SlideShare a Scribd company logo
1 of 147
Download to read offline
Marc Vael
Managing social media risks 

to an acceptable level
Definition of social media
The social interaction among people in which
they create, share or exchange information and
ideas in virtual communities and networks.
A group of Internet-based applications that
build on the ideological and technological
foundations of Web 2.0, and that allow the
creation and exchange of user-generated
content.
Social media and technology
Social media depend on mobile and web-based
technologies to create highly interactive
platforms through which individuals and
communities share, co-create, discuss, and
modify user-generated content.
Social media introduce substantial and
pervasive changes to communication between
organizations, communities, and individuals.
Example
What makes social media social?
Social media differ from traditional or industrial
media in many ways, including quality, reach,
frequency, usability, immediacy, and permanence.
Internet users spend more time with social media
sites than any other type of site.
For content contributors, the benefits of
participating in social media have gone beyond
simply social sharing to building reputation and
bringing in career opportunities and monetary
income.
What makes social media different?
• It’s very, very public
• It’s amplified (one to many, many to many,
possibly millions)
• It’s a continuous live conversation driven
by everyone.
• It’s permanent (Twitter is now archived in
the U.S. Library of Congress)
• It lacks much of the contextual information
of traditional media.
Protiviti, 2013 IA Capabilities Needs survey
Social media risks
Threats and Vulnerabilities
• Employee posting of pictures or information linking
them to the organisation
Risks
• Brand damage
• Reputational damage
• Legal contract damage
Risk Mitigation Techniques
• policy that specifies how employees may use organisation
related images, assets, and intellectual property (IP) in their
online presence.
• awareness training and campaigns to inform employees on
using social media sites
Aanmaken van een vals sociaal media
profiel leidt tot de volgende (gezamenlijke)
juridische aanklachten:

1. Valsheid in informatica (artikel
210bis Sw.);
2. Belaging/stalking (artikel 442bis Sw.);
3. Laster en eerroof (artikel 443 Sw.);
4. Belaging via telecommunicatie (o.a. artikel
145 §3bis van de Wet van 13 juni 2005
betreffende de elektronische communicatie)
5. Aanmatiging van naam (231 Sw).
Social media risks
Threats and Vulnerabilities
• Exposure to customers and organisation through fraudulent or
hijacked corporate presence
Risks
• Customer backlash/adverse legal actions
• Exposure of customer information
• Reputational damage
• Targeted phishing attacks on customers or employees
Risk Mitigation Techniques
• brand protection firm scans & searches brand misuse.
• periodic informational updates to customers to maintain awareness of
potential fraud and to establish clear guidelines regarding what
information should be posted as part of enterprise social media
presence.
• awareness training and campaigns to inform employees of the risks
involved with using social media sites
Social media risks
Threats and Vulnerabilities
• Mismanagement of electronic communications impacted by
retention regulations or e-discovery
Risks
• Regulatory sanctions and fines
• Adverse legal actions
Risk Mitigation Techniques
• appropriate policies, processes, tools & technologies, training are in
place to ensure that communications via social media that may be
impacted by litigation or regulations are tracked & archived
appropriately.
• ensuring security protocols & audits are adequate
• avoid publishing misleading tweets from consumers
• depending on social media site, maintaining archives may or may
not be a recommended approach.
Once Upon a Time…
• Coastal photos taken 

by photographer 

Kenneth Adelman as

part of erosion 

documentation study
• Study commissioned

by California Coastal Records Project and
contained over 12,000 photographs later placed
on Pictopia.com
• This image was descriptively named Image 3850
The Streisand Effect
is born
• Barbara Streisand sued

photographer + site

for invasion of privacy

in 2003
• Photo was downloaded 

6 times prior to suit 

(2 times by Streisand’s attorneys)
• Within a month of the lawsuit being filed, 

the photo was downloaded 420,000
times
• You can read the whole lawsuit at 

bit.ly/streisandlawsuit
The Streisand Effect Irony
• “…the property is owned by an entity which cannot
be traced, with any certainty, back to her.”
• “…Plaintiff’s living quarters are set back from the
brink of the cliff…In fact, to catch a glimpse of
[Plaintiff’s living quarters] one would have to walk a
significant distance from the property either to the
north or the south.”
• “…by entering the word ‘Streisand’ on the website’s
own search engine, one is immediately taken to the
detailed picture…”
The Streisand Effect Case Outcome
• 45 page ruling against Streisand at bit.ly/
streisandruling
• Court embarked on research from People Magazine
(page 80 of March 9, 1998 issue) to California
coastal history of the 1850s.
• The result:
Social media risks
Threats and Vulnerabilities
• Introduction of viruses and malware to corporate network
Risks
• Data leakage/theft
• “Owned” systems (zombies)
• System downtime
• Resources required to clean systems
Risk Mitigation Techniques
• antivirus & anti malware controls installed and updated.
• content filtering technology to restrict or limit access.
• controls installed on mobile devices such as smartphones.
• social media policies & standards.
• awareness training and campaigns to inform employees of the risks
involved with using social media sites.
• regular audits
Social media malware distribution
• Similar to other threats that can lead to downloading/
installing malware
– Malicious ads
– Clickjacking (“likejacking”)
– Wall posts, inbox or chat messages with malicious
links from “Friends” (hijacked user account)
– “My wallet was stolen and I’m stuck in Rome. Send
me cash now.”
– Spam email pretending to be from social media
(facebook, twitter, linkedin) admins
Social media malware distribution
URL Shorteners
• bit.ly, TinyUrl, ReadThisURL, NotLong
• Hides the true destination URL – no way to tell
where you’re going until you click!
http://www.hacker.com/badsite?%20infect-your-
pc.html
is now
http://bit.ly/aaI9KV
Social media malware distribution
3rd
party apps
• Games, quizzes, cutesie stuff
• Untested by Facebook: anyone can write one
• No Terms & Conditions: you either allow or you
don’t
• Installation gives developers rights to look at
your profile and overrides your privacy settings!
Hollywood Celebrity iCloud picture incident
OMG!
Social media risks
Threats and Vulnerabilities
• Move to digital business model increases customer
service expectations
Risks
• Customer dissatisfaction with the responsiveness
received, leading to potential reputational damage for
the organisation and customer retention issues
Risk Mitigation Techniques
• adequate staffing to handle the traffic created from social
media presence.
• notices with clear windows for customer response.
Social media risks
Threats and Vulnerabilities
• Use of personal accounts to communicate work-related
information
Risks
• Privacy violations
• Reputational damage
• Loss of competitive advantage
Risk Mitigation Techniques
• policies address employee posting of work-related
information
• awareness training and campaigns that reinforce policies.
Moments
• "Little do they know that the
cheese was in his nose and that
there was some lethal gas that
ended up on their salami ... Now
that's how we roll at Domino's."
• “We got blindsided by two idiots
with a video camera and an
awful idea … .”
Social media risks
Threats and Vulnerabilities
• Excessive employee use of social media in the workplace
Risks
• Network utilization issues
• Productivity loss
• Increased risk of defamation
• Increased risk of exposure to viruses and malware due to
longer duration of sessions
Risk Mitigation Techniques
• awareness training and campaigns that reinforce policies
• manage accessibility to social media sites via
– content filtering
– limiting network throughput to social media sites.
Social media risks
Threats and Vulnerabilities
• Unclear/undefined content rights to information posted to
social media
Risks
• Organisation’s loss of control/legal rights of information
posted to the social media sites
• Unwanted contracts
Risk Mitigation Techniques
• legal & communications teams review user agreements for
social media sites that are being considered.
• clear policies to employees and customers what information
should be posted as part of the organisation social media
presence.
• (If feasible and appropriate) capability to capture & log all
communications.
Social media risks
Threats and Vulnerabilities
• Employee access to social media via organisation-supplied mobile
devices (smartphones, tablets, laptops,…)
Risks
• Infection of mobile devices
• Data theft from mobile devices
• Circumvention of corporate controls
• Data leakage
Risk Mitigation Techniques
• route corporate mobile devices through corporate network filtering
technology to restrict or limit access to social media sites.
• appropriate controls are installed & continuously updated on mobile
devices.
• policies & standards regarding use of mobile devices to access social
media.
• awareness training and campaigns to inform employees of the risks
involved with using social media sites
By 2017, 

