Successfully reported this slideshow.
We use your LinkedIn profile and activity data to personalize ads and to show you more relevant ads. You can change your ad preferences anytime.

Social collaboration 10 must have tips for security, productivity and compliance


Published on

Published in: Technology, Economy & Finance
  • Be the first to comment

Social collaboration 10 must have tips for security, productivity and compliance

  1. 1. Social Collaboration:  10 must have tips for security, productivity and compliance Sarah Carter, VP Marketing Actiance, Inc. <ul><li>Confidential and Proprietary © 2011, Actiance, Inc. </li></ul><ul><li>All rights reserved. Actiance and the Actiance logo are trademarks of Actiance, Inc. </li></ul>
  2. 2. Ten Tips to Safe Social Collaboration <ul><li>Understand the landscape </li></ul><ul><li>Consider and address the risks </li></ul><ul><li>Understand the legal and regulatory situation </li></ul><ul><li>Establish a presence </li></ul><ul><li>Engage and be engaging </li></ul><ul><li>Consider Enterprise Social </li></ul><ul><li>Educate </li></ul><ul><li>Control, Manage, Secure </li></ul><ul><li>Review and Revise </li></ul><ul><li>Measure </li></ul>
  3. 3. The Internet Has Changed <ul><li>Public IM </li></ul><ul><li>P2P </li></ul><ul><li>Anonymizers </li></ul><ul><li>VoIP </li></ul><ul><li>Social Networks </li></ul><ul><li>Games </li></ul><ul><li>Virtual Worlds </li></ul><ul><li>IPTV </li></ul>Source: Actiance Annual Greynets Surveys 2008 – 2011 & Projected <ul><li>Financial IM </li></ul><ul><li>Unified Communications </li></ul><ul><li>Web Conferencing </li></ul><ul><li>VoIP </li></ul><ul><li>Remote Admin Tools </li></ul>
  4. 4. The Enterprise and Web 2.0 Are Converging Source: Actiance Annual Collaborative Internet Surveys 2008 – 2011 & Projected 2008 2009 2010 2011 2010 2009 2008
  5. 5. Social Is Booming <ul><li>Social Networking </li></ul><ul><li>Social Collaboration </li></ul><ul><li>Social Publishing </li></ul><ul><li>Social Feedback </li></ul><ul><li>Social Analytics </li></ul>Confidential and Proprietary © 2011, Actiance, Inc. All rights reserved.
  6. 6. Understand the Social Risks Data Leakage Personal Information Intellectual Property Credit Card, SSN Patient Records Incoming Threats Malware, Spyware Viruses, Trojans Inappropriate Content Compliance & eDiscovery SEC, FINRA, NFA HIPAA, FISMA, SOX PCI, FOI, DOD, FSA FRCP- eDiscovery FERC, NERC User Behavior Employee Productivity Bandwidth Explosion Every employee is the face of the business
  7. 7. Best Practices – The 4E’s Objective Recommendation Establish Create a LinkedIn profile and populate with relevant information Engage Make it easy for your network to contact, interact, and communicate with you Educate Publish event notifications, news updates, upcoming conferences, job openings, etc. Expand Offer links to other professionals or like-minded individuals (e.g., tax specialists, estate planning attorneys, etc.)
  8. 8. Establishing a Presence Social Media? <ul><li>Generate buzz and increase visibility </li></ul><ul><li>Strengthen customer relations </li></ul><ul><li>Build an additional revenue source </li></ul><ul><li>Extend your brand </li></ul><ul><li>Sales & Marketing </li></ul><ul><ul><li>Promotions </li></ul></ul><ul><ul><li>Advertising </li></ul></ul><ul><ul><li>Branding </li></ul></ul><ul><li>HR </li></ul><ul><ul><li>Background checks </li></ul></ul><ul><ul><li>Recruiting </li></ul></ul><ul><li>Scientists & Researchers </li></ul><ul><ul><li>Information exchange </li></ul></ul><ul><ul><li>Collaboration </li></ul></ul><ul><li>IT </li></ul><ul><ul><li>Investigation of security breaches </li></ul></ul>
  9. 9. Social Networking: Balancing Benefit & Risk <ul><li>Risks & Challenges </li></ul><ul><li>Employee productivity </li></ul><ul><li>Control who can access what, when, and for how long </li></ul><ul><li>Content security </li></ul><ul><li>Introduction of malware </li></ul><ul><li>Brand and reputation protection </li></ul><ul><li>Allow “approved corporate posters” to self-moderate </li></ul><ul><li>Moderate posts from unapproved corporate posters </li></ul><ul><li>IP/Information Leak Prevention/NDA compliance </li></ul><ul><li>Sensitive, confidential term dictionary matching </li></ul><ul><li>Stop contract staff accidentally leaking your secrets </li></ul><ul><li>Quarantine posts for moderation by a reviewer </li></ul><ul><li>Quick deployment, no desktop touch </li></ul><ul><li>Compliance with regulation (e.g., FSA, PCI) </li></ul><ul><li>Archive content </li></ul><ul><li>Stop credit card number patterns </li></ul><ul><li>Control specific content </li></ul>
  10. 10. Establish a Presence (1a) <ul><li>Create a LinkedIn Profile </li></ul><ul><ul><li>Basic info, employment history, education, summary </li></ul></ul><ul><li>Build out full content – its your resume </li></ul><ul><ul><li>Approachable descriptions </li></ul></ul><ul><ul><li>Friendly, but professional </li></ul></ul><ul><ul><li>What’s in it for THEM? </li></ul></ul><ul><li>Provide external contact info </li></ul><ul><ul><li>Twitter, Blogs, Website </li></ul></ul><ul><ul><li>Personalize your URL </li></ul></ul>
