SlideShare una empresa de Scribd logo
1 de 37
Descargar para leer sin conexión
SOCIAL MEDIA:
  INFILTRATING THE
      ENTERPRISE	

     MIDTECH IT Summit	

       June 27th, 2011	


     JAY A. MCLAUGHLIN, CISSP	

SVP, CHIEF INFORMATION OFFICER
DISCLAIMER	

 The materials, thoughts, comments, ideas
  and opinions expressed throughout this
 presentation are entirely my own and do
 not necessarily represent the thoughts or
opinions of my employer (past or present).
AGENDA	

•    Defining social media	

•    Embracing the Inevitable	

•    Understanding the Benefits  Risks	

•    Friending your Customers	

•    Preventing social media disasters	

•    Building a strategy
: forms of electronic communication (as Web sites
                 for social networking and microblogging) through
                 which users create online communities to share
                 information, ideas, personal messages, and other
                 content	



What is Social
  Media?	

                 Social media is media for social interaction using
                 highly accessible and scalable communication
                 techniques. Social media is the use of web-based
                 and mobile technologies to turn communication
                 into interactive dialogue.
•  500 Million	

•  250 Million	

•  700 Billion	

              Source: Facebook.com April 2011
It s Corporate
•  6939	

•  319	

•  140 Million	

             Source: Twitter. com March 2011
It s Mainstream
•  100 Million	

•  2 Million	

•  4.3 Billion	

               Source: LinkedIn.com May 2011
WHY SHOULD WE CARE?	

•  It's   where your customers are 	


•  It's   where your prospects are	


•  It's
    reach stretches further broader than any
  marketing channel	


•  It's   relevant to be in the game
We don t have a choice
  on whether we will DO
social media, the question
 is how WELL we DO it. 	

               	

               	

   - Erik Qualman, Author
         Socialnomics	





                        http://www.youtube.com/user/Socialnomics09?blend=1ob=5
* companies that have 100 or more employees	

             Source: eMarketer, Nov
             2010
Enhanced
                      Collaboration	

               Shared         Faster access to
BUSINESS      Workspaces	

     Information	


BENEFITS	

   Extended Organizational Reach	

                        Compete	

                        Ability to
• When   leveraged effectively,
 social networks become an
                                       THE
 equalizer, leveling the playing     EQUALIZER	

 field	

• Itallows organizations both
 large and small to compete
 and be relevant in their space	

• Ability
        to influence with little
 or not cost
UNANTICIPATED DISASTERS
PREVENTING DISASTERS
IS YOUR ORGANIZATION
       PREPARED FOR...?	

• Employees    posting opinions about the organization	


• Managing    brand reputation and public opinion/
exposure	


• Responding    to positive and negative feedback from
customers	


• Standing   by the decision NOT to get engaged....?
SOCIAL MEDIA SWOT	

•  Strength - ability to build •  Weakness - silo-ed as a
   relationships with your         business function and not
   target audience like never      integrated in overall
   before.	

                      business strategy.	



•  Opportunities - its          •  Threat - fear of losing
   where our customers             control. Seeks risk aversion.
   are. Integration with the       Non-innovative.	

   business is key.
ESTABLISHING A POLICY	





             ?
THE BASICS	

• Doyour employees know what is acceptable or
 permitted?	


• How    may (or not) employees identify themselves?	


• To   what degree can corporate content be used?	


• Hasyour organization determined what is can do
 with information obtained through social media?	


           Establishing a policy is critical! 	

             
ESTABLISH A STRATEGY	

• Governance  required implement and enforce acceptable
 usage policy covering social networking sites	


• It
   is key that all staff receive security awareness training
 covering your acceptable usage policy for social
 networking	


• Promote  good practices to help improve users behavior
 ultimately reducing and/or mitigating some of the risks	


• Permit access only to social networking sites that have
 obvious business benefits only to users with a business
 need
ESTABLISH A STRATEGY	

• Institute   processes to manage and monitor activity	


• Be flexible - overall uncertainty about what strategies and
 tactics to adopt to security social media	


• Understand and identify which users create the most
 amount of risk?	


• Create   reasonable guidelines that can be followed	


• Review sites terms and conditions to understand risks
 associated with each site
REGULATION is coming	

For regulated industries, what
requirements do you face?	

ex. FINRA	


Employers know ALOT about
their employees/candidates
HR: OBTAINING INFORMATION FROM
          SOCIAL NETWORKS	

• HRis tempted to peak at these sites to gather information
 about employees and potential candidates	


• Consider     discrimination lawsuits! Proceed with caution.	

- ex: viewing the online photo/picture of a candidate	


• Consistency      is KING - it will minimize your risk. 	