40%
of enterprise contact information
will have leaked into Facebook
via employees' increased use
of mobile device collaboration
applications.
“Not using social media 

in the workplace 

is starting to make 

about as much sense as 

not using the phone or email.”
Ryan Holmes
www.isaca.org/cobit
Source: COBITŽ 5, figure 15. Š 2012 ISACAŽ All rights reserved.
Principles, policies & frameworks
Protiviti, 2013 IA Capabilities Needs survey
Protiviti, 2013 IA Capabilities Needs survey
10 social media strategy questions
1. What is the strategic benefit to leveraging social media?
2. Are all appropriate stakeholders involved in social media strategy
development?
3. What are the risks associated with social media and do the benefits
outweigh the costs?
4. What are the new legal issues associated with the use of social
media?
5. How will customer privacy issues be addressed?
6. How can positive brand recognition be ensured?
7. How will awareness training be communicated to employees and
customers?
8. How will inquiries and concerns from customers be handled?
9. Does the organisation have the resources to support such an
initiative?
10. What are the regulatory requirements that accompany the integration
of social media?
What to consider in a social media policy?
• Who is going to manage social media in the organisation?
(consider a collaborative approach)
• The nature of conduct that the employer seeks to protect
itself against
• Who should such a policy apply to: the entire business or
levels within the business, suppliers, business partners
contractors?
• The nature of control over social media use: a total ban,
limited use, total accessibility?
• Authority limits or restrictions for use: is permission
required, content pre-approval, who is responsible for
such approvals?
• What can or cannot be discussed on social media
forums ?
What to consider in a social media policy?
• What logos, icons, ideas can or cannot be published
on social media forums?
• What disclaimers or other information must be
included when participating in a social media forum?
• The nature of behaviour that is acceptable or
unacceptable?
• When it is (not) acceptable to use or participate in a
social media forum?
• Reporting any breach
• Consequences of breach
• Integration into existing policies.
Review existing policies for social media
implications
• Code of Conduct / Ethics
• Conflict of Interest
• User agreements or term of use
• Disclaimers
• Linking agreement
• License agreement
• Logo use guidelines
• Affiliation agreements
Advantages of a social media policy
• Provide guidelines for using social media:
you can define what you consider
appropriate
• Provide recourse as an employer if
something does go wrong
• If you don’t have a policy in place you
may find it hard to discipline staff for what
you consider to be inappropriate use of
social media
Social media guidelines: in general
• Think about language & etiquette: nothing
beats good manners
• Understand that every post is public: this is not
a relationship between you & your computer!
• Consider information you are posting: is it
confidential or private in any way?
• Think about consequences in terms of being
“quoted out of context”
• Have systems in place for dealing with
negative events.
Social media guidelines: private vs
public
• Anything posted on social media should be
considered public – ie front page of the
newspaper
• Know your privacy settings, especially on
Facebook
• Be careful of “linking” private social media
accounts to company accounts
• Share freely that which is public (and appropriate).
• Think about location based social media
networking ie do you want your competition to
know when you’re visiting clients?
Protiviti, 2013 IA Capabilities Needs survey
Privacy basics
Privacy basics
Basic principles: the Data controller
–collect & process personal data only when
this is legally permitted
–respect certain obligations regarding the
processing of personal data;
–respond to complaints regarding breaches
of data protection rules;
–collaborate with national data protection
supervisory authorities
Source: http://ec.europa.eu/justice/data-protection/
Privacy basics
• Personal data must be
– processed legally & fairly;
– collected for explicit & legitimate purposes and used
accordingly;
– adequate, relevant & not excessive in relation to the
purposes for which it is collected and/or further processed;
– accurate & updated where necessary;
– kept any longer than strictly necessary;
– rectified, removed or blocked by the data subject if
incorrect;
– Protected against accidental or unlawful destruction, loss,
alteration and disclosure, particularly when processing
involves data transmission over networks.
Source: http://ec.europa.eu/justice/data-protection/
Privacy basics & social media
Who’s looking?
• Parents
• Friends & family
• Friends of friends & family
• Employers & co-workers
• Customers
• Universities
• Marketing companies & vendors
• Criminals & hackers
• Government agencies
• EVERYONE ELSE
Privacy basics & social media
Privacy basics & social media
Dimensions
• Privacy of Personal Communications
• Privacy of Personal Data / Data Protection
• Privacy of Personal Behaviour
• Privacy of the Person
Privacy concerns
• Privacy-Abusive Data Collection
• Privacy-Abusive Service-Provider Rights
• Privacy-Abusive Functionality & User Interfaces
• Privacy-Abusive Data Exploitation
Privacy basics & social media
Disincentives
Impediments
Incentives
Stimulants
Attractors
Detractors
'turn-off' 'turn-on'
Processes
Social Media risk assessment
Corporate governance
: ERM = COSO
Organisational structure
Roles involved in social media risk management
Information
Services, Infrastructure, Applications
How much information?
Social Media technological controls
• Technology can assist in policy enforcement,
blocking, preventing or identifying potential
incidents.
• Monitor social media via tools like Google
Alerts, Social Mention, Twitter search,….
• Combination of web content filtering, which can
block all access or allow limited access, and provide
protection against malware downloads and end-user
system antimalware, antivirus and operating system
security to counter such attacks.
• A layered approach is optimal.
• Tracking & reporting results
Social Media technological controls
Electronic security
• Viruses
• False links
• Spam
• Phishing
• Hackers
• Web site security
• Internet security
• Electronic discovery
– Electronic information lasts forever
Social Media technological controls
Personal security
• Identity theft
• Stalking
• Cyber-bullying
• Sextortion
• Sexting
• Predators
Culture, Ethics, Behaviour
Indicative Indicative

Generation Birth-Years Age in 2014
Silent / Seniors 1910-45 70-100
Baby Boomers – Early 1945-55 60-70
Baby Boomers – Late 1955-65 50-60
Generation X 1965-80 35-50
Generation Y 1980-95 20-35
The iGeneration 1995- 0-20
The Generations of Computing Consumers
Baby Boomers (50-70)
• Handshake/phone, PCs came late, had to adapt to mobile phones
• Work is Life, the team discusses / the boss decides, process-oriented
GenXs (35-50)
• Grew up with PCs, email and mobile phones, hence multi-taskers
• Work to Have More Life, expect payback from work, product-oriented
GenYs (20-35)
• Grew up with IM/chat, texting and video-games, strong multi-taskers
• Life-Work Balance, expect fulfilment from work, highly interactive
iGens (to 20)
• Growing up with texting, multi-media social networking, networked games,
multi-channel immersion / inherent multi-tasking
• Life before Work, even more hedonistic, highly (e-)interactive
The Generations of Computing Consumers
The Privacy Attitudes of iGens
The Privacy Attitudes of iGens
The Privacy Attitudes of iGens
The Privacy Attitudes of iGens
0. People say 'the generation that has embraced 'reality TV' 

and Facebook see the world differently' ... 'Privacy is dead'
BUT
1. Young people are risk-takers, and 'have nothing to hide'
2. People become more risk-averse as they get older 

and accumulate things that they want to hide
3. The big change has been the reach and the re-discoverability 

of the text, the images and the video of youthful indiscretions
4. Many people have been exposed during 2005-12
5. As a result, iGens are more savvy about self-exposure
6. iGens will be more privacy-sensitive than their predecessors
The Privacy Attitudes of iGens
Share appropriately
• Caution everyone about the information they share with
family members.
• The greatest social media risks revolve around discussing:
• company’s finances
• strategies & goals
• brand & trade secrets
• proprietary research
• unreleased advertising
• personal information of employees or clients
• Different perceptions on social media communications
– Unofficial communications (It’s private, isn’t it?...)
– Ephemeral communications (Did we really say that?)
– Anonymous communications (Catch me if you can!)
Trust your gut feeling
• If you feel like you may have
come upon information you are
not authorized to have, err on
the side of not using it.
• In other words: When in doubt,
don’t. Once it’s out there, it’s
out there forever.
• It’s truly better to be safe than
sorry.
When things look too good to be true
Be mindful about copyrights & trademarks
• Just because it is
online, does not
mean it is fair game.
• When in doubt, 

get permission 

to use another’s
material.
“More companies are discovering
that an über-connected workplace 

is not just about implementing a
new set of tools: it is also about
embracing a cultural shift to
create an open environment
where employees are encouraged
to share, innovate and collaborate
virtually.” 

