Social Media Opportunities and Risks A Lifecycle Approach for the Enterprise

Size: px
Start display at page:

Download "Social Media Opportunities and Risks A Lifecycle Approach for the Enterprise"

Transcription

1 Social Media Opportunities and Risks A Lifecycle Approach for the Enterprise The program will begin shortly. Please listen to the webinar through your computer audio. Make sure your speakers are turned on.

2 Some Reminders... During the call you can ask questions by clicking on the questions link at the top of your screen. We will address these questions following the presentation. If for some reason we are not able to get to your question(s) in the time allotted, our presenters would be happy to have a separate discussion to answer your inquiries. After the webinar, all attendees will receive a link to a copy of the presentation and recording 2

3 Discussion Topics The Social Media Landscape The Social Media Lifecycle Risk Management Questions and Answers 3

4 Discussion Topics The Social Media Landscape The Social Media Lifecycle Risk Management Questions and Answers 4

5 5

6 Top External (or Customer-Facing) Social Strategy Objectives 2011 Social website integration is the top external priority in 2011 for 47% of corporate Social Strategists 6 Source: corporateventuringconference.com Base: 140 Global Corporate Social Strategists

7 Adoption and Spending Forecast Reveals Key Trends for 2011 Three major social business spending areas Internal Soft Costs: This includes Staff to Manage the program, Education and Training, and Research and Development Customer-Facing Initiatives: This includes Ad/Marketing Spend on social networks, Traditional Agencies (deploying social media), Boutique Agencies (specializing in social media), and Influencer/Blogger Programs Technology Investments: This includes Brand Monitoring, Community Platform, Custom Technology Development, Social CRM (SCRM), and Social Media Management Systems (SMMS) Key Trends In 2011, corporations will increase spending on staff to manage social business though team sizes will remain small 78% of social strategists will invest in training and education this year, yet it will be underfunded Corporations will invest heavily in ad and marketing on social networks, though fail to truly engage or leverage the social graph More corporations will adopt brand monitoring, increasing their investment by 56% over last year, but return on investment (ROI) problem will persist Advanced corporations will invest in custom technology development, including integration of social networks on the corporate website To scale, more mature programs will invest in nascent systems, such as social media management systems (SMMS) and social CRM (SCRM) 7 Source: corporateventuringconference.com

8 Social Media Technologies by Function Archiving & Compliance Content Management Monitoring & Analytics Tools to facilitate capturing and storing social communications for regulatory compliance Tools to control and prevent violations Integration with existing archive platforms Tools to facilitate centralized and robust user interaction on social networks Implements workflow to allow review and moderation of content Central library for pre-reviewed and approved content. Listen, monitor, and engage in conversations in the social space Identify PR issues/negative events Platform to respond and engage in customer relationship management (CRM) Perform analysis on monitored social conversations Capture and measure brand sentiment Calculate ROI and track metrics Identify social trends and activities Example Vendors Example Vendors Example Vendors 8

9 Security Concerns Social Network Users More Vulnerable To Security Risks 21% accept contact offerings from members they don't recognize More than half let acquaintances or roommates access social networks on their machines 64% click on links offered by community members or contacts 26% share files within social networks 20% have experienced identity theft 47% have been victims of malware infections Facebook has been hit with malicious applications and new version of the Koobface virus, which allows hackers to steal information from personal profiles 9

10 Social Media Hacking Example 10

11 Another Risk Social Widgets 11

12 Discussion Topics The Social Media Landscape The Social Media Lifecycle Risk Management Questions and Answers 12

13 The Social Media Lifecycle STRATEGY Establish linkage to corporate objectives MEASURING THE RESULTS Collect data and validate against goals and adjust approach as needed Business Strategies CREATING THE PLAN Putting the plan into the corporate development process IMPLEMENTATION AND MONITORING Obtain final sign-offs and monitor the activity in a production mode DEVELOPMENT AND CHANGE MANAGEMENT Developing the product and testing in a nonproduction mode 13

14 The Social Media Lifecycle Strategy Activities Specifically scope the intended use and expected outcomes Assess the competitive landscape to determine if social media intentions are groundbreaking or already in existence from others Align the goals for social media usage with company business objectives STRATEGY Establish linkage to corporate objectives Determine potential social media functional options and align with existing marketing/communications processes MEASURING THE RESULTS Collect data and validate against goals and adjust approach as needed Business Strategies CREATING THE PLAN Putting the plan into the corporate development process Develop an inventory of risks that will be assessed and managed Develop methods and metrics for measuring intended results Identify high-level schedule and intended delivery of capabilities Determine appropriate gates for go/no-go decisions on rolling out the capabilities IMPLEMENTATION AND MONITORING Obtain final sign-offs and monitor the activity in a production mode DEVELOPMENT AND CHANGE MANAGEMENT Developing the product and testing in a nonproduction mode 14

15 The Social Media Lifecycle Creating the Plan Activities Identify executive sponsorship for the work Identify the stakeholders for implementing the social media capabilities and assign appropriate ownership Begin training of stakeholders STRATEGY Establish linkage to corporate objectives Define functional requirements and prioritize them Determine impact on existing technical standards/patterns and potential implications of new capabilities MEASURING THE RESULTS Collect data and validate against goals and adjust approach as needed Business Strategies CREATING THE PLAN Putting the plan into the corporate development process Select products/tools and implementation scheme (SaaS, selfmanaged) Review the skills needed to deliver the social media capabilities and identify gaps that may need to be addressed between those that currently exist in the company Develop a detailed project plan to include timeline requirements, resource needs, and dependencies on other initiatives Review company social media policies and revise as necessary IMPLEMENTATION AND MONITORING Obtain final sign-offs and monitor the activity in a production mode DEVELOPMENT AND CHANGE MANAGEMENT Developing the product and testing in a nonproduction mode 15

16 The Social Media Lifecycle Development and Change Management Activities Identify potential pilot and proof-of-concept needs Define the development environment design, and implement necessary technical capabilities and tools support Review infrastructure management procedures and confirm adherence to them Validate appropriate solution design and signoff procedures. Confirm testing requirements and overall design Confirm implementation requirements and coordination Define training requirements for pilot participants Design training curriculum and timing Develop communication plan for impacted internal and external personnel Define necessary monitoring capabilities and procure necessary tools MEASURING THE RESULTS Collect data and validate against goals and adjust approach as needed IMPLEMENTATION AND MONITORING Obtain final sign-offs and monitor the activity in a production mode STRATEGY Establish linkage to corporate objectives Business Strategies CREATING THE PLAN Putting the plan into the corporate development process DEVELOPMENT AND CHANGE MANAGEMENT Developing the product and testing in a nonproduction mode 16