  11. 11. Establish a Presence <ul><li>Use Groups </li></ul><ul><li>Answers </li></ul><ul><li>Use Applications </li></ul>
  12. 12. Engage with Customers, Colleagues, and Prospects (1) <ul><li>Network with others </li></ul><ul><li>Look for jobs or candidates </li></ul><ul><li>Prospect for new business/customers </li></ul><ul><li>Advertise </li></ul><ul><li>Promote your company </li></ul><ul><li>Post updates, comments, etc. </li></ul><ul><li>Answer questions </li></ul><ul><li>Follow companies </li></ul><ul><li>Keep tabs on your network </li></ul><ul><li>Provide links to other resources </li></ul>
  13. 13. Educate Your Network <ul><li>Publish events, upcoming conferences, speaking engagements, etc. </li></ul><ul><li>“ attend events” – reach out to other attendees </li></ul><ul><li>Publish links to other relevant content (e.g., websites, collateral) </li></ul><ul><li>Industry news feeds </li></ul>
  14. 14. Educate & Re Educate Your Network <ul><li>When you have new news </li></ul><ul><ul><li>Message your network </li></ul></ul><ul><ul><li>We have a TRIBAL response to Social Networks – people respond more in this medium that they do IN ANY OTHER digital medium </li></ul></ul><ul><ul><li>50 messages at a time </li></ul></ul><ul><ul><li>My experience? 40% response if you get your message RIGHT, personal and timely </li></ul></ul><ul><ul><li>Do NOT overuse it </li></ul></ul>
  15. 15. Control, Manage, Secure Issue Control Requirements Identity management Ensure that all the different logins of an individual link back to corporate identity Activity control Posting of content allowed for marketing but read-only for everyone else Granular application control Employees can access Facebook, but not Facebook Chat or Facebook Games Anti-malware Protect network against hidden phishing or Trojan attacks Data leak prevention Protect organization from employees disclosing sensitive information Moderation Messages posted only upon approval by designated officer Logging and archiving Log all content posted to social networks Export of data Export stored data to any email archive or WORM storage
  16. 16. End Users Adopting Web 2.0 Faster Than IT Can Control Actual customer traffic history (~155 organizations) Representing all Internet activity from over 150K end users (Actiance Internet Survey 2009) Source: Actiance Annual Internet Survey 2010
  17. 17. Social Networking Feature Control <ul><li>Control features or areas of content posting by user or group </li></ul>
  18. 18. Content Monitoring <ul><li>Policy summaries </li></ul><ul><li>Easy-to-set policies </li></ul><ul><ul><li>Archiving </li></ul></ul><ul><ul><li>Moderation </li></ul></ul><ul><li>Lexicons </li></ul><ul><li>Actions to take </li></ul>
  19. 19. eDiscovery of Social Networking Posts <ul><li>Social networking activity and posts are captured </li></ul><ul><li>All the captured events are presented for eDiscovery and available for export to archiving platforms </li></ul>
  20. 20. Measuring Your Efforts <ul><li>Number of Connections </li></ul><ul><ul><li>The more connected your are, the more connected you can be </li></ul></ul><ul><ul><li>Make connections meaningful – a network of “connect with me even if you don’t know me has NO VALUE – you can buy a list from a list broker. </li></ul></ul><ul><li>Number of responses from outreach </li></ul><ul><ul><li>Using advanced search, responses from inmails, messages etc </li></ul></ul><ul><li>Comments on Discussions, in Groups, Answers </li></ul><ul><li>Number of Comments or Replies </li></ul><ul><li>Number of page views </li></ul><ul><li>Followers to your blog, twitter followers, retweets </li></ul>Confidential and Proprietary © 2011, Actiance, Inc. All rights reserved.
  21. 21. About Actiance: Enabling the New Internet <ul><li>Market leader for security and compliance solutions </li></ul><ul><li>Focused on Web 2.0, Social media, Unified communications </li></ul><ul><li>Global operations </li></ul><ul><li>1,600 customers across a range of industries </li></ul><ul><li>Broadest partner ecosystem </li></ul>
  22. 22. More Info? <ul><li> </li></ul><ul><li>Visit the Actiance Collateral Library at </li></ul><ul><li>Specific Questions? </li></ul><ul><li> </li></ul><ul><li>Twitter: @SarahActiance </li></ul><ul><li>Email: </li></ul><ul><li>650 631 6452 (desk) </li></ul><ul><li>415 806 9504 (cell) </li></ul><ul><li>+44 (0) 7970 729068 (UK mobile) </li></ul>
  23. 23. Ten Tips to Safe Social Collaboration <ul><li>Understand the landscape </li></ul><ul><li>Consider and address the risks </li></ul><ul><li>Understand the legal and regulatory situation </li></ul><ul><li>Establish a presence </li></ul><ul><li>Engage and be engaging </li></ul><ul><li>Consider Enterprise Social </li></ul><ul><li>Educate </li></ul><ul><li>Control, Manage, Secure </li></ul><ul><li>Review and Revise </li></ul><ul><li>Measure </li></ul>
  24. 24. Sarah Carter, VP Marketing Actiance, Inc Pg.