Willyerd & Meister, HarvardBusiness.org
Ethical issues
Should you
friend
someone who
works for you?
Should you
accept your
bosses’ friend
request?
Should the
company
accept a
jobstudent’s
friend
How much
should you
research job
applicants?
People, Skills, Competencies
Social media awareness and training program
Personal use in the workplace:
• is it allowed?
• nondisclosure/posting of business-related content
• discussion of workplace-related topics
• inappropriate sites, content or conversations
Personal use outside the workplace:
• nondisclosure/posting of business-related content
• standard disclaimers if identifying the employer
• dangers of posting too much personal information
Business use:
• is it allowed?
• process to gain approval for use
• scope of topics or information permitted to flow through this channel
• disallowed activities (installation of applications, playing games, etc.)
• escalation process for customer issues
http://www.vvsg.be/Internationaal/Europa/Documents/FOD_Aanbevelingen%20gebruik%20sociale%20media_NL.pdf
Social media costs
Social media ROI
1. Higher customer satisfaction and interaction
through personalized webcare.
2. Know about (problems with) your new
products and services faster.
3. Increase impact of own content. Without filter.
4. Strengthen your reputation.
5. Strengthen your relationships.
6. Strengthen your controls.
Your social media controls
are as strong …
… as their weakest link
TWEETED
145
For more information…
Marc Vael

President
http://www.isaca.org/
http://www.isaca.be/
marc@vael.net
Follow Marc Vael on Twitter http://twitter.com/marcvael
Join Marc Vael on Linkedin: http://www.linkedin.com/in/marcvael

More Related Content

What's hot

Social Networking Security
Social Networking SecuritySocial Networking Security
Social Networking SecurityS. M. Shakib Limon
 
Social Media Cyber Security Awareness Briefing
Social Media Cyber Security Awareness BriefingSocial Media Cyber Security Awareness Briefing
Social Media Cyber Security Awareness BriefingDepartment of Defense
 
Raising information security awareness
Raising information security awarenessRaising information security awareness
Raising information security awarenessTerranovatraining
 
Pivotal Role of HR in Cybersecurity
Pivotal Role of HR in CybersecurityPivotal Role of HR in Cybersecurity
Pivotal Role of HR in CybersecurityMatthew Rosenquist
 
Cyber security from military point of view
Cyber security from military point of viewCyber security from military point of view
Cyber security from military point of viewS.E. CTS CERT-GOV-MD
 
Security Awareness Training
Security Awareness TrainingSecurity Awareness Training
Security Awareness TrainingWilliam Mann
 
Cyber security
Cyber securityCyber security
Cyber securitySapna Patil
 
Cyber Security 101: Training, awareness, strategies for small to medium sized...
Cyber Security 101: Training, awareness, strategies for small to medium sized...Cyber Security 101: Training, awareness, strategies for small to medium sized...
Cyber Security 101: Training, awareness, strategies for small to medium sized...Stephen Cobb
 
Security Awareness Training
Security Awareness TrainingSecurity Awareness Training
Security Awareness TrainingDaniel P Wallace
 
Cyber security
Cyber securityCyber security
Cyber securityBhavin Shah
 
The need for security
The need for securityThe need for security
The need for securityDhani Ahmad
 
Securityawareness
SecurityawarenessSecurityawareness
SecurityawarenessJayfErika
 
2016 CYBERSECURITY PLAYBOOK
2016 CYBERSECURITY PLAYBOOK2016 CYBERSECURITY PLAYBOOK
2016 CYBERSECURITY PLAYBOOKBoris Loukanov
 
Cybersecurity Fundamentals | Understanding Cybersecurity Basics | Cybersecuri...
Cybersecurity Fundamentals | Understanding Cybersecurity Basics | Cybersecuri...Cybersecurity Fundamentals | Understanding Cybersecurity Basics | Cybersecuri...
Cybersecurity Fundamentals | Understanding Cybersecurity Basics | Cybersecuri...Edureka!
 
What is Cyber Security - Avantika University
What is Cyber Security - Avantika UniversityWhat is Cyber Security - Avantika University
What is Cyber Security - Avantika UniversityAvantika University
 
Security management concepts and principles
Security management concepts and principlesSecurity management concepts and principles
Security management concepts and principlesDivya Tiwari
 
Cybersecurity Awareness Training Presentation v1.0
Cybersecurity Awareness Training Presentation v1.0Cybersecurity Awareness Training Presentation v1.0
Cybersecurity Awareness Training Presentation v1.0DallasHaselhorst
 

What's hot (20)

Social Networking Security
Social Networking SecuritySocial Networking Security
Social Networking Security
 
Social Media Cyber Security Awareness Briefing
Social Media Cyber Security Awareness BriefingSocial Media Cyber Security Awareness Briefing
Social Media Cyber Security Awareness Briefing
 
information security
information securityinformation security
information security
 
Raising information security awareness
Raising information security awarenessRaising information security awareness
Raising information security awareness
 
Pivotal Role of HR in Cybersecurity
Pivotal Role of HR in CybersecurityPivotal Role of HR in Cybersecurity
Pivotal Role of HR in Cybersecurity
 
Cyber security from military point of view
Cyber security from military point of viewCyber security from military point of view
Cyber security from military point of view
 
CyberSecurity
CyberSecurityCyberSecurity
CyberSecurity
 
Security Awareness Training
Security Awareness TrainingSecurity Awareness Training
Security Awareness Training
 
Cyber security
Cyber securityCyber security
Cyber security
 
Cyber Security 101: Training, awareness, strategies for small to medium sized...
Cyber Security 101: Training, awareness, strategies for small to medium sized...Cyber Security 101: Training, awareness, strategies for small to medium sized...
Cyber Security 101: Training, awareness, strategies for small to medium sized...
 
Security Awareness Training
Security Awareness TrainingSecurity Awareness Training
Security Awareness Training
 
Cyber security
Cyber securityCyber security
Cyber security
 
The need for security
The need for securityThe need for security
The need for security
 
Securityawareness
SecurityawarenessSecurityawareness
Securityawareness
 
2016 CYBERSECURITY PLAYBOOK
2016 CYBERSECURITY PLAYBOOK2016 CYBERSECURITY PLAYBOOK
2016 CYBERSECURITY PLAYBOOK
 
CYBER SECURITY
CYBER SECURITY CYBER SECURITY
CYBER SECURITY
 
Cybersecurity Fundamentals | Understanding Cybersecurity Basics | Cybersecuri...
Cybersecurity Fundamentals | Understanding Cybersecurity Basics | Cybersecuri...Cybersecurity Fundamentals | Understanding Cybersecurity Basics | Cybersecuri...
Cybersecurity Fundamentals | Understanding Cybersecurity Basics | Cybersecuri...
 
What is Cyber Security - Avantika University
What is Cyber Security - Avantika UniversityWhat is Cyber Security - Avantika University
What is Cyber Security - Avantika University
 
Security management concepts and principles
Security management concepts and principlesSecurity management concepts and principles
Security management concepts and principles
 
Cybersecurity Awareness Training Presentation v1.0
Cybersecurity Awareness Training Presentation v1.0Cybersecurity Awareness Training Presentation v1.0
Cybersecurity Awareness Training Presentation v1.0
 

Similar to Social media risks and controls

Risks and Security of Internet and System
Risks and Security of Internet and SystemRisks and Security of Internet and System
Risks and Security of Internet and SystemParam Nanavati
 
Cyber Security Awareness at Dadar April 25, 2010
Cyber Security Awareness at Dadar April 25, 2010Cyber Security Awareness at Dadar April 25, 2010
Cyber Security Awareness at Dadar April 25, 2010Vicky Shah
 
Info Session on Cybersecurity & Cybersecurity Study Jams
Info Session on Cybersecurity & Cybersecurity Study JamsInfo Session on Cybersecurity & Cybersecurity Study Jams
Info Session on Cybersecurity & Cybersecurity Study JamsGDSCCVR
 
Social Media & Legal Risk
Social Media & Legal Risk Social Media & Legal Risk
Social Media & Legal Risk Endcode_org
 
Social networking boon or a bane
Social networking boon or a baneSocial networking boon or a bane
Social networking boon or a baneAbhishek Sharma
 
Shannon Morris PDLM presentation
Shannon Morris PDLM presentationShannon Morris PDLM presentation
Shannon Morris PDLM presentationshannoncmorris
 
Hacking the Human - How Secure Is Your Organization?
Hacking the Human - How Secure Is Your Organization?Hacking the Human - How Secure Is Your Organization?
Hacking the Human - How Secure Is Your Organization?CBIZ, Inc.
 