17 The Social Media Lifecycle Implementation and Monitoring Activities Review final go/no-go requirements and determine appropriate actions STRATEGY Establish linkage to corporate objectives Conduct training with applicable personnel Create implementation checklist Distribute final communications to necessary internal and external personnel MEASURING THE RESULTS Collect data and validate against goals and adjust approach as needed Business Strategies CREATING THE PLAN Putting the plan into the corporate development process Implement monitoring capabilities Monitor production activities and create accountability for issues IMPLEMENTATION AND MONITORING Obtain final sign-offs and monitor the activity in a production mode DEVELOPMENT AND CHANGE MANAGEMENT Developing the product and testing in a nonproduction mode 17

18 The Social Media Lifecycle Measuring the Results Activities Collect key measurements and analyze results STRATEGY Establish linkage to corporate objectives Create reports to track results and comparison to intended metrics Identify gaps and determine ongoing expectations for results Determine next-phase (from pilot exit to full implementation) capabilities and ongoing enhancements to the social media capabilities MEASURING THE RESULTS Collect data and validate against goals and adjust approach as needed Business Strategies CREATING THE PLAN Putting the plan into the corporate development process Execute communications plan to socialize pilot results and define next steps IMPLEMENTATION AND MONITORING Obtain final sign-offs and monitor the activity in a production mode DEVELOPMENT AND CHANGE MANAGEMENT Developing the product and testing in a nonproduction mode 18

19 The Social Media Lifecycle Guiding Principles Governance Ensure that the social media capabilities have appropriate oversight and ownership Coordinate/integrate social media efforts with other marketing activities Monitor market developments with emerging social media offerings Establish appropriate review and quality assurance steps Capabilities Review current skill sets within the organization and validate what may be needed to deliver social media efforts. Introductory and expert usage training is essential. Make sure that the IT organization is appropriately involved for evaluation and consideration of social media designs Integrity Establish an environment where capabilities can be developed with appropriate oversight and security. Reinforce with clear policies and procedures. Design appropriate monitoring oversight for development and production environments Review interaction of social media capabilities with existing systems and business processes Validate risks and ongoing monitoring steps Security Validate security design Ensure appropriate access to development and production environments Review and implement automated tools to support security monitoring Integrate with your existing security and privacy practices 19

20 Discussion Topics The Social Media Landscape The Social Media Lifecycle Risk Management Questions and Answers 20

21 Regulatory/Legal Environment Three Italian Google executives are convicted of privacy violations The EU Article 29 Working party provided Opinion 5/2009 on social networking Increasing pressure is applied to Facebook to give its users more control over their personal information The U.S. Federal Trade Commission (FTC) has created guidelines on Internet privacy to protect consumers Senator McCain and Senator Kerry introduced a privacy bill that would require companies to clearly inform customers when their data is being collected and indicate how the information will be protected Canada has the Personal Information Protection and Electronic Documents Act (PIPEDA). Office of the Privacy Commissioner has been investigating Facebook. The U.S. HITECH act requires immediate disclosure to individuals and to media outlets when 500 or more individual records have been compromised. 21

22 Regulatory/Legal Environment (cont.) Google Inc. has agreed to settle Federal Trade Commission charges that it used deceptive tactics and violated its own privacy promises to consumers when it launched its social network, Google Buzz, in The agency alleges the practices violate the FTC Act. The proposed settlement bars the company from future privacy misrepresentations, requires it to implement a comprehensive privacy program, and calls for regular, independent privacy audits for the next 20 years. This is the first time an FTC settlement order has required a company to implement a comprehensive privacy program to protect the privacy of consumers information. California has tried to pass a bill that would force Facebook and other social networking sites to allow parents to police their children s pages or face fines up to $10,000. The bill, known as the Social Networking Privacy Act, would require sites to carefully monitor information on those pages of users younger than 18. It would also allow the parents to demand the site take down whatever they deem unsuitable for their child. Maryland's proposed User Name and Password Privacy Protection Bill is intended to protect the personal privacy of job applicants and employees in the State of Maryland. The bill was drafted because a Maryland Corrections Officer was asked to turn over his Facebook user name and password during an interview. U.S. Representatives Ed Markey and Joe Barton introduced a bill that would make it very difficult for anyone to go online and track young American children. The new bill would also prevent marketers from gathering information concerning teenagers personal information and location. 22

23 Results from UK Survey 39% No Policy 61% Have Policy Although policies may exist... 24% employees don t know policy exists 16% receive guidance on what to say 8% receive guidance on what to upload Social media policy Did you know? 51% of workers surveyed claim to engage in social media during work 14% of workers know of somebody disciplined for inappropriate social media activity Workers aged are most regular users 1 in 5 engage several times an hour 35% UK employees say social media activity is not allowed in workplace Source: Protiviti web article click here 23

24 Results from other recent studies 81% 69% 64% 46% Improve customer relations and build brands Value in recruitment Value in customer service Improves employee morale Gartner predictions for % 80% Enterprises will have a corporate face book Discretionary consumer spending influenced Sources: Russell Herder and Ethos Business Law Study Gartner 24

25 What s the Risk? Regulatory Risk Statements or other shared media could violate regulatory and compliance requirements. ( Famous person A just visited our healthcare facility and was treated for ) IP Loss Information that is strategic to a company could be inappropriately released. ( Company A whom I work for is working on this cool new project to ) Sensitive Data Loss Data that potentially violates regulatory/compliance requirements could be communicated. ( Celebrity A just came to the hospital to have this treatment done ) Reputation Risk Slanderous remarks and comments from a disgruntled employee could created damaging perceptions. ( If you work for Company B, you will be mistreated and not respected... ) 25