- ex: if conducting a search for ONE candidate, then do so for ALL	


• Evenif employers have the technical capability to gain access
 to social networking information of their employees or
 candidates, it does not imply the legal right to do so.
consider ALL risks	





Is there a need to address how to evaluate the risk of
sharing too much information online in relation to the
            value it brings to the business?
Security Concerns	

• There is a continued growth in social networking sites
      being used as an attack distribution platform	

	


• Users are less likely to see malware when it is passed
      on by a friend as it has a certain level of authenticity
      and a level of trust	

	


• Social networks give attackers a potentially powerful
      point of leverage, sometimes allowing them to launch
      sophisticated attacks against businesses	

	


• Known weaknesses exist in the security of the
      networks themselves, which limit our control
Threatscape of sites	

•  Session-hijacking / authentication weaknesses	

•  Profile harvesting leading to social engineering	

                  -  ex: phishing / spear-phishing	

	

•  Cross-site scripting (XSS) / Cross-site request forgery
      (CSRF)	


•  Malicious code / Malware	

                  -  ex: drive-by downloads
XSS Example	

        iframe id= CrazyDaVinci
        style= display:none; src= http://
        m.facebook.com/connect/prompt_feed.php?
        display=wapuser_message_prompt= script
        window.onload=function(){document.forms
        [0].message.value= Just visited
        http://y.ahoo.it/gajeBA Wow.. cool! nice page
        dude!!! ;document.forms[0].submit();}/
        script /iframe
• this bit of HTML/Javascript would be included in a viral page. 	

	

• the code sets the content of the wall post to a message that
includes a link to a viral page, then submits the prompt automatically.
Microsoft has documented a
steady rise in the number of
attacks targeting social networks 	



   Primary vectors: 	

   	


   • Phishing attempts	

   	


   • Social engineering tactics	

   	

   	

   Instances of Phishing impressions increased from 8.3% to 84.5%
Verizon highlighted in its 2011
DBIR, that malware and social
engineering to have been the
culprit for 60% of all reported
attacks/breaches	


  Contribution of malware:	

  	


  • 49% of breaches	

  	


  • 79% of records stolen
PROTECT  SERVE	





            Policing Social Media: 	

How do we protect the usage of social networks?
Policing Social Media	

•  Is it possible to establish and implement a standard set
      of guidelines for enterprise users?	

	

•  ...that would help to not only prevent data leaks, but
      also keep emerging social networking malware at bay?	

	

	

        •  It requires a combination of technical, behavioral
                   and organizational security controls
CONCLUSION	

• Social media isn t a choice anyone….recognize it is
      a business transformation tool	

	

• Perform a comprehensive risk assessment against all
      social networks that will be considered for use	


• Social networks DO introduce new security risks -
      take a formal approach to mitigate them through
      policy enforcement and user education	

	

• Doing nothing is not an option...will you take that
      risk?
QUESTIONS?	

   Contact Info:	


                      linkedin.com/
                      jaymclaughlin	





                 @jaymclaughlin

Más contenido relacionado

La actualidad más candente

Death of the Newspaper Industy: Bad News for You
Death of the Newspaper Industy: Bad News for YouDeath of the Newspaper Industy: Bad News for You
Death of the Newspaper Industy: Bad News for YouTaleo Research
 
Social Media and HR
Social Media and HRSocial Media and HR
Social Media and HRLance Haun
 
Increasing Employee Engagement using Social Media
Increasing Employee Engagement using Social MediaIncreasing Employee Engagement using Social Media
Increasing Employee Engagement using Social MediaVirtual EyeSee
 
Social Networking Fundamentals
Social Networking FundamentalsSocial Networking Fundamentals
Social Networking FundamentalsAyelet Baron
 
Spcial Networking Part I. "Differentiate Yourself on Social Networks"
Spcial Networking Part I. "Differentiate Yourself on Social Networks"Spcial Networking Part I. "Differentiate Yourself on Social Networks"
Spcial Networking Part I. "Differentiate Yourself on Social Networks"Wise Career Move LLC
 
How Collaboration Can Change the World: Getting Networked in the Networking Age
How Collaboration Can Change the World: Getting Networked in the Networking Age How Collaboration Can Change the World: Getting Networked in the Networking Age
How Collaboration Can Change the World: Getting Networked in the Networking Age Ayelet Baron
 
Social Media: Perspectives from the Trenches
Social Media: Perspectives from the TrenchesSocial Media: Perspectives from the Trenches
Social Media: Perspectives from the TrenchesJim Cahill
 
Leverage social media for customer interaction
Leverage social media for customer interactionLeverage social media for customer interaction
Leverage social media for customer interactionInfo-Tech Research Group
 
Getting Started with Enterprise Social Networking
Getting Started with Enterprise Social NetworkingGetting Started with Enterprise Social Networking
Getting Started with Enterprise Social NetworkingDavid Stephens
 
How Social Media Changes Business, Technology, and Society
How Social Media Changes Business, Technology, and SocietyHow Social Media Changes Business, Technology, and Society
How Social Media Changes Business, Technology, and SocietyKanda Runapongsa Saikaew
 
Social Media: Should We, Should We Not, or Should We Ignore the Whole Thing
Social Media: Should We, Should We Not, or Should We Ignore the Whole ThingSocial Media: Should We, Should We Not, or Should We Ignore the Whole Thing
Social Media: Should We, Should We Not, or Should We Ignore the Whole ThingJim Cahill
 
