SlideShare una empresa de Scribd logo
1 de 4
Descargar para leer sin conexión
IBM Center for Applied Insights




                                                                Executive Series


                                                                Security Essentials
                                                                for CIOs
                                                                Navigating the risks and rewards
                                                                of social media

                                                                Imagine an immense tradeshow floor filled with all of your
                                                                clients. It’s also teeming with your most promising prospects,
                Highlights:                                     along with thousands of talented potential hires. There’s no
                                                                better place for you to showcase your offerings, your smarts,
                Today, there are over 280,000 IBMers on
                                                                and what sets you apart. Naturally, your rivals are there too,
                LinkedIn, over 170,000 people on Facebook
                with IBM listed as their workplace, and         angling for clients, brainpower and ideas. So there’s plenty
                an estimated 30,000 IBMers engaging on          of competitive pressure to attend. But, regrettably, there’s a
                Twitter each month. Done the right way,         downside. Growing numbers of thieves, industrial spies and
                social media can pay off both for individuals
                and the enterprise.                             other ne’er-do-wells are circulating the same halls. As is so
                                                                often the case, opportunity comes with its share of risk.

                                                                This non-stop global conference, of course, is social media.
                                                                At IBM, we feel that these digital gatherings provide near
                                                                limitless opportunity for our employees to make connections,
                                                                exchange ideas, and innovate. For us, engaging in social media,
                                                                inside and outside of the company, is a strategic imperative.
                                                                So is security. We believe the solution is to create a risk-aware
                                                                culture — one that acknowledges both the value and the risks
                                                                associated with the digital world. It is important that we
                                                                engage digitally in a smart and secure way.

                                                                Just a few years ago, many companies saw social computing
                                                                as an outcropping on the periphery of their businesses.
                                                                Since then, social networks have exploded, with hundreds
                                                                of millions of people trading ideas and leads, from work,
                                                                home and on the move. This growth has created enormous
                                                                value, for everything from recruiting staff to customer service.
                                                                In a recent Ponemon Institute survey, nearly 70 percent
                                                                of global respondents said that social media is now very
                                                                important for achieving their business objectives.1
Executive Series                                                                                                        Security Intelligence




However, there is still a long way to go between seeing the value   Analyze the risks
and actively engaging. In IBM’s latest CEO Survey of 1709           The next step is an analysis of the risks inherent in each of
CEOs around the world, only 16 percent of them are currently        these initiatives. ISACA has defined five primary social media
participating in social business platforms to connect with          risks for business.3 They range from the increased threat
customers. Within five years, that will likely grow to              of viruses and malware to brand hijacking and lack of content
57 percent.2 Outperformers in the survey were more likely           control to changing customer expectations to increasing
to identify openness, often characterized by a greater use          the chances of non-compliance.
of social media, as a key influence on their organization.
                                                                    One growing trend is for criminals to harvest personal
This growth and attention has created new opportunities for         information from social networks, and then to use it to craft
thieves and hackers, and many enterprises are unsure what to        personalized phishing attacks. If successful, these can deliver
do about it. In the Ponemon study, 63 percent of respondents        malware, which can quietly steal information, shut down
said that social media puts their organization at risk and          vital operations, or even carry out sabotage.
is a serious security threat. The risk is recognized, but only
29 percent admitted to having the necessary security controls       There are not only external risks, but also risks from employees
to mitigate that threat. There is still a long way to go.           as well. What if company secrets are exposed via social media?
                                                                    What would happen to the firm’s reputation if negative photos
                                                                    of employees made their way onto Flickr? What to do if an ugly


Nearly 70%
                                                                    and false rumor goes viral on Twitter or if a colleague appears
                                                                    to be spilling details from yesterday’s meeting on Facebook?


of global respondents said that social                              These risks may be common across enterprises, but the way
                                                                    in which organizations respond will likely be unique to their
media is now very important for                                     corporate culture. The important element is to raise these
achieving their business objectives.1                               early on in the process, and build appropriate response plans.