26 What s the Risk? (cont.) Financial Risk Remarks about company performance could impact stock price and performance. ( The strategic plan for Company C is not going to work and results are not going to be good ) Safety Risk Release of information about what someone is doing or where someone is traveling. ( Our executive team is meeting at Location Z ) Personal Reputation Loss Remarks made by an individual or friends of an individual could be viewed by others ( I can t believe what happened the other night when I was out for dinner ) Lack of Governance Appropriate involvement of stakeholders and executive oversight do not correlate social media activities to company objectives and culture. 26

27 What s the Risk? (cont.) Metrics Integrity Risk Metrics used to measure results of social media efforts may be invalid or inappropriately measured leading to poor decisions and investments. Litigation Risk What is said on social media sites can, and will, be used against individuals and companies in a court of law. Infrastructure Stability Risk The rich content and enormous traffic loads of social media communication will consume network (bandwidth) and storage resources. Knowing what to plan for is difficult. Information Security Risk Access to social media sites opens the door to unauthorized disclosure of information as well as in-bound malware and phishing attacks. 27

28 Social Media Policies An Opportunity Don t Start From Scratch Leverage your existing policies (acceptable use, communications, HR, etc.) and use the topic to reinforce what you have in place Many companies are sharing their work Use new technologies to raise awareness of security, privacy and your organization s focus on risk management Reinforce enterprise commitment and why it exists Make sure employees understand how the technologies will be used (Acceptable Use) Communicate the business need and the risks Socialize your decision and the criteria Use the opportunity to educate your employees on personal use Create process to gather feedback and incorporate changes into future versions of the policies 28

29 Where Organizations Typically Seek Assistance Refining the scope of the effort Help with defining what the intended benefits will be and linkage to other strategic initiatives Building meaningful and measurable metrics of merit Identify data sources for gathering metrics Develop scorecards showing trends and support for intended benefits Product selection and implementation Organizing a pilot and plan to scale Develop an appropriate timeline Identify appropriate stakeholders Provide perspective on available vendor tools and capabilities Identify and implement risk management capabilities Inventory risks based on the initiative Information security policy refinement 29

30 Discussion Topics The Social Media Landscape The Social Media Lifecycle Risk Management Questions and Answers 30

31 Contacts Tom Andreesen Managing Director t: m: Ryan Rubin Director t: m: Cal Slemp Managing Director t: m: John Hollyoak Senior Manager t: m:

32 Join Protiviti at Gartner Symposium ITxpo 2011 Orlando, Florida, USA October 16 20, 2011 Join 7,500 senior IT executives including 2,000 CIOs Continue the discussion on social media and a host of other topics meet with Protiviti and Gartner experts Need more info? Visit 32

33 Appendix Live Poll Results 33

34 Appendix Live Poll Results 34

35

Sensitive Data Management: Current Trends in HIPAA and HITRUST

Sensitive Data Management: Current Trends in HIPAA and HITRUST Sensitive Data Management: Current Trends in HIPAA and HITRUST Presented by, Cal Slemp Managing Director, New York, NY June 12, 2012 Speaker Presenter Topic Objective Cal Slemp Managing Director, New York

More information

Managing Risk in a Social Media-Driven Society By Tom Andreesen and Cal Slemp, Protiviti

Managing Risk in a Social Media-Driven Society By Tom Andreesen and Cal Slemp, Protiviti Managing Risk in a Social Media-Driven Society By Tom Andreesen and Cal Slemp, Protiviti Is social media just a fad? Or is it the biggest shift in the way business is done since the advent of the Internet?

More information

WHITE PAPER Mapping Organizational Roles & Responsibilities for Social Media Risk. A Hootsuite & Nexgate White Paper

WHITE PAPER Mapping Organizational Roles & Responsibilities for Social Media Risk. A Hootsuite & Nexgate White Paper WHITE PAPER Mapping Organizational Roles & Responsibilities for Social Media Risk A Hootsuite & Nexgate White Paper Mapping Organizational Roles & Responsibilities for Social Media Risk Executive Summary

More information

MANAGING YOUR EMAIL LIST

MANAGING YOUR EMAIL LIST MANAGING YOUR EMAIL LIST Ensuring you reach the right people at the right time with a relevant message. 866.915.9465 www.delivra.com 2013 Delivra Professional Email Marketing Software and Consulting 2

More information

Top Attacks in Social Media

Top Attacks in Social Media Top Attacks in Social Media SESSION ID: HUM-F03A Gary Bahadur CEO KRAA Security @KRAASecurity 140 Characters of Pain What s the Problem with Social Media? No security strategies in place No enterprise-wide

More information

IT Governance In The Cloud: Building A Solution Using Salesforce.com

IT Governance In The Cloud: Building A Solution Using Salesforce.com WHITE PAPER IT Governance In The Cloud: Building A Solution Using Salesforce.com By Jason Atwood and Justin Edelstein Co-Founders, Arkus, Inc. Cloud computing has the potential to create a new paradigm

More information

1. For each of the 25 questions, multiply each question response risk value (1-5) by the number of times it was chosen by the survey takers.

1. For each of the 25 questions, multiply each question response risk value (1-5) by the number of times it was chosen by the survey takers. Employee Security Awareness Survey Trenton Bond trent.bond@gmail.com Admin - Version 1.3 Security Awareness One of the most significant security risks that organizations and corporations face today is

More information

Enterprise Security Tactical Plan

Enterprise Security Tactical Plan Enterprise Security Tactical Plan Fiscal Years 2011 2012 (July 1, 2010 to June 30, 2012) Prepared By: State Chief Information Security Officer The Information Security Council State of Minnesota Enterprise

More information

Compliance Guide ISO 27002. Compliance Guide. September 2015. Contents. Introduction 1. Detailed Controls Mapping 2.

