SlideShare uma empresa Scribd logo
1 de 14
How to Enable Social Media in Financial Services
Agenda

    Intro
    About Actiance
    Social Media on the Rise
    Benefits of Social Media
    Understanding the Risks
    Applicable Regulations
    Anecdotes
    Applying Appropriate Controls
    Wrap-up




1   Confidential and Proprietary © 2011, Actiance, Inc. All rights reserved.
About Actiance

    Enable the New Internet
      – 4,500+ Web 2.0 apps, Unified
           Communications, Social Networks
    Global operations
      – USA, EMEA, India, Asia/Pacific
    Market Leader
      – 9 of the top 10 US banks
      – Top 5 Canadian banks
      – 3 of the top 5 energy companies
    Broadest Partner Ecosystem
      – Technology alliances


2   Confidential and Proprietary © 2011, Actiance, Inc. All rights reserved.
Social Is Booming


    Social Networking


    Social Collaboration


    Social Publishing


    Social Feedback




3    Confidential and Proprietary © 2011, Actiance, Inc. All rights reserved.
Upside of Social Media

    Generate buzz and increase visibility


    Strengthen customer relations


    Build an additional revenue source


    Extend your brand




4    Confidential and Proprietary © 2011, Actiance, Inc. All rights reserved.
Risks of Using Social Media and Web 2.0

    Data Leakage          Incoming Threats   Compliance & eDiscovery      User Behavior




Personal                                      SEC, FINRA               Employee
Information             Malware, Spyware                               Productivity
                                              HIPAA, FISMA
Intellectual Property   Viruses, Trojans                               Bandwidth
                                              SOX, PCI, FSA
Credit Card,                                                           Explosion
                        Inappropriate
SSN                                           FRCP- eDiscovery
                        Content                                        Every employee is
Client Records                                FERC, NERC               the face of business
Web 2.0 & Social Networks Regulation & Compliance



          Regulation                             Social Network and Web 2.0 Impact

                                Obliged to store records and make accessible. Public correspondence requires
SEC and FINRA                   approval, review and retention. Extended to social media.
                                http://www.finra.org/Industry/Issues/Advertising/p006118

                                Protect information, monitor for sensitive content, and ensure not sent over
Gramm-Leach-Bliley Act (GLBA)   public channels (e.g., Twitter)

                                Ensuring cardholder data is not sent over unsecured channels AND PROVING
PCI                             IT
                                Prevent identity theft. Protect IM and Web 2.0 from malware and phishing
Red Flag Rules                  when users are more likely to drop their guard.

                                Email and IM are ESI. Posts to social media sites must be preserved if
FRCP (eDiscovery)               reasonably determined to be discoverable. http://blog.twitter.com/


Sarbanes-Oxley (SOX)            Businesses must preserve information relevant to the company reporting.
Real-Life Anecdotes


    Citibank
    Deloitte Financial
    Northshore Bank
    Online Banking




7    Confidential and Proprietary © 2011, Actiance, Inc. All rights reserved.
Appropriate Controls: The Basics

    Who needs controls applied?
       Users within your organization - HR, Marketing, Sales, IT?

    How do I apply these controls?
       Are there tools available?

    Where do I get started?




8   Confidential and Proprietary © 2011, Actiance, Inc. All rights reserved.
Appropriate Controls: The Specifics


                 Issue                                                           Control Requirements

Identity management                             Ensure that all the different logins of an individual link back to corporate identity

Activity control                                Posting of content allowed for marketing but read-only for everyone else

Granular application control                    Employees can access Facebook, but not Facebook Chat or Facebook Games


Anti-malware                                    Protect network against hidden phishing or Trojan attacks


Data leak prevention                            Protect organization from employees disclosing sensitive information


Moderation                                      Messages posted only upon approval by designated officer

Logging and archiving                           Log all content posted to social networks

Export of data                                  Export stored data to any email archive or WORM storage




9     Confidential and Proprietary © 2011, Actiance, Inc. All rights reserved.
Appropriate Controls: Moderation




                                                                                Posts to Twitter/Facebook/LinkedIn
                                                                                held for review by the following
                                                                                criteria:
                                                                            – All
                                                                            – Keyword/dictionary matches
                                                                            – Regular expressions (e.g., credit
                                                                              card/SSN patterns)


10   Confidential and Proprietary © 2011, Actiance, Inc. All rights reserved.
Appropriate Controls: Archiving for eDiscovery

     Social networking activity and
     posts are captured




                                                                                 All the captured
                                                                                 events are presented
                                                                                 for eDiscovery and
                                                                                 available for export to
                                                                                 archiving platforms



11    Confidential and Proprietary © 2011, Actiance, Inc. All rights reserved.
Further Reading and Materials


 Osterman Research White Paper
       “The Impact of New Communications
       Tools for Financial Services Organizations”



 Meeting FINRA 10-06 Compliance Guidelines White Paper
 How Actiance address FINRA 10-06 Matrix
 2010 Internet Usage Survey Results




12   Confidential and Proprietary © 2011, Actiance, Inc. All rights reserved.
Questions

Mais conteúdo relacionado

Mais procurados

Actiance - BDI 6.14.11 Mobile Financial Services Communications Leadership Forum
Actiance - BDI 6.14.11 Mobile Financial Services Communications Leadership ForumActiance - BDI 6.14.11 Mobile Financial Services Communications Leadership Forum
Actiance - BDI 6.14.11 Mobile Financial Services Communications Leadership ForumBusiness Development Institute
 
Six Irrefutable Laws of Information Security
Six Irrefutable Laws of Information SecuritySix Irrefutable Laws of Information Security
Six Irrefutable Laws of Information SecurityIT@Intel
 