Source: Ponemon Institute                                           Create and communicate your policy
                                                                    The third step of the process is crucial. It involves communicating
Because of this growth, in both opportunity and risk,               the opportunities and risks of the digital world, and providing
we feel it’s important to share our ideas on how to help            policies, awareness programs and tools to guide the entire work
build a risk-aware culture for the social world.                    force. For this, ongoing education and guidance must be built
                                                                    into the fabric of the enterprise’s social media strategy.
Define your social agenda
The first step for every enterprise is to determine where it fits   At IBM, we began these efforts with our own Intranet. In
in the social sphere, and what it might gain from social media.     2005, IBMers were using an in-house social network known
Ideally, top executives from every division will meet to explore    as Connections to exchange everything from algorithms
the possible benefits. Core questions include: Will participation   to chili recipes. Then, external blogs and social networks
boost brand awareness? Can it improve customer satisfaction?        began to take off, and IBM considered the opportunities and
Could we use social media to drive collaboration or crowdsourcing   challenges of engaging far beyond the corporate firewall.
for product innovation? Discussions must also extend to             Collaborating on a wiki, IBM employees drew up our Social
the costs of not engaging. Will the company be hamstrung            Computing Guidelines. This initial effort was a starting point
in responding to public relations issues if it lacks a well-known   and we’ve been evolving it ever since.
Twitter account or Facebook page? Will it be at a disadvantage
finding and communicating with good recruits if it doesn’t          Today, there are over 280,000 IBMers on LinkedIn, over 170,000
use social media?                                                   people on Facebook with IBM listed as their workplace, and
                                                                    an estimated 30,000 IBMers engaging on Twitter each month.
Each enterprise will come up with its own answers. Some             Done the right way, social media can pay off both for individuals
may conclude that certain functions, perhaps HR, Sales,             and the enterprise. By participating, our employees build what
and Marketing need to be active on social networks while
other functions require a smaller presence or none at all.                                                                                 2
Executive Series                                                                                                                 Security Intelligence




    Social Computing Tips                                                •  espect others’ rights. You should respect the rights of
                                                                           R
                                                                          others, including their privacy and intellectual property rights.
    for Employees
                                                                         • Be careful with connections. Your employees might
                                                                           
    Like many of today’s emerging technologies, social                    receive connection requests from those who are hunting
    computing puts employees in the driver’s seat—essentially             for private company information so remind them that it’s
    making them your brand ambassadors. You might want                    good to be choosy when considering who to connect with.
    to consider the following tips as you empower your
    employees to effectively navigate the risks and reap
                                                                         •  ead the fine print. Social networks have terms of use
                                                                           R
    the rewards of social platforms:
                                                                          and privacy policies, and you and your employees should
                                                                          review these closely to confirm that you can live with those
    • Be authentic. Encourage employees to identify their
                                                                          terms and policies. Also, social networks may change
     employer in their profiles, but provide a disclaimer that            their terms and policies over time, so you should regularly
     their opinions remain their own.                                     check them for changes before connecting.

    •  hink before posting. Content and context go hand-in-hand.
      T                                                                  •  dmit mistakes. Things move faster than ever in social
                                                                           A
     Confidential or private information isn’t ever appropriate           media, and employee mistakes are likely to happen.
     to share in a public context. For example, a tweet about             A culture where employees are encouraged to admit and
     a recently released whitepaper would be fine, but a tweet            quickly correct mistakes can help to avoid any fallout
     about confidential company financials would not be.                  from the inevitable social media faux pas.



we call Digital Eminence, a reputation for sharing experience            Join the conversation
and ideas that can boost their professional persona as well as the       To read additional articles, learn more about Security Essentials
company’s prestige, while drawing people and business to IBM.            for CIOs, or share your thoughts with other security leaders
                                                                         join us at ibm.com/smarter/cai/security.
Monitor security and measure progress
One word of warning, enterprises must be extremely careful               About the author
to balance privacy issues and security when it comes to social           Kristin Lovejoy is Vice President of IT Risk, Office of the CIO,
media use. Gartner recently reported that by 2015, 60 percent            IBM. She can be contacted at klovejoy@us.ibm.com.
of enterprises are expected to actively monitor employee’s
social media use for potential security breaches.4 It’s important        About IBM Center for Applied Insights
to maintain a secure environment, but companies should                   The IBM Center for Applied Insights (ibm.com/smarter/cai/value)
also consider doing so in a way that is sensitive to privacy and         introduces new ways of thinking, working and leading. Through
other concerns.                                                          evidence-based research, the Center arms leaders with pragmatic
                                                                         guidance and the case for change.
Once an enterprise delves into social media, it is useful
to measure various efforts and to gauge their effectiveness.         1
                                                                       P
                                                                        onemon Institute, “Global Survey on Social Media Risks: Survey of IT  IT
If human resource professionals are using social networks for          Security Practitioners”, September 2011
                                                                     2
                                                                        2
                                                                         012 IBM CEO Study, “Leading Through Connections”,
recruiting, how do the talent pool and pipeline match up                http://www-935.ibm.com/services/us/en/c-suite/ceostudy2012/
before and after? If developers are collaborating through social     3
                                                                        I
                                                                        SACA, “Social Media: Business Benefits and Security, Governance and
                                                                        Assurance Perspectives”, June 2010, http://www.isaca.org/Knowledge-Center/
media, how much more quickly are products and services                  Research/ResearchDeliverables/Pages/Social-Media-Business-Benefits-and-
getting to market? With the development of new tools and                Security-Governance-and-Assurance-Perspectives.aspx
                                                                     4
                                                                       “Gartner Predicts Huge Rise in Monitoring of Employees’ Social Media Use”,
                                                                       
constant flows of data, social media is an ongoing laboratory.         PC World, 29 May 2012, http://www.pcworld.com/businesscenter/article/256420/
The learning never ends.                                               gartner_predicts_huge_rise_in_monitoring_of_employees_social_media_use.html




                                                                                                                                                    3
Executive Series                                                            Security Intelligence




                   © Copyright IBM Corporation 2012

                   IBM Global Services
                   Route 100
                   Somers, NY 10589
                   U.S.A.