Compliance Guide ISO 27002. Compliance Guide. September 2015. Contents. Introduction 1. Detailed Controls Mapping 2. ISO 27002 Compliance Guide September 2015 Contents Compliance Guide 01 02 03 Introduction 1 Detailed Controls Mapping 2 About Rapid7 7 01 INTRODUCTION If you re looking for a comprehensive, global framework

More information

RISKY BUSINESS SEMINAR CYBER LIABILITY DISCUSSION

RISKY BUSINESS SEMINAR CYBER LIABILITY DISCUSSION RISKY BUSINESS SEMINAR CYBER LIABILITY DISCUSSION October 23, 2015 THREAT ENVIRONMENT Growing incentive for insiders to abuse access to sensitive data for financial gain Disgruntled current and former

More information

Italy. EY s Global Information Security Survey 2013

Italy. EY s Global Information Security Survey 2013 Italy EY s Global Information Security Survey 2013 EY s Global Information Security Survey 2013 This year s survey our 16th edition captures the responses of 1,909 C-suite and senior level IT and information

More information

Defending Against Data Beaches: Internal Controls for Cybersecurity

Defending Against Data Beaches: Internal Controls for Cybersecurity Defending Against Data Beaches: Internal Controls for Cybersecurity Presented by: Michael Walter, Managing Director and Chris Manning, Associate Director Protiviti Atlanta Office Agenda Defining Cybersecurity

More information

Privacy Law Basics and Best Practices

Privacy Law Basics and Best Practices Privacy Law Basics and Best Practices Information Privacy in a Digital World Stephanie Skaff sskaff@fbm.com What Is Information Privacy? Your name? Your phone number or home address? Your email address?

More information

Security Risk Management Strategy in a Mobile and Consumerised World

Security Risk Management Strategy in a Mobile and Consumerised World Security Risk Management Strategy in a Mobile and Consumerised World RYAN RUBIN (Msc, CISSP, CISM, QSA, CHFI) PROTIVITI Session ID: GRC-308 Session Classification: Intermediate AGENDA Current State Key

More information

EMA CMDB Assessment Service

EMA CMDB Assessment Service The Promise of the CMDB The Configuration Management Database (CMDB) provides a common trusted source for all IT data used by the business and promises to improve IT operational efficiency and increase

More information

Cybersecurity y Managing g the Risks

Cybersecurity y Managing g the Risks Cybersecurity y Managing g the Risks Presented by: Steven L. Caponi Jennifer Daniels Gregory F. Linsin 99 Cybersecurity The Risks Are Real Perpetrators are as varied as their goals Organized Crime: seeking

More information

#socialmediarisk Social Media and Consumer Marketing for Financial Services Organizations

#socialmediarisk Social Media and Consumer Marketing for Financial Services Organizations #socialmediarisk Social Media and Consumer Marketing for Financial Services Organizations Social media has created significant opportunities for organizations to connect with their customers and the overall

More information

ASSUMING A STATE OF COMPROMISE: EFFECTIVE DETECTION OF SECURITY BREACHES

ASSUMING A STATE OF COMPROMISE: EFFECTIVE DETECTION OF SECURITY BREACHES ASSUMING A STATE OF COMPROMISE: EFFECTIVE DETECTION OF SECURITY BREACHES Leonard Levy PricewaterhouseCoopers LLP Session ID: SEC-W03 Session Classification: Intermediate Agenda The opportunity Assuming

More information

The Role of Internal Audit In Business Continuity Planning

The Role of Internal Audit In Business Continuity Planning The Role of Internal Audit In Business Continuity Planning Dan Bailey, MBCP Page 0 Introduction Dan Bailey, MBCP Senior Manager Protiviti Inc. dan.bailey@protiviti.com Actively involved in the Information

More information

Mobile Medical Devices and BYOD: Latest Legal Threat for Providers

Mobile Medical Devices and BYOD: Latest Legal Threat for Providers Presenting a live 90-minute webinar with interactive Q&A Mobile Medical Devices and BYOD: Latest Legal Threat for Providers Developing a Comprehensive Usage Strategy to Safeguard Health Information and

More information

NSERC SSHRC AUDIT OF IT SECURITY Corporate Internal Audit Division

NSERC SSHRC AUDIT OF IT SECURITY Corporate Internal Audit Division AUDIT OF IT SECURITY Corporate Internal Audit Division Natural Sciences and Engineering Research Council of Canada Social Sciences and Humanities Research Council of Canada September 20, 2012 Corporate

More information

Boost BCM Program Maturity: Arm Your Team with the Right Tools. Jason Zimmerman Vice President Operations

Boost BCM Program Maturity: Arm Your Team with the Right Tools. Jason Zimmerman Vice President Operations Boost BCM Program Maturity: Arm Your Team with the Right Tools Jason Zimmerman Vice President Operations Gartner Rates Incident Management Systems Benefit High In their 2014 Hype Cycle Report, Gartner

More information

Compliance. TODAY February 2013. Meet Lew Morris

Compliance. TODAY February 2013. Meet Lew Morris Compliance TODAY February 2013 a publication of the health care compliance association www.hcca-info.org Meet Lew Morris Senior Counsel with Adelman, Sheff and Smith in Annapolis, Maryland; former Chief

More information

ASAE s Job Task Analysis Strategic Level Competencies

ASAE s Job Task Analysis Strategic Level Competencies ASAE s Job Task Analysis Strategic Level Competencies During 2013, ASAE funded an extensive, psychometrically valid study to document the competencies essential to the practice of association management

More information

How To Protect Yourself From Cyber Threats

How To Protect Yourself From Cyber Threats Cyber Security for Non- Profit Organizations Scott Lawler CISSP- ISSAP, ISSMP, HCISPP Copyright 2015 LP3 May 2015 Agenda IT Security Basics e- Discovery Compliance Legal Risk Disaster Plans Non- Profit

More information

Ten Questions Your Board Should be asking about Cyber Security. Eric M. Wright, Shareholder

Ten Questions Your Board Should be asking about Cyber Security. Eric M. Wright, Shareholder Ten Questions Your Board Should be asking about Cyber Security Eric M. Wright, Shareholder Eric Wright, CPA, CITP Started my career with Schneider Downs in 1983. Responsible for all IT audit and system

More information

Enterprise Social Media Marketing Software. Evaluation and Selection Guide

Enterprise Social Media Marketing Software. Evaluation and Selection Guide Enterprise Social Media Marketing Software Evaluation and Selection Guide Summer/Fall 2013 How to use this guide Today s enterprises increasingly recognize that they need a technology solution to manage

More information

Executive Overview...4. Importance to Citizens, Businesses and Government...5. Emergency Management and Preparedness...6

Executive Overview...4. Importance to Citizens, Businesses and Government...5. Emergency Management and Preparedness...6 Securing the State Of Michigan Information Technology Resources Table of Contents Executive Overview...4 Importance to Citizens, Businesses and Government...5 Emergency Management and Preparedness...6

More information

Follow us on Twitter: @FairfaxEDA. Tweet about this session: #fceda. www.hodgespart.com

