SlideShare a Scribd company logo
1 of 22
The Risky Business of Social Media Tom Snyder Trivera Interactive Contents Copyright © 2011 Trivera Interactive and ISACA
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
I’m the guy who convinces your marketing people to do all the Social Media stuff that turns the IT, IS, Security, Legal and HR people into this:
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Social Media Usage
95%  of social media users now use it for  business reasons 61%  use public social media sites like LinkedIn, Twitter, Facebook, and YouTube  every day  (up from 51% in 2008). 15%  use these sites  "constantly throughout the day. 56%  work for companies that have  no policies  that cover use  at work  and  outside work Social Media Usage
 
76%  of companies now use Social Media  for business purposes 43%  have experienced  employee misuse 31%  have  disciplined  employees for misuse 29%   block  employee access 27%   monitor  employee use 25%   ban  use for non-business purposes Social Media Usage
The Old Paradigm
The New Paradigm
[object Object],[object Object],[object Object],[object Object],[object Object],Risks for Business
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Risks for Business
[object Object],[object Object],[object Object],[object Object],[object Object],Risks for Business
Tactics  without  strategy  is the  noise before defeat Strategy  without  tactics is the  slowest route to victory -Sun Tzu Addressing Risk
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Addressing Risk
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Addressing Risk
Mitigating Risk Threats and Vulnerabilities Risks Risk Mitigation Techniques Introduction of viruses and malware to the organizational network ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Exposure to customers and the enterprise through a fraudulent or hijacked corporate presence ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Mitigating Risk Threats and Vulnerabilities Risks Risk Mitigation Techniques Unclear or undefined content rights to information posted to social media sites ,[object Object],[object Object],[object Object],[object Object],A move to a digital business model may increase customer service expectations ,[object Object],[object Object],[object Object],Mismanagement of electronic communications that may be impacted by retention regulations or e-discovery ,[object Object],[object Object],[object Object],[object Object]
Mitigating Risk Threats and Vulnerabilities Risks Risk Mitigation Techniques Use of personal accounts to communicate work-related information ,[object Object],[object Object],[object Object],[object Object],[object Object],Employee posts that link them to the enterprise ,[object Object],[object Object],[object Object],Excessive employee use of social media in the workplace ,[object Object],[object Object],[object Object],[object Object],Employee access to social media via enterprise-supplied mobile devices.  ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Social Media Audit/Assurance ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Resources and References ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
 
Tom Snyder [email_address]   http://www.triveraguy.com Trivera Interactive http://www.trivera.com   ISACA http:// www.isaca.org/socialmedia   Contents Copyright © 2011 Trivera Interactive and ISACA

More Related Content

What's hot

Índice de software sin licencia en el mundo.
Índice de software sin licencia en el mundo. Índice de software sin licencia en el mundo.
Índice de software sin licencia en el mundo. Luis Noguera
 
11 Reasons Why Your Company Could Be In Danger
11 Reasons Why Your Company Could Be In Danger11 Reasons Why Your Company Could Be In Danger
11 Reasons Why Your Company Could Be In DangerCopper Mobile, Inc.
 
Wiretap 5-collaboration-security-risks-revealed
Wiretap 5-collaboration-security-risks-revealedWiretap 5-collaboration-security-risks-revealed
Wiretap 5-collaboration-security-risks-revealedBritt Newton
 
Unisys Security Insights Infographic: Global
Unisys Security Insights Infographic: GlobalUnisys Security Insights Infographic: Global
Unisys Security Insights Infographic: GlobalUnisys Corporation
 
Data Protection Maturity Survey Results 2013
Data Protection Maturity Survey Results 2013 Data Protection Maturity Survey Results 2013
Data Protection Maturity Survey Results 2013 - Mark - Fullbright
 
Governing Social Media
Governing Social MediaGoverning Social Media
Governing Social MediaDoug Cornelius
 
Norton Mobile Apps Survey Report
Norton Mobile Apps Survey ReportNorton Mobile Apps Survey Report
Norton Mobile Apps Survey ReportSymantec
 
Intralinks Ponemon Research Report | Breaking Bad: The Risk of Unsecure File...
Intralinks Ponemon Research Report | Breaking Bad: The Risk of Unsecure File...Intralinks Ponemon Research Report | Breaking Bad: The Risk of Unsecure File...
Intralinks Ponemon Research Report | Breaking Bad: The Risk of Unsecure File...Melissa Luongo
 
Is Your Company Ready for a Big Data Breach?
Is Your Company Ready for a Big Data Breach?Is Your Company Ready for a Big Data Breach?
Is Your Company Ready for a Big Data Breach?- Mark - Fullbright
 
