital Transformation Sociabble
It's not easy to stay relevant in today's social media landscape. Discover how companies like Microsoft and Sage have been able to boost their social media strategy and overall digital strategy using an effective employee advocacy program.
Understanding Social Media Networks for Financial Advisors - A Webinar for Ac...Jay Palter Social Advisory
The webinar discusses how financial advisors can leverage social media networks to build their business, noting that search engines are the primary way consumers find information online and social media allows advisors to improve their search engine optimization. It provides an overview of key social media strategies for professionals, including cultivating trust through consistency and transparency, defining a personal brand, and allowing social media to transform their business by listening to customers. The presentation also covers popular social media tools and how to hedge risks by establishing presences on major sites.
Social Media 101: Understanding Social Media Channels, Demographics, and UsageDebra Askanase
When should you use Facebook? Should you create a page, a group, or both? These and other questions will be addressed in this overview of the most popular social media channels for business. It includes a definition of social media, current demographics and use data, an overview of the most popular US social media channels, and how to choose the right platform for your audience.
Maz @ SoAmpli social media crash course Mishel Cordes
1) Influencers are becoming a new form of currency as social media usage increases rapidly. Anyone with an online presence can now influence brands.
2) This document discusses how to effectively use social media for businesses. It covers the landscape of social media, characteristics like collaboration and community, and why businesses should use social media.
3) The document provides advice on developing a social media strategy including listening to customers, engaging authentically, and establishing measurable objectives. It also suggests tools for listening and participating in online conversations.
The document provides an overview of a social media workshop presented by Intraprise Technologies LLC. The workshop aimed to help participants understand basic social media concepts, implications for professional use, and key features of Facebook, LinkedIn, and Twitter. Attendees were introduced to the presenters and their company, which provides management, technology, and accounting consulting services. The workshop then covered definitions of social media, its mainstream adoption, types of technologies, and potential benefits and risks of professional usage. Guided tours of Twitter, LinkedIn, and Facebook highlighted their purposes and interesting usage statistics.
Similar to Social Media: Infiltrating The Enterprise (20)
Driving Business Innovation: Latest Generative AI Advancements & Success StorySafe Software
Are you ready to revolutionize how you handle data? Join us for a webinar where we’ll bring you up to speed with the latest advancements in Generative AI technology and discover how leveraging FME with tools from giants like Google Gemini, Amazon, and Microsoft OpenAI can supercharge your workflow efficiency.
During the hour, we’ll take you through:
Guest Speaker Segment with Hannah Barrington: Dive into the world of dynamic real estate marketing with Hannah, the Marketing Manager at Workspace Group. Hear firsthand how their team generates engaging descriptions for thousands of office units by integrating diverse data sources—from PDF floorplans to web pages—using FME transformers, like OpenAIVisionConnector and AnthropicVisionConnector. This use case will show you how GenAI can streamline content creation for marketing across the board.
Ollama Use Case: Learn how Scenario Specialist Dmitri Bagh has utilized Ollama within FME to input data, create custom models, and enhance security protocols. This segment will include demos to illustrate the full capabilities of FME in AI-driven processes.
Custom AI Models: Discover how to leverage FME to build personalized AI models using your data. Whether it’s populating a model with local data for added security or integrating public AI tools, find out how FME facilitates a versatile and secure approach to AI.
We’ll wrap up with a live Q&A session where you can engage with our experts on your specific use cases, and learn more about optimizing your data workflows with AI.
This webinar is ideal for professionals seeking to harness the power of AI within their data management systems while ensuring high levels of customization and security. Whether you're a novice or an expert, gain actionable insights and strategies to elevate your data processes. Join us to see how FME and AI can revolutionize how you work with data!
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc
How does your privacy program stack up against your peers? What challenges are privacy teams tackling and prioritizing in 2024?
In the fifth annual Global Privacy Benchmarks Survey, we asked over 1,800 global privacy professionals and business executives to share their perspectives on the current state of privacy inside and outside of their organizations. This year’s report focused on emerging areas of importance for privacy and compliance professionals, including considerations and implications of Artificial Intelligence (AI) technologies, building brand trust, and different approaches for achieving higher privacy competence scores.
See how organizational priorities and strategic approaches to data security and privacy are evolving around the globe.