Bright talk intrusion prevention are we joking - henshaw july 2010 a
Bright talk   intrusion prevention are we joking - henshaw july 2010 aBright talk   intrusion prevention are we joking - henshaw july 2010 a
Bright talk intrusion prevention are we joking - henshaw july 2010 aMark Henshaw
 
Centrify rethink security brochure
Centrify rethink security brochureCentrify rethink security brochure
Centrify rethink security brochureMark Gibson
 
Best Practice For Public Sector Information Security And Compliance
Best  Practice For  Public  Sector    Information  Security And  ComplianceBest  Practice For  Public  Sector    Information  Security And  Compliance
Best Practice For Public Sector Information Security And ComplianceOracle
 
IT vs. Users? How Law Firms Can Maximize Security While Granting Access to th...
IT vs. Users? How Law Firms Can Maximize Security While Granting Access to th...IT vs. Users? How Law Firms Can Maximize Security While Granting Access to th...
IT vs. Users? How Law Firms Can Maximize Security While Granting Access to th...Authentic8
 
Managing IT security and Business Ethics
Managing IT security and Business EthicsManaging IT security and Business Ethics
Managing IT security and Business EthicsRahul Sharma
 
Managed Security for Your Business
Managed Security for Your BusinessManaged Security for Your Business
Managed Security for Your BusinessSikich LLP
 
Security is Hard
Security is HardSecurity is Hard
Security is HardMike Murray
 
A Guide to Internet Security For Businesses- Business.com
A Guide to Internet Security For Businesses- Business.comA Guide to Internet Security For Businesses- Business.com
A Guide to Internet Security For Businesses- Business.comBusiness.com
 
The importance of information security nowadays
The importance of information security nowadaysThe importance of information security nowadays
The importance of information security nowadaysPECB
 
Cyber Privacy & Password Protection
Cyber Privacy & Password ProtectionCyber Privacy & Password Protection
Cyber Privacy & Password ProtectionNikhil D
 
Mitigating Malware Presentation Jkd 11 10 08 Aitp
Mitigating Malware Presentation Jkd 11 10 08 AitpMitigating Malware Presentation Jkd 11 10 08 Aitp
Mitigating Malware Presentation Jkd 11 10 08 AitpJoann Davis
 
Strong Authentication: Securing Identities and Enabling Business
Strong Authentication: Securing Identities and Enabling BusinessStrong Authentication: Securing Identities and Enabling Business
Strong Authentication: Securing Identities and Enabling BusinessSafeNet
 
Top 10 Tips for Data Security
Top 10 Tips for Data SecurityTop 10 Tips for Data Security
Top 10 Tips for Data Securitylgcdcpas
 
introduction to cyber security
introduction to cyber securityintroduction to cyber security
introduction to cyber securitySlamet Ar Rokhim
 

Mais procurados (20)

Actiance - BDI 6.14.11 Mobile Financial Services Communications Leadership Forum
Actiance - BDI 6.14.11 Mobile Financial Services Communications Leadership ForumActiance - BDI 6.14.11 Mobile Financial Services Communications Leadership Forum
Actiance - BDI 6.14.11 Mobile Financial Services Communications Leadership Forum
 
Six Irrefutable Laws of Information Security
Six Irrefutable Laws of Information SecuritySix Irrefutable Laws of Information Security
Six Irrefutable Laws of Information Security
 
Bright talk intrusion prevention are we joking - henshaw july 2010 a
Bright talk   intrusion prevention are we joking - henshaw july 2010 aBright talk   intrusion prevention are we joking - henshaw july 2010 a
Bright talk intrusion prevention are we joking - henshaw july 2010 a
 
Centrify rethink security brochure
Centrify rethink security brochureCentrify rethink security brochure
Centrify rethink security brochure
 
Best Practice For Public Sector Information Security And Compliance
Best  Practice For  Public  Sector    Information  Security And  ComplianceBest  Practice For  Public  Sector    Information  Security And  Compliance
Best Practice For Public Sector Information Security And Compliance
 
Cyber liabilty
Cyber liabiltyCyber liabilty
Cyber liabilty
 
Cyber Liabilty: A new exposure for businesses
Cyber Liabilty: A new exposure for businesses Cyber Liabilty: A new exposure for businesses
Cyber Liabilty: A new exposure for businesses
 
Heartbleed
HeartbleedHeartbleed
Heartbleed
 
IT vs. Users? How Law Firms Can Maximize Security While Granting Access to th...
IT vs. Users? How Law Firms Can Maximize Security While Granting Access to th...IT vs. Users? How Law Firms Can Maximize Security While Granting Access to th...
IT vs. Users? How Law Firms Can Maximize Security While Granting Access to th...
 
Managing IT security and Business Ethics
Managing IT security and Business EthicsManaging IT security and Business Ethics
Managing IT security and Business Ethics
 
Managed Security for Your Business
Managed Security for Your BusinessManaged Security for Your Business
Managed Security for Your Business
 
Security is Hard
Security is HardSecurity is Hard
Security is Hard
 
A Guide to Internet Security For Businesses- Business.com
A Guide to Internet Security For Businesses- Business.comA Guide to Internet Security For Businesses- Business.com
A Guide to Internet Security For Businesses- Business.com
 
The importance of information security nowadays
The importance of information security nowadaysThe importance of information security nowadays
The importance of information security nowadays
 
CyberCrime attacks on Small Businesses
CyberCrime attacks on Small BusinessesCyberCrime attacks on Small Businesses
CyberCrime attacks on Small Businesses
 
Cyber Privacy & Password Protection
Cyber Privacy & Password ProtectionCyber Privacy & Password Protection
Cyber Privacy & Password Protection
 
Mitigating Malware Presentation Jkd 11 10 08 Aitp
Mitigating Malware Presentation Jkd 11 10 08 AitpMitigating Malware Presentation Jkd 11 10 08 Aitp
Mitigating Malware Presentation Jkd 11 10 08 Aitp
 