Follow us on Twitter: @FairfaxEDA. Tweet about this session: #fceda. www.hodgespart.com Follow us on Twitter: @FairfaxEDA Tweet about this session: Marketing Communications Strategies and Tactics Content Marketing 101 Agenda What is content marketing? Who uses content marketing and why? How

More information

Predictive Marketing for Banking

Predictive Marketing for Banking Tony Firmani Predictive Analytics Solution Architect Predictive Marketing for Banking Business Analytics software Session Overview Data Drives Decisions Applying Predictive Analytics Throughout Entire

More information

HCCA Compliance Institute 2013 Privacy & Security

HCCA Compliance Institute 2013 Privacy & Security HCCA Compliance Institute 2013 Privacy & Security 704 Conducting a Privacy Risk Assessment A Practical Guide to the Performance, Evaluation and Response April 23, 2013 Presented By Eric Dieterich Session

More information

How Keurig Brewed a Better Path to Success. Mike Quinn & Eileen Hanafin: Keurig Will Crump: DATUM LLC SESSION CODE: CP1380

How Keurig Brewed a Better Path to Success. Mike Quinn & Eileen Hanafin: Keurig Will Crump: DATUM LLC SESSION CODE: CP1380 How Keurig Brewed a Better Path to Success Mike Quinn & Eileen Hanafin: Keurig Will Crump: DATUM LLC SESSION CODE: CP1380 An innovative technology-driven values-based personal beverage-system company.

More information

Data Governance Baseline Deployment

Data Governance Baseline Deployment Service Offering Data Governance Baseline Deployment Overview Benefits Increase the value of data by enabling top business imperatives. Reduce IT costs of maintaining data. Transform Informatica Platform

More information

Quality Programs for Regulatory Compliance

Quality Programs for Regulatory Compliance Quality Programs for Regulatory Compliance Roy Garris, IconATG Regulatory Compliance Practice Manager (866) 785-4266 http://www.iconatg.com info@iconatg.com Version 1.00 Application Vulnerabilities Put

More information

Data Loss Prevention Program

Data Loss Prevention Program Data Loss Prevention Program Safeguarding Intellectual Property Author: Powell Hamilton Senior Managing Consultant Foundstone Professional Services One of the major challenges for today s IT security professional

More information

Cisco on Cisco Best Practice Security Practices for Online Collaboration and Social Media

Cisco on Cisco Best Practice Security Practices for Online Collaboration and Social Media January 2012 Cisco on Cisco Best Practice Security Practices for Online Collaboration and Social Media January 2012 All contents are Copyright 1992 2012 Cisco Systems, Inc. All rights reserved. This document

More information

An Employer's Guide to Conducting Internal Investigations

An Employer's Guide to Conducting Internal Investigations An Employer's Guide to Conducting Internal Investigations Source: Corporate Compliance & Regulatory Newsletter. Brooke Iley and Mark Blondman www.investigationsystem.com Tel: (613) 244-5111/ 1-800-465-6089

More information

Build Better Social Relationships and Realize Better Results

Build Better Social Relationships and Realize Better Results SAP Brief Adobe Marketing s from SAP Adobe Social from SAP Objectives Build Better Social Relationships and Realize Better Results Develop relationships that work for you and your customers Develop relationships

More information

Information Governance 2.0 A DOCULABS WHITE PAPER

Information Governance 2.0 A DOCULABS WHITE PAPER Information Governance 2.0 A DOCULABS WHITE PAPER Information governance is the control of an organization s information to meet its regulatory, litigation, and risk objectives. Effectively managing and

More information

2010 AICPA Top Technology Initiatives. About the Presenter. Agenda. Presenter: Dan Schroeder, CPA/CITP Habif, Arogeti, & Wynne, LLP

2010 AICPA Top Technology Initiatives. About the Presenter. Agenda. Presenter: Dan Schroeder, CPA/CITP Habif, Arogeti, & Wynne, LLP 2010 AICPA Top Technology Initiatives Presenter: Dan Schroeder, CPA/CITP Habif, Arogeti, & Wynne, LLP Georgia Society of CPAs Annual Convention June 16, 2010 About the Presenter Partner-in-Charge, Habif,

More information

Our clients are tapping social media to generate brand awareness and create emotional connections.

Our clients are tapping social media to generate brand awareness and create emotional connections. he power of social media and social technology is being felt throughout organizations today much in the way the internet influenced the way we did business in the early 1990s. In the beginning, expanding

More information

How To Manage Security On A Networked Computer System

How To Manage Security On A Networked Computer System Unified Security Reduce the Cost of Compliance Introduction In an effort to achieve a consistent and reliable security program, many organizations have adopted the standard as a key compliance strategy

More information

TRACK BEYOND THE RACK MANAGING IT ASSETS ACROSS THE ENTERPRISE

TRACK BEYOND THE RACK MANAGING IT ASSETS ACROSS THE ENTERPRISE TRACK BEYOND THE RACK ITAM Track Beyond the Rack The current buzz around ITAM (IT Asset Management) has solely focused on assets residing in the data center. However ITAM is more then servers and racks.

More information

CYBERSECURITY: PROTECTING YOUR ORGANIZATION AGAINST CYBER ATTACKS. Viviana Campanaro CISSP Director, Security and Compliance July 14, 2015

CYBERSECURITY: PROTECTING YOUR ORGANIZATION AGAINST CYBER ATTACKS. Viviana Campanaro CISSP Director, Security and Compliance July 14, 2015 CYBERSECURITY: PROTECTING YOUR ORGANIZATION AGAINST CYBER ATTACKS Viviana Campanaro CISSP Director, Security and Compliance July 14, 2015 TODAY S PRESENTER Viviana Campanaro, CISSP Director, Security and

More information

State of Oregon. State of Oregon 1

State of Oregon. State of Oregon 1 State of Oregon State of Oregon 1 Table of Contents 1. Introduction...1 2. Information Asset Management...2 3. Communication Operations...7 3.3 Workstation Management... 7 3.9 Log management... 11 4. Information

More information

2H 2015 SHADOW DATA REPORT

2H 2015 SHADOW DATA REPORT 2H 20 SHADOW DATA REPORT Shadow Data Defined: All potentially risky data exposures lurking in cloud apps, due to lack of knowledge of the type of data being uploaded and how it is being shared. Shadow