This webinar will review:
- The top 10 privacy insights from the fifth annual Global Privacy Benchmarks Survey
- The top challenges for privacy leaders, practitioners, and organizations in 2024
- Key themes to consider in developing and maintaining your privacy program
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfPaige Cruz
Monitoring and observability aren’t traditionally found in software curriculums and many of us cobble this knowledge together from whatever vendor or ecosystem we were first introduced to and whatever is a part of your current company’s observability stack.
While the dev and ops silo continues to crumble….many organizations still relegate monitoring & observability as the purview of ops, infra and SRE teams. This is a mistake - achieving a highly observable system requires collaboration up and down the stack.
I, a former op, would like to extend an invitation to all application developers to join the observability party will share these foundational concepts to build on:
Full-RAG: A modern architecture for hyper-personalizationZilliz
Mike Del Balso, CEO & Co-Founder at Tecton, presents "Full RAG," a novel approach to AI recommendation systems, aiming to push beyond the limitations of traditional models through a deep integration of contextual insights and real-time data, leveraging the Retrieval-Augmented Generation architecture. This talk will outline Full RAG's potential to significantly enhance personalization, address engineering challenges such as data management and model training, and introduce data enrichment with reranking as a key solution. Attendees will gain crucial insights into the importance of hyperpersonalization in AI, the capabilities of Full RAG for advanced personalization, and strategies for managing complex data integrations for deploying cutting-edge AI solutions.
AI 101: An Introduction to the Basics and Impact of Artificial IntelligenceIndexBug
Imagine a world where machines not only perform tasks but also learn, adapt, and make decisions. This is the promise of Artificial Intelligence (AI), a technology that's not just enhancing our lives but revolutionizing entire industries.
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!SOFTTECHHUB
As the digital landscape continually evolves, operating systems play a critical role in shaping user experiences and productivity. The launch of Nitrux Linux 3.5.0 marks a significant milestone, offering a robust alternative to traditional systems such as Windows 11. This article delves into the essence of Nitrux Linux 3.5.0, exploring its unique features, advantages, and how it stands as a compelling choice for both casual users and tech enthusiasts.
Building Production Ready Search Pipelines with Spark and MilvusZilliz
Spark is the widely used ETL tool for processing, indexing and ingesting data to serving stack for search. Milvus is the production-ready open-source vector database. In this talk we will show how to use Spark to process unstructured data to extract vector representations, and push the vectors to Milvus vector database for search serving.
Threats to mobile devices are more prevalent and increasing in scope and complexity. Users of mobile devices desire to take full advantage of the features
available on those devices, but many of the features provide convenience and capability but sacrifice security. This best practices guide outlines steps the users can take to better protect personal devices and information.
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...Neo4j
Leonard Jayamohan, Partner & Generative AI Lead, Deloitte
This keynote will reveal how Deloitte leverages Neo4j’s graph power for groundbreaking digital twin solutions, achieving a staggering 100x performance boost. Discover the essential role knowledge graphs play in successful generative AI implementations. Plus, get an exclusive look at an innovative Neo4j + Generative AI solution Deloitte is developing in-house.
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?Speck&Tech
ABSTRACT: A prima vista, un mattoncino Lego e la backdoor XZ potrebbero avere in comune il fatto di essere entrambi blocchi di costruzione, o dipendenze di progetti creativi e software. La realtà è che un mattoncino Lego e il caso della backdoor XZ hanno molto di più di tutto ciò in comune.
Partecipate alla presentazione per immergervi in una storia di interoperabilità, standard e formati aperti, per poi discutere del ruolo importante che i contributori hanno in una comunità open source sostenibile.
BIO: Sostenitrice del software libero e dei formati standard e aperti. È stata un membro attivo dei progetti Fedora e openSUSE e ha co-fondato l'Associazione LibreItalia dove è stata coinvolta in diversi eventi, migrazioni e formazione relativi a LibreOffice. In precedenza ha lavorato a migrazioni e corsi di formazione su LibreOffice per diverse amministrazioni pubbliche e privati. Da gennaio 2020 lavora in SUSE come Software Release Engineer per Uyuni e SUSE Manager e quando non segue la sua passione per i computer e per Geeko coltiva la sua curiosità per l'astronomia (da cui deriva il suo nickname deneb_alpha).
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slackshyamraj55
Discover the seamless integration of RPA (Robotic Process Automation), COMPOSER, and APM with AWS IDP enhanced with Slack notifications. Explore how these technologies converge to streamline workflows, optimize performance, and ensure secure access, all while leveraging the power of AWS IDP and real-time communication via Slack notifications.