Strong Authentication: Securing Identities and Enabling Business
Strong Authentication: Securing Identities and Enabling BusinessStrong Authentication: Securing Identities and Enabling Business
Strong Authentication: Securing Identities and Enabling Business
 
Top 10 Tips for Data Security
Top 10 Tips for Data SecurityTop 10 Tips for Data Security
Top 10 Tips for Data Security
 
introduction to cyber security
introduction to cyber securityintroduction to cyber security
introduction to cyber security
 

Semelhante a Actiance Presentation - BDI 2/9/11 Financial Services Social Communications Leadership Forum

Risk Management Practices for PCI DSS 2.0
Risk Management Practices for PCI DSS 2.0Risk Management Practices for PCI DSS 2.0
Risk Management Practices for PCI DSS 2.0Ulf Mattsson
 
Cyberoam: il futuro della network security!
Cyberoam: il futuro della network security!Cyberoam: il futuro della network security!
Cyberoam: il futuro della network security!Team Sistemi
 
IT Security Presentation - IIMC 2014 Conference
IT Security Presentation - IIMC 2014 ConferenceIT Security Presentation - IIMC 2014 Conference
IT Security Presentation - IIMC 2014 ConferenceJeff Lemmermann
 
FaceTime - DSS @Vilnius 2010
FaceTime - DSS @Vilnius 2010FaceTime - DSS @Vilnius 2010
FaceTime - DSS @Vilnius 2010Andris Soroka
 
PCTY 2012, IBM Security and Strategy v. Fabio Panada
PCTY 2012, IBM Security and Strategy v. Fabio PanadaPCTY 2012, IBM Security and Strategy v. Fabio Panada
PCTY 2012, IBM Security and Strategy v. Fabio PanadaIBM Danmark
 
Identity intelligence: Threat-aware Identity and Access Management
Identity intelligence: Threat-aware Identity and Access ManagementIdentity intelligence: Threat-aware Identity and Access Management
Identity intelligence: Threat-aware Identity and Access ManagementProlifics
 
Security in Web 2.0, Social Web and Cloud
Security in Web 2.0, Social Web and CloudSecurity in Web 2.0, Social Web and Cloud
Security in Web 2.0, Social Web and CloudITDogadjaji.com
 
Information Security Risk Management
Information Security Risk ManagementInformation Security Risk Management
Information Security Risk Managementipspat
 
Information security management v2010
Information security management v2010Information security management v2010
Information security management v2010joevest
 
Безопасность данных мобильных приложений. Мифы и реальность.
Безопасность данных мобильных приложений. Мифы и реальность.Безопасность данных мобильных приложений. Мифы и реальность.
Безопасность данных мобильных приложений. Мифы и реальность.Advanced monitoring
 
Information Management in a Web 2.0 World May 2009
Information Management in a Web 2.0 World May 2009Information Management in a Web 2.0 World May 2009
Information Management in a Web 2.0 World May 2009Collabor8now Ltd
 
Shaping-Up SharePoint Security in 5 Steps
Shaping-Up SharePoint Security in 5 StepsShaping-Up SharePoint Security in 5 Steps
Shaping-Up SharePoint Security in 5 StepsImperva
 
Joanna Belbey, Actiance Presentation - BDI 2/23/12 Social Media in Wealth Man...
Joanna Belbey, Actiance Presentation - BDI 2/23/12 Social Media in Wealth Man...Joanna Belbey, Actiance Presentation - BDI 2/23/12 Social Media in Wealth Man...
Joanna Belbey, Actiance Presentation - BDI 2/23/12 Social Media in Wealth Man...Business Development Institute
 
Ulf mattsson webinar jun 7 2012 slideshare version
Ulf mattsson webinar jun 7 2012   slideshare versionUlf mattsson webinar jun 7 2012   slideshare version
Ulf mattsson webinar jun 7 2012 slideshare versionUlf Mattsson
 
ISACA NA CACS 2012 Orlando session 414 Ulf Mattsson
ISACA NA CACS 2012 Orlando session 414 Ulf MattssonISACA NA CACS 2012 Orlando session 414 Ulf Mattsson
ISACA NA CACS 2012 Orlando session 414 Ulf MattssonUlf Mattsson
 
Cloud Privacy Update: What You Need to Know
Cloud Privacy Update: What You Need to KnowCloud Privacy Update: What You Need to Know
Cloud Privacy Update: What You Need to KnowAct-On Software
 
2022 APIsecure_Understanding API Abuse With Behavioral Analytics
2022 APIsecure_Understanding API Abuse With Behavioral Analytics2022 APIsecure_Understanding API Abuse With Behavioral Analytics
2022 APIsecure_Understanding API Abuse With Behavioral AnalyticsAPIsecure_ Official
 
Ssi Data Protection Solutions V0.2
Ssi Data Protection Solutions V0.2Ssi Data Protection Solutions V0.2
Ssi Data Protection Solutions V0.2olambel
 

Semelhante a Actiance Presentation - BDI 2/9/11 Financial Services Social Communications Leadership Forum (20)

Risk Management Practices for PCI DSS 2.0
Risk Management Practices for PCI DSS 2.0Risk Management Practices for PCI DSS 2.0
Risk Management Practices for PCI DSS 2.0
 
Cyberoam: il futuro della network security!
Cyberoam: il futuro della network security!Cyberoam: il futuro della network security!
Cyberoam: il futuro della network security!
 
