Securing Your Social Media Strategy
Otavio Freire
CTO and Co-Founder Social SafeGuard Visiting Scholar University of Virginia Executive Lecturer Darden Business School
Securing Your Social Media Strategy Otavio Freire CTO and - - PowerPoint PPT Presentation
Securing Your Social Media Strategy Otavio Freire CTO and Co-Founder Social SafeGuard Visiting Scholar University of Virginia Executive Lecturer Darden Business School www.socialsafeguard.com, Tysons Corner, VA Overview for Today o Discuss how
CTO and Co-Founder Social SafeGuard Visiting Scholar University of Virginia Executive Lecturer Darden Business School
SocialSafeGuard.com
Marketing
Source: Comscore
2007 2008 2009 2010 2011
Social Users Email Users
social users
2015
information security
channels
than 10X per day
employees using social are even harder to control.
Sources: Forrester Wave, “Social Media Risk Management”, 2015, Forrester, “Social Archiving”, GRC 2020 award Socialnomics.net, Gen Y 2015 Report, Social Media in the Workplace, www.generationirony.com
See appendix for examples of catastrophic risks and losses
“By 2018, organizations that monitor and analyze a broad spectrum of employee activities will experience 50% fewer insider data breaches than organizations that monitor internal communications only.”
Source: Gartner, Market Guide for Employee Monitoring and Analytics, March 29, 2016, Andrew Walls.
8/5/2016 7
8/5/2016 8
SocialSafeGuard.com
Identify all social assets across
selected networks.
Identify / classify threats for
action
Initiate monitoring or take-down
requests and monitor for conclusion
Process assets and using
advanced algorithms and map threats
What is your current risk
Where are you risks
What are the trends? What types of risks do you face
“Risk insights are the new holy grail” – Nick Hayes, Forrester, Tech Radar Report
Wrong Category No Likes / Followers Minimally completed profile Page Not Verified Frequent Religious Views Posted to Page
Would you have connected with
Do they work at your company? Does their profile appear
Does their profile appear
SocialSafeGuard.com
Notification and freeze if your social account changes
Algorithm driven detection of account hacking
Restore immediately to previous state
Removal of any malicious content posted by hackers
14
communities
Easy to use and deploy:
Works like antivirus software with no new interface needed for users
Secure, no maintenance: Expansion is simple:
Private cloud architecture scales to enterprise customer’s need Choose the people, social networks, profiles documents, and apps to protect
Comprehensive on Day 1:
Takes action against security risks by industry, out-of-the-box
Brand Manager, Major Pharma
8/5/2016 15
SocialSafeGuard.com
Facebook, LinkedIn, Twitter and others were designed to deliver malware. Attackers discover a user's location, contacts and job function, among other information. Social data used to develop campaigns aimed at stealing sensitive information, creating fake profiles and conducting criminal activity
marketing, IT and other relevant departments in a planning phase that defines the objectives of the social media security mitigation program.
security exposures and the “new” network.
be created along with policies on acceptable social media behavior, codes of conduct and an explanation of how oversight will take place.
the greatest volume of social media data and the most risk. That roll out should be accompanied with comprehensive training throughout the organization followed by close monitoring, so process improvements can be made continuously.