Climate Impact of Software Testing at Nordic Testing DaysKari Kakkonen
My slides at Nordic Testing Days 6.6.2024
Climate impact / sustainability of software testing discussed on the talk. ICT and testing must carry their part of global responsibility to help with the climat warming. We can minimize the carbon footprint but we can also have a carbon handprint, a positive impact on the climate. Quality characteristics can be added with sustainability, and then measured continuously. Test environments can be used less, and in smaller scale and on demand. Test techniques can be used in optimizing or minimizing number of tests. Test automation can be used to speed up testing.
In his public lecture, Christian Timmerer provides insights into the fascinating history of video streaming, starting from its humble beginnings before YouTube to the groundbreaking technologies that now dominate platforms like Netflix and ORF ON. Timmerer also presents provocative contributions of his own that have significantly influenced the industry. He concludes by looking at future challenges and invites the audience to join in a discussion.
For the full video of this presentation, please visit: https://www.edge-ai-vision.com/2024/06/building-and-scaling-ai-applications-with-the-nx-ai-manager-a-presentation-from-network-optix/
Robin van Emden, Senior Director of Data Science at Network Optix, presents the “Building and Scaling AI Applications with the Nx AI Manager,” tutorial at the May 2024 Embedded Vision Summit.
In this presentation, van Emden covers the basics of scaling edge AI solutions using the Nx tool kit. He emphasizes the process of developing AI models and deploying them globally. He also showcases the conversion of AI models and the creation of effective edge AI pipelines, with a focus on pre-processing, model conversion, selecting the appropriate inference engine for the target hardware and post-processing.
van Emden shows how Nx can simplify the developer’s life and facilitate a rapid transition from concept to production-ready applications.He provides valuable insights into developing scalable and efficient edge AI solutions, with a strong focus on practical implementation.
1. SOCIAL MEDIA:
INFILTRATING THE
ENTERPRISE
MIDTECH IT Summit
June 27th, 2011
JAY A. MCLAUGHLIN, CISSP
SVP, CHIEF INFORMATION OFFICER
2. DISCLAIMER
The materials, thoughts, comments, ideas
and opinions expressed throughout this
presentation are entirely my own and do
not necessarily represent the thoughts or
opinions of my employer (past or present).
3. AGENDA
• Defining social media
• Embracing the Inevitable
• Understanding the Benefits Risks
• Friending your Customers
• Preventing social media disasters
• Building a strategy
4. : forms of electronic communication (as Web sites
for social networking and microblogging) through
which users create online communities to share
information, ideas, personal messages, and other
content
What is Social
Media?
Social media is media for social interaction using
highly accessible and scalable communication
techniques. Social media is the use of web-based
and mobile technologies to turn communication
into interactive dialogue.
5.
6. • 500 Million
• 250 Million
• 700 Billion
Source: Facebook.com April 2011
10. • 100 Million
• 2 Million
• 4.3 Billion
Source: LinkedIn.com May 2011
11.
12. WHY SHOULD WE CARE?
• It's where your customers are
• It's where your prospects are
• It's
reach stretches further broader than any
marketing channel
• It's relevant to be in the game
13. We don t have a choice
on whether we will DO
social media, the question
is how WELL we DO it.
- Erik Qualman, Author
Socialnomics
http://www.youtube.com/user/Socialnomics09?blend=1ob=5
14. * companies that have 100 or more employees
Source: eMarketer, Nov
2010
15. Enhanced
Collaboration
Shared Faster access to
BUSINESS Workspaces
Information
BENEFITS
Extended Organizational Reach
Compete
Ability to
16. • When leveraged effectively,
social networks become an
THE
equalizer, leveling the playing EQUALIZER
field
• Itallows organizations both
large and small to compete
and be relevant in their space
• Ability
to influence with little
or not cost
19. IS YOUR ORGANIZATION
PREPARED FOR...?
• Employees posting opinions about the organization
• Managing brand reputation and public opinion/
exposure
• Responding to positive and negative feedback from
customers
• Standing by the decision NOT to get engaged....?
20. SOCIAL MEDIA SWOT
• Strength - ability to build • Weakness - silo-ed as a
relationships with your business function and not
target audience like never integrated in overall
before.
business strategy.