IT Security Presentation - IIMC 2014 Conference
IT Security Presentation - IIMC 2014 ConferenceIT Security Presentation - IIMC 2014 Conference
IT Security Presentation - IIMC 2014 Conference
 
FaceTime - DSS @Vilnius 2010
FaceTime - DSS @Vilnius 2010FaceTime - DSS @Vilnius 2010
FaceTime - DSS @Vilnius 2010
 
PCTY 2012, IBM Security and Strategy v. Fabio Panada
PCTY 2012, IBM Security and Strategy v. Fabio PanadaPCTY 2012, IBM Security and Strategy v. Fabio Panada
PCTY 2012, IBM Security and Strategy v. Fabio Panada
 
Identity intelligence: Threat-aware Identity and Access Management
Identity intelligence: Threat-aware Identity and Access ManagementIdentity intelligence: Threat-aware Identity and Access Management
Identity intelligence: Threat-aware Identity and Access Management
 
Security in Web 2.0, Social Web and Cloud
Security in Web 2.0, Social Web and CloudSecurity in Web 2.0, Social Web and Cloud
Security in Web 2.0, Social Web and Cloud
 
Information Security Risk Management
Information Security Risk ManagementInformation Security Risk Management
Information Security Risk Management
 
Information security management v2010
Information security management v2010Information security management v2010
Information security management v2010
 
Безопасность данных мобильных приложений. Мифы и реальность.
Безопасность данных мобильных приложений. Мифы и реальность.Безопасность данных мобильных приложений. Мифы и реальность.
Безопасность данных мобильных приложений. Мифы и реальность.
 
Information Management in a Web 2.0 World May 2009
Information Management in a Web 2.0 World May 2009Information Management in a Web 2.0 World May 2009
Information Management in a Web 2.0 World May 2009
 
Shaping-Up SharePoint Security in 5 Steps
Shaping-Up SharePoint Security in 5 StepsShaping-Up SharePoint Security in 5 Steps
Shaping-Up SharePoint Security in 5 Steps
 
Joanna Belbey, Actiance Presentation - BDI 2/23/12 Social Media in Wealth Man...
Joanna Belbey, Actiance Presentation - BDI 2/23/12 Social Media in Wealth Man...Joanna Belbey, Actiance Presentation - BDI 2/23/12 Social Media in Wealth Man...
Joanna Belbey, Actiance Presentation - BDI 2/23/12 Social Media in Wealth Man...
 
Ulf mattsson webinar jun 7 2012 slideshare version
Ulf mattsson webinar jun 7 2012   slideshare versionUlf mattsson webinar jun 7 2012   slideshare version
Ulf mattsson webinar jun 7 2012 slideshare version
 
ISACA NA CACS 2012 Orlando session 414 Ulf Mattsson
ISACA NA CACS 2012 Orlando session 414 Ulf MattssonISACA NA CACS 2012 Orlando session 414 Ulf Mattsson
ISACA NA CACS 2012 Orlando session 414 Ulf Mattsson
 
Chris Boyer
Chris BoyerChris Boyer
Chris Boyer
 
Cloud Privacy Update: What You Need to Know
Cloud Privacy Update: What You Need to KnowCloud Privacy Update: What You Need to Know
Cloud Privacy Update: What You Need to Know
 
Cloud Privacy
Cloud PrivacyCloud Privacy
Cloud Privacy
 
2022 APIsecure_Understanding API Abuse With Behavioral Analytics
2022 APIsecure_Understanding API Abuse With Behavioral Analytics2022 APIsecure_Understanding API Abuse With Behavioral Analytics
2022 APIsecure_Understanding API Abuse With Behavioral Analytics
 
Ssi Data Protection Solutions V0.2
Ssi Data Protection Solutions V0.2Ssi Data Protection Solutions V0.2
Ssi Data Protection Solutions V0.2
 

Mais de Business Development Institute

The Business of Blogging (for Lawyers) - BDI 12/11 Social Media Marketing Sum...
The Business of Blogging (for Lawyers) - BDI 12/11 Social Media Marketing Sum...The Business of Blogging (for Lawyers) - BDI 12/11 Social Media Marketing Sum...
The Business of Blogging (for Lawyers) - BDI 12/11 Social Media Marketing Sum...Business Development Institute
 
Content is Still King: A look at best practices for creating and distributing...
Content is Still King: A look at best practices for creating and distributing...Content is Still King: A look at best practices for creating and distributing...
Content is Still King: A look at best practices for creating and distributing...Business Development Institute
 
Use Storytelling to Define Your Brand and Connect on Social Media - BDI 12/11...
Use Storytelling to Define Your Brand and Connect on Social Media - BDI 12/11...Use Storytelling to Define Your Brand and Connect on Social Media - BDI 12/11...
Use Storytelling to Define Your Brand and Connect on Social Media - BDI 12/11...Business Development Institute
 
Combining Eyes and Ears: The Visual Search for Social - BDI 12/4 Visual Conte...
Combining Eyes and Ears: The Visual Search for Social - BDI 12/4 Visual Conte...Combining Eyes and Ears: The Visual Search for Social - BDI 12/4 Visual Conte...
Combining Eyes and Ears: The Visual Search for Social - BDI 12/4 Visual Conte...Business Development Institute
 
Digital Marketing Strategies to Drive Enrollment - BDI 11/19 Social Media Mar...
Digital Marketing Strategies to Drive Enrollment - BDI 11/19 Social Media Mar...Digital Marketing Strategies to Drive Enrollment - BDI 11/19 Social Media Mar...
Digital Marketing Strategies to Drive Enrollment - BDI 11/19 Social Media Mar...Business Development Institute
 
People are (S)Talking: How to Get Users to Participate, Not Just Spectate - B...
People are (S)Talking: How to Get Users to Participate, Not Just Spectate - B...People are (S)Talking: How to Get Users to Participate, Not Just Spectate - B...
People are (S)Talking: How to Get Users to Participate, Not Just Spectate - B...Business Development Institute
 
The Power of Social Listening - BDI 11/19 Social Media Marketing Forum for Ed...
The Power of Social Listening - BDI 11/19 Social Media Marketing Forum for Ed...The Power of Social Listening - BDI 11/19 Social Media Marketing Forum for Ed...
The Power of Social Listening - BDI 11/19 Social Media Marketing Forum for Ed...Business Development Institute
 