More information

FIVE KEY CONSIDERATIONS FOR ENABLING PRIVACY IN HEALTH INFORMATION EXCHANGES

FIVE KEY CONSIDERATIONS FOR ENABLING PRIVACY IN HEALTH INFORMATION EXCHANGES FIVE KEY CONSIDERATIONS FOR ENABLING PRIVACY IN HEALTH INFORMATION EXCHANGES The implications for privacy and security in the emergence of HIEs The emergence of health information exchanges (HIE) is widely

More information

Policy for Social Media Usage in Catawba County

Policy for Social Media Usage in Catawba County Policy for Social Media Usage in Catawba County Adopted March 1, 2010 Revised September 7,2010 1. PURPOSE The role of technology in the 21 st century workplace is constantly expanding and now includes

More information

Into the cybersecurity breach

Into the cybersecurity breach Into the cybersecurity breach Tim Sanouvong State Sector Cyber Risk Services Deloitte & Touche LLP April 3, 2015 Agenda Setting the stage Cyber risks in state governments Cyber attack vectors Preparing

More information

The expression better, faster, cheaper THE BUSINESS CASE FOR PROJECT PORTFOLIO MANAGEMENT

The expression better, faster, cheaper THE BUSINESS CASE FOR PROJECT PORTFOLIO MANAGEMENT Cloud Solutions for IT Management WHITE PAPER THE BUSINESS CASE FOR PROJECT PORTFOLIO MANAGEMENT How Progressive IT Organizations Are Using Hosted Solutions To Deliver On Time, On Budget, On Quota and

More information

Data Breaches and Trade Secrets: What to Do When Your Client Gets Hacked

Data Breaches and Trade Secrets: What to Do When Your Client Gets Hacked Data Breaches and Trade Secrets: What to Do When Your Client Gets Hacked R. Mark Halligan, FisherBroyles, LLP Andreas Kaltsounis, Stroz Friedberg Amy L. Carlson, Stoel Rives LLP Moderated by David A. Bateman,

More information

Software Licensing and Pricing Best Practices. Stewart Buchanan June 3, 2009 Gartner Webinar

Software Licensing and Pricing Best Practices. Stewart Buchanan June 3, 2009 Gartner Webinar Software Licensing and Pricing Best Practices Stewart Buchanan June 3, 2009 Gartner Webinar How to Participate Today Audio Announcement You have joined the audio muted using your computer s speaker system

More information

Security Management. Security is taken for granted until something goes wrong.

Security Management. Security is taken for granted until something goes wrong. Security Management Security Management Security is taken for granted until something goes wrong. Concerns about security have existed for as long as has mankind. The most obvious manifestation of this

More information

SOCIAL MEDIA STRATEGY 2013 2015

SOCIAL MEDIA STRATEGY 2013 2015 SOCIAL MEDIA STRATEGY 2013 2015 October 2013 1 Contents 1. Background 2. Channels 3. Use 4. Management and Administration 5. Analytics and Reporting 6. Communication and Employee Engagement 7. Timeline

More information

How-To Guide: Cyber Security. Content Provided by

How-To Guide: Cyber Security. Content Provided by How-To Guide: Cyber Security Content Provided by Who needs cyber security? Businesses that have, use, or support computers, smartphones, email, websites, social media, or cloudbased services. Businesses

More information

Cyber Resilience Implementing the Right Strategy. Grant Brown Security specialist, CISSP @TheGrantBrown

Cyber Resilience Implementing the Right Strategy. Grant Brown Security specialist, CISSP @TheGrantBrown Cyber Resilience Implementing the Right Strategy Grant Brown specialist, CISSP @TheGrantBrown 1 2 Network + Technology + Customers = $$ 3 Perfect Storm? 1) Increase in Bandwidth (extended reach) 2) Available

More information

ENABLING FAST RESPONSES THREAT MONITORING

ENABLING FAST RESPONSES THREAT MONITORING ENABLING FAST RESPONSES TO Security INCIDENTS WITH THREAT MONITORING Executive Summary As threats evolve and the effectiveness of signaturebased web security declines, IT departments need to play a bigger,

More information

Practical Legal Aspects of BYOD

Practical Legal Aspects of BYOD Practical Legal Aspects of BYOD SESSION ID: LAW-F01 Lawrence Dietz General Counsel & Managing Director TalGlobal Corporation ldietz@talglobal.net +1 408 993 1300 http://psyopregiment.blogspot.com Francoise

More information

ERP. Key Initiative Overview

ERP. Key Initiative Overview Jeff Woods Research Managing Vice President This overview provides a high-level description of the ERP Key Initiative. IT leaders can use this overview to better understand what they need to do to prepare

More information

Contents. Introduction. Creating a list. Growing your list. Managing unsubscribes. Handling spam complaints. Managing bounces

Contents. Introduction. Creating a list. Growing your list. Managing unsubscribes. Handling spam complaints. Managing bounces Managing your data Contents 01 02 03 04 05 06 07 08 09 10 11 Introduction Creating a list Growing your list Managing unsubscribes Handling spam complaints Managing bounces Dealing with Out of Office notifications

More information

2015 Global Identity and Access Management (IAM) Market Leadership Award

2015 Global Identity and Access Management (IAM) Market Leadership Award 2015 Global Identity and Access Management (IAM) Market Leadership Award 2015 Contents Background and Company Performance... 3 Industry Challenges... 3 Market Leadership of IBM... 3 Conclusion... 6 Significance

More information

The Workplace of the Future and Mobile Device Risk ISACA Pittsburgh. May 20 th, 2013

The Workplace of the Future and Mobile Device Risk ISACA Pittsburgh. May 20 th, 2013 The Workplace of the Future and Mobile Device Risk ISACA Pittsburgh May 20 th, 2013 Companies are leveraging mobile computing today Three major consumption models: 1. Improving productivity Improving employee

More information

Reducing the Threat Window

Reducing the Threat Window INFONETICS RESEARCH WHITE PAPER The Importance of Security Orchestration and Automation January 2015 695 Campbell Technology Parkway Suite 200 Campbell California 95008 t 408.583.0011 f 408.583.0031 www.infonetics.com