Student Mobile Workspaces
Student Mobile WorkspacesStudent Mobile Workspaces
Student Mobile WorkspacesCitrix
 
2013-ISC2-Global-Information-Security-Workforce-Study
2013-ISC2-Global-Information-Security-Workforce-Study2013-ISC2-Global-Information-Security-Workforce-Study
2013-ISC2-Global-Information-Security-Workforce-StudyTam Nguyen
 
Prof m01-2013 global information security workforce study - final
Prof m01-2013 global information security workforce study - finalProf m01-2013 global information security workforce study - final
Prof m01-2013 global information security workforce study - finalSelectedPresentations
 
Digital Generation: Security Infographic
Digital Generation: Security InfographicDigital Generation: Security Infographic
Digital Generation: Security InfographicUnisys Corporation
 
Apperian 2017 Executive Enterprise Mobility Report
Apperian 2017 Executive Enterprise Mobility ReportApperian 2017 Executive Enterprise Mobility Report
Apperian 2017 Executive Enterprise Mobility ReportJennifer Walker
 
Apperian 2016 Executive Enterprise Mobility Report_FINAL_20160217
Apperian 2016 Executive Enterprise Mobility Report_FINAL_20160217Apperian 2016 Executive Enterprise Mobility Report_FINAL_20160217
Apperian 2016 Executive Enterprise Mobility Report_FINAL_20160217Sophie Jasson-Holt
 
Apperian 2015 Executive Enterprise Mobility Survey
Apperian 2015 Executive Enterprise Mobility SurveyApperian 2015 Executive Enterprise Mobility Survey
Apperian 2015 Executive Enterprise Mobility SurveyJennifer Walker
 
Web 2.0 @ Work Survey
Web 2.0 @ Work SurveyWeb 2.0 @ Work Survey
Web 2.0 @ Work SurveyTJ Rains
 

What's hot (19)

Índice de software sin licencia en el mundo.
Índice de software sin licencia en el mundo. Índice de software sin licencia en el mundo.
Índice de software sin licencia en el mundo.
 
11 Reasons Why Your Company Could Be In Danger
11 Reasons Why Your Company Could Be In Danger11 Reasons Why Your Company Could Be In Danger
11 Reasons Why Your Company Could Be In Danger
 
Wiretap 5-collaboration-security-risks-revealed
Wiretap 5-collaboration-security-risks-revealedWiretap 5-collaboration-security-risks-revealed
Wiretap 5-collaboration-security-risks-revealed
 
Anti-Malvertising Guidelines
Anti-Malvertising GuidelinesAnti-Malvertising Guidelines
Anti-Malvertising Guidelines
 
Unisys Security Insights Infographic: Global
Unisys Security Insights Infographic: GlobalUnisys Security Insights Infographic: Global
Unisys Security Insights Infographic: Global
 
Data Protection Maturity Survey Results 2013
Data Protection Maturity Survey Results 2013 Data Protection Maturity Survey Results 2013
Data Protection Maturity Survey Results 2013
 
Governing Social Media
Governing Social MediaGoverning Social Media
Governing Social Media
 
Norton Mobile Apps Survey Report
Norton Mobile Apps Survey ReportNorton Mobile Apps Survey Report
Norton Mobile Apps Survey Report
 
CFS November
CFS NovemberCFS November
CFS November
 
Intralinks Ponemon Research Report | Breaking Bad: The Risk of Unsecure File...
Intralinks Ponemon Research Report | Breaking Bad: The Risk of Unsecure File...Intralinks Ponemon Research Report | Breaking Bad: The Risk of Unsecure File...
Intralinks Ponemon Research Report | Breaking Bad: The Risk of Unsecure File...
 
Is Your Company Ready for a Big Data Breach?
Is Your Company Ready for a Big Data Breach?Is Your Company Ready for a Big Data Breach?
Is Your Company Ready for a Big Data Breach?
 