How Investors Will Communicate as the Internet Swallows Everything - BDI 11/0...
How Investors Will Communicate as the Internet Swallows Everything - BDI 11/0...How Investors Will Communicate as the Internet Swallows Everything - BDI 11/0...
How Investors Will Communicate as the Internet Swallows Everything - BDI 11/0...Business Development Institute
 
Financial Communications Society - BDI 11/06 The Future of Financial Services...
Financial Communications Society - BDI 11/06 The Future of Financial Services...Financial Communications Society - BDI 11/06 The Future of Financial Services...
Financial Communications Society - BDI 11/06 The Future of Financial Services...Business Development Institute
 
The New Communications Paradigm in Financial Services: The Penn Mutual Case S...
The New Communications Paradigm in Financial Services: The Penn Mutual Case S...The New Communications Paradigm in Financial Services: The Penn Mutual Case S...
The New Communications Paradigm in Financial Services: The Penn Mutual Case S...Business Development Institute
 
Social Listening Trends and the Paradigm Change in Financial Services - BDI 1...
Social Listening Trends and the Paradigm Change in Financial Services - BDI 1...Social Listening Trends and the Paradigm Change in Financial Services - BDI 1...
Social Listening Trends and the Paradigm Change in Financial Services - BDI 1...Business Development Institute
 
Digital Financial Wellness: The Future of Money - BDI 11/06 The Future of Fin...
Digital Financial Wellness: The Future of Money - BDI 11/06 The Future of Fin...Digital Financial Wellness: The Future of Money - BDI 11/06 The Future of Fin...
Digital Financial Wellness: The Future of Money - BDI 11/06 The Future of Fin...Business Development Institute
 
Bitcoin & The Sharing Economy - BDI 11/06 The Future of Financial Services Co...
Bitcoin & The Sharing Economy - BDI 11/06 The Future of Financial Services Co...Bitcoin & The Sharing Economy - BDI 11/06 The Future of Financial Services Co...
Bitcoin & The Sharing Economy - BDI 11/06 The Future of Financial Services Co...Business Development Institute
 
Hearts, Heads and Hands: How cupcakes, sidewalk chalk, and the story of a tee...
Hearts, Heads and Hands: How cupcakes, sidewalk chalk, and the story of a tee...Hearts, Heads and Hands: How cupcakes, sidewalk chalk, and the story of a tee...
Hearts, Heads and Hands: How cupcakes, sidewalk chalk, and the story of a tee...Business Development Institute
 
Content is still King: A look at best practices for creating and distributing...
Content is still King: A look at best practices for creating and distributing...Content is still King: A look at best practices for creating and distributing...
Content is still King: A look at best practices for creating and distributing...Business Development Institute
 
Developing and Sustaining an Effective Mobile Strategy - BDI 10/16 Financial ...
Developing and Sustaining an Effective Mobile Strategy - BDI 10/16 Financial ...Developing and Sustaining an Effective Mobile Strategy - BDI 10/16 Financial ...
Developing and Sustaining an Effective Mobile Strategy - BDI 10/16 Financial ...Business Development Institute
 
Make Friends First, Do Business Last: Relationship Marketing Using Social Med...
Make Friends First, Do Business Last: Relationship Marketing Using Social Med...Make Friends First, Do Business Last: Relationship Marketing Using Social Med...
Make Friends First, Do Business Last: Relationship Marketing Using Social Med...Business Development Institute
 
The New Communications Paradigm in Financial Services: The Penn Mutual Case S...
The New Communications Paradigm in Financial Services: The Penn Mutual Case S...The New Communications Paradigm in Financial Services: The Penn Mutual Case S...
The New Communications Paradigm in Financial Services: The Penn Mutual Case S...Business Development Institute
 
Using Social Media Ethically - BDI 10/15 Social Media Marketing Summit for La...
Using Social Media Ethically - BDI 10/15 Social Media Marketing Summit for La...Using Social Media Ethically - BDI 10/15 Social Media Marketing Summit for La...
Using Social Media Ethically - BDI 10/15 Social Media Marketing Summit for La...Business Development Institute
 
The Power of Social Media: Attracting the Next Generation of Clients - BDI 9/...
The Power of Social Media: Attracting the Next Generation of Clients - BDI 9/...The Power of Social Media: Attracting the Next Generation of Clients - BDI 9/...
The Power of Social Media: Attracting the Next Generation of Clients - BDI 9/...Business Development Institute
 

Mais de Business Development Institute (20)

The Business of Blogging (for Lawyers) - BDI 12/11 Social Media Marketing Sum...
The Business of Blogging (for Lawyers) - BDI 12/11 Social Media Marketing Sum...The Business of Blogging (for Lawyers) - BDI 12/11 Social Media Marketing Sum...
The Business of Blogging (for Lawyers) - BDI 12/11 Social Media Marketing Sum...
 
Content is Still King: A look at best practices for creating and distributing...
Content is Still King: A look at best practices for creating and distributing...Content is Still King: A look at best practices for creating and distributing...
Content is Still King: A look at best practices for creating and distributing...
 
Use Storytelling to Define Your Brand and Connect on Social Media - BDI 12/11...
Use Storytelling to Define Your Brand and Connect on Social Media - BDI 12/11...Use Storytelling to Define Your Brand and Connect on Social Media - BDI 12/11...
Use Storytelling to Define Your Brand and Connect on Social Media - BDI 12/11...
 
Combining Eyes and Ears: The Visual Search for Social - BDI 12/4 Visual Conte...
Combining Eyes and Ears: The Visual Search for Social - BDI 12/4 Visual Conte...Combining Eyes and Ears: The Visual Search for Social - BDI 12/4 Visual Conte...
Combining Eyes and Ears: The Visual Search for Social - BDI 12/4 Visual Conte...
 