More information

June 25, 2013. Ministry of Health Security enhancement roadmap

June 25, 2013. Ministry of Health Security enhancement roadmap June 25, 2013 Ministry of Health Security enhancement roadmap Table of contents Enhancement roadmap overview... 1 Introduction... 1 Objectives and scope... 1 Approach... 2 Summary of recommended enhancement

More information

YOUR TRUSTED PARTNER IN A DIGITAL AGE. A guide to Hiscox Cyber and Data Insurance

YOUR TRUSTED PARTNER IN A DIGITAL AGE. A guide to Hiscox Cyber and Data Insurance YOUR TRUSTED PARTNER IN A DIGITAL AGE A guide to Hiscox Cyber and Data Insurance 2 THE CYBER AND DATA RISK TO YOUR BUSINESS This digital guide will help you find out more about the potential cyber and

More information

Addressing APTs and Modern Malware with Security Intelligence Date: September 2013 Author: Jon Oltsik, Senior Principal Analyst

Addressing APTs and Modern Malware with Security Intelligence Date: September 2013 Author: Jon Oltsik, Senior Principal Analyst ESG Brief Addressing APTs and Modern Malware with Security Intelligence Date: September 2013 Author: Jon Oltsik, Senior Principal Analyst Abstract: APTs first came on the scene in 2010, creating a wave

More information

WHITE PAPER. Social media analytics in the insurance industry

WHITE PAPER. Social media analytics in the insurance industry WHITE PAPER Social media analytics in the insurance industry Introduction Insurance is a high involvement product, as it is an expense. Consumers obtain information about insurance from advertisements,

More information

Security Is Everyone s Concern:

Security Is Everyone s Concern: Security Is Everyone s Concern: What a Practice Needs to Know About ephi Security Mert Gambito Hawaii HIE Compliance and Privacy Officer July 26, 2014 E Komo Mai! This session s presenter is Mert Gambito

More information

WHITE PAPER. Mitigate BPO Security Issues

WHITE PAPER. Mitigate BPO Security Issues WHITE PAPER Mitigate BPO Security Issues INTRODUCTION Business Process Outsourcing (BPO) is a common practice these days: from front office to back office, HR to accounting, offshore to near shore. However,

More information

Grand Canyon Council - Social Media Policy

Grand Canyon Council - Social Media Policy INTRODUCTION It s an exciting time to be part of the BSA for many reasons. One of those is that new communication vehicles now enable current and past Scouts and Scouters, as well those who are interested

More information

Business Conduct, Compliance and Ethics Program. important

Business Conduct, Compliance and Ethics Program. important Business Conduct, Compliance and Ethics Program important Table of Contents Letter from Troy Kirchenbauer As healthcare s first online direct contracting market, aptitude is committed to upholding the

More information

Evaluation Guide: Enterprise Social Relationship Platforms

Evaluation Guide: Enterprise Social Relationship Platforms Evaluation Guide: Enterprise Social Relationship Platforms A Guide to Evaluating Enterprise Social Relationship Platforms For any organization that uses social media, it s no longer practical to operate

More information

Sales Performance Improvement

Sales Performance Improvement Sales Performance Improvement The CappcoPartners team manage and improve revenue generation processes by fine tuning the value proposition, implementing demand creation campaigns which drive quality leads

More information

You ve Got the Technology Now What?

You ve Got the Technology Now What? White Paper You ve Got the Technology Now What? Pre-planning for Social Engagement by COMMfusion LLC & Jamison Consulting May 2012 You ve Got the Technology Now What? 2 Going Beyond the Technology to Deployment

More information

Sales & Operations Planning Process Excellence Program

Sales & Operations Planning Process Excellence Program Chemical Sector We make it happen. Better. Sales & Operations Planning Process Excellence Program Engagement Summary November 2014 S&OP Excellence Robust discussions creating valuable ideas Engagement

More information

SMB Update on Service Information Gathering

SMB Update on Service Information Gathering SMB Update on Service Information Gathering Overview SMB governance framework overview 3 In 2015, SMB proposed this initial (probably annual) governance process. Provide roadmaps for service sets Evolve

More information

Closing the Business Analysis Skills Gap

Closing the Business Analysis Skills Gap RG Perspective Closing the Business Analysis Skills Gap Finding the immediate solution and preparing for the long term As the Business Analysis bar is raised, skilled BAS become harder to find. Susan Martin

More information

The Changing IT Risk Landscape Understanding and managing existing and emerging risks

The Changing IT Risk Landscape Understanding and managing existing and emerging risks The Changing IT Risk Landscape Understanding and managing existing and emerging risks IIA @ Noon Kareem Sadek Senior Manager, Deloitte Canada Chris Close Senior Manager, Deloitte Canada December 2, 2015

More information

MANAGING THE EMPLOYEE LIFECYCLE

MANAGING THE EMPLOYEE LIFECYCLE MANAGING THE EMPLOYEE LIFECYCLE Current Position Jose Laurel Experience & Expertise 16 years experience in management, operations, marketing and international commerce Prior to G&A, served as country manager

More information

White Paper: The Seven Elements of an Effective Compliance and Ethics Program

White Paper: The Seven Elements of an Effective Compliance and Ethics Program White Paper: The Seven Elements of an Effective Compliance and Ethics Program Executive Summary Recently, the United States Sentencing Commission voted to modify the Federal Sentencing Guidelines, including

More information

THE POWER OF INFLUENCE TAKING THE LUCK OUT OF WORD OF MOUTH

THE POWER OF INFLUENCE TAKING THE LUCK OUT OF WORD OF MOUTH THE POWER OF INFLUENCE INTRODUCTION Word-of-mouth marketing has always been a powerful driver of consumer behavior. Every experienced marketer knows that customers are more likely to base purchasing decisions

More information

Insulate Your Company from a Cyber Breach: Proactive Steps to Minimize Breach Risks & Impact. February 10, 2015

Insulate Your Company from a Cyber Breach: Proactive Steps to Minimize Breach Risks & Impact. February 10, 2015 Insulate Your Company from a Cyber Breach: Proactive Steps to Minimize Breach Risks & Impact February 10, 2015 Overview 1 The Legal Risks And Issues/The Role Of Legal Counsel: The Breach Coach The Slippery