Social Media & Employee Engagement
Social Media & Employee EngagementSocial Media & Employee Engagement
Social Media & Employee EngagementMichael Specht
 
CIO's Web 2 0 In The Enterprise
CIO's Web 2 0 In The EnterpriseCIO's Web 2 0 In The Enterprise
CIO's Web 2 0 In The EnterpriseAbbie Lundberg
 
Social Media for Sustainable Business [Fall 2010 Refresh]
Social Media for Sustainable Business [Fall 2010 Refresh]Social Media for Sustainable Business [Fall 2010 Refresh]
Social Media for Sustainable Business [Fall 2010 Refresh]Earthsite
 
Wave 5 The Socialisation of Brands
Wave 5 The Socialisation of BrandsWave 5 The Socialisation of Brands
Wave 5 The Socialisation of Brandsmediabrandsfrance
 
Socializing Your CEO : Présence numérique des grands partons
Socializing Your CEO : Présence numérique des grands partons Socializing Your CEO : Présence numérique des grands partons
Socializing Your CEO : Présence numérique des grands partons Laurent de Personnalité
 
Social Media Recruitment PPT
Social Media Recruitment PPTSocial Media Recruitment PPT
Social Media Recruitment PPTSuman Banerjee
 
Measuring Value Of New Media Channels While Combining Them With Traditional C...
Measuring Value Of New Media Channels While Combining Them With Traditional C...Measuring Value Of New Media Channels While Combining Them With Traditional C...
Measuring Value Of New Media Channels While Combining Them With Traditional C...Shael Sharma
 

La actualidad más candente (19)

Death of the Newspaper Industy: Bad News for You
Death of the Newspaper Industy: Bad News for YouDeath of the Newspaper Industy: Bad News for You
Death of the Newspaper Industy: Bad News for You
 
Social Media and HR
Social Media and HRSocial Media and HR
Social Media and HR
 
Increasing Employee Engagement using Social Media
Increasing Employee Engagement using Social MediaIncreasing Employee Engagement using Social Media
Increasing Employee Engagement using Social Media
 
Social Networking Fundamentals
Social Networking FundamentalsSocial Networking Fundamentals
Social Networking Fundamentals
 
Spcial Networking Part I. "Differentiate Yourself on Social Networks"
Spcial Networking Part I. "Differentiate Yourself on Social Networks"Spcial Networking Part I. "Differentiate Yourself on Social Networks"
Spcial Networking Part I. "Differentiate Yourself on Social Networks"
 
How Collaboration Can Change the World: Getting Networked in the Networking Age
How Collaboration Can Change the World: Getting Networked in the Networking Age How Collaboration Can Change the World: Getting Networked in the Networking Age
How Collaboration Can Change the World: Getting Networked in the Networking Age
 
Social Media: Perspectives from the Trenches
Social Media: Perspectives from the TrenchesSocial Media: Perspectives from the Trenches
Social Media: Perspectives from the Trenches
 
Leverage social media for customer interaction
Leverage social media for customer interactionLeverage social media for customer interaction
Leverage social media for customer interaction
 
Getting Started with Enterprise Social Networking
Getting Started with Enterprise Social NetworkingGetting Started with Enterprise Social Networking
Getting Started with Enterprise Social Networking
 
How Social Media Changes Business, Technology, and Society
How Social Media Changes Business, Technology, and SocietyHow Social Media Changes Business, Technology, and Society
How Social Media Changes Business, Technology, and Society
 
Social Media: Should We, Should We Not, or Should We Ignore the Whole Thing
Social Media: Should We, Should We Not, or Should We Ignore the Whole ThingSocial Media: Should We, Should We Not, or Should We Ignore the Whole Thing
Social Media: Should We, Should We Not, or Should We Ignore the Whole Thing
 
Social Media & Employee Engagement
Social Media & Employee EngagementSocial Media & Employee Engagement
Social Media & Employee Engagement
 
CIO's Web 2 0 In The Enterprise
CIO's Web 2 0 In The EnterpriseCIO's Web 2 0 In The Enterprise
CIO's Web 2 0 In The Enterprise
 
Social Media for Sustainable Business [Fall 2010 Refresh]
Social Media for Sustainable Business [Fall 2010 Refresh]Social Media for Sustainable Business [Fall 2010 Refresh]
Social Media for Sustainable Business [Fall 2010 Refresh]
 
Wave 5 The Socialisation of Brands
Wave 5 The Socialisation of BrandsWave 5 The Socialisation of Brands
Wave 5 The Socialisation of Brands
 
Socializing Your CEO : Présence numérique des grands partons
Socializing Your CEO : Présence numérique des grands partons Socializing Your CEO : Présence numérique des grands partons
Socializing Your CEO : Présence numérique des grands partons
 
Philly.com4
Philly.com4Philly.com4
Philly.com4
 
Social Media Recruitment PPT
Social Media Recruitment PPTSocial Media Recruitment PPT
Social Media Recruitment PPT
 
Measuring Value Of New Media Channels While Combining Them With Traditional C...
Measuring Value Of New Media Channels While Combining Them With Traditional C...Measuring Value Of New Media Channels While Combining Them With Traditional C...
Measuring Value Of New Media Channels While Combining Them With Traditional C...
 