Digital Marketing Strategies to Drive Enrollment - BDI 11/19 Social Media Mar...
Digital Marketing Strategies to Drive Enrollment - BDI 11/19 Social Media Mar...Digital Marketing Strategies to Drive Enrollment - BDI 11/19 Social Media Mar...
Digital Marketing Strategies to Drive Enrollment - BDI 11/19 Social Media Mar...
 
People are (S)Talking: How to Get Users to Participate, Not Just Spectate - B...
People are (S)Talking: How to Get Users to Participate, Not Just Spectate - B...People are (S)Talking: How to Get Users to Participate, Not Just Spectate - B...
People are (S)Talking: How to Get Users to Participate, Not Just Spectate - B...
 
The Power of Social Listening - BDI 11/19 Social Media Marketing Forum for Ed...
The Power of Social Listening - BDI 11/19 Social Media Marketing Forum for Ed...The Power of Social Listening - BDI 11/19 Social Media Marketing Forum for Ed...
The Power of Social Listening - BDI 11/19 Social Media Marketing Forum for Ed...
 
How Investors Will Communicate as the Internet Swallows Everything - BDI 11/0...
How Investors Will Communicate as the Internet Swallows Everything - BDI 11/0...How Investors Will Communicate as the Internet Swallows Everything - BDI 11/0...
How Investors Will Communicate as the Internet Swallows Everything - BDI 11/0...
 
Financial Communications Society - BDI 11/06 The Future of Financial Services...
Financial Communications Society - BDI 11/06 The Future of Financial Services...Financial Communications Society - BDI 11/06 The Future of Financial Services...
Financial Communications Society - BDI 11/06 The Future of Financial Services...
 
The New Communications Paradigm in Financial Services: The Penn Mutual Case S...
The New Communications Paradigm in Financial Services: The Penn Mutual Case S...The New Communications Paradigm in Financial Services: The Penn Mutual Case S...
The New Communications Paradigm in Financial Services: The Penn Mutual Case S...
 
Social Listening Trends and the Paradigm Change in Financial Services - BDI 1...
Social Listening Trends and the Paradigm Change in Financial Services - BDI 1...Social Listening Trends and the Paradigm Change in Financial Services - BDI 1...
Social Listening Trends and the Paradigm Change in Financial Services - BDI 1...
 
Digital Financial Wellness: The Future of Money - BDI 11/06 The Future of Fin...
Digital Financial Wellness: The Future of Money - BDI 11/06 The Future of Fin...Digital Financial Wellness: The Future of Money - BDI 11/06 The Future of Fin...
Digital Financial Wellness: The Future of Money - BDI 11/06 The Future of Fin...
 
Bitcoin & The Sharing Economy - BDI 11/06 The Future of Financial Services Co...
Bitcoin & The Sharing Economy - BDI 11/06 The Future of Financial Services Co...Bitcoin & The Sharing Economy - BDI 11/06 The Future of Financial Services Co...
Bitcoin & The Sharing Economy - BDI 11/06 The Future of Financial Services Co...
 
Hearts, Heads and Hands: How cupcakes, sidewalk chalk, and the story of a tee...
Hearts, Heads and Hands: How cupcakes, sidewalk chalk, and the story of a tee...Hearts, Heads and Hands: How cupcakes, sidewalk chalk, and the story of a tee...
Hearts, Heads and Hands: How cupcakes, sidewalk chalk, and the story of a tee...
 
Content is still King: A look at best practices for creating and distributing...
Content is still King: A look at best practices for creating and distributing...Content is still King: A look at best practices for creating and distributing...
Content is still King: A look at best practices for creating and distributing...
 
Developing and Sustaining an Effective Mobile Strategy - BDI 10/16 Financial ...
Developing and Sustaining an Effective Mobile Strategy - BDI 10/16 Financial ...Developing and Sustaining an Effective Mobile Strategy - BDI 10/16 Financial ...
Developing and Sustaining an Effective Mobile Strategy - BDI 10/16 Financial ...
 
Make Friends First, Do Business Last: Relationship Marketing Using Social Med...
Make Friends First, Do Business Last: Relationship Marketing Using Social Med...Make Friends First, Do Business Last: Relationship Marketing Using Social Med...
Make Friends First, Do Business Last: Relationship Marketing Using Social Med...
 
The New Communications Paradigm in Financial Services: The Penn Mutual Case S...
The New Communications Paradigm in Financial Services: The Penn Mutual Case S...The New Communications Paradigm in Financial Services: The Penn Mutual Case S...
The New Communications Paradigm in Financial Services: The Penn Mutual Case S...
 
Using Social Media Ethically - BDI 10/15 Social Media Marketing Summit for La...
Using Social Media Ethically - BDI 10/15 Social Media Marketing Summit for La...Using Social Media Ethically - BDI 10/15 Social Media Marketing Summit for La...
Using Social Media Ethically - BDI 10/15 Social Media Marketing Summit for La...
 
The Power of Social Media: Attracting the Next Generation of Clients - BDI 9/...
The Power of Social Media: Attracting the Next Generation of Clients - BDI 9/...The Power of Social Media: Attracting the Next Generation of Clients - BDI 9/...
The Power of Social Media: Attracting the Next Generation of Clients - BDI 9/...
 