Student Mobile Workspaces
Student Mobile WorkspacesStudent Mobile Workspaces
Student Mobile Workspaces
 
2013-ISC2-Global-Information-Security-Workforce-Study
2013-ISC2-Global-Information-Security-Workforce-Study2013-ISC2-Global-Information-Security-Workforce-Study
2013-ISC2-Global-Information-Security-Workforce-Study
 
Prof m01-2013 global information security workforce study - final
Prof m01-2013 global information security workforce study - finalProf m01-2013 global information security workforce study - final
Prof m01-2013 global information security workforce study - final
 
Digital Generation: Security Infographic
Digital Generation: Security InfographicDigital Generation: Security Infographic
Digital Generation: Security Infographic
 
Apperian 2017 Executive Enterprise Mobility Report
Apperian 2017 Executive Enterprise Mobility ReportApperian 2017 Executive Enterprise Mobility Report
Apperian 2017 Executive Enterprise Mobility Report
 
Apperian 2016 Executive Enterprise Mobility Report_FINAL_20160217
Apperian 2016 Executive Enterprise Mobility Report_FINAL_20160217Apperian 2016 Executive Enterprise Mobility Report_FINAL_20160217
Apperian 2016 Executive Enterprise Mobility Report_FINAL_20160217
 
Apperian 2015 Executive Enterprise Mobility Survey
Apperian 2015 Executive Enterprise Mobility SurveyApperian 2015 Executive Enterprise Mobility Survey
Apperian 2015 Executive Enterprise Mobility Survey
 
Web 2.0 @ Work Survey
Web 2.0 @ Work SurveyWeb 2.0 @ Work Survey
Web 2.0 @ Work Survey
 

Similar to Risky business of social media

Meraj Ahmad - Information security in a borderless world
Meraj Ahmad - Information security in a borderless worldMeraj Ahmad - Information security in a borderless world
Meraj Ahmad - Information security in a borderless worldnooralmousa
 
Internet & Social Media issues for brand owners
Internet & Social Media issues for brand ownersInternet & Social Media issues for brand owners
Internet & Social Media issues for brand ownersDavid Green
 
Fraud in Social Media: Facing the Growing Threat
Fraud in Social Media: Facing the Growing ThreatFraud in Social Media: Facing the Growing Threat
Fraud in Social Media: Facing the Growing ThreatFraudBusters
 
Social Media
Social MediaSocial Media
Social MediaJ.L+C.L
 
Find the Risk vs. Reward Balance in Social Media
Find the Risk vs. Reward Balance in Social MediaFind the Risk vs. Reward Balance in Social Media
Find the Risk vs. Reward Balance in Social MediaGerardo A Dada
 
Rothke rsa 2012 what happens in vegas goes on youtube using social networks...
Rothke rsa 2012   what happens in vegas goes on youtube using social networks...Rothke rsa 2012   what happens in vegas goes on youtube using social networks...
Rothke rsa 2012 what happens in vegas goes on youtube using social networks...Ben Rothke
 
Creating And Enforcing Anti Malware Practices
Creating And Enforcing Anti Malware PracticesCreating And Enforcing Anti Malware Practices
Creating And Enforcing Anti Malware PracticesDiane M. Metcalf
 
20110720 fose 2011 sm governance
20110720 fose 2011 sm governance20110720 fose 2011 sm governance
20110720 fose 2011 sm governanceJesse Wilkins
 
How Social Media Can Destroy Your Business Model Final
How Social Media Can Destroy Your Business Model FinalHow Social Media Can Destroy Your Business Model Final
How Social Media Can Destroy Your Business Model FinalAnjuan Simmons
 
How Social Media Can Destroy Your Business Model
How Social Media Can Destroy Your Business ModelHow Social Media Can Destroy Your Business Model
How Social Media Can Destroy Your Business ModelKami Watson Huyse, APR
 
Social networking risks
Social networking risksSocial networking risks
Social networking risksPadma Kannan
 
Auditing Social Media SOPAC2013
Auditing Social Media SOPAC2013Auditing Social Media SOPAC2013
Auditing Social Media SOPAC2013KINSHIP digital
 
How to manage and leverage business use of social media platforms
How to manage and leverage business use of social media platformsHow to manage and leverage business use of social media platforms
How to manage and leverage business use of social media platformsSocialengine India
 
It consumerisation presentation
It  consumerisation presentationIt  consumerisation presentation
It consumerisation presentationrevaathey
 
It consumerisation presentation
It  consumerisation presentationIt  consumerisation presentation
It consumerisation presentationrevaathey
 
Web 2.0..Business Friend or Foe?
Web 2.0..Business Friend or Foe?Web 2.0..Business Friend or Foe?
Web 2.0..Business Friend or Foe?Stites & Harbison
 
SMAC - The paradigm shift : Creating future of the Enterprise
SMAC - The paradigm shift : Creating future of the EnterpriseSMAC - The paradigm shift : Creating future of the Enterprise
SMAC - The paradigm shift : Creating future of the EnterpriseNikhil Kulkarni
 
Replies Required for below Posting 1 user security awarene.docx
Replies Required for below  Posting 1  user security awarene.docxReplies Required for below  Posting 1  user security awarene.docx
Replies Required for below Posting 1 user security awarene.docxsodhi3
 

