Download presentation
Presentation is loading. Please wait.
Published byLara Alcott Modified over 3 years ago
1
BDProtect Inc. 2009 CONFIDENTIAL SOCIAL MEDIA RISK: Prepare and Protect your Organization Thursday, September 30th
2
The leader in internet threat management TM BDProtect Inc. 2010 CONFIDENTIAL Today’s Speakers Rob Stroud is international vice president of ISACA and a member of the COBIT 5 development team. Mr. Stroud is considered a global authority on governance and risk management. He has contributed to multiple industry publications, including COBIT 4.1, and is a frequent speaker at business and IT events worldwide. As an IT service management expert, he also has contributed to several titles on ITIL and was a member of the ITIL refresh process. Michael Kiefer, an active speaker regarding Enterprise Internet Risk Mitigation (EIRM) and has spoken across North America to the HTCIA, ISACA, the ISAC’s, National and Regional financial associations and authored numerous papers on Internet Risk & Opportunity. Previously, he was President, North America, AVAYA and directed the CISCO US service providers.
3
The leader in internet threat management TM BDProtect Inc. 2010 CONFIDENTIAL Agenda Rob Stroud: Social Media Risks and Benefits -Statistics: Facebook, LinkedIn, Twitter -Value: Fortune 100 companies -Uses and Impact -Social Media Risks Michael Kiefer: General Manager, BrandProtect -Market Risk -What is Social Media -The Good -The Anatomy of Internet Crime -The Bad -Solutions and Tools
4
BDProtect Inc. 2009 CONFIDENTIAL Social Media Risks and Benefits Robert E. Stroud, CGEIT ISACA International Vice President
5
The leader in internet threat management TM BDProtect Inc. 2010 CONFIDENTIAL ■ Facebook currently has in excess of 500 million active users worldwide, with 50% of them logging into the site each day. 150 million access the site through their mobile devices. (Source: Facebook) ■ Twitter now has 105 million user accounts, with 50 million tweets per day. (Source: Twitter) ■ LinkedIn has more than 75 million members worldwide. (Source: LinkedIn) Social Media Statistics
6
The leader in internet threat management TM BDProtect Inc. 2010 CONFIDENTIAL Enterprises are enjoying numerous tangible benefits of social media: Enhancing brand recognition Better sales Improved search engine optimization (SEO) Higher web traffic Rapid feedback and insight from customers Better ability to monitor the competition Easier ability to search for and communicate with potential employees Of the Fortune Global 100 companies, 65% have active Twitter accounts 54% have Facebook fan pages 50% have YouTube video channels 33% have blogs Social Media Drives Value
7
The leader in internet threat management TM BDProtect Inc. 2010 CONFIDENTIAL Employee Use of Social Media
8
The leader in internet threat management TM BDProtect Inc. 2010 CONFIDENTIAL Top Social Media Risks
9
The leader in internet threat management TM BDProtect Inc. 2010 CONFIDENTIAL The greatest risks posed by social media are all tied to violations of trust and people not following policy. If you don’t have a policy on Internet activity, write one and keep it current! Social media is built on the assumption of a network of trusted friends and colleagues. Continual education program is critical. Trust With Verification
10
The leader in internet threat management TM BDProtect Inc. 2010 CONFIDENTIAL Free download of ISACA white paper: www.isaca.org/socialmediawww.isaca.org/socialmedia. Social Media: Business Benefits With Security, Governance and Assurance Perspectives addresses the benefits, risks and privacy issues surrounding social media and provides guidance on implementing controls, managing usage, maximizing value and minimizing risk. Free Guidance
11
BDProtect Inc. 2009 CONFIDENTIAL Internet Social Media Opportunities & Risk Michael Kiefer General Manager mkiefer@brandprotect.com 224.766.3000
12
The leader in internet threat management TM BDProtect Inc. 2010 CONFIDENTIAL Agenda ■ Market Risk ■ What is Social Media ■ The Good ■ The Anatomy of Internet Crime ■ The Bad ■ Solutions and Tools
13
The leader in internet threat management TM BDProtect Inc. 2010 CONFIDENTIAL Quote of the Day There are known known's. These are things we know that we know. There are known unknowns. That is to say, there are things that we know we don't know. But there are also unknown unknowns. There are things we don't know we don't know. --Donald Rumsfeld--
14
The leader in internet threat management TM BDProtect Inc. 2010 CONFIDENTIAL Internet Crime is growing exponentially... $559 Million in Online Fraud (Source: The Internet Crime Complaint Center ) $221 Billion in Identity Theft (Source: Aberdeen Group) $400 Billion in counterfeit goods sold (Source: Havacscope.com) But Cyber Criminals are no longer the only threat! The emergence of Social Media and Blogs have increased the risk significantly. Threats can now come from competitors, dissatisfied employees or even just careless practices.