Destacado

Exploring DDoS Attacks: Impact to Community Financial Institutions
Exploring DDoS Attacks: Impact to Community Financial InstitutionsExploring DDoS Attacks: Impact to Community Financial Institutions
Exploring DDoS Attacks: Impact to Community Financial InstitutionsJay McLaughlin
 
National Shipbuilding Procurement Strategy: Economic Impact, Nova Scotia
National Shipbuilding Procurement Strategy: Economic Impact, Nova ScotiaNational Shipbuilding Procurement Strategy: Economic Impact, Nova Scotia
National Shipbuilding Procurement Strategy: Economic Impact, Nova ScotiaShipsStartHere.ca
 
Securing the Virtual Branch
Securing the Virtual BranchSecuring the Virtual Branch
Securing the Virtual BranchJay McLaughlin
 
ملف اليهود فى مصر الحيثة
ملف اليهود فى مصر الحيثةملف اليهود فى مصر الحيثة
ملف اليهود فى مصر الحيثةalsoefy
 
Evaluating your Cybersecurity Preparedness - FFIEC Assessment
Evaluating your Cybersecurity Preparedness - FFIEC AssessmentEvaluating your Cybersecurity Preparedness - FFIEC Assessment
Evaluating your Cybersecurity Preparedness - FFIEC AssessmentJay McLaughlin
 
Todorov’s theory
Todorov’s theoryTodorov’s theory
Todorov’s theoryjessgregson
 
Asesõna
AsesõnaAsesõna
Asesõnasgrig
 
Protecting the Information Infrastructure
Protecting the Information InfrastructureProtecting the Information Infrastructure
Protecting the Information InfrastructureJay McLaughlin
 
10 Ways Buildium Has Used Video
10 Ways Buildium Has Used Video10 Ways Buildium Has Used Video
10 Ways Buildium Has Used VideoThad Peterson
 
Securing 3-Mode Mobile Banking
Securing 3-Mode Mobile BankingSecuring 3-Mode Mobile Banking
Securing 3-Mode Mobile BankingJay McLaughlin
 
ShipsStartHere.ca: Nova Scotia’s response to the National Shipbuilding Procur...
ShipsStartHere.ca: Nova Scotia’s response to the National Shipbuilding Procur...ShipsStartHere.ca: Nova Scotia’s response to the National Shipbuilding Procur...
ShipsStartHere.ca: Nova Scotia’s response to the National Shipbuilding Procur...ShipsStartHere.ca
 
BYOD: Device Control in the Wild, Wild, West
BYOD: Device Control in the Wild, Wild, WestBYOD: Device Control in the Wild, Wild, West
BYOD: Device Control in the Wild, Wild, WestJay McLaughlin
 
Phil's Senior Seminar Slide Show
Phil's Senior Seminar Slide ShowPhil's Senior Seminar Slide Show
Phil's Senior Seminar Slide Showphillycheez
 

Destacado (17)

Pumkin
Pumkin Pumkin
Pumkin
 
Exploring DDoS Attacks: Impact to Community Financial Institutions
Exploring DDoS Attacks: Impact to Community Financial InstitutionsExploring DDoS Attacks: Impact to Community Financial Institutions
Exploring DDoS Attacks: Impact to Community Financial Institutions
 
National Shipbuilding Procurement Strategy: Economic Impact, Nova Scotia
National Shipbuilding Procurement Strategy: Economic Impact, Nova ScotiaNational Shipbuilding Procurement Strategy: Economic Impact, Nova Scotia
National Shipbuilding Procurement Strategy: Economic Impact, Nova Scotia
 
Securing the Virtual Branch
Securing the Virtual BranchSecuring the Virtual Branch
Securing the Virtual Branch
 
-Pass it on--
 -Pass it on-- -Pass it on--
-Pass it on--
 
ملف اليهود فى مصر الحيثة
ملف اليهود فى مصر الحيثةملف اليهود فى مصر الحيثة
ملف اليهود فى مصر الحيثة
 
Evaluating your Cybersecurity Preparedness - FFIEC Assessment
Evaluating your Cybersecurity Preparedness - FFIEC AssessmentEvaluating your Cybersecurity Preparedness - FFIEC Assessment
Evaluating your Cybersecurity Preparedness - FFIEC Assessment
 
Ngou CV - for dlink
Ngou CV - for dlinkNgou CV - for dlink
Ngou CV - for dlink
 
-Pass it on--
 -Pass it on-- -Pass it on--
-Pass it on--
 
Todorov’s theory
Todorov’s theoryTodorov’s theory
Todorov’s theory
 
Asesõna
AsesõnaAsesõna
Asesõna
 
Protecting the Information Infrastructure
Protecting the Information InfrastructureProtecting the Information Infrastructure
Protecting the Information Infrastructure
 
10 Ways Buildium Has Used Video
10 Ways Buildium Has Used Video10 Ways Buildium Has Used Video
10 Ways Buildium Has Used Video
 
Securing 3-Mode Mobile Banking
Securing 3-Mode Mobile BankingSecuring 3-Mode Mobile Banking
Securing 3-Mode Mobile Banking
 
ShipsStartHere.ca: Nova Scotia’s response to the National Shipbuilding Procur...
ShipsStartHere.ca: Nova Scotia’s response to the National Shipbuilding Procur...ShipsStartHere.ca: Nova Scotia’s response to the National Shipbuilding Procur...
ShipsStartHere.ca: Nova Scotia’s response to the National Shipbuilding Procur...
 