• Opportunities - its • Threat - fear of losing
where our customers control. Seeks risk aversion.
are. Integration with the Non-innovative.
business is key.
22. THE BASICS
• Doyour employees know what is acceptable or
permitted?
• How may (or not) employees identify themselves?
• To what degree can corporate content be used?
• Hasyour organization determined what is can do
with information obtained through social media?
Establishing a policy is critical!
23. ESTABLISH A STRATEGY
• Governance required implement and enforce acceptable
usage policy covering social networking sites
• It
is key that all staff receive security awareness training
covering your acceptable usage policy for social
networking
• Promote good practices to help improve users behavior
ultimately reducing and/or mitigating some of the risks
• Permit access only to social networking sites that have
obvious business benefits only to users with a business
need
24. ESTABLISH A STRATEGY
• Institute processes to manage and monitor activity
• Be flexible - overall uncertainty about what strategies and
tactics to adopt to security social media
• Understand and identify which users create the most
amount of risk?
• Create reasonable guidelines that can be followed
• Review sites terms and conditions to understand risks
associated with each site
25. REGULATION is coming
For regulated industries, what
requirements do you face?
ex. FINRA
Employers know ALOT about
their employees/candidates
26. HR: OBTAINING INFORMATION FROM
SOCIAL NETWORKS
• HRis tempted to peak at these sites to gather information
about employees and potential candidates
• Consider discrimination lawsuits! Proceed with caution.
- ex: viewing the online photo/picture of a candidate
• Consistency is KING - it will minimize your risk.
- ex: if conducting a search for ONE candidate, then do so for ALL
• Evenif employers have the technical capability to gain access
to social networking information of their employees or
candidates, it does not imply the legal right to do so.
27. consider ALL risks
Is there a need to address how to evaluate the risk of
sharing too much information online in relation to the
value it brings to the business?
28. Security Concerns
• There is a continued growth in social networking sites
being used as an attack distribution platform
• Users are less likely to see malware when it is passed
on by a friend as it has a certain level of authenticity
and a level of trust
• Social networks give attackers a potentially powerful
point of leverage, sometimes allowing them to launch
sophisticated attacks against businesses
• Known weaknesses exist in the security of the
networks themselves, which limit our control
29.
30. Threatscape of sites
• Session-hijacking / authentication weaknesses
• Profile harvesting leading to social engineering
- ex: phishing / spear-phishing
• Cross-site scripting (XSS) / Cross-site request forgery
(CSRF)
• Malicious code / Malware
- ex: drive-by downloads
31. XSS Example
iframe id= CrazyDaVinci
style= display:none; src= http://
m.facebook.com/connect/prompt_feed.php?
display=wapuser_message_prompt= script
window.onload=function(){document.forms
[0].message.value= Just visited
http://y.ahoo.it/gajeBA Wow.. cool! nice page
dude!!! ;document.forms[0].submit();}/
script /iframe
• this bit of HTML/Javascript would be included in a viral page.
• the code sets the content of the wall post to a message that
includes a link to a viral page, then submits the prompt automatically.
32. Microsoft has documented a
steady rise in the number of
attacks targeting social networks
Primary vectors:
• Phishing attempts
• Social engineering tactics
Instances of Phishing impressions increased from 8.3% to 84.5%
33. Verizon highlighted in its 2011
DBIR, that malware and social
engineering to have been the
culprit for 60% of all reported
attacks/breaches
Contribution of malware:
• 49% of breaches
• 79% of records stolen
34. PROTECT SERVE
Policing Social Media:
How do we protect the usage of social networks?
35. Policing Social Media
• Is it possible to establish and implement a standard set
of guidelines for enterprise users?
• ...that would help to not only prevent data leaks, but
also keep emerging social networking malware at bay?
• It requires a combination of technical, behavioral
and organizational security controls
36. CONCLUSION
• Social media isn t a choice anyone….recognize it is
a business transformation tool
• Perform a comprehensive risk assessment against all
social networks that will be considered for use
• Social networks DO introduce new security risks -
take a formal approach to mitigate them through
policy enforcement and user education
• Doing nothing is not an option...will you take that
risk?
1. 500 Million active users 2. 250 Million mobile users 700 Billions minutes per month users spend 300,000 businesses have a presence on Facebook - Socialnomics;
1. 6939 tweets per second 2. 319 signups per second / 300,000 per day 3. 140 Million tweets per day
Websites lag for information sharing, but using Twitter, businesses now have access to hundreds/thousands/millions of followers through a system designed to reach people across the globe in real time in a matter of seconds.