Similar to Risky business of social media (20)

Social media risks guide
Social media risks guideSocial media risks guide
Social media risks guide
 
Meraj Ahmad - Information security in a borderless world
Meraj Ahmad - Information security in a borderless worldMeraj Ahmad - Information security in a borderless world
Meraj Ahmad - Information security in a borderless world
 
Internet & Social Media issues for brand owners
Internet & Social Media issues for brand ownersInternet & Social Media issues for brand owners
Internet & Social Media issues for brand owners
 
Fraud in Social Media: Facing the Growing Threat
Fraud in Social Media: Facing the Growing ThreatFraud in Social Media: Facing the Growing Threat
Fraud in Social Media: Facing the Growing Threat
 
Social Media
Social MediaSocial Media
Social Media
 
Find the Risk vs. Reward Balance in Social Media
Find the Risk vs. Reward Balance in Social MediaFind the Risk vs. Reward Balance in Social Media
Find the Risk vs. Reward Balance in Social Media
 
Rothke rsa 2012 what happens in vegas goes on youtube using social networks...
Rothke rsa 2012   what happens in vegas goes on youtube using social networks...Rothke rsa 2012   what happens in vegas goes on youtube using social networks...
Rothke rsa 2012 what happens in vegas goes on youtube using social networks...
 
Social Media Policies by Sarah Wallace
Social Media Policies by Sarah WallaceSocial Media Policies by Sarah Wallace
Social Media Policies by Sarah Wallace
 
Creating And Enforcing Anti Malware Practices
Creating And Enforcing Anti Malware PracticesCreating And Enforcing Anti Malware Practices
Creating And Enforcing Anti Malware Practices
 
20110720 fose 2011 sm governance
20110720 fose 2011 sm governance20110720 fose 2011 sm governance
20110720 fose 2011 sm governance
 
How Social Media Can Destroy Your Business Model Final
How Social Media Can Destroy Your Business Model FinalHow Social Media Can Destroy Your Business Model Final
How Social Media Can Destroy Your Business Model Final
 
How Social Media Can Destroy Your Business Model
How Social Media Can Destroy Your Business ModelHow Social Media Can Destroy Your Business Model
How Social Media Can Destroy Your Business Model
 
Social networking risks
Social networking risksSocial networking risks
Social networking risks
 
Auditing Social Media SOPAC2013
Auditing Social Media SOPAC2013Auditing Social Media SOPAC2013
Auditing Social Media SOPAC2013
 
How to manage and leverage business use of social media platforms
How to manage and leverage business use of social media platformsHow to manage and leverage business use of social media platforms
How to manage and leverage business use of social media platforms
 
It consumerisation presentation
It  consumerisation presentationIt  consumerisation presentation
It consumerisation presentation
 
It consumerisation presentation
It  consumerisation presentationIt  consumerisation presentation
It consumerisation presentation
 
Web 2.0..Business Friend or Foe?
Web 2.0..Business Friend or Foe?Web 2.0..Business Friend or Foe?
Web 2.0..Business Friend or Foe?
 
SMAC - The paradigm shift : Creating future of the Enterprise
SMAC - The paradigm shift : Creating future of the EnterpriseSMAC - The paradigm shift : Creating future of the Enterprise
SMAC - The paradigm shift : Creating future of the Enterprise
 
Replies Required for below Posting 1 user security awarene.docx
Replies Required for below  Posting 1  user security awarene.docxReplies Required for below  Posting 1  user security awarene.docx
Replies Required for below Posting 1 user security awarene.docx
 

More from Trivera Interactive

5 Elements of a Successful Social Media Plan
5 Elements of a Successful Social Media Plan5 Elements of a Successful Social Media Plan
5 Elements of a Successful Social Media PlanTrivera Interactive
 
Creating, Maintaining and Executing your Social Media Editorial Calendar
Creating, Maintaining and Executing your Social Media Editorial CalendarCreating, Maintaining and Executing your Social Media Editorial Calendar
Creating, Maintaining and Executing your Social Media Editorial CalendarTrivera Interactive
 
Social Media 5 Years Later: Strategy is Still the Key
Social Media 5 Years Later: Strategy is Still the KeySocial Media 5 Years Later: Strategy is Still the Key
Social Media 5 Years Later: Strategy is Still the KeyTrivera Interactive
 
5 Digital Marketing Mistakes You're Probably Making
5 Digital Marketing Mistakes You're Probably Making5 Digital Marketing Mistakes You're Probably Making
5 Digital Marketing Mistakes You're Probably MakingTrivera Interactive
 