BYOD: Device Control in the Wild, Wild, West
BYOD: Device Control in the Wild, Wild, WestBYOD: Device Control in the Wild, Wild, West
BYOD: Device Control in the Wild, Wild, West
 
Phil's Senior Seminar Slide Show
Phil's Senior Seminar Slide ShowPhil's Senior Seminar Slide Show
Phil's Senior Seminar Slide Show
 

Similar a Social Media Strategy: Managing Risks and Security Concerns

Social media in recruiting
Social media in recruitingSocial media in recruiting
Social media in recruitingSneha Joy
 
Digital mindset for Social HR
Digital mindset for Social HRDigital mindset for Social HR
Digital mindset for Social HRRuchi Bhatia
 
Social networks and social media analysis in the context of the enterprise
Social networks and social media analysis in the context of the enterpriseSocial networks and social media analysis in the context of the enterprise
Social networks and social media analysis in the context of the enterpriseRamez Al-Fayez
 
Risks of social media for businesses (and how to manage them)
Risks of social media for businesses (and how to manage them)Risks of social media for businesses (and how to manage them)
Risks of social media for businesses (and how to manage them)CrowdControlHQ
 
Effective Training and Policy Takes the Fear out of Social Networking - Shawn...
Effective Training and Policy Takes the Fear out of Social Networking - Shawn...Effective Training and Policy Takes the Fear out of Social Networking - Shawn...
Effective Training and Policy Takes the Fear out of Social Networking - Shawn...sdavis532
 
Social Media Presentation Gt Vfinal
Social Media Presentation Gt VfinalSocial Media Presentation Gt Vfinal
Social Media Presentation Gt VfinalDanny Miller
 
Leveraging the Power of Social Media - For Cisco Partners
Leveraging the Power of Social Media - For Cisco PartnersLeveraging the Power of Social Media - For Cisco Partners
Leveraging the Power of Social Media - For Cisco PartnersSquareOne|Consulting
 
Starting Clients with Digital and Social Media Marketing
Starting Clients with Digital and Social Media MarketingStarting Clients with Digital and Social Media Marketing
Starting Clients with Digital and Social Media MarketingSusan Chesley Fant
 
Communication Strategies for Leveraging Social Media
Communication Strategies for Leveraging Social Media Communication Strategies for Leveraging Social Media
Communication Strategies for Leveraging Social Media Sazed Monsur
 
Desarrollo de social media en los canales de venta
Desarrollo de social media en los canales de ventaDesarrollo de social media en los canales de venta
Desarrollo de social media en los canales de ventaEmpresas 2.0
 
Social business: from #buzz to #benefits
Social business: from #buzz to #benefitsSocial business: from #buzz to #benefits
Social business: from #buzz to #benefitsVelrada
 
Employee Advocacy - The Next Step in Digital Transformation
Employee Advocacy - The Next Step in Digital Transformation Employee Advocacy - The Next Step in Digital Transformation
Employee Advocacy - The Next Step in Digital Transformation Sociabble
 
Recruitment through Social Media
Recruitment through Social MediaRecruitment through Social Media
Recruitment through Social MediaArindam Ghose
 
Understanding Social Media Networks for Financial Advisors - A Webinar for Ac...
Understanding Social Media Networks for Financial Advisors - A Webinar for Ac...Understanding Social Media Networks for Financial Advisors - A Webinar for Ac...
Understanding Social Media Networks for Financial Advisors - A Webinar for Ac...Jay Palter Social Advisory
 
Social Media 101: Understanding Social Media Channels, Demographics, and Usage
Social Media 101: Understanding Social Media Channels, Demographics, and UsageSocial Media 101: Understanding Social Media Channels, Demographics, and Usage
Social Media 101: Understanding Social Media Channels, Demographics, and UsageDebra Askanase
 
Maz @ SoAmpli social media crash course
Maz @ SoAmpli social media crash course Maz @ SoAmpli social media crash course
Maz @ SoAmpli social media crash course Mishel Cordes
 
Social Media Hands-On Workshop - Sept 2010
Social Media Hands-On Workshop - Sept 2010Social Media Hands-On Workshop - Sept 2010
Social Media Hands-On Workshop - Sept 2010Donny Shimamoto
 

Similar a Social Media Strategy: Managing Risks and Security Concerns (20)