1. 100 Million professional users 2. 2 Million companies have LinkedIn company pages 3. 4.3 Billion initial value for IPO
Q-The ROI is often raised - how do we measure? A-The ROI of doing it is that you ’ re company will be in business in five yrs...
Why are we trying to measure social media like a traditional channel? Social media can touch every facet of business and is more an extension of good business. When asked what the ROI of social media, he responds, "what's the ROI of your phone?"- What is the cost of doing nothing? - Do you really want to take that risk?
Basically, by the end of this year, 4 out of 5 businesses will adopt in some form.
1-Taco Bell - 2 million views on YouTube when NYC restaurant infested with rats 2-The microphone is always on! if you wouldn ’ t say something to everyone, don ’ t say it at all. 3-American Red Cross - accidental mixup by employee thinking he was posting a personal tweet
This past February, Southwest Airlines kicked director Kevin Smith off a flight from San Francisco headed to Los Angeles for being too fat. Southwest was quick to respond — 16 minutes after Smith ’ s first tweet regarding the incident. TechCrunch - heavily followed tech blog - experience slowness which impacted site visitors. After tweeting, they received a call from a Comcast manager that and the problem was resolved within 20 minutes.
1-Identify the collaboration hot-spots 2-Select technologies that will improve or accelerate existing process workflows 3-Identify the high-value business outcomes you want to achieve 4-The benefits and employments of social media tools are different for every organization. The ROI may not be as identifiable for your company.
Not having a policy is no longer optional. And it is a good place to start. You need to give your employees a guide on how to successfully engage online. These guidelines should be supported by training on how to use social media tools effectively.
Social media demands new technology and a fresh business approach. IT must make sure any traffic generated doesn ’ t bring the business applications your organization depends on to its knees. Your network needs to be told to give ‘ real work ’ the priority it deserves.
the Genetic Information Nondiscrimination Act ("GINA") that went into effect on November 21, 2009, prohibits employers from utilizing genetic tests or considering an applicant or employee's genetic background in hiring, firing, or promotions. with the explosion in the use of social media, the EEOC is worried that health insurers and employers will data mine an applicant or employee's social media accounts and utilize the information obtained to discriminate against them -- may result in expensive litigation!
1-Although this practice is common, employers that rely on social media websites to obtain information regarding applicants ’ employment histories and personal lives should proceed with caution. 2-failure to hire the applicant because of his or her race, ethnicity, gender, or any other protected classification that might be perceived from the picture. 4-What are the employee ’ s rights? Visiting www.privacyrights.org ,which is a self-proclaimed Privacy Rights Clearinghouse, doesn ’ t mention social sites. There is no precedence.
Social networking is a haven for marketers AND a collaboration between colleagues. But it can put corporate information assets and reputations at risk. Social networking platforms, such as Facebook, Twitter and LinkedIn, are becoming an integral part of people's personal and business worlds. The lines are blurring…
1-Recent study by Symantec 2-We need to educate - example - when reading emails they're kind of aware of looking out for in unsafe looking attachments or spelling or grammar mistakes 3-Corporations are increasingly being exposed to hacking by savvy attackers who glean information about their employees from social networks. 4-HTTPS at the point of authentication, then the connection is switched to HTTP
1-Lack of SSL - recommend using ForceTLS to obtain a secure connection when offered 1-HTTPS at the point of authentication, then the connection is switched to HTTP 3-Critical XSS vulnerability that would make it possible for attackers to infect users with spyware, adware, and just maybe anything else they want. 3-One in five web-based attacks are aimed at social networks 4-Automatic infection without intentional user request
Anyone clicking the link would get the same code executed on their account.
The report found a steady increase in social engineering attacks and an influx of rogue security software, designed to trick users into installing phony antivirus programs containing keyloggers, backdoors and other nasty malware...why? There is an increased level of trust people have on SNs.
More attacks targeting the username and passwords of social networking users..why? These are passwords that they might be using for other sites, such as financial sites. A Social Network Fraud survey in 2010 by Harris Interactive showed that nearly 75% (sample of 1,103) of Americans use the same password for their social sites and email.
Requires a combination of technical, behavioral and organizational security controls