More information

Certified Identity and Access Manager (CIAM) Overview & Curriculum

Certified Identity and Access Manager (CIAM) Overview & Curriculum Identity and access management (IAM) is the most important discipline of the information security field. It is the foundation of any information security program and one of the information security management

More information

Anatomy of a Healthcare Data Breach

Anatomy of a Healthcare Data Breach BUSINESS WHITE PAPER Anatomy of a Healthcare Data Breach Prevention and remediation strategies Anatomy of a Healthcare Data Breach Table of Contents 2 Increased risk 3 Mitigation costs 3 An Industry unprepared

More information

GUIDE Wealth Management. 9 Social Media Guidelines for Wealth Management Firms

GUIDE Wealth Management. 9 Social Media Guidelines for Wealth Management Firms GUIDE Wealth Management 9 Social Media Guidelines for Wealth Management Firms Wealth Management 9 Social Media Guidelines for Wealth Management Firms Wealth management firms that embrace social media can

More information

Executive Summary 3. Snowden and Retail Breaches Influencing Security Strategies 3. Attackers are on the Inside Protect Your Privileges 3

Executive Summary 3. Snowden and Retail Breaches Influencing Security Strategies 3. Attackers are on the Inside Protect Your Privileges 3 GLOBAL ADVANCED THREAT LANDSCAPE SURVEY 2014 TABLE OF CONTENTS Executive Summary 3 Snowden and Retail Breaches Influencing Security Strategies 3 Attackers are on the Inside Protect Your Privileges 3 Third-Party

More information

First Annual URIM Conference January 28, 2015

First Annual URIM Conference January 28, 2015 First Annual URIM Conference January 28, 2015 Conference Program Welcome Russ Taylor Library Administration Howard Loos, CRM - Essential Elements of a Successful RIM Program Greg Danklef Communication

More information

Best Practices for Implementing Software Asset Management

Best Practices for Implementing Software Asset Management Best Practices for Implementing Software Asset Management Table of Contents I. The Case for Software Asset Management (SAM)............................ 2 II. Laying the Groundwork for SAM............................................

More information

PREVENTIA. Skyhigh Best Practices and Use cases. Table of Contents

PREVENTIA. Skyhigh Best Practices and Use cases. Table of Contents PREVENTIA Forward Thinking Security Solutions Skyhigh Best Practices and Use cases. Table of Contents Discover Your Cloud 1. Identify all cloud services in use & evaluate risk 2. Encourage use of low-risk

More information

GlobalSign Malware Monitoring

GlobalSign Malware Monitoring GLOBALSIGN WHITE PAPER GlobalSign Malware Monitoring Protecting your website from distributing hidden malware GLOBALSIGN WHITE PAPER www.globalsign.com CONTENTS Introduction... 2 Malware Monitoring...

More information

Applied Security Metrics

Applied Security Metrics Applied Security Metrics Planning, design and implementation of security metrics Doug Streit, ODU Dan Han, VCU Designing a Security Metrics Framework Doug Streit, ODU Metrics Program Getting Started 1.

More information

FitCause Privacy Policy

FitCause Privacy Policy FitCause Privacy Policy EFFECTIVE DATE: June 19, 2013 FuelGooder Inc. d/b/a FitCause ( FitCause ) values your privacy. FitCause is a social fundraising platform empowering individuals to turn their exercising

More information

Project Management Office Charter

Project Management Office Charter Old Dominion University Office of Computing and Communication Services Project Management Office Charter Version: 1.0 Last Update: February 18, 2010 Created By: Anthony Fox, PMP OCCS Project Management

More information

DON T BE A VICTIM! IS YOUR ORGANIZATION PROTECTED FROM CYBERSECURITY THREATS?

DON T BE A VICTIM! IS YOUR ORGANIZATION PROTECTED FROM CYBERSECURITY THREATS? HEALTH WEALTH CAREER DON T BE A VICTIM! IS YOUR ORGANIZATION PROTECTED FROM CYBERSECURITY THREATS? FREEMAN WOOD HEAD OF MERCER SENTINEL NORTH AMERICA GREGG SOMMER HEAD OF OPERATIONAL RISK ASSESSMENTS MERCER

More information

Building a Strategic Account Management Practice. Building a Strategic Account

Building a Strategic Account Management Practice. Building a Strategic Account Building a Strategic Account Management Practice Jim Contardi, Leader, Product Solutions and Strategic Sales, First Data James Jacobson, Senior Consultant and Account Coach, Richardson Building a Strategic

More information

GETTING MORE RAIN FROM YOUR RAINMAKERS WHY INVESTING IN YOUR HIGEST PERFORMING SALES STARS IS THE SMARTER CHOICE FOR GROWING REVENUES

GETTING MORE RAIN FROM YOUR RAINMAKERS WHY INVESTING IN YOUR HIGEST PERFORMING SALES STARS IS THE SMARTER CHOICE FOR GROWING REVENUES GETTING MORE RAIN FROM YOUR RAINMAKERS WHY INVESTING IN YOUR HIGEST PERFORMING SALES STARS IS THE SMARTER CHOICE FOR GROWING REVENUES EXECUTIVE SUMMARY We ve all been there -- your sales team is down one

More information

Experience the commitment WHITE PAPER. Information Security Continuous Monitoring. Charting the Right Course. cgi.com 2014 CGI GROUP INC.

Experience the commitment WHITE PAPER. Information Security Continuous Monitoring. Charting the Right Course. cgi.com 2014 CGI GROUP INC. Experience the commitment WHITE PAPER Information Security Continuous Monitoring Charting the Right Course May 2014 cgi.com 2014 CGI GROUP INC. During the last few months of 2013, six federal agencies

More information

GUIDE Evaluation Guide: Enterprise Social Relationship Platforms

GUIDE Evaluation Guide: Enterprise Social Relationship Platforms GUIDE Evaluation Guide: Enterprise Social Relationship Platforms A Guide to Evaluating Enterprise Social Relationship Platforms For any organization that uses social media, it s no longer practical to

More information

State of Minnesota. Enterprise Security Strategic Plan. Fiscal Years 2009 2013

State of Minnesota. Enterprise Security Strategic Plan. Fiscal Years 2009 2013 State of Minnesota Enterprise Security Strategic Plan Fiscal Years 2009 2013 Jointly Prepared By: Office of Enterprise Technology - Enterprise Security Office Members of the Information Security Council

More information