Social media in recruiting
Social media in recruitingSocial media in recruiting
Social media in recruiting
 
Digital mindset for Social HR
Digital mindset for Social HRDigital mindset for Social HR
Digital mindset for Social HR
 
Social networks and social media analysis in the context of the enterprise
Social networks and social media analysis in the context of the enterpriseSocial networks and social media analysis in the context of the enterprise
Social networks and social media analysis in the context of the enterprise
 
Risks of social media for businesses (and how to manage them)
Risks of social media for businesses (and how to manage them)Risks of social media for businesses (and how to manage them)
Risks of social media for businesses (and how to manage them)
 
Effective Training and Policy Takes the Fear out of Social Networking - Shawn...
Effective Training and Policy Takes the Fear out of Social Networking - Shawn...Effective Training and Policy Takes the Fear out of Social Networking - Shawn...
Effective Training and Policy Takes the Fear out of Social Networking - Shawn...
 
Social media risks guide
Social media risks guideSocial media risks guide
Social media risks guide
 
Social Media Presentation Gt Vfinal
Social Media Presentation Gt VfinalSocial Media Presentation Gt Vfinal
Social Media Presentation Gt Vfinal
 
Philly.com5
Philly.com5Philly.com5
Philly.com5
 
Social media-assessment
Social media-assessmentSocial media-assessment
Social media-assessment
 
Leveraging the Power of Social Media - For Cisco Partners
Leveraging the Power of Social Media - For Cisco PartnersLeveraging the Power of Social Media - For Cisco Partners
Leveraging the Power of Social Media - For Cisco Partners
 
Starting Clients with Digital and Social Media Marketing
Starting Clients with Digital and Social Media MarketingStarting Clients with Digital and Social Media Marketing
Starting Clients with Digital and Social Media Marketing
 
Communication Strategies for Leveraging Social Media
Communication Strategies for Leveraging Social Media Communication Strategies for Leveraging Social Media
Communication Strategies for Leveraging Social Media
 
Desarrollo de social media en los canales de venta
Desarrollo de social media en los canales de ventaDesarrollo de social media en los canales de venta
Desarrollo de social media en los canales de venta
 
Social business: from #buzz to #benefits
Social business: from #buzz to #benefitsSocial business: from #buzz to #benefits
Social business: from #buzz to #benefits
 
Employee Advocacy - The Next Step in Digital Transformation
Employee Advocacy - The Next Step in Digital Transformation Employee Advocacy - The Next Step in Digital Transformation
Employee Advocacy - The Next Step in Digital Transformation
 
Recruitment through Social Media
Recruitment through Social MediaRecruitment through Social Media
Recruitment through Social Media
 
Understanding Social Media Networks for Financial Advisors - A Webinar for Ac...
Understanding Social Media Networks for Financial Advisors - A Webinar for Ac...Understanding Social Media Networks for Financial Advisors - A Webinar for Ac...
Understanding Social Media Networks for Financial Advisors - A Webinar for Ac...
 
Social Media 101: Understanding Social Media Channels, Demographics, and Usage
Social Media 101: Understanding Social Media Channels, Demographics, and UsageSocial Media 101: Understanding Social Media Channels, Demographics, and Usage
Social Media 101: Understanding Social Media Channels, Demographics, and Usage
 
Maz @ SoAmpli social media crash course
Maz @ SoAmpli social media crash course Maz @ SoAmpli social media crash course
Maz @ SoAmpli social media crash course
 
Social Media Hands-On Workshop - Sept 2010
Social Media Hands-On Workshop - Sept 2010Social Media Hands-On Workshop - Sept 2010
Social Media Hands-On Workshop - Sept 2010
 

Último

08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 

Último (20)