Social Networks - The Good and the Bad
Social Networks - The Good and the BadSocial Networks - The Good and the Bad
Social Networks - The Good and the BadXavier Mertens
 
Cyber security by Gaurav Singh
Cyber security by Gaurav SinghCyber security by Gaurav Singh
Cyber security by Gaurav SinghGaurav Singh
 
Why is cyber security a disruption in the digital economy
Why is cyber security a disruption in the digital economyWhy is cyber security a disruption in the digital economy
Why is cyber security a disruption in the digital economyMark Albala
 
Cyberattacks.pptx
Cyberattacks.pptxCyberattacks.pptx
Cyberattacks.pptxSonakshiMundra
 
Topic-2.2_InfoPrivacy-IT-Ethics.pptx
Topic-2.2_InfoPrivacy-IT-Ethics.pptxTopic-2.2_InfoPrivacy-IT-Ethics.pptx
Topic-2.2_InfoPrivacy-IT-Ethics.pptxOxfordRiNorth
 
ACS Talk (Melbourne) - The future of security
ACS Talk (Melbourne) - The future of securityACS Talk (Melbourne) - The future of security
ACS Talk (Melbourne) - The future of securitysiswarren
 
Social media privacy threats that you need to keep an eye on in 2021
Social media privacy threats that you need to keep an eye on in 2021Social media privacy threats that you need to keep an eye on in 2021
Social media privacy threats that you need to keep an eye on in 2021Impulse Digital
 
Internet & Social Media issues for brand owners
Internet & Social Media issues for brand ownersInternet & Social Media issues for brand owners
Internet & Social Media issues for brand ownersDavid Green
 
Intelligence-Driven Fraud Prevention
Intelligence-Driven Fraud PreventionIntelligence-Driven Fraud Prevention
Intelligence-Driven Fraud PreventionEMC
 
Managing Data Breach Communication on The Social Web
Managing Data Breach Communication on The Social WebManaging Data Breach Communication on The Social Web
Managing Data Breach Communication on The Social WebBoyd Neil
 

Similar to Social media risks and controls (20)

Risks and Security of Internet and System
Risks and Security of Internet and SystemRisks and Security of Internet and System
Risks and Security of Internet and System
 
Cyber Security Awareness at Dadar April 25, 2010
Cyber Security Awareness at Dadar April 25, 2010Cyber Security Awareness at Dadar April 25, 2010
Cyber Security Awareness at Dadar April 25, 2010
 
Info Session on Cybersecurity & Cybersecurity Study Jams
Info Session on Cybersecurity & Cybersecurity Study JamsInfo Session on Cybersecurity & Cybersecurity Study Jams
Info Session on Cybersecurity & Cybersecurity Study Jams
 
The Digital Dilemma - Igor Verhoeven, Bindung
The Digital Dilemma - Igor Verhoeven, BindungThe Digital Dilemma - Igor Verhoeven, Bindung
The Digital Dilemma - Igor Verhoeven, Bindung
 
Social Media & Legal Risk
Social Media & Legal Risk Social Media & Legal Risk
Social Media & Legal Risk
 
Social networking boon or a bane
Social networking boon or a baneSocial networking boon or a bane
Social networking boon or a bane
 
Shannon Morris PDLM presentation
Shannon Morris PDLM presentationShannon Morris PDLM presentation
Shannon Morris PDLM presentation
 
Hacking the Human - How Secure Is Your Organization?
Hacking the Human - How Secure Is Your Organization?Hacking the Human - How Secure Is Your Organization?
Hacking the Human - How Secure Is Your Organization?
 
Social Networks - The Good and the Bad
Social Networks - The Good and the BadSocial Networks - The Good and the Bad
Social Networks - The Good and the Bad
 
Cyber security by Gaurav Singh
Cyber security by Gaurav SinghCyber security by Gaurav Singh
Cyber security by Gaurav Singh
 
Why is cyber security a disruption in the digital economy
Why is cyber security a disruption in the digital economyWhy is cyber security a disruption in the digital economy
Why is cyber security a disruption in the digital economy
 
Cyberattacks.pptx
Cyberattacks.pptxCyberattacks.pptx
Cyberattacks.pptx
 
Topic-2.2_InfoPrivacy-IT-Ethics.pptx
Topic-2.2_InfoPrivacy-IT-Ethics.pptxTopic-2.2_InfoPrivacy-IT-Ethics.pptx
Topic-2.2_InfoPrivacy-IT-Ethics.pptx
 
ACS Talk (Melbourne) - The future of security
ACS Talk (Melbourne) - The future of securityACS Talk (Melbourne) - The future of security
ACS Talk (Melbourne) - The future of security
 
Social media privacy threats that you need to keep an eye on in 2021
Social media privacy threats that you need to keep an eye on in 2021Social media privacy threats that you need to keep an eye on in 2021
Social media privacy threats that you need to keep an eye on in 2021
 
Shailendra Pandey.ppt
Shailendra Pandey.pptShailendra Pandey.ppt
Shailendra Pandey.ppt
 
Internet & Social Media issues for brand owners
Internet & Social Media issues for brand ownersInternet & Social Media issues for brand owners
Internet & Social Media issues for brand owners
 
Intelligence-Driven Fraud Prevention
Intelligence-Driven Fraud PreventionIntelligence-Driven Fraud Prevention
Intelligence-Driven Fraud Prevention
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Managing Data Breach Communication on The Social Web
Managing Data Breach Communication on The Social WebManaging Data Breach Communication on The Social Web
Managing Data Breach Communication on The Social Web
 

More from Marc Vael

How secure are chat and webconf tools
How secure are chat and webconf toolsHow secure are chat and webconf tools
How secure are chat and webconf toolsMarc Vael
 
my experience as ciso
my experience as cisomy experience as ciso
my experience as cisoMarc Vael
 
Advantages of privacy by design in IoE
Advantages of privacy by design in IoEAdvantages of privacy by design in IoE
Advantages of privacy by design in IoEMarc Vael
 
Cybersecurity governance existing frameworks (nov 2015)
Cybersecurity governance existing frameworks (nov 2015)Cybersecurity governance existing frameworks (nov 2015)
Cybersecurity governance existing frameworks (nov 2015)Marc Vael
 
Cybersecurity nexus vision
Cybersecurity nexus visionCybersecurity nexus vision
Cybersecurity nexus visionMarc Vael
 
ISACA Reporting relevant IT risks to stakeholders
ISACA Reporting relevant IT risks to stakeholdersISACA Reporting relevant IT risks to stakeholders
ISACA Reporting relevant IT risks to stakeholdersMarc Vael
 
Cloud security lessons learned and audit
Cloud security lessons learned and auditCloud security lessons learned and audit
Cloud security lessons learned and auditMarc Vael
 
Value-added it auditing
Value-added it auditingValue-added it auditing
Value-added it auditingMarc Vael
 
ISACA Internet of Things open forum presentation
ISACA Internet of Things open forum presentationISACA Internet of Things open forum presentation
ISACA Internet of Things open forum presentationMarc Vael
 
hoe kan u vandaag informatie veiligheid realiseren op een praktische manier?
hoe kan u vandaag informatie veiligheid realiseren op een praktische manier?hoe kan u vandaag informatie veiligheid realiseren op een praktische manier?
hoe kan u vandaag informatie veiligheid realiseren op een praktische manier?Marc Vael
 
The value of big data analytics
The value of big data analyticsThe value of big data analytics
The value of big data analyticsMarc Vael
 
The view of auditor on cybercrime
The view of auditor on cybercrimeThe view of auditor on cybercrime
The view of auditor on cybercrimeMarc Vael
 
ISACA Mobile Payments Forum presentation
ISACA Mobile Payments Forum presentationISACA Mobile Payments Forum presentation
ISACA Mobile Payments Forum presentationMarc Vael
 
Belgian Data Protection Commission's new audit programme
Belgian Data Protection Commission's new audit programmeBelgian Data Protection Commission's new audit programme
Belgian Data Protection Commission's new audit programmeMarc Vael
 