5 Digital Marketing Mistakes You're Probably Making - 2014 BizExpo
5 Digital Marketing Mistakes You're Probably Making - 2014 BizExpo5 Digital Marketing Mistakes You're Probably Making - 2014 BizExpo
5 Digital Marketing Mistakes You're Probably Making - 2014 BizExpoTrivera Interactive
 
Gameplan for Online Marketing: Getting more measurable results from your Onli...
Gameplan for Online Marketing: Getting more measurable results from your Onli...Gameplan for Online Marketing: Getting more measurable results from your Onli...
Gameplan for Online Marketing: Getting more measurable results from your Onli...Trivera Interactive
 
Using Video Marketing in Social Media
Using Video Marketing in Social MediaUsing Video Marketing in Social Media
Using Video Marketing in Social MediaTrivera Interactive
 
What is Social Media and Why Should I Care?
What is Social Media and Why Should I Care?What is Social Media and Why Should I Care?
What is Social Media and Why Should I Care?Trivera Interactive
 
How Social Media Impacts Your SEO
How Social Media Impacts Your SEOHow Social Media Impacts Your SEO
How Social Media Impacts Your SEOTrivera Interactive
 
Your Website - Still the Bullseye
Your Website - Still the BullseyeYour Website - Still the Bullseye
Your Website - Still the BullseyeTrivera Interactive
 
Getting to the Top in Google - Your Blueprint to Search Engine Success
Getting to the Top in Google - Your Blueprint to Search Engine SuccessGetting to the Top in Google - Your Blueprint to Search Engine Success
Getting to the Top in Google - Your Blueprint to Search Engine SuccessTrivera Interactive
 
Twitter: Fun and Games or Powerful Business Tool
Twitter: Fun and Games or Powerful Business ToolTwitter: Fun and Games or Powerful Business Tool
Twitter: Fun and Games or Powerful Business ToolTrivera Interactive
 
Optimizing and Integrating Social Media into your PR
Optimizing and Integrating  Social Media into your PR Optimizing and Integrating  Social Media into your PR
Optimizing and Integrating Social Media into your PR Trivera Interactive
 
Search Optmization: Social Media & Websites
Search Optmization: Social Media & WebsitesSearch Optmization: Social Media & Websites
Search Optmization: Social Media & WebsitesTrivera Interactive
 
Social Media: Fun and Games or Powerful Business Tool
Social Media: Fun and Games or Powerful Business ToolSocial Media: Fun and Games or Powerful Business Tool
Social Media: Fun and Games or Powerful Business ToolTrivera Interactive
 
Time to Jump on the Twitter Bandwagon for Training and Education
Time to Jump on the Twitter Bandwagon for Training and EducationTime to Jump on the Twitter Bandwagon for Training and Education
Time to Jump on the Twitter Bandwagon for Training and EducationTrivera Interactive
 

More from Trivera Interactive (19)

5 Elements of a Successful Social Media Plan
5 Elements of a Successful Social Media Plan5 Elements of a Successful Social Media Plan
5 Elements of a Successful Social Media Plan
 
Creating, Maintaining and Executing your Social Media Editorial Calendar
Creating, Maintaining and Executing your Social Media Editorial CalendarCreating, Maintaining and Executing your Social Media Editorial Calendar
Creating, Maintaining and Executing your Social Media Editorial Calendar
 
Social Media 5 Years Later: Strategy is Still the Key
Social Media 5 Years Later: Strategy is Still the KeySocial Media 5 Years Later: Strategy is Still the Key
Social Media 5 Years Later: Strategy is Still the Key
 
5 Digital Marketing Mistakes You're Probably Making
5 Digital Marketing Mistakes You're Probably Making5 Digital Marketing Mistakes You're Probably Making
5 Digital Marketing Mistakes You're Probably Making
 
5 Digital Marketing Mistakes You're Probably Making - 2014 BizExpo
5 Digital Marketing Mistakes You're Probably Making - 2014 BizExpo5 Digital Marketing Mistakes You're Probably Making - 2014 BizExpo
5 Digital Marketing Mistakes You're Probably Making - 2014 BizExpo
 
Gameplan for Online Marketing: Getting more measurable results from your Onli...
Gameplan for Online Marketing: Getting more measurable results from your Onli...Gameplan for Online Marketing: Getting more measurable results from your Onli...
Gameplan for Online Marketing: Getting more measurable results from your Onli...
 