08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 

Social Media Strategy: Managing Risks and Security Concerns

  • 1. SOCIAL MEDIA: INFILTRATING THE ENTERPRISE MIDTECH IT Summit June 27th, 2011 JAY A. MCLAUGHLIN, CISSP SVP, CHIEF INFORMATION OFFICER
  • 2. DISCLAIMER The materials, thoughts, comments, ideas and opinions expressed throughout this presentation are entirely my own and do not necessarily represent the thoughts or opinions of my employer (past or present).
  • 3. AGENDA •  Defining social media •  Embracing the Inevitable •  Understanding the Benefits Risks •  Friending your Customers •  Preventing social media disasters •  Building a strategy
  • 4. : forms of electronic communication (as Web sites for social networking and microblogging) through which users create online communities to share information, ideas, personal messages, and other content What is Social Media? Social media is media for social interaction using highly accessible and scalable communication techniques. Social media is the use of web-based and mobile technologies to turn communication into interactive dialogue.
  • 5.
  • 6. •  500 Million •  250 Million •  700 Billion Source: Facebook.com April 2011
  • 8. •  6939 •  319 •  140 Million Source: Twitter. com March 2011
  • 10. •  100 Million •  2 Million •  4.3 Billion Source: LinkedIn.com May 2011
  • 11.
  • 12. WHY SHOULD WE CARE? •  It's where your customers are •  It's where your prospects are •  It's reach stretches further broader than any marketing channel •  It's relevant to be in the game
  • 13. We don t have a choice on whether we will DO social media, the question is how WELL we DO it. - Erik Qualman, Author Socialnomics http://www.youtube.com/user/Socialnomics09?blend=1ob=5
  • 14. * companies that have 100 or more employees Source: eMarketer, Nov 2010
  • 15. Enhanced Collaboration Shared Faster access to BUSINESS Workspaces Information BENEFITS Extended Organizational Reach Compete Ability to
  • 16. • When leveraged effectively, social networks become an THE equalizer, leveling the playing EQUALIZER field • Itallows organizations both large and small to compete and be relevant in their space • Ability to influence with little or not cost
  • 19. IS YOUR ORGANIZATION PREPARED FOR...? • Employees posting opinions about the organization • Managing brand reputation and public opinion/ exposure • Responding to positive and negative feedback from customers • Standing by the decision NOT to get engaged....?
  • 20. SOCIAL MEDIA SWOT •  Strength - ability to build •  Weakness - silo-ed as a relationships with your business function and not target audience like never integrated in overall before. business strategy. •  Opportunities - its •  Threat - fear of losing where our customers control. Seeks risk aversion. are. Integration with the Non-innovative. business is key.
  • 22. THE BASICS • Doyour employees know what is acceptable or permitted? • How may (or not) employees identify themselves? • To what degree can corporate content be used? • Hasyour organization determined what is can do with information obtained through social media? Establishing a policy is critical!  
  • 23. ESTABLISH A STRATEGY • Governance required implement and enforce acceptable usage policy covering social networking sites • It is key that all staff receive security awareness training covering your acceptable usage policy for social networking • Promote good practices to help improve users behavior ultimately reducing and/or mitigating some of the risks • Permit access only to social networking sites that have obvious business benefits only to users with a business need
  • 24. ESTABLISH A STRATEGY • Institute processes to manage and monitor activity • Be flexible - overall uncertainty about what strategies and tactics to adopt to security social media • Understand and identify which users create the most amount of risk? • Create reasonable guidelines that can be followed • Review sites terms and conditions to understand risks associated with each site
  • 25. REGULATION is coming For regulated industries, what requirements do you face? ex. FINRA Employers know ALOT about their employees/candidates
  • 26. HR: OBTAINING INFORMATION FROM SOCIAL NETWORKS • HRis tempted to peak at these sites to gather information about employees and potential candidates • Consider discrimination lawsuits! Proceed with caution. - ex: viewing the online photo/picture of a candidate • Consistency is KING - it will minimize your risk. - ex: if conducting a search for ONE candidate, then do so for ALL • Evenif employers have the technical capability to gain access to social networking information of their employees or candidates, it does not imply the legal right to do so.
  • 27. consider ALL risks Is there a need to address how to evaluate the risk of sharing too much information online in relation to the value it brings to the business?
  • 28. Security Concerns • There is a continued growth in social networking sites being used as an attack distribution platform • Users are less likely to see malware when it is passed on by a friend as it has a certain level of authenticity and a level of trust • Social networks give attackers a potentially powerful point of leverage, sometimes allowing them to launch sophisticated attacks against businesses • Known weaknesses exist in the security of the networks themselves, which limit our control
  • 29.
  • 30. Threatscape of sites •  Session-hijacking / authentication weaknesses •  Profile harvesting leading to social engineering -  ex: phishing / spear-phishing •  Cross-site scripting (XSS) / Cross-site request forgery (CSRF) •  Malicious code / Malware -  ex: drive-by downloads
  • 31. XSS Example iframe id= CrazyDaVinci style= display:none; src= http:// m.facebook.com/connect/prompt_feed.php? display=wapuser_message_prompt= script window.onload=function(){document.forms [0].message.value= Just visited http://y.ahoo.it/gajeBA Wow.. cool! nice page dude!!! ;document.forms[0].submit();}/ script /iframe • this bit of HTML/Javascript would be included in a viral page. • the code sets the content of the wall post to a message that includes a link to a viral page, then submits the prompt automatically.
  • 32. Microsoft has documented a steady rise in the number of attacks targeting social networks Primary vectors: • Phishing attempts • Social engineering tactics Instances of Phishing impressions increased from 8.3% to 84.5%
  • 33. Verizon highlighted in its 2011 DBIR, that malware and social engineering to have been the culprit for 60% of all reported attacks/breaches Contribution of malware: • 49% of breaches • 79% of records stolen
  • 34. PROTECT SERVE Policing Social Media: How do we protect the usage of social networks?
  • 35. Policing Social Media •  Is it possible to establish and implement a standard set of guidelines for enterprise users? •  ...that would help to not only prevent data leaks, but also keep emerging social networking malware at bay? •  It requires a combination of technical, behavioral and organizational security controls
  • 36. CONCLUSION • Social media isn t a choice anyone….recognize it is a business transformation tool • Perform a comprehensive risk assessment against all social networks that will be considered for use • Social networks DO introduce new security risks - take a formal approach to mitigate them through policy enforcement and user education • Doing nothing is not an option...will you take that risk?
  • 37. QUESTIONS? Contact Info: linkedin.com/ jaymclaughlin @jaymclaughlin