ISACA Cloud Computing Risks
ISACA Cloud Computing RisksISACA Cloud Computing Risks
ISACA Cloud Computing RisksMarc Vael
 
Information security awareness (sept 2012) bis handout
Information security awareness (sept 2012) bis handoutInformation security awareness (sept 2012) bis handout
Information security awareness (sept 2012) bis handoutMarc Vael
 
ISACA smart security for smart devices
ISACA smart security for smart devicesISACA smart security for smart devices
ISACA smart security for smart devicesMarc Vael
 
Securing big data (july 2012)
Securing big data (july 2012)Securing big data (july 2012)
Securing big data (july 2012)Marc Vael
 
Valuendo cyberwar and security (jan 2012) handout
Valuendo cyberwar and security (jan 2012) handoutValuendo cyberwar and security (jan 2012) handout
Valuendo cyberwar and security (jan 2012) handoutMarc Vael
 
How to handle multilayered IT security today
How to handle multilayered IT security todayHow to handle multilayered IT security today
How to handle multilayered IT security todayMarc Vael
 

More from Marc Vael (20)

How secure are chat and webconf tools
How secure are chat and webconf toolsHow secure are chat and webconf tools
How secure are chat and webconf tools
 
my experience as ciso
my experience as cisomy experience as ciso
my experience as ciso
 
Advantages of privacy by design in IoE
Advantages of privacy by design in IoEAdvantages of privacy by design in IoE
Advantages of privacy by design in IoE
 
Cybersecurity governance existing frameworks (nov 2015)
Cybersecurity governance existing frameworks (nov 2015)Cybersecurity governance existing frameworks (nov 2015)
Cybersecurity governance existing frameworks (nov 2015)
 
Cybersecurity nexus vision
Cybersecurity nexus visionCybersecurity nexus vision
Cybersecurity nexus vision
 
ISACA Reporting relevant IT risks to stakeholders
ISACA Reporting relevant IT risks to stakeholdersISACA Reporting relevant IT risks to stakeholders
ISACA Reporting relevant IT risks to stakeholders
 
Cloud security lessons learned and audit
Cloud security lessons learned and auditCloud security lessons learned and audit
Cloud security lessons learned and audit
 
Value-added it auditing
Value-added it auditingValue-added it auditing
Value-added it auditing
 
ISACA Internet of Things open forum presentation
ISACA Internet of Things open forum presentationISACA Internet of Things open forum presentation
ISACA Internet of Things open forum presentation
 
hoe kan u vandaag informatie veiligheid realiseren op een praktische manier?
hoe kan u vandaag informatie veiligheid realiseren op een praktische manier?hoe kan u vandaag informatie veiligheid realiseren op een praktische manier?
hoe kan u vandaag informatie veiligheid realiseren op een praktische manier?
 
The value of big data analytics
The value of big data analyticsThe value of big data analytics
The value of big data analytics
 
The view of auditor on cybercrime
The view of auditor on cybercrimeThe view of auditor on cybercrime
The view of auditor on cybercrime
 
ISACA Mobile Payments Forum presentation
ISACA Mobile Payments Forum presentationISACA Mobile Payments Forum presentation
ISACA Mobile Payments Forum presentation
 
Belgian Data Protection Commission's new audit programme
Belgian Data Protection Commission's new audit programmeBelgian Data Protection Commission's new audit programme
Belgian Data Protection Commission's new audit programme
 
ISACA Cloud Computing Risks
ISACA Cloud Computing RisksISACA Cloud Computing Risks
ISACA Cloud Computing Risks
 
Information security awareness (sept 2012) bis handout
Information security awareness (sept 2012) bis handoutInformation security awareness (sept 2012) bis handout
Information security awareness (sept 2012) bis handout
 
ISACA smart security for smart devices
ISACA smart security for smart devicesISACA smart security for smart devices
ISACA smart security for smart devices
 
Securing big data (july 2012)
Securing big data (july 2012)Securing big data (july 2012)
Securing big data (july 2012)
 
Valuendo cyberwar and security (jan 2012) handout
Valuendo cyberwar and security (jan 2012) handoutValuendo cyberwar and security (jan 2012) handout
Valuendo cyberwar and security (jan 2012) handout
 
How to handle multilayered IT security today
How to handle multilayered IT security todayHow to handle multilayered IT security today
How to handle multilayered IT security today
 

Recently uploaded

AI Virtual Influencers: The Future of Influencer Marketing
AI Virtual Influencers:  The Future of Influencer MarketingAI Virtual Influencers:  The Future of Influencer Marketing
AI Virtual Influencers: The Future of Influencer MarketingCut-the-SaaS
 
VIP Moti Bagh Call Girls Free Doorstep Delivery 9873777170
VIP Moti Bagh Call Girls Free Doorstep Delivery 9873777170VIP Moti Bagh Call Girls Free Doorstep Delivery 9873777170
VIP Moti Bagh Call Girls Free Doorstep Delivery 9873777170Komal Khan
 
Mastering Wealth with YouTube Content Marketing.pdf
Mastering Wealth with YouTube Content Marketing.pdfMastering Wealth with YouTube Content Marketing.pdf
Mastering Wealth with YouTube Content Marketing.pdfTirupati Social Media
 
Call Girls In Dwarka ⏊7838079806 ⏊Escort Service In Patel Nagar Delhi
Call Girls In Dwarka ⏊7838079806 ⏊Escort Service In Patel Nagar DelhiCall Girls In Dwarka ⏊7838079806 ⏊Escort Service In Patel Nagar Delhi
Call Girls In Dwarka ⏊7838079806 ⏊Escort Service In Patel Nagar Delhidelhiescort
 
Models Call Girls Shettihalli - 7001305949 Escorts Service 50% Off with Cash ...
Models Call Girls Shettihalli - 7001305949 Escorts Service 50% Off with Cash ...Models Call Girls Shettihalli - 7001305949 Escorts Service 50% Off with Cash ...
Models Call Girls Shettihalli - 7001305949 Escorts Service 50% Off with Cash ...jicagig173
 
定制(ENU毕业证书)英国爱丁堡龙比亚大学毕业证成绩单原版一比一
定制(ENU毕业证书)英国爱丁堡龙比亚大学毕业证成绩单原版一比一定制(ENU毕业证书)英国爱丁堡龙比亚大学毕业证成绩单原版一比一
定制(ENU毕业证书)英国爱丁堡龙比亚大学毕业证成绩单原版一比一ra6e69ou
 
When-technology-and-Humanity-Cross-1.pptx
When-technology-and-Humanity-Cross-1.pptxWhen-technology-and-Humanity-Cross-1.pptx
When-technology-and-Humanity-Cross-1.pptxReaper61
 
YouScan Company Overview - Social Media Listening with Visual Insights.pdf
YouScan Company Overview - Social Media Listening with Visual Insights.pdfYouScan Company Overview - Social Media Listening with Visual Insights.pdf
YouScan Company Overview - Social Media Listening with Visual Insights.pdfAlexander Sirach
 
Dubai Call Girls O528786472 Diabolic Call Girls In Dubai
Dubai Call Girls O528786472 Diabolic Call Girls In DubaiDubai Call Girls O528786472 Diabolic Call Girls In Dubai
Dubai Call Girls O528786472 Diabolic Call Girls In Dubaihf8803863
 
Upgrade Your Twitter Presence with Socio Cosmos
Upgrade Your Twitter Presence with Socio CosmosUpgrade Your Twitter Presence with Socio Cosmos
Upgrade Your Twitter Presence with Socio CosmosSocioCosmos
 
social media for the hospitality industry.
social media for the hospitality industry.social media for the hospitality industry.
social media for the hospitality industry.japie swanepoel
 
"Ready to elevate your Instagram? Let's go
"Ready to elevate your Instagram? Let's go"Ready to elevate your Instagram? Let's go
"Ready to elevate your Instagram? Let's goSocioCosmos
 
Independent Escorts Lucknow 8923113531 WhatsApp luxurious locale in your city...
Independent Escorts Lucknow 8923113531 WhatsApp luxurious locale in your city...Independent Escorts Lucknow 8923113531 WhatsApp luxurious locale in your city...
Independent Escorts Lucknow 8923113531 WhatsApp luxurious locale in your city...makika9823
 