Using Video Marketing in Social Media
Using Video Marketing in Social MediaUsing Video Marketing in Social Media
Using Video Marketing in Social Media
 
What is Social Media and Why Should I Care?
What is Social Media and Why Should I Care?What is Social Media and Why Should I Care?
What is Social Media and Why Should I Care?
 
How Social Media Impacts Your SEO
How Social Media Impacts Your SEOHow Social Media Impacts Your SEO
How Social Media Impacts Your SEO
 
Your Website - Still the Bullseye
Your Website - Still the BullseyeYour Website - Still the Bullseye
Your Website - Still the Bullseye
 
Getting to the Top in Google - Your Blueprint to Search Engine Success
Getting to the Top in Google - Your Blueprint to Search Engine SuccessGetting to the Top in Google - Your Blueprint to Search Engine Success
Getting to the Top in Google - Your Blueprint to Search Engine Success
 
Twitter: Fun and Games or Powerful Business Tool
Twitter: Fun and Games or Powerful Business ToolTwitter: Fun and Games or Powerful Business Tool
Twitter: Fun and Games or Powerful Business Tool
 
Optimizing and Integrating Social Media into your PR
Optimizing and Integrating  Social Media into your PR Optimizing and Integrating  Social Media into your PR
Optimizing and Integrating Social Media into your PR
 
Search Optmization: Social Media & Websites
Search Optmization: Social Media & WebsitesSearch Optmization: Social Media & Websites
Search Optmization: Social Media & Websites
 
Social Media: Fun and Games or Powerful Business Tool
Social Media: Fun and Games or Powerful Business ToolSocial Media: Fun and Games or Powerful Business Tool
Social Media: Fun and Games or Powerful Business Tool
 
Time to Jump on the Twitter Bandwagon for Training and Education
Time to Jump on the Twitter Bandwagon for Training and EducationTime to Jump on the Twitter Bandwagon for Training and Education
Time to Jump on the Twitter Bandwagon for Training and Education
 
Twitterbandwagon4
Twitterbandwagon4Twitterbandwagon4
Twitterbandwagon4
 
nonbox marketing summit
nonbox marketing summitnonbox marketing summit
nonbox marketing summit
 
SMUM Morning Keynote
SMUM Morning KeynoteSMUM Morning Keynote
SMUM Morning Keynote
 

Recently uploaded

Presentation4 (2) survey responses clearly labelled
Presentation4 (2) survey responses clearly labelledPresentation4 (2) survey responses clearly labelled
Presentation4 (2) survey responses clearly labelledCaitlinCummins3
 
Guide to Networking Essentials 8th Edition by Greg Tomsho solution manual.doc
Guide to Networking Essentials 8th Edition by Greg Tomsho solution manual.docGuide to Networking Essentials 8th Edition by Greg Tomsho solution manual.doc
Guide to Networking Essentials 8th Edition by Greg Tomsho solution manual.docssuserf63bd7
 
What is paper chromatography, principal, procedure,types, diagram, advantages...
What is paper chromatography, principal, procedure,types, diagram, advantages...What is paper chromatography, principal, procedure,types, diagram, advantages...
What is paper chromatography, principal, procedure,types, diagram, advantages...srcw2322l101
 
8 Questions B2B Commercial Teams Can Ask To Help Product Discovery
8 Questions B2B Commercial Teams Can Ask To Help Product Discovery8 Questions B2B Commercial Teams Can Ask To Help Product Discovery
8 Questions B2B Commercial Teams Can Ask To Help Product DiscoveryDesmond Leo
 
Elevate Your Online Presence with SEO Services
Elevate Your Online Presence with SEO ServicesElevate Your Online Presence with SEO Services
Elevate Your Online Presence with SEO ServicesHaseebBashir5
 
TriStar Gold Corporate Presentation May 2024
TriStar Gold Corporate Presentation May 2024TriStar Gold Corporate Presentation May 2024
TriStar Gold Corporate Presentation May 2024Adnet Communications
 
How to Maintain Healthy Life style.pptx
How to Maintain  Healthy Life style.pptxHow to Maintain  Healthy Life style.pptx
How to Maintain Healthy Life style.pptxrdishurana
 
MichaelStarkes_UncutGemsProjectSummary.pdf
MichaelStarkes_UncutGemsProjectSummary.pdfMichaelStarkes_UncutGemsProjectSummary.pdf
MichaelStarkes_UncutGemsProjectSummary.pdfmstarkes24
 
Copyright: What Creators and Users of Art Need to Know
Copyright: What Creators and Users of Art Need to KnowCopyright: What Creators and Users of Art Need to Know
Copyright: What Creators and Users of Art Need to KnowMiriam Robeson
 