Notas del editor

  1. 1. 500 Million active users 2. 250 Million mobile users 700 Billions minutes per month users spend 300,000 businesses have a presence on Facebook - Socialnomics;
  2. 1. 6939 tweets per second 2. 319 signups per second / 300,000 per day 3. 140 Million tweets per day
  3. Websites lag for information sharing, but using Twitter, businesses now have access to hundreds/thousands/millions of followers through a system designed to reach people across the globe in real time in a matter of seconds. 
  4. 1. 100 Million professional users 2. 2 Million companies have LinkedIn company pages 3. 4.3 Billion initial value for IPO
  5. Q-The ROI is often raised - how do we measure? A-The ROI of doing it is that you ’ re company will be in business in five yrs...
  6. Why are we trying to measure social media like a traditional channel?  Social media can touch every facet of business and is more an extension of good business.  When asked what the ROI of social media, he responds, "what's the ROI of your phone?"- What is the cost of doing nothing?  - Do you really want to take that risk?
  7. Basically, by the end of this year, 4 out of 5 businesses will adopt in some form.
  8. 1-Taco Bell - 2 million views on YouTube when NYC restaurant infested with rats 2-The microphone is always on! if you wouldn ’ t say something to everyone, don ’ t say it at all. 3-American Red Cross - accidental mixup by employee thinking he was posting a personal tweet
  9. This past February, Southwest Airlines kicked director Kevin Smith off a flight from San Francisco headed to Los Angeles for being too fat. Southwest was quick to respond — 16 minutes after Smith ’ s first tweet regarding the incident. TechCrunch - heavily followed tech blog - experience slowness which impacted site visitors. After tweeting, they received a call from a Comcast manager that and the problem was resolved within 20 minutes.
  10. 1-Identify the collaboration hot-spots 2-Select technologies that will improve or accelerate existing process workflows 3-Identify the high-value business outcomes you want to achieve 4-The benefits and employments of social media tools are different for every organization. The ROI may not be as identifiable for your company.
  11. Not having a policy is no longer optional. And it is a good place to start. You need to give your employees a guide on how to successfully engage online. These guidelines should be supported by training on how to use social media tools effectively.
  12. Social media demands new technology and a fresh business approach. IT must make sure any traffic generated doesn ’ t bring the business applications your organization depends on to its knees. Your network needs to be told to give ‘ real work ’ the priority it deserves.
  13. the Genetic Information Nondiscrimination Act ("GINA") that went into effect on November 21, 2009, prohibits employers from utilizing genetic tests or considering an applicant or employee's genetic background in hiring, firing, or promotions. with the explosion in the use of social media, the EEOC is worried that health insurers and employers will data mine an applicant or employee's social media accounts and utilize the information obtained to discriminate against them -- may result in expensive litigation!
  14. 1-Although this practice is common, employers that rely on social media websites to obtain information regarding applicants ’ employment histories and personal lives should proceed with caution. 2-failure to hire the applicant because of his or her race, ethnicity, gender, or any other protected classification that might be perceived from the picture. 4-What are the employee ’ s rights?  Visiting  www.privacyrights.org ,which is a self-proclaimed Privacy Rights Clearinghouse, doesn ’ t mention social sites.  There is no precedence.
  15. Social networking is a haven for marketers AND a collaboration between colleagues. But it can put corporate information assets and reputations at risk. Social networking platforms, such as Facebook, Twitter and LinkedIn, are becoming an integral part of people's personal and business worlds. The lines are blurring…
  16. 1-Recent study by Symantec 2-We need to educate - example - when reading emails they're kind of aware of looking out for in unsafe looking attachments or spelling or grammar mistakes 3-Corporations are increasingly being exposed to hacking by savvy attackers who glean information about their employees from social networks. 4-HTTPS at the point of authentication, then the connection is switched to HTTP
  17. 1-Lack of SSL - recommend using ForceTLS to obtain a secure connection when offered 1-HTTPS at the point of authentication, then the connection is switched to HTTP 3-Critical XSS vulnerability that would make it possible for attackers to infect users with spyware, adware, and just maybe anything else they want. 3-One in five web-based attacks are aimed at social networks 4-Automatic infection without intentional user request
  18. Anyone clicking the link would get the same code executed on their account.
  19. The report found a steady increase in social engineering attacks and an influx of rogue security software, designed to trick users into installing phony antivirus programs containing keyloggers, backdoors and other nasty malware...why? There is an increased level of trust people have on SNs.
  20. More attacks targeting the username and passwords of social networking users..why? These are passwords that they might be using for other sites, such as financial sites. A Social Network Fraud survey in 2010 by Harris Interactive showed that nearly 75% (sample of 1,103) of Americans use the same password for their social sites and email.
  21. Requires a combination of technical, behavioral and organizational security controls