Cosmic Conversations with Sociocosmos...
Cosmic Conversations with Sociocosmos...Cosmic Conversations with Sociocosmos...
Cosmic Conversations with Sociocosmos...SocioCosmos
 
Add more information to your upload Tip: Better titles and descriptions lead ...
Add more information to your upload Tip: Better titles and descriptions lead ...Add more information to your upload Tip: Better titles and descriptions lead ...
Add more information to your upload Tip: Better titles and descriptions lead ...SejarahLokal
 
办理伯明翰大学毕业证书文凭学位证书
办理伯明翰大学毕业证书文凭学位证书办理伯明翰大学毕业证书文凭学位证书
办理伯明翰大学毕业证书文凭学位证书saphesg8
 

Recently uploaded (20)

looking for escort 9953056974 Low Rate Call Girls In Vinod Nagar
looking for escort 9953056974 Low Rate Call Girls In  Vinod Nagarlooking for escort 9953056974 Low Rate Call Girls In  Vinod Nagar
looking for escort 9953056974 Low Rate Call Girls In Vinod Nagar
 
AI Virtual Influencers: The Future of Influencer Marketing
AI Virtual Influencers:  The Future of Influencer MarketingAI Virtual Influencers:  The Future of Influencer Marketing
AI Virtual Influencers: The Future of Influencer Marketing
 
young Call girls in Dwarka sector 23🔝 9953056974 🔝 Delhi escort Service
young Call girls in Dwarka sector 23🔝 9953056974 🔝 Delhi escort Serviceyoung Call girls in Dwarka sector 23🔝 9953056974 🔝 Delhi escort Service
young Call girls in Dwarka sector 23🔝 9953056974 🔝 Delhi escort Service
 
FULL ENJOY Call Girls In Mohammadpur (Delhi) Call Us 9953056974
FULL ENJOY Call Girls In Mohammadpur  (Delhi) Call Us 9953056974FULL ENJOY Call Girls In Mohammadpur  (Delhi) Call Us 9953056974
FULL ENJOY Call Girls In Mohammadpur (Delhi) Call Us 9953056974
 
VIP Moti Bagh Call Girls Free Doorstep Delivery 9873777170
VIP Moti Bagh Call Girls Free Doorstep Delivery 9873777170VIP Moti Bagh Call Girls Free Doorstep Delivery 9873777170
VIP Moti Bagh Call Girls Free Doorstep Delivery 9873777170
 
Mastering Wealth with YouTube Content Marketing.pdf
Mastering Wealth with YouTube Content Marketing.pdfMastering Wealth with YouTube Content Marketing.pdf
Mastering Wealth with YouTube Content Marketing.pdf
 
Call Girls In Dwarka ⏊7838079806 ⏊Escort Service In Patel Nagar Delhi
Call Girls In Dwarka ⏊7838079806 ⏊Escort Service In Patel Nagar DelhiCall Girls In Dwarka ⏊7838079806 ⏊Escort Service In Patel Nagar Delhi
Call Girls In Dwarka ⏊7838079806 ⏊Escort Service In Patel Nagar Delhi
 
Models Call Girls Shettihalli - 7001305949 Escorts Service 50% Off with Cash ...
Models Call Girls Shettihalli - 7001305949 Escorts Service 50% Off with Cash ...Models Call Girls Shettihalli - 7001305949 Escorts Service 50% Off with Cash ...
Models Call Girls Shettihalli - 7001305949 Escorts Service 50% Off with Cash ...
 
定制(ENU毕业证书)英国爱丁堡龙比亚大学毕业证成绩单原版一比一
定制(ENU毕业证书)英国爱丁堡龙比亚大学毕业证成绩单原版一比一定制(ENU毕业证书)英国爱丁堡龙比亚大学毕业证成绩单原版一比一
定制(ENU毕业证书)英国爱丁堡龙比亚大学毕业证成绩单原版一比一
 
When-technology-and-Humanity-Cross-1.pptx
When-technology-and-Humanity-Cross-1.pptxWhen-technology-and-Humanity-Cross-1.pptx
When-technology-and-Humanity-Cross-1.pptx
 
YouScan Company Overview - Social Media Listening with Visual Insights.pdf
YouScan Company Overview - Social Media Listening with Visual Insights.pdfYouScan Company Overview - Social Media Listening with Visual Insights.pdf
YouScan Company Overview - Social Media Listening with Visual Insights.pdf
 
Dubai Call Girls O528786472 Diabolic Call Girls In Dubai
Dubai Call Girls O528786472 Diabolic Call Girls In DubaiDubai Call Girls O528786472 Diabolic Call Girls In Dubai
Dubai Call Girls O528786472 Diabolic Call Girls In Dubai
 
Upgrade Your Twitter Presence with Socio Cosmos
Upgrade Your Twitter Presence with Socio CosmosUpgrade Your Twitter Presence with Socio Cosmos
Upgrade Your Twitter Presence with Socio Cosmos
 
social media for the hospitality industry.
social media for the hospitality industry.social media for the hospitality industry.
social media for the hospitality industry.
 
"Ready to elevate your Instagram? Let's go
"Ready to elevate your Instagram? Let's go"Ready to elevate your Instagram? Let's go
"Ready to elevate your Instagram? Let's go
 
Independent Escorts Lucknow 8923113531 WhatsApp luxurious locale in your city...
Independent Escorts Lucknow 8923113531 WhatsApp luxurious locale in your city...Independent Escorts Lucknow 8923113531 WhatsApp luxurious locale in your city...
Independent Escorts Lucknow 8923113531 WhatsApp luxurious locale in your city...
 
Cosmic Conversations with Sociocosmos...
Cosmic Conversations with Sociocosmos...Cosmic Conversations with Sociocosmos...
Cosmic Conversations with Sociocosmos...
 
young call girls in Greater Noida 🔝 9953056974 🔝 Delhi escort Service
young call girls in  Greater Noida 🔝 9953056974 🔝 Delhi escort Serviceyoung call girls in  Greater Noida 🔝 9953056974 🔝 Delhi escort Service
young call girls in Greater Noida 🔝 9953056974 🔝 Delhi escort Service
 
Add more information to your upload Tip: Better titles and descriptions lead ...
Add more information to your upload Tip: Better titles and descriptions lead ...Add more information to your upload Tip: Better titles and descriptions lead ...
Add more information to your upload Tip: Better titles and descriptions lead ...
 