Último

Call Girls In Panjim North Goa 9971646499 Genuine Service
Call Girls In Panjim North Goa 9971646499 Genuine ServiceCall Girls In Panjim North Goa 9971646499 Genuine Service
Call Girls In Panjim North Goa 9971646499 Genuine Serviceritikaroy0888
 
Call Girls in Gomti Nagar - 7388211116 - With room Service
Call Girls in Gomti Nagar - 7388211116  - With room ServiceCall Girls in Gomti Nagar - 7388211116  - With room Service
Call Girls in Gomti Nagar - 7388211116 - With room Servicediscovermytutordmt
 
Monte Carlo simulation : Simulation using MCSM
Monte Carlo simulation : Simulation using MCSMMonte Carlo simulation : Simulation using MCSM
Monte Carlo simulation : Simulation using MCSMRavindra Nath Shukla
 
Regression analysis: Simple Linear Regression Multiple Linear Regression
Regression analysis:  Simple Linear Regression Multiple Linear RegressionRegression analysis:  Simple Linear Regression Multiple Linear Regression
Regression analysis: Simple Linear Regression Multiple Linear RegressionRavindra Nath Shukla
 
Insurers' journeys to build a mastery in the IoT usage
Insurers' journeys to build a mastery in the IoT usageInsurers' journeys to build a mastery in the IoT usage
Insurers' journeys to build a mastery in the IoT usageMatteo Carbone
 
👉Chandigarh Call Girls 👉9878799926👉Just Call👉Chandigarh Call Girl In Chandiga...
👉Chandigarh Call Girls 👉9878799926👉Just Call👉Chandigarh Call Girl In Chandiga...👉Chandigarh Call Girls 👉9878799926👉Just Call👉Chandigarh Call Girl In Chandiga...
👉Chandigarh Call Girls 👉9878799926👉Just Call👉Chandigarh Call Girl In Chandiga...rajveerescorts2022
 
Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...
Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...
Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...anilsa9823
 
Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...
Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...
Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...Dipal Arora
 
Pharma Works Profile of Karan Communications
Pharma Works Profile of Karan CommunicationsPharma Works Profile of Karan Communications
Pharma Works Profile of Karan Communicationskarancommunications
 
Value Proposition canvas- Customer needs and pains
Value Proposition canvas- Customer needs and painsValue Proposition canvas- Customer needs and pains
Value Proposition canvas- Customer needs and painsP&CO
 
0183760ssssssssssssssssssssssssssss00101011 (27).pdf
0183760ssssssssssssssssssssssssssss00101011 (27).pdf0183760ssssssssssssssssssssssssssss00101011 (27).pdf
0183760ssssssssssssssssssssssssssss00101011 (27).pdfRenandantas16
 
Dr. Admir Softic_ presentation_Green Club_ENG.pdf
Dr. Admir Softic_ presentation_Green Club_ENG.pdfDr. Admir Softic_ presentation_Green Club_ENG.pdf
Dr. Admir Softic_ presentation_Green Club_ENG.pdfAdmir Softic
 
Ensure the security of your HCL environment by applying the Zero Trust princi...
Ensure the security of your HCL environment by applying the Zero Trust princi...Ensure the security of your HCL environment by applying the Zero Trust princi...
Ensure the security of your HCL environment by applying the Zero Trust princi...Roland Driesen
 
Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...
Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...
Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...amitlee9823
 
MONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRL
MONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRLMONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRL
MONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRLSeo
 
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756dollysharma2066
 
Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...
Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...
Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...Dave Litwiller
 
Organizational Transformation Lead with Culture
Organizational Transformation Lead with CultureOrganizational Transformation Lead with Culture
Organizational Transformation Lead with CultureSeta Wicaksana
 

Último (20)

Call Girls In Panjim North Goa 9971646499 Genuine Service
Call Girls In Panjim North Goa 9971646499 Genuine ServiceCall Girls In Panjim North Goa 9971646499 Genuine Service
Call Girls In Panjim North Goa 9971646499 Genuine Service
 
Call Girls in Gomti Nagar - 7388211116 - With room Service
Call Girls in Gomti Nagar - 7388211116  - With room ServiceCall Girls in Gomti Nagar - 7388211116  - With room Service
Call Girls in Gomti Nagar - 7388211116 - With room Service
 
Monte Carlo simulation : Simulation using MCSM
Monte Carlo simulation : Simulation using MCSMMonte Carlo simulation : Simulation using MCSM
Monte Carlo simulation : Simulation using MCSM
 
unwanted pregnancy Kit [+918133066128] Abortion Pills IN Dubai UAE Abudhabi
unwanted pregnancy Kit [+918133066128] Abortion Pills IN Dubai UAE Abudhabiunwanted pregnancy Kit [+918133066128] Abortion Pills IN Dubai UAE Abudhabi
unwanted pregnancy Kit [+918133066128] Abortion Pills IN Dubai UAE Abudhabi
 
Regression analysis: Simple Linear Regression Multiple Linear Regression
Regression analysis:  Simple Linear Regression Multiple Linear RegressionRegression analysis:  Simple Linear Regression Multiple Linear Regression
Regression analysis: Simple Linear Regression Multiple Linear Regression
 
Insurers' journeys to build a mastery in the IoT usage
Insurers' journeys to build a mastery in the IoT usageInsurers' journeys to build a mastery in the IoT usage
Insurers' journeys to build a mastery in the IoT usage
 
👉Chandigarh Call Girls 👉9878799926👉Just Call👉Chandigarh Call Girl In Chandiga...
👉Chandigarh Call Girls 👉9878799926👉Just Call👉Chandigarh Call Girl In Chandiga...👉Chandigarh Call Girls 👉9878799926👉Just Call👉Chandigarh Call Girl In Chandiga...
👉Chandigarh Call Girls 👉9878799926👉Just Call👉Chandigarh Call Girl In Chandiga...
 
Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...
Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...
Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...
 
Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...
Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...
Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...
 