                   Produced in the United States of America
                   June 2012
                   All Rights Reserved

                   IBM, the IBM logo and ibm.com are trademarks or registered trademarks
                   of International Business Machines Corporation in the United
                   States, other countries, or both. If these and other IBM trademarked
                   terms are marked on their first occurrence in this information with a
                   trademark symbol (® or ™), these symbols indicate U.S. registered
                   or common law trademarks owned by IBM at the time this information
                   was published. Such trademarks may also be registered or common
                   law trademarks in other countries. A current list of IBM trademarks is
                   available on the Web at “Copyright and trademark information” at
                   ibm.com/legal/copytrade.shtml Other company, product and service
                   names may be trademarks or service marks of others.

                   References in this publication to IBM products and services do not
                   imply that IBM intends to make them available in all countries in which
                   IBM operates.


                            Please Recycle




                                                                     WGW03006USEN-00

Más contenido relacionado

La actualidad más candente

Occupy IT Manifesto
Occupy IT ManifestoOccupy IT Manifesto
Occupy IT ManifestoJohn Mancini
 
Cloud Enterprise Programme
Cloud Enterprise ProgrammeCloud Enterprise Programme
Cloud Enterprise Programmeandyderrick
 
The Power of the Social Organization
The Power of the Social OrganizationThe Power of the Social Organization
The Power of the Social OrganizationMichael Pace
 
The state of corporate social media in 2011 results from the first corporat...
The state of corporate social media in 2011   results from the first corporat...The state of corporate social media in 2011   results from the first corporat...
The state of corporate social media in 2011 results from the first corporat...Gnocchi / Digital Marketing
 
IT Next February 2010 Issue
IT Next February 2010 IssueIT Next February 2010 Issue
IT Next February 2010 IssueShashwat DC
 
Big data and the challenge of extreme information
Big data and the challenge of extreme informationBig data and the challenge of extreme information
Big data and the challenge of extreme informationJohn Mancini
 
Enterprise 2.0 and business/IT alignment
Enterprise 2.0 and business/IT alignment Enterprise 2.0 and business/IT alignment
Enterprise 2.0 and business/IT alignment Jeroen Derynck
 
Connect IT Conference 2010 Brief
Connect IT Conference 2010 BriefConnect IT Conference 2010 Brief
Connect IT Conference 2010 BriefMalcolm Bastien
 
Social responsibility > Social marketing > Social media
Social responsibility > Social marketing > Social mediaSocial responsibility > Social marketing > Social media
Social responsibility > Social marketing > Social mediaBob Pickard
 
CIO Leadership on Web 2.0 and Social Media
CIO Leadership on Web 2.0 and Social MediaCIO Leadership on Web 2.0 and Social Media
CIO Leadership on Web 2.0 and Social MediaAnne Pauker Kreitzberg
 
2 24254 ch_e-book_four_cs_of_social_media
2 24254 ch_e-book_four_cs_of_social_media2 24254 ch_e-book_four_cs_of_social_media
2 24254 ch_e-book_four_cs_of_social_mediaNuno Candeias
 
Practical advice for making Social Media work for your business HINTS, TIPS A...
Practical advice for making Social Media work for your business HINTS, TIPS A...Practical advice for making Social Media work for your business HINTS, TIPS A...
Practical advice for making Social Media work for your business HINTS, TIPS A...Typeset
 
Socialmediabenchmark maerz2012
Socialmediabenchmark maerz2012Socialmediabenchmark maerz2012
Socialmediabenchmark maerz2012Hansueli Gujer
 
8 reasons you need a strategy for managing information...before it's too late
8 reasons you need a strategy for managing information...before it's too late8 reasons you need a strategy for managing information...before it's too late
8 reasons you need a strategy for managing information...before it's too lateJohn Mancini
 
The Connected Entreprise
The Connected EntrepriseThe Connected Entreprise
The Connected EntrepriseNerea
 
Women in security_ Is the tide turning_ - Print Article - SC Magazine UK
Women in security_ Is the tide turning_ - Print Article - SC Magazine UKWomen in security_ Is the tide turning_ - Print Article - SC Magazine UK
Women in security_ Is the tide turning_ - Print Article - SC Magazine UKCaroline Rivett
 

La actualidad más candente (20)

Occupy IT Manifesto
Occupy IT ManifestoOccupy IT Manifesto
Occupy IT Manifesto
 
Cloud Enterprise Programme
Cloud Enterprise ProgrammeCloud Enterprise Programme
Cloud Enterprise Programme
 
The Power of the Social Organization
The Power of the Social OrganizationThe Power of the Social Organization
The Power of the Social Organization
 
The state of corporate social media in 2011 results from the first corporat...
The state of corporate social media in 2011   results from the first corporat...The state of corporate social media in 2011   results from the first corporat...
The state of corporate social media in 2011 results from the first corporat...
 