办理伯明翰大学毕业证书文凭学位证书
办理伯明翰大学毕业证书文凭学位证书办理伯明翰大学毕业证书文凭学位证书
办理伯明翰大学毕业证书文凭学位证书
 

Social media risks and controls

  • 1. Marc Vael Managing social media risks 
 to an acceptable level
  • 2.
  • 3. Definition of social media The social interaction among people in which they create, share or exchange information and ideas in virtual communities and networks. A group of Internet-based applications that build on the ideological and technological foundations of Web 2.0, and that allow the creation and exchange of user-generated content.
  • 4. Social media and technology Social media depend on mobile and web-based technologies to create highly interactive platforms through which individuals and communities share, co-create, discuss, and modify user-generated content. Social media introduce substantial and pervasive changes to communication between organizations, communities, and individuals.
  • 6.
  • 7.
  • 8. What makes social media social? Social media differ from traditional or industrial media in many ways, including quality, reach, frequency, usability, immediacy, and permanence. Internet users spend more time with social media sites than any other type of site. For content contributors, the benefits of participating in social media have gone beyond simply social sharing to building reputation and bringing in career opportunities and monetary income.
  • 9. What makes social media different? • It’s very, very public • It’s amplified (one to many, many to many, possibly millions) • It’s a continuous live conversation driven by everyone. • It’s permanent (Twitter is now archived in the U.S. Library of Congress) • It lacks much of the contextual information of traditional media.
  • 10.
  • 11.
  • 12. Protiviti, 2013 IA Capabilities Needs survey
  • 13. Social media risks Threats and Vulnerabilities • Employee posting of pictures or information linking them to the organisation Risks • Brand damage • Reputational damage • Legal contract damage Risk Mitigation Techniques • policy that specifies how employees may use organisation related images, assets, and intellectual property (IP) in their online presence. • awareness training and campaigns to inform employees on using social media sites
  • 14.
  • 15.
  • 16. Aanmaken van een vals sociaal media profiel leidt tot de volgende (gezamenlijke) juridische aanklachten:
 1. Valsheid in informatica (artikel 210bis Sw.); 2. Belaging/stalking (artikel 442bis Sw.); 3. Laster en eerroof (artikel 443 Sw.); 4. Belaging via telecommunicatie (o.a. artikel 145 §3bis van de Wet van 13 juni 2005 betreffende de elektronische communicatie) 5. Aanmatiging van naam (231 Sw).
  • 17.
  • 18.
  • 19. Social media risks Threats and Vulnerabilities • Exposure to customers and organisation through fraudulent or hijacked corporate presence Risks • Customer backlash/adverse legal actions • Exposure of customer information • Reputational damage • Targeted phishing attacks on customers or employees Risk Mitigation Techniques • brand protection firm scans & searches brand misuse. • periodic informational updates to customers to maintain awareness of potential fraud and to establish clear guidelines regarding what information should be posted as part of enterprise social media presence. • awareness training and campaigns to inform employees of the risks involved with using social media sites
  • 20.
  • 21.
  • 22.
  • 23.
  • 24.
  • 25.
  • 26. Social media risks Threats and Vulnerabilities • Mismanagement of electronic communications impacted by retention regulations or e-discovery Risks • Regulatory sanctions and fines • Adverse legal actions Risk Mitigation Techniques • appropriate policies, processes, tools & technologies, training are in place to ensure that communications via social media that may be impacted by litigation or regulations are tracked & archived appropriately. • ensuring security protocols & audits are adequate • avoid publishing misleading tweets from consumers • depending on social media site, maintaining archives may or may not be a recommended approach.
  • 27.
  • 28. Once Upon a Time… • Coastal photos taken 
 by photographer 
 Kenneth Adelman as
 part of erosion 
 documentation study • Study commissioned
 by California Coastal Records Project and contained over 12,000 photographs later placed on Pictopia.com • This image was descriptively named Image 3850
  • 29. The Streisand Effect is born • Barbara Streisand sued
 photographer + site
 for invasion of privacy
 in 2003 • Photo was downloaded 
 6 times prior to suit 
 (2 times by Streisand’s attorneys) • Within a month of the lawsuit being filed, 
 the photo was downloaded 420,000 times • You can read the whole lawsuit at 
 bit.ly/streisandlawsuit
  • 30. The Streisand Effect Irony • “…the property is owned by an entity which cannot be traced, with any certainty, back to her.” • “…Plaintiff’s living quarters are set back from the brink of the cliff…In fact, to catch a glimpse of [Plaintiff’s living quarters] one would have to walk a significant distance from the property either to the north or the south.” • “…by entering the word ‘Streisand’ on the website’s own search engine, one is immediately taken to the detailed picture…”
  • 31. The Streisand Effect Case Outcome • 45 page ruling against Streisand at bit.ly/ streisandruling • Court embarked on research from People Magazine (page 80 of March 9, 1998 issue) to California coastal history of the 1850s. • The result:
  • 32. Social media risks Threats and Vulnerabilities • Introduction of viruses and malware to corporate network Risks • Data leakage/theft • “Owned” systems (zombies) • System downtime • Resources required to clean systems Risk Mitigation Techniques • antivirus & anti malware controls installed and updated. • content filtering technology to restrict or limit access. • controls installed on mobile devices such as smartphones. • social media policies & standards. • awareness training and campaigns to inform employees of the risks involved with using social media sites. • regular audits
  • 33. Social media malware distribution • Similar to other threats that can lead to downloading/ installing malware – Malicious ads – Clickjacking (“likejacking”) – Wall posts, inbox or chat messages with malicious links from “Friends” (hijacked user account) – “My wallet was stolen and I’m stuck in Rome. Send me cash now.” – Spam email pretending to be from social media (facebook, twitter, linkedin) admins
  • 34. Social media malware distribution URL Shorteners • bit.ly, TinyUrl, ReadThisURL, NotLong • Hides the true destination URL – no way to tell where you’re going until you click! http://www.hacker.com/badsite?%20infect-your- pc.html is now http://bit.ly/aaI9KV
  • 35. Social media malware distribution 3rd party apps • Games, quizzes, cutesie stuff • Untested by Facebook: anyone can write one • No Terms & Conditions: you either allow or you don’t • Installation gives developers rights to look at your profile and overrides your privacy settings!
  • 36.
  • 37. Hollywood Celebrity iCloud picture incident
  • 38.
  • 39.
  • 40. OMG!
  • 41.
  • 42.
  • 43.
  • 44.
  • 45.
  • 46.
  • 47. Social media risks Threats and Vulnerabilities • Move to digital business model increases customer service expectations Risks • Customer dissatisfaction with the responsiveness received, leading to potential reputational damage for the organisation and customer retention issues Risk Mitigation Techniques • adequate staffing to handle the traffic created from social media presence. • notices with clear windows for customer response.
  • 48. Social media risks Threats and Vulnerabilities • Use of personal accounts to communicate work-related information Risks • Privacy violations • Reputational damage • Loss of competitive advantage Risk Mitigation Techniques • policies address employee posting of work-related information • awareness training and campaigns that reinforce policies.
  • 49.
  • 50.
  • 51.
  • 52.
  • 53.
  • 54.
  • 56. • "Little do they know that the cheese was in his nose and that there was some lethal gas that ended up on their salami ... Now that's how we roll at Domino's." • “We got blindsided by two idiots with a video camera and an awful idea … .”
  • 57.
  • 58.
  • 59.
  • 60. Social media risks Threats and Vulnerabilities • Excessive employee use of social media in the workplace Risks • Network utilization issues • Productivity loss • Increased risk of defamation • Increased risk of exposure to viruses and malware due to longer duration of sessions Risk Mitigation Techniques • awareness training and campaigns that reinforce policies • manage accessibility to social media sites via – content filtering – limiting network throughput to social media sites.
  • 61. Social media risks Threats and Vulnerabilities • Unclear/undefined content rights to information posted to social media Risks • Organisation’s loss of control/legal rights of information posted to the social media sites • Unwanted contracts Risk Mitigation Techniques • legal & communications teams review user agreements for social media sites that are being considered. • clear policies to employees and customers what information should be posted as part of the organisation social media presence. • (If feasible and appropriate) capability to capture & log all communications.
  • 62. Social media risks Threats and Vulnerabilities • Employee access to social media via organisation-supplied mobile devices (smartphones, tablets, laptops,…) Risks • Infection of mobile devices • Data theft from mobile devices • Circumvention of corporate controls • Data leakage Risk Mitigation Techniques • route corporate mobile devices through corporate network filtering technology to restrict or limit access to social media sites. • appropriate controls are installed & continuously updated on mobile devices. • policies & standards regarding use of mobile devices to access social media. • awareness training and campaigns to inform employees of the risks involved with using social media sites
  • 63. By 2017, 
 40% of enterprise contact information will have leaked into Facebook via employees' increased use of mobile device collaboration applications.
  • 64.
  • 65. “Not using social media 
 in the workplace 
 is starting to make 
 about as much sense as 
 not using the phone or email.” Ryan Holmes
  • 67.
  • 68.
  • 69. Source: COBITÂŽ 5, figure 15. Š 2012 ISACAÂŽ All rights reserved.
  • 70.
  • 72.
  • 73.
  • 74. Protiviti, 2013 IA Capabilities Needs survey
  • 75. Protiviti, 2013 IA Capabilities Needs survey