Pharma Works Profile of Karan Communications
Pharma Works Profile of Karan CommunicationsPharma Works Profile of Karan Communications
Pharma Works Profile of Karan Communications
 
Value Proposition canvas- Customer needs and pains
Value Proposition canvas- Customer needs and painsValue Proposition canvas- Customer needs and pains
Value Proposition canvas- Customer needs and pains
 
0183760ssssssssssssssssssssssssssss00101011 (27).pdf
0183760ssssssssssssssssssssssssssss00101011 (27).pdf0183760ssssssssssssssssssssssssssss00101011 (27).pdf
0183760ssssssssssssssssssssssssssss00101011 (27).pdf
 
Dr. Admir Softic_ presentation_Green Club_ENG.pdf
Dr. Admir Softic_ presentation_Green Club_ENG.pdfDr. Admir Softic_ presentation_Green Club_ENG.pdf
Dr. Admir Softic_ presentation_Green Club_ENG.pdf
 
Ensure the security of your HCL environment by applying the Zero Trust princi...
Ensure the security of your HCL environment by applying the Zero Trust princi...Ensure the security of your HCL environment by applying the Zero Trust princi...
Ensure the security of your HCL environment by applying the Zero Trust princi...
 
Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...
Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...
Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...
 
MONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRL
MONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRLMONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRL
MONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRL
 
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
 
Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...
Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...
Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...
 
Forklift Operations: Safety through Cartoons
Forklift Operations: Safety through CartoonsForklift Operations: Safety through Cartoons
Forklift Operations: Safety through Cartoons
 
Organizational Transformation Lead with Culture
Organizational Transformation Lead with CultureOrganizational Transformation Lead with Culture
Organizational Transformation Lead with Culture
 

Actiance Presentation - BDI 2/9/11 Financial Services Social Communications Leadership Forum

  • 1. How to Enable Social Media in Financial Services
  • 2. Agenda Intro About Actiance Social Media on the Rise Benefits of Social Media Understanding the Risks Applicable Regulations Anecdotes Applying Appropriate Controls Wrap-up 1 Confidential and Proprietary © 2011, Actiance, Inc. All rights reserved.
  • 3. About Actiance Enable the New Internet – 4,500+ Web 2.0 apps, Unified Communications, Social Networks Global operations – USA, EMEA, India, Asia/Pacific Market Leader – 9 of the top 10 US banks – Top 5 Canadian banks – 3 of the top 5 energy companies Broadest Partner Ecosystem – Technology alliances 2 Confidential and Proprietary © 2011, Actiance, Inc. All rights reserved.
  • 4. Social Is Booming Social Networking Social Collaboration Social Publishing Social Feedback 3 Confidential and Proprietary © 2011, Actiance, Inc. All rights reserved.
  • 5. Upside of Social Media Generate buzz and increase visibility Strengthen customer relations Build an additional revenue source Extend your brand 4 Confidential and Proprietary © 2011, Actiance, Inc. All rights reserved.
  • 6. Risks of Using Social Media and Web 2.0 Data Leakage Incoming Threats Compliance & eDiscovery User Behavior Personal SEC, FINRA Employee Information Malware, Spyware Productivity HIPAA, FISMA Intellectual Property Viruses, Trojans Bandwidth SOX, PCI, FSA Credit Card, Explosion Inappropriate SSN FRCP- eDiscovery Content Every employee is Client Records FERC, NERC the face of business
  • 7. Web 2.0 & Social Networks Regulation & Compliance Regulation Social Network and Web 2.0 Impact Obliged to store records and make accessible. Public correspondence requires SEC and FINRA approval, review and retention. Extended to social media. http://www.finra.org/Industry/Issues/Advertising/p006118 Protect information, monitor for sensitive content, and ensure not sent over Gramm-Leach-Bliley Act (GLBA) public channels (e.g., Twitter) Ensuring cardholder data is not sent over unsecured channels AND PROVING PCI IT Prevent identity theft. Protect IM and Web 2.0 from malware and phishing Red Flag Rules when users are more likely to drop their guard. Email and IM are ESI. Posts to social media sites must be preserved if FRCP (eDiscovery) reasonably determined to be discoverable. http://blog.twitter.com/ Sarbanes-Oxley (SOX) Businesses must preserve information relevant to the company reporting.
  • 8. Real-Life Anecdotes Citibank Deloitte Financial Northshore Bank Online Banking 7 Confidential and Proprietary © 2011, Actiance, Inc. All rights reserved.
  • 9. Appropriate Controls: The Basics Who needs controls applied? Users within your organization - HR, Marketing, Sales, IT? How do I apply these controls? Are there tools available? Where do I get started? 8 Confidential and Proprietary © 2011, Actiance, Inc. All rights reserved.
  • 10. Appropriate Controls: The Specifics Issue Control Requirements Identity management Ensure that all the different logins of an individual link back to corporate identity Activity control Posting of content allowed for marketing but read-only for everyone else Granular application control Employees can access Facebook, but not Facebook Chat or Facebook Games Anti-malware Protect network against hidden phishing or Trojan attacks Data leak prevention Protect organization from employees disclosing sensitive information Moderation Messages posted only upon approval by designated officer Logging and archiving Log all content posted to social networks Export of data Export stored data to any email archive or WORM storage 9 Confidential and Proprietary © 2011, Actiance, Inc. All rights reserved.
  • 11. Appropriate Controls: Moderation Posts to Twitter/Facebook/LinkedIn held for review by the following criteria: – All – Keyword/dictionary matches – Regular expressions (e.g., credit card/SSN patterns) 10 Confidential and Proprietary © 2011, Actiance, Inc. All rights reserved.
  • 12. Appropriate Controls: Archiving for eDiscovery Social networking activity and posts are captured All the captured events are presented for eDiscovery and available for export to archiving platforms 11 Confidential and Proprietary © 2011, Actiance, Inc. All rights reserved.
  • 13. Further Reading and Materials Osterman Research White Paper “The Impact of New Communications Tools for Financial Services Organizations” Meeting FINRA 10-06 Compliance Guidelines White Paper How Actiance address FINRA 10-06 Matrix 2010 Internet Usage Survey Results 12 Confidential and Proprietary © 2011, Actiance, Inc. All rights reserved.