LinkedIn Masterclass Techweek 2024 v4.1.pptx
LinkedIn Masterclass Techweek 2024 v4.1.pptxLinkedIn Masterclass Techweek 2024 v4.1.pptx
LinkedIn Masterclass Techweek 2024 v4.1.pptxSymbio Agency Ltd
 
NewBase 17 May 2024 Energy News issue - 1725 by Khaled Al Awadi_compresse...
NewBase   17 May  2024  Energy News issue - 1725 by Khaled Al Awadi_compresse...NewBase   17 May  2024  Energy News issue - 1725 by Khaled Al Awadi_compresse...
NewBase 17 May 2024 Energy News issue - 1725 by Khaled Al Awadi_compresse...Khaled Al Awadi
 
tekAura | Desktop Procedure Template (2016)
tekAura | Desktop Procedure Template (2016)tekAura | Desktop Procedure Template (2016)
tekAura | Desktop Procedure Template (2016)Norah Medlin
 
Your Work Matters to God RestorationChurch.pptx
Your Work Matters to God RestorationChurch.pptxYour Work Matters to God RestorationChurch.pptx
Your Work Matters to God RestorationChurch.pptxOs Hillman
 
Powers and Functions of CPCB - The Water Act 1974.pdf
Powers and Functions of CPCB - The Water Act 1974.pdfPowers and Functions of CPCB - The Water Act 1974.pdf
Powers and Functions of CPCB - The Water Act 1974.pdflinciy03
 
hyundai capital 2023 consolidated financial statements
hyundai capital 2023 consolidated financial statementshyundai capital 2023 consolidated financial statements
hyundai capital 2023 consolidated financial statementsirhcs
 
PitchBook’s Guide to VC Funding for Startups
PitchBook’s Guide to VC Funding for StartupsPitchBook’s Guide to VC Funding for Startups
PitchBook’s Guide to VC Funding for StartupsAlejandro Cremades
 
Raising Seed Capital by Steve Schlafman at RRE Ventures
Raising Seed Capital by Steve Schlafman at RRE VenturesRaising Seed Capital by Steve Schlafman at RRE Ventures
Raising Seed Capital by Steve Schlafman at RRE VenturesAlejandro Cremades
 
Stages of Startup Funding - An Explainer
Stages of Startup Funding - An ExplainerStages of Startup Funding - An Explainer
Stages of Startup Funding - An ExplainerAlejandro Cremades
 
Innomantra Viewpoint - Building Moonshots : May-Jun 2024.pdf
Innomantra Viewpoint - Building Moonshots : May-Jun 2024.pdfInnomantra Viewpoint - Building Moonshots : May-Jun 2024.pdf
Innomantra Viewpoint - Building Moonshots : May-Jun 2024.pdfInnomantra
 

Recently uploaded (20)

WAM Corporate Presentation May 2024_w.pdf
WAM Corporate Presentation May 2024_w.pdfWAM Corporate Presentation May 2024_w.pdf
WAM Corporate Presentation May 2024_w.pdf
 
Presentation4 (2) survey responses clearly labelled
Presentation4 (2) survey responses clearly labelledPresentation4 (2) survey responses clearly labelled
Presentation4 (2) survey responses clearly labelled
 
Guide to Networking Essentials 8th Edition by Greg Tomsho solution manual.doc
Guide to Networking Essentials 8th Edition by Greg Tomsho solution manual.docGuide to Networking Essentials 8th Edition by Greg Tomsho solution manual.doc
Guide to Networking Essentials 8th Edition by Greg Tomsho solution manual.doc
 
What is paper chromatography, principal, procedure,types, diagram, advantages...
What is paper chromatography, principal, procedure,types, diagram, advantages...What is paper chromatography, principal, procedure,types, diagram, advantages...
What is paper chromatography, principal, procedure,types, diagram, advantages...
 
8 Questions B2B Commercial Teams Can Ask To Help Product Discovery
8 Questions B2B Commercial Teams Can Ask To Help Product Discovery8 Questions B2B Commercial Teams Can Ask To Help Product Discovery
8 Questions B2B Commercial Teams Can Ask To Help Product Discovery
 
Elevate Your Online Presence with SEO Services
Elevate Your Online Presence with SEO ServicesElevate Your Online Presence with SEO Services
Elevate Your Online Presence with SEO Services
 
TriStar Gold Corporate Presentation May 2024
TriStar Gold Corporate Presentation May 2024TriStar Gold Corporate Presentation May 2024
TriStar Gold Corporate Presentation May 2024
 