  • 76. 10 social media strategy questions 1. What is the strategic benefit to leveraging social media? 2. Are all appropriate stakeholders involved in social media strategy development? 3. What are the risks associated with social media and do the benefits outweigh the costs? 4. What are the new legal issues associated with the use of social media? 5. How will customer privacy issues be addressed? 6. How can positive brand recognition be ensured? 7. How will awareness training be communicated to employees and customers? 8. How will inquiries and concerns from customers be handled? 9. Does the organisation have the resources to support such an initiative? 10. What are the regulatory requirements that accompany the integration of social media?
  • 77.
  • 78. What to consider in a social media policy? • Who is going to manage social media in the organisation? (consider a collaborative approach) • The nature of conduct that the employer seeks to protect itself against • Who should such a policy apply to: the entire business or levels within the business, suppliers, business partners contractors? • The nature of control over social media use: a total ban, limited use, total accessibility? • Authority limits or restrictions for use: is permission required, content pre-approval, who is responsible for such approvals? • What can or cannot be discussed on social media forums ?
  • 79. What to consider in a social media policy? • What logos, icons, ideas can or cannot be published on social media forums? • What disclaimers or other information must be included when participating in a social media forum? • The nature of behaviour that is acceptable or unacceptable? • When it is (not) acceptable to use or participate in a social media forum? • Reporting any breach • Consequences of breach • Integration into existing policies.
  • 80. Review existing policies for social media implications • Code of Conduct / Ethics • Conflict of Interest • User agreements or term of use • Disclaimers • Linking agreement • License agreement • Logo use guidelines • Affiliation agreements
  • 81.
  • 82. Advantages of a social media policy • Provide guidelines for using social media: you can define what you consider appropriate • Provide recourse as an employer if something does go wrong • If you don’t have a policy in place you may find it hard to discipline staff for what you consider to be inappropriate use of social media
  • 83. Social media guidelines: in general • Think about language & etiquette: nothing beats good manners • Understand that every post is public: this is not a relationship between you & your computer! • Consider information you are posting: is it confidential or private in any way? • Think about consequences in terms of being “quoted out of context” • Have systems in place for dealing with negative events.
  • 84. Social media guidelines: private vs public • Anything posted on social media should be considered public – ie front page of the newspaper • Know your privacy settings, especially on Facebook • Be careful of “linking” private social media accounts to company accounts • Share freely that which is public (and appropriate). • Think about location based social media networking ie do you want your competition to know when you’re visiting clients?
  • 85.
  • 86. Protiviti, 2013 IA Capabilities Needs survey
  • 88. Privacy basics Basic principles: the Data controller –collect & process personal data only when this is legally permitted –respect certain obligations regarding the processing of personal data; –respond to complaints regarding breaches of data protection rules; –collaborate with national data protection supervisory authorities Source: http://ec.europa.eu/justice/data-protection/
  • 89. Privacy basics • Personal data must be – processed legally & fairly; – collected for explicit & legitimate purposes and used accordingly; – adequate, relevant & not excessive in relation to the purposes for which it is collected and/or further processed; – accurate & updated where necessary; – kept any longer than strictly necessary; – rectified, removed or blocked by the data subject if incorrect; – Protected against accidental or unlawful destruction, loss, alteration and disclosure, particularly when processing involves data transmission over networks. Source: http://ec.europa.eu/justice/data-protection/
  • 90. Privacy basics & social media Who’s looking? • Parents • Friends & family • Friends of friends & family • Employers & co-workers • Customers • Universities • Marketing companies & vendors • Criminals & hackers • Government agencies • EVERYONE ELSE
  • 91.
  • 92. Privacy basics & social media
  • 93. Privacy basics & social media Dimensions • Privacy of Personal Communications • Privacy of Personal Data / Data Protection • Privacy of Personal Behaviour • Privacy of the Person Privacy concerns • Privacy-Abusive Data Collection • Privacy-Abusive Service-Provider Rights • Privacy-Abusive Functionality & User Interfaces • Privacy-Abusive Data Exploitation
  • 94. Privacy basics & social media Disincentives Impediments Incentives Stimulants Attractors Detractors 'turn-off' 'turn-on'
  • 95.
  • 96.
  • 98.
  • 99.
  • 100. Social Media risk assessment
  • 101. Corporate governance : ERM = COSO Organisational structure
  • 102. Roles involved in social media risk management
  • 103.
  • 104.
  • 106.
  • 107.
  • 109.
  • 110.
  • 112. Social Media technological controls • Technology can assist in policy enforcement, blocking, preventing or identifying potential incidents. • Monitor social media via tools like Google Alerts, Social Mention, Twitter search,…. • Combination of web content filtering, which can block all access or allow limited access, and provide protection against malware downloads and end-user system antimalware, antivirus and operating system security to counter such attacks. • A layered approach is optimal. • Tracking & reporting results
  • 113. Social Media technological controls Electronic security • Viruses • False links • Spam • Phishing • Hackers • Web site security • Internet security • Electronic discovery – Electronic information lasts forever
  • 114. Social Media technological controls Personal security • Identity theft • Stalking • Cyber-bullying • Sextortion • Sexting • Predators
  • 116. Indicative Indicative
 Generation Birth-Years Age in 2014 Silent / Seniors 1910-45 70-100 Baby Boomers – Early 1945-55 60-70 Baby Boomers – Late 1955-65 50-60 Generation X 1965-80 35-50 Generation Y 1980-95 20-35 The iGeneration 1995- 0-20 The Generations of Computing Consumers
  • 117. Baby Boomers (50-70) • Handshake/phone, PCs came late, had to adapt to mobile phones • Work is Life, the team discusses / the boss decides, process-oriented GenXs (35-50) • Grew up with PCs, email and mobile phones, hence multi-taskers • Work to Have More Life, expect payback from work, product-oriented GenYs (20-35) • Grew up with IM/chat, texting and video-games, strong multi-taskers • Life-Work Balance, expect fulfilment from work, highly interactive iGens (to 20) • Growing up with texting, multi-media social networking, networked games, multi-channel immersion / inherent multi-tasking • Life before Work, even more hedonistic, highly (e-)interactive The Generations of Computing Consumers
  • 122. 0. People say 'the generation that has embraced 'reality TV' 
 and Facebook see the world differently' ... 'Privacy is dead' BUT 1. Young people are risk-takers, and 'have nothing to hide' 2. People become more risk-averse as they get older 
 and accumulate things that they want to hide 3. The big change has been the reach and the re-discoverability 
 of the text, the images and the video of youthful indiscretions 4. Many people have been exposed during 2005-12 5. As a result, iGens are more savvy about self-exposure 6. iGens will be more privacy-sensitive than their predecessors The Privacy Attitudes of iGens
  • 123. Share appropriately • Caution everyone about the information they share with family members. • The greatest social media risks revolve around discussing: • company’s finances • strategies & goals • brand & trade secrets • proprietary research • unreleased advertising • personal information of employees or clients • Different perceptions on social media communications – Unofficial communications (It’s private, isn’t it?...) – Ephemeral communications (Did we really say that?) – Anonymous communications (Catch me if you can!)
  • 124. Trust your gut feeling • If you feel like you may have come upon information you are not authorized to have, err on the side of not using it. • In other words: When in doubt, don’t. Once it’s out there, it’s out there forever. • It’s truly better to be safe than sorry.
  • 125. When things look too good to be true
  • 126.
  • 127. Be mindful about copyrights & trademarks • Just because it is online, does not mean it is fair game. • When in doubt, 
 get permission 
 to use another’s material.
  • 128. “More companies are discovering that an Ăźber-connected workplace 
 is not just about implementing a new set of tools: it is also about embracing a cultural shift to create an open environment where employees are encouraged to share, innovate and collaborate virtually.” 
 Willyerd & Meister, HarvardBusiness.org
  • 129. Ethical issues Should you friend someone who works for you? Should you accept your bosses’ friend request? Should the company accept a jobstudent’s friend How much should you research job applicants?
  • 131. Social media awareness and training program Personal use in the workplace: • is it allowed? • nondisclosure/posting of business-related content • discussion of workplace-related topics • inappropriate sites, content or conversations Personal use outside the workplace: • nondisclosure/posting of business-related content • standard disclaimers if identifying the employer • dangers of posting too much personal information Business use: • is it allowed? • process to gain approval for use • scope of topics or information permitted to flow through this channel • disallowed activities (installation of applications, playing games, etc.) • escalation process for customer issues
  • 133.
  • 134.
  • 135.
  • 136.
  • 138.
  • 139. Social media ROI 1. Higher customer satisfaction and interaction through personalized webcare. 2. Know about (problems with) your new products and services faster. 3. Increase impact of own content. Without filter. 4. Strengthen your reputation. 5. Strengthen your relationships. 6. Strengthen your controls.
  • 140. Your social media controls are as strong … … as their weakest link
  • 141.
  • 142.
  • 144.
  • 145. 145
  • 146.
  • 147. For more information… Marc Vael
 President http://www.isaca.org/ http://www.isaca.be/ marc@vael.net Follow Marc Vael on Twitter http://twitter.com/marcvael Join Marc Vael on Linkedin: http://www.linkedin.com/in/marcvael