7350_RiskWatch-Summer2015-Maligec
7350_RiskWatch-Summer2015-Maligec7350_RiskWatch-Summer2015-Maligec
7350_RiskWatch-Summer2015-Maligec
 
State of csm_2011
State of csm_2011State of csm_2011
State of csm_2011
 
IT Next February 2010 Issue
IT Next February 2010 IssueIT Next February 2010 Issue
IT Next February 2010 Issue
 
Big data and the challenge of extreme information
Big data and the challenge of extreme informationBig data and the challenge of extreme information
Big data and the challenge of extreme information
 
Enterprise 2.0 and business/IT alignment
Enterprise 2.0 and business/IT alignment Enterprise 2.0 and business/IT alignment
Enterprise 2.0 and business/IT alignment
 
Connect IT Conference 2010 Brief
Connect IT Conference 2010 BriefConnect IT Conference 2010 Brief
Connect IT Conference 2010 Brief
 
Social responsibility > Social marketing > Social media
Social responsibility > Social marketing > Social mediaSocial responsibility > Social marketing > Social media
Social responsibility > Social marketing > Social media
 
CIO Leadership on Web 2.0 and Social Media
CIO Leadership on Web 2.0 and Social MediaCIO Leadership on Web 2.0 and Social Media
CIO Leadership on Web 2.0 and Social Media
 
2 24254 ch_e-book_four_cs_of_social_media
2 24254 ch_e-book_four_cs_of_social_media2 24254 ch_e-book_four_cs_of_social_media
2 24254 ch_e-book_four_cs_of_social_media
 
Practical advice for making Social Media work for your business HINTS, TIPS A...
Practical advice for making Social Media work for your business HINTS, TIPS A...Practical advice for making Social Media work for your business HINTS, TIPS A...
Practical advice for making Social Media work for your business HINTS, TIPS A...
 
Socialmediabenchmark maerz2012
Socialmediabenchmark maerz2012Socialmediabenchmark maerz2012
Socialmediabenchmark maerz2012
 
8 reasons you need a strategy for managing information...before it's too late
8 reasons you need a strategy for managing information...before it's too late8 reasons you need a strategy for managing information...before it's too late
8 reasons you need a strategy for managing information...before it's too late
 
Adapt or Die
Adapt or DieAdapt or Die
Adapt or Die
 
Whitepaper - The connected Enterprise - Microsoft Dynamics
Whitepaper - The connected Enterprise - Microsoft DynamicsWhitepaper - The connected Enterprise - Microsoft Dynamics
Whitepaper - The connected Enterprise - Microsoft Dynamics
 
The Connected Entreprise
The Connected EntrepriseThe Connected Entreprise
The Connected Entreprise
 
Women in security_ Is the tide turning_ - Print Article - SC Magazine UK
Women in security_ Is the tide turning_ - Print Article - SC Magazine UKWomen in security_ Is the tide turning_ - Print Article - SC Magazine UK
Women in security_ Is the tide turning_ - Print Article - SC Magazine UK
 

Similar a Security essentials for CIOs - Navigating the risks and rewards of social media

Balancing Security & Authencity Final
Balancing Security & Authencity FinalBalancing Security & Authencity Final
Balancing Security & Authencity FinalCindy Kim
 
From Social Media to Social Business - Marketing in the 'Social Age'
From Social Media to Social Business - Marketing in the 'Social Age'From Social Media to Social Business - Marketing in the 'Social Age'
From Social Media to Social Business - Marketing in the 'Social Age'Stefan Pfeiffer
 
Raise The Cybersecurity Curtain! Be The Voice!
Raise The Cybersecurity Curtain! Be The Voice!Raise The Cybersecurity Curtain! Be The Voice!
Raise The Cybersecurity Curtain! Be The Voice!Ludmila Morozova-Buss
 
Socially Intelligent Business
Socially Intelligent BusinessSocially Intelligent Business
Socially Intelligent BusinessPulsar Platform
 
WEBINAR: ROI of Social Media: Myths, Truths and How to Measure
WEBINAR: ROI of Social Media: Myths, Truths and How to MeasureWEBINAR: ROI of Social Media: Myths, Truths and How to Measure
WEBINAR: ROI of Social Media: Myths, Truths and How to MeasureSalesforce Marketing Cloud
 