How to Maintain Healthy Life style.pptx
How to Maintain  Healthy Life style.pptxHow to Maintain  Healthy Life style.pptx
How to Maintain Healthy Life style.pptx
 
MichaelStarkes_UncutGemsProjectSummary.pdf
MichaelStarkes_UncutGemsProjectSummary.pdfMichaelStarkes_UncutGemsProjectSummary.pdf
MichaelStarkes_UncutGemsProjectSummary.pdf
 
Copyright: What Creators and Users of Art Need to Know
Copyright: What Creators and Users of Art Need to KnowCopyright: What Creators and Users of Art Need to Know
Copyright: What Creators and Users of Art Need to Know
 
LinkedIn Masterclass Techweek 2024 v4.1.pptx
LinkedIn Masterclass Techweek 2024 v4.1.pptxLinkedIn Masterclass Techweek 2024 v4.1.pptx
LinkedIn Masterclass Techweek 2024 v4.1.pptx
 
NewBase 17 May 2024 Energy News issue - 1725 by Khaled Al Awadi_compresse...
NewBase   17 May  2024  Energy News issue - 1725 by Khaled Al Awadi_compresse...NewBase   17 May  2024  Energy News issue - 1725 by Khaled Al Awadi_compresse...
NewBase 17 May 2024 Energy News issue - 1725 by Khaled Al Awadi_compresse...
 
tekAura | Desktop Procedure Template (2016)
tekAura | Desktop Procedure Template (2016)tekAura | Desktop Procedure Template (2016)
tekAura | Desktop Procedure Template (2016)
 
Your Work Matters to God RestorationChurch.pptx
Your Work Matters to God RestorationChurch.pptxYour Work Matters to God RestorationChurch.pptx
Your Work Matters to God RestorationChurch.pptx
 
Powers and Functions of CPCB - The Water Act 1974.pdf
Powers and Functions of CPCB - The Water Act 1974.pdfPowers and Functions of CPCB - The Water Act 1974.pdf
Powers and Functions of CPCB - The Water Act 1974.pdf
 
hyundai capital 2023 consolidated financial statements
hyundai capital 2023 consolidated financial statementshyundai capital 2023 consolidated financial statements
hyundai capital 2023 consolidated financial statements
 
PitchBook’s Guide to VC Funding for Startups
PitchBook’s Guide to VC Funding for StartupsPitchBook’s Guide to VC Funding for Startups
PitchBook’s Guide to VC Funding for Startups
 
Raising Seed Capital by Steve Schlafman at RRE Ventures
Raising Seed Capital by Steve Schlafman at RRE VenturesRaising Seed Capital by Steve Schlafman at RRE Ventures
Raising Seed Capital by Steve Schlafman at RRE Ventures
 
Stages of Startup Funding - An Explainer
Stages of Startup Funding - An ExplainerStages of Startup Funding - An Explainer
Stages of Startup Funding - An Explainer
 
Innomantra Viewpoint - Building Moonshots : May-Jun 2024.pdf
Innomantra Viewpoint - Building Moonshots : May-Jun 2024.pdfInnomantra Viewpoint - Building Moonshots : May-Jun 2024.pdf
Innomantra Viewpoint - Building Moonshots : May-Jun 2024.pdf
 

Risky business of social media

  • 1. The Risky Business of Social Media Tom Snyder Trivera Interactive Contents Copyright © 2011 Trivera Interactive and ISACA
  • 2.
  • 3. I’m the guy who convinces your marketing people to do all the Social Media stuff that turns the IT, IS, Security, Legal and HR people into this:
  • 4.
  • 5. 95% of social media users now use it for business reasons 61% use public social media sites like LinkedIn, Twitter, Facebook, and YouTube every day (up from 51% in 2008). 15% use these sites "constantly throughout the day. 56% work for companies that have no policies that cover use at work and outside work Social Media Usage
  • 6.  
  • 7. 76% of companies now use Social Media for business purposes 43% have experienced employee misuse 31% have disciplined employees for misuse 29% block employee access 27% monitor employee use 25% ban use for non-business purposes Social Media Usage
  • 10.
  • 11.
  • 12.
  • 13. Tactics without strategy is the noise before defeat Strategy without tactics is the slowest route to victory -Sun Tzu Addressing Risk
  • 14.
  • 15.
  • 16.
  • 17.
  • 18.
  • 19.
  • 20.
  • 21.  
  • 22. Tom Snyder [email_address] http://www.triveraguy.com Trivera Interactive http://www.trivera.com ISACA http:// www.isaca.org/socialmedia Contents Copyright © 2011 Trivera Interactive and ISACA