15
The leader in internet threat management TM BDProtect Inc. 2010 CONFIDENTIAL The Social Media Phenomenon
16
The leader in internet threat management TM BDProtect Inc. 2010 CONFIDENTIAL In the Beginning…simple emails ■ FUNDS FOR YOU! ■ [KFRENCH@burnsville.k12.mn.us] Sent: Wednesday, September 15, 2010 6:34 AM ■ FUNDS FOR YOU I am Mrs Stella Ethan, a Christian. I have picked you for an inheritance, Everything is available. Please contact me for more details. Private contact email: mrs.stallaethan@jpwind.com mrs.stallaethan@jpwind.com
17
The leader in internet threat management TM BDProtect Inc. 2010 CONFIDENTIAL Advent of Innovation…Branding in emails
18
The leader in internet threat management TM BDProtect Inc. 2010 CONFIDENTIAL Where we are today…Branded/typo-squat/malware
19
The leader in internet threat management TM BDProtect Inc. 2010 CONFIDENTIAL or…Corporate espionage via Social Media ■ Corporations targeted by crime group or government ■ Background research done on individuals of importance ■ Social media personas created ■ Network requests from old friends or associates ■ Sharing of some type of file (get s/w on target machine) ■ Secretary of State Hillary Clinton asked China to launch an investigation into the hackers who broke into Google’s network in search of email account data on human rights activists.Hillary Clinton asked China
20
The leader in internet threat management TM BDProtect Inc. 2010 CONFIDENTIAL The Good – Wins ■ Wine Library grew the business from $4 million to $50 million using social media. Stats: $15,000 in direct mail = 200 new customers; $7,500 billboard = 300 new customers; $0 Twitter = 1,800 new customers. A Wetpaint/Altimeter Study found companies that are both deeply and widely engaged in social media significantly surpass their peers in both revenue and profit. The study also found the company sales with the highest levels of social media activity grew on average by +18 percent, while those companies with the least amount of social activity saw their sales decline -6%.
21
The leader in internet threat management TM BDProtect Inc. 2010 CONFIDENTIAL The Good – Ford ■ "You can't just say it. You have to get the people to say it to each other," says James Farley, CMO Ford. ■ Gave away 100 Ford Fiestas to influential bloggers. ■ 37 percent of Generation Y were aware of the Ford Fiesta before its launch in the United States. ■ 25 percent of Ford's marketing spend has been shifted to digital/social media initiatives ■ The only U.S. auto company that didn't take a government loan.
22
The leader in internet threat management TM BDProtect Inc. 2010 CONFIDENTIAL The Good – Intuit ■ Introduced "Live Community" into its TurboTax products two years ago. ■ Due in part to the resulting word-of-mouth, it has seen unit sales increase +30 percent each year and has now integrated "Live Community" into its other products like QuickBooks, Quicken, etc. "Live Community" allows customers to ask other customers questions, which has proved both beneficial to the customer and to Intuit. ■ In some instances, the customer can answer questions that Intuit isn't allowed to answer because of regulatory restrictions.
23
The leader in internet threat management TM BDProtect Inc. 2010 CONFIDENTIAL The Good – Big Brands are active and winning
24
The leader in internet threat management TM BDProtect Inc. 2010 CONFIDENTIAL The Bad 24
25
The leader in internet threat management TM BDProtect Inc. 2010 CONFIDENTIAL The Bad 25
26
The leader in internet threat management TM BDProtect Inc. 2010 CONFIDENTIAL Are they who they say they are?
27
The leader in internet threat management TM BDProtect Inc. 2010 CONFIDENTIAL ■ Define for employees, partners and suppliers what is social media. ■ Have employee, partner and supplier internet use policies. ■ Notice employees, partners and suppliers of policy enforcement. ■ Monitor your social media policy and enforce. ■ Keep policies up to date as internet applications re-invent themselves! Top FIVE Tips
28
The leader in internet threat management TM BDProtect Inc. 2010 CONFIDENTIAL Special skills are required to…. Monitor, manage and Mitigate Social Media. Respond to threats by your customers, suppliers or employees. Remove inaccurate content from the Internet. Stop competitors from diverting your customers. Shut down inappropriate sites or Facebook commentary. What would you say if your boss, auditor or shareholders asked what you had done to address Internet threats? Who will you call for help or expert advice? When every second counts, are you protected?