Time to Trade Up to A Social Business Strategy
Time to Trade Up to A Social Business StrategyTime to Trade Up to A Social Business Strategy
Time to Trade Up to A Social Business StrategyOgilvy Consulting
 
Developments affecting corporate social media strategy
Developments affecting corporate social media strategyDevelopments affecting corporate social media strategy
Developments affecting corporate social media strategyTiffany St James
 
ESR_cyberSecurity_issue-1-1 (1)
ESR_cyberSecurity_issue-1-1 (1)ESR_cyberSecurity_issue-1-1 (1)
ESR_cyberSecurity_issue-1-1 (1)Julie Bridgen
 
Securing the Digital Future
Securing the Digital FutureSecuring the Digital Future
Securing the Digital FutureCognizant
 
Futurists insights to 2025 and beyond
Futurists insights to 2025 and beyondFuturists insights to 2025 and beyond
Futurists insights to 2025 and beyondRoberto Candida
 
Playing Together: How IBM is Bringing the Outside Inside by Ben Edwards
Playing Together: How IBM is Bringing the Outside Inside by Ben EdwardsPlaying Together: How IBM is Bringing the Outside Inside by Ben Edwards
Playing Together: How IBM is Bringing the Outside Inside by Ben EdwardsEdelman Digital
 
Eloqua grande guide_social_cmo
Eloqua grande guide_social_cmoEloqua grande guide_social_cmo
Eloqua grande guide_social_cmoHeuvel Marketing
 
Understanding the Social Customer
Understanding the Social CustomerUnderstanding the Social Customer
Understanding the Social CustomerRyan Turner
 
LEVICK Weekly - Mar 8 2013
LEVICK Weekly - Mar 8 2013LEVICK Weekly - Mar 8 2013
LEVICK Weekly - Mar 8 2013LEVICK
 
Guarding the Social Gates: The Imperative for Social Media Risk Management
 Guarding the Social Gates: The Imperative for Social Media Risk Management Guarding the Social Gates: The Imperative for Social Media Risk Management
Guarding the Social Gates: The Imperative for Social Media Risk ManagementUzzi Ohana
 
[Report] Guarding the Social Gates: The Imperative for Social Media Risk Mana...
[Report] Guarding the Social Gates: The Imperative for Social Media Risk Mana...[Report] Guarding the Social Gates: The Imperative for Social Media Risk Mana...
[Report] Guarding the Social Gates: The Imperative for Social Media Risk Mana...Altimeter, a Prophet Company
 
Top Cyber News Magazine - Oct 2022
Top Cyber News Magazine - Oct 2022Top Cyber News Magazine - Oct 2022
Top Cyber News Magazine - Oct 2022Matthew Rosenquist
 
Digital Thinking Winter 2010
Digital Thinking Winter 2010Digital Thinking Winter 2010
Digital Thinking Winter 2010cplray
 
Ibm Swg Social Media Marketing Delphine Remy Boutang 3rd March
Ibm Swg Social Media Marketing Delphine Remy Boutang 3rd MarchIbm Swg Social Media Marketing Delphine Remy Boutang 3rd March
Ibm Swg Social Media Marketing Delphine Remy Boutang 3rd Marchguestca2060b
 

Similar a Security essentials for CIOs - Navigating the risks and rewards of social media (20)

Balancing Security & Authencity Final
Balancing Security & Authencity FinalBalancing Security & Authencity Final
Balancing Security & Authencity Final
 
From Social Media to Social Business - Marketing in the 'Social Age'
From Social Media to Social Business - Marketing in the 'Social Age'From Social Media to Social Business - Marketing in the 'Social Age'
From Social Media to Social Business - Marketing in the 'Social Age'
 
observe_issue_3
observe_issue_3observe_issue_3
observe_issue_3
 
Raise The Cybersecurity Curtain! Be The Voice!
Raise The Cybersecurity Curtain! Be The Voice!Raise The Cybersecurity Curtain! Be The Voice!
Raise The Cybersecurity Curtain! Be The Voice!
 
Socially Intelligent Business
Socially Intelligent BusinessSocially Intelligent Business
Socially Intelligent Business
 
WEBINAR: ROI of Social Media: Myths, Truths and How to Measure
WEBINAR: ROI of Social Media: Myths, Truths and How to MeasureWEBINAR: ROI of Social Media: Myths, Truths and How to Measure
WEBINAR: ROI of Social Media: Myths, Truths and How to Measure
 
Time to Trade Up to A Social Business Strategy
Time to Trade Up to A Social Business StrategyTime to Trade Up to A Social Business Strategy
Time to Trade Up to A Social Business Strategy
 
Developments affecting corporate social media strategy
Developments affecting corporate social media strategyDevelopments affecting corporate social media strategy
Developments affecting corporate social media strategy
 
ESR_cyberSecurity_issue-1-1 (1)
ESR_cyberSecurity_issue-1-1 (1)ESR_cyberSecurity_issue-1-1 (1)
ESR_cyberSecurity_issue-1-1 (1)
 
Securing the Digital Future
Securing the Digital FutureSecuring the Digital Future
Securing the Digital Future
 
Futurists insights to 2025 and beyond
Futurists insights to 2025 and beyondFuturists insights to 2025 and beyond
Futurists insights to 2025 and beyond
 
Playing Together: How IBM is Bringing the Outside Inside by Ben Edwards
Playing Together: How IBM is Bringing the Outside Inside by Ben EdwardsPlaying Together: How IBM is Bringing the Outside Inside by Ben Edwards
Playing Together: How IBM is Bringing the Outside Inside by Ben Edwards
 
Eloqua grande guide_social_cmo
Eloqua grande guide_social_cmoEloqua grande guide_social_cmo
Eloqua grande guide_social_cmo
 
Understanding the Social Customer
Understanding the Social CustomerUnderstanding the Social Customer
Understanding the Social Customer
 
LEVICK Weekly - Mar 8 2013
LEVICK Weekly - Mar 8 2013LEVICK Weekly - Mar 8 2013
LEVICK Weekly - Mar 8 2013
 
Guarding the Social Gates: The Imperative for Social Media Risk Management
 Guarding the Social Gates: The Imperative for Social Media Risk Management Guarding the Social Gates: The Imperative for Social Media Risk Management
Guarding the Social Gates: The Imperative for Social Media Risk Management
 
[Report] Guarding the Social Gates: The Imperative for Social Media Risk Mana...
[Report] Guarding the Social Gates: The Imperative for Social Media Risk Mana...[Report] Guarding the Social Gates: The Imperative for Social Media Risk Mana...
[Report] Guarding the Social Gates: The Imperative for Social Media Risk Mana...
 
Top Cyber News Magazine - Oct 2022
Top Cyber News Magazine - Oct 2022Top Cyber News Magazine - Oct 2022
Top Cyber News Magazine - Oct 2022
 
Digital Thinking Winter 2010
Digital Thinking Winter 2010Digital Thinking Winter 2010
Digital Thinking Winter 2010
 
Ibm Swg Social Media Marketing Delphine Remy Boutang 3rd March
Ibm Swg Social Media Marketing Delphine Remy Boutang 3rd MarchIbm Swg Social Media Marketing Delphine Remy Boutang 3rd March
Ibm Swg Social Media Marketing Delphine Remy Boutang 3rd March
 

Último

Famous Olympic Siblings from the 21st Century
Famous Olympic Siblings from the 21st CenturyFamous Olympic Siblings from the 21st Century
Famous Olympic Siblings from the 21st Centuryrwgiffor
 
A DAY IN THE LIFE OF A SALESMAN / WOMAN
A DAY IN THE LIFE OF A  SALESMAN / WOMANA DAY IN THE LIFE OF A  SALESMAN / WOMAN
A DAY IN THE LIFE OF A SALESMAN / WOMANIlamathiKannappan
 
Regression analysis: Simple Linear Regression Multiple Linear Regression
Regression analysis:  Simple Linear Regression Multiple Linear RegressionRegression analysis:  Simple Linear Regression Multiple Linear Regression
Regression analysis: Simple Linear Regression Multiple Linear RegressionRavindra Nath Shukla
 
Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...
Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...
Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...Dipal Arora
 
Ensure the security of your HCL environment by applying the Zero Trust princi...
Ensure the security of your HCL environment by applying the Zero Trust princi...Ensure the security of your HCL environment by applying the Zero Trust princi...
Ensure the security of your HCL environment by applying the Zero Trust princi...Roland Driesen
 
VIP Call Girls In Saharaganj ( Lucknow ) 🔝 8923113531 🔝 Cash Payment (COD) 👒
VIP Call Girls In Saharaganj ( Lucknow  ) 🔝 8923113531 🔝  Cash Payment (COD) 👒VIP Call Girls In Saharaganj ( Lucknow  ) 🔝 8923113531 🔝  Cash Payment (COD) 👒
VIP Call Girls In Saharaganj ( Lucknow ) 🔝 8923113531 🔝 Cash Payment (COD) 👒anilsa9823
 
How to Get Started in Social Media for Art League City
How to Get Started in Social Media for Art League CityHow to Get Started in Social Media for Art League City
How to Get Started in Social Media for Art League CityEric T. Tung
 
Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...
Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...
Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...lizamodels9
 
Monte Carlo simulation : Simulation using MCSM
Monte Carlo simulation : Simulation using MCSMMonte Carlo simulation : Simulation using MCSM
Monte Carlo simulation : Simulation using MCSMRavindra Nath Shukla
 