29
The leader in internet threat management TM BDProtect Inc. 2010 CONFIDENTIAL Contract Experts On-Call Hire a seasoned and knowledgeable team to be available to: ■ Engage experts to help write policy and roll out ■ Provide a realistic assessment of your online threats ■ Suggest tangible solutions ■ Guide you through the required actions ■ Provide a tailored “shutdown” program for serious offences
30
The leader in internet threat management TM BDProtect Inc. 2010 CONFIDENTIAL ■ Listen to the Internet continuously in host languages ■ Internet Data Mining capability ■ Understand & Embrace Social Media ■ Track Internet Linkages & Associations ■ 24x7 Internet Incident Response ■ Relationship with Global Internet Service Providers & CERTs ■ Monitoring of your marks and messaging (IP and Images) ■ Global Enterprise visibility & workflow ■ Recovery Capabilities Vendor Requirements 30
31
The leader in internet threat management TM BDProtect Inc. 2010 CONFIDENTIAL ■ Auction Fraud ■ Counterfeit Cashier's Check ■ Credit Card Fraud ■ Debt Elimination ■ DHL/UPS ■ Employment/Business Opportunities ■ Escrow Services Fraud ■ Identity Fraud ■ Internet Extortion Government Classifications of Internet Fraud 31 ■ Investment Fraud ■ Lotteries ■ Nigerian Letter or "419” ■ Phishing/Spoofing ■ Ponzi/Pyramid ■ Reshipping ■ Spam ■ Third Party Receiver of Funds
32
The leader in internet threat management TM BDProtect Inc. 2010 CONFIDENTIAL ■ http://www.ic3.gov/preventiontips.aspx http://www.ic3.gov/preventiontips.aspx ■ http://www.fbi.gov/majcases/fraud/internetschemes.htm http://www.fbi.gov/majcases/fraud/internetschemes.htm ■ http://www.justice.gov/criminal/cybercrime/reporting.htm http://www.justice.gov/criminal/cybercrime/reporting.htm ■ https://postalinspectors.uspis.gov/radDocs/consumer/ReshippingScam.html https://postalinspectors.uspis.gov/radDocs/consumer/ReshippingScam.html ■ http://www.ftc.gov/bcp/edu/microsites/phonefraud/identity.shtml http://www.ftc.gov/bcp/edu/microsites/phonefraud/identity.shtml ■ http://www.treas.gov/inspector-general/fraud-alerts/ http://www.treas.gov/inspector-general/fraud-alerts/ ■ http://www.fsisac.com/ Government help and reporting 32
33
The leader in internet threat management TM BDProtect Inc. 2010 CONFIDENTIAL Commercial Services www.internet911.com 33
34
The leader in internet threat management TM BDProtect Inc. 2010 CONFIDENTIAL ■ www.BrandProtect.com www.BrandProtect.com ■ http://www.isaca.org/Knowledge- Center/Research/ResearchDeliverables/Pages/Social-Media- Business-Benefits-and-Security-Governance-and-Assurance- Perspectives.aspx http://www.isaca.org/Knowledge- Center/Research/ResearchDeliverables/Pages/Social-Media- Business-Benefits-and-Security-Governance-and-Assurance- Perspectives.aspx ■ https://www.internet911.com/Site/internet-reputation- management-guidelines.html https://www.internet911.com/Site/internet-reputation- management-guidelines.html ■ Bottom Line. NO policy/NO enforcement. Corporate Resources 34
35
The leader in internet threat management TM BDProtect Inc. 2010 CONFIDENTIAL
36
The leader in internet threat management TM BDProtect Inc. 2010 CONFIDENTIAL In Closing...
37
The leader in internet threat management TM BDProtect Inc. 2010 CONFIDENTIAL Q & A Expand question box Type question here
38
The leader in internet threat management TM BDProtect Inc. 2010 CONFIDENTIAL Thank you ■ Michael Kiefer, General Manager, BrandProtect mkiefer@brandprotect.com ■ Rob Stroud, International Vice-President, ISACA Rob.stroud@ca.com ■ Kevin Joy, Vice-President, BrandProtect kjoy@brandprotect.com
Similar presentations
© 2018 SlidePlayer.com Inc.
All rights reserved.
Ppt on ms powerpoint tutorial Ppt on home automation using zigbee Types of window display ppt online Ppt on acid-base titration formula Ppt on cross-sectional study limitations Ppt on states of matter for class 7 Download ppt on fibre to fabric Ppt on high court of india Perspective view ppt on mac Ppt on brand building and management