John Halpern sued for sexual assault.pdf
John Halpern sued for sexual assault.pdfJohn Halpern sued for sexual assault.pdf
John Halpern sued for sexual assault.pdfAmzadHosen3
 
FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756dollysharma2066
 
Boost the utilization of your HCL environment by reevaluating use cases and f...
Boost the utilization of your HCL environment by reevaluating use cases and f...Boost the utilization of your HCL environment by reevaluating use cases and f...
Boost the utilization of your HCL environment by reevaluating use cases and f...Roland Driesen
 
Russian Call Girls In Gurgaon ❤️8448577510 ⊹Best Escorts Service In 24/7 Delh...
Russian Call Girls In Gurgaon ❤️8448577510 ⊹Best Escorts Service In 24/7 Delh...Russian Call Girls In Gurgaon ❤️8448577510 ⊹Best Escorts Service In 24/7 Delh...
Russian Call Girls In Gurgaon ❤️8448577510 ⊹Best Escorts Service In 24/7 Delh...lizamodels9
 
KYC-Verified Accounts: Helping Companies Handle Challenging Regulatory Enviro...
KYC-Verified Accounts: Helping Companies Handle Challenging Regulatory Enviro...KYC-Verified Accounts: Helping Companies Handle Challenging Regulatory Enviro...
KYC-Verified Accounts: Helping Companies Handle Challenging Regulatory Enviro...Any kyc Account
 
Insurers' journeys to build a mastery in the IoT usage
Insurers' journeys to build a mastery in the IoT usageInsurers' journeys to build a mastery in the IoT usage
Insurers' journeys to build a mastery in the IoT usageMatteo Carbone
 
Call Girls Pune Just Call 9907093804 Top Class Call Girl Service Available
Call Girls Pune Just Call 9907093804 Top Class Call Girl Service AvailableCall Girls Pune Just Call 9907093804 Top Class Call Girl Service Available
Call Girls Pune Just Call 9907093804 Top Class Call Girl Service AvailableDipal Arora
 
B.COM Unit – 4 ( CORPORATE SOCIAL RESPONSIBILITY ( CSR ).pptx
B.COM Unit – 4 ( CORPORATE SOCIAL RESPONSIBILITY ( CSR ).pptxB.COM Unit – 4 ( CORPORATE SOCIAL RESPONSIBILITY ( CSR ).pptx
B.COM Unit – 4 ( CORPORATE SOCIAL RESPONSIBILITY ( CSR ).pptxpriyanshujha201
 
Cracking the Cultural Competence Code.pptx
Cracking the Cultural Competence Code.pptxCracking the Cultural Competence Code.pptx
Cracking the Cultural Competence Code.pptxWorkforce Group
 
HONOR Veterans Event Keynote by Michael Hawkins
HONOR Veterans Event Keynote by Michael HawkinsHONOR Veterans Event Keynote by Michael Hawkins
HONOR Veterans Event Keynote by Michael HawkinsMichael W. Hawkins
 

Último (20)

Famous Olympic Siblings from the 21st Century
Famous Olympic Siblings from the 21st CenturyFamous Olympic Siblings from the 21st Century
Famous Olympic Siblings from the 21st Century
 
A DAY IN THE LIFE OF A SALESMAN / WOMAN
A DAY IN THE LIFE OF A  SALESMAN / WOMANA DAY IN THE LIFE OF A  SALESMAN / WOMAN
A DAY IN THE LIFE OF A SALESMAN / WOMAN
 
Regression analysis: Simple Linear Regression Multiple Linear Regression
Regression analysis:  Simple Linear Regression Multiple Linear RegressionRegression analysis:  Simple Linear Regression Multiple Linear Regression
Regression analysis: Simple Linear Regression Multiple Linear Regression
 
Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...
Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...
Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...
 
Ensure the security of your HCL environment by applying the Zero Trust princi...
Ensure the security of your HCL environment by applying the Zero Trust princi...Ensure the security of your HCL environment by applying the Zero Trust princi...
Ensure the security of your HCL environment by applying the Zero Trust princi...
 
VIP Call Girls In Saharaganj ( Lucknow ) 🔝 8923113531 🔝 Cash Payment (COD) 👒
VIP Call Girls In Saharaganj ( Lucknow  ) 🔝 8923113531 🔝  Cash Payment (COD) 👒VIP Call Girls In Saharaganj ( Lucknow  ) 🔝 8923113531 🔝  Cash Payment (COD) 👒
VIP Call Girls In Saharaganj ( Lucknow ) 🔝 8923113531 🔝 Cash Payment (COD) 👒
 
How to Get Started in Social Media for Art League City
How to Get Started in Social Media for Art League CityHow to Get Started in Social Media for Art League City
How to Get Started in Social Media for Art League City
 
Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...
Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...
Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...
 
Monte Carlo simulation : Simulation using MCSM
Monte Carlo simulation : Simulation using MCSMMonte Carlo simulation : Simulation using MCSM
Monte Carlo simulation : Simulation using MCSM
 
John Halpern sued for sexual assault.pdf
John Halpern sued for sexual assault.pdfJohn Halpern sued for sexual assault.pdf
John Halpern sued for sexual assault.pdf
 
FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756
 
Boost the utilization of your HCL environment by reevaluating use cases and f...
Boost the utilization of your HCL environment by reevaluating use cases and f...Boost the utilization of your HCL environment by reevaluating use cases and f...
Boost the utilization of your HCL environment by reevaluating use cases and f...
 
Russian Call Girls In Gurgaon ❤️8448577510 ⊹Best Escorts Service In 24/7 Delh...
Russian Call Girls In Gurgaon ❤️8448577510 ⊹Best Escorts Service In 24/7 Delh...Russian Call Girls In Gurgaon ❤️8448577510 ⊹Best Escorts Service In 24/7 Delh...
Russian Call Girls In Gurgaon ❤️8448577510 ⊹Best Escorts Service In 24/7 Delh...
 
KYC-Verified Accounts: Helping Companies Handle Challenging Regulatory Enviro...
KYC-Verified Accounts: Helping Companies Handle Challenging Regulatory Enviro...KYC-Verified Accounts: Helping Companies Handle Challenging Regulatory Enviro...
KYC-Verified Accounts: Helping Companies Handle Challenging Regulatory Enviro...
 
Insurers' journeys to build a mastery in the IoT usage
Insurers' journeys to build a mastery in the IoT usageInsurers' journeys to build a mastery in the IoT usage
Insurers' journeys to build a mastery in the IoT usage
 
VVVIP Call Girls In Greater Kailash ➡️ Delhi ➡️ 9999965857 🚀 No Advance 24HRS...
VVVIP Call Girls In Greater Kailash ➡️ Delhi ➡️ 9999965857 🚀 No Advance 24HRS...VVVIP Call Girls In Greater Kailash ➡️ Delhi ➡️ 9999965857 🚀 No Advance 24HRS...
VVVIP Call Girls In Greater Kailash ➡️ Delhi ➡️ 9999965857 🚀 No Advance 24HRS...
 
Call Girls Pune Just Call 9907093804 Top Class Call Girl Service Available
Call Girls Pune Just Call 9907093804 Top Class Call Girl Service AvailableCall Girls Pune Just Call 9907093804 Top Class Call Girl Service Available
Call Girls Pune Just Call 9907093804 Top Class Call Girl Service Available
 
B.COM Unit – 4 ( CORPORATE SOCIAL RESPONSIBILITY ( CSR ).pptx
B.COM Unit – 4 ( CORPORATE SOCIAL RESPONSIBILITY ( CSR ).pptxB.COM Unit – 4 ( CORPORATE SOCIAL RESPONSIBILITY ( CSR ).pptx
B.COM Unit – 4 ( CORPORATE SOCIAL RESPONSIBILITY ( CSR ).pptx
 
Cracking the Cultural Competence Code.pptx
Cracking the Cultural Competence Code.pptxCracking the Cultural Competence Code.pptx
Cracking the Cultural Competence Code.pptx
 
HONOR Veterans Event Keynote by Michael Hawkins
HONOR Veterans Event Keynote by Michael HawkinsHONOR Veterans Event Keynote by Michael Hawkins
HONOR Veterans Event Keynote by Michael Hawkins
 

Security essentials for CIOs - Navigating the risks and rewards of social media

  • 1. IBM Center for Applied Insights Executive Series Security Essentials for CIOs Navigating the risks and rewards of social media Imagine an immense tradeshow floor filled with all of your clients. It’s also teeming with your most promising prospects, Highlights: along with thousands of talented potential hires. There’s no better place for you to showcase your offerings, your smarts, Today, there are over 280,000 IBMers on and what sets you apart. Naturally, your rivals are there too, LinkedIn, over 170,000 people on Facebook with IBM listed as their workplace, and angling for clients, brainpower and ideas. So there’s plenty an estimated 30,000 IBMers engaging on of competitive pressure to attend. But, regrettably, there’s a Twitter each month. Done the right way, downside. Growing numbers of thieves, industrial spies and social media can pay off both for individuals and the enterprise. other ne’er-do-wells are circulating the same halls. As is so often the case, opportunity comes with its share of risk. This non-stop global conference, of course, is social media. At IBM, we feel that these digital gatherings provide near limitless opportunity for our employees to make connections, exchange ideas, and innovate. For us, engaging in social media, inside and outside of the company, is a strategic imperative. So is security. We believe the solution is to create a risk-aware culture — one that acknowledges both the value and the risks associated with the digital world. It is important that we engage digitally in a smart and secure way. Just a few years ago, many companies saw social computing as an outcropping on the periphery of their businesses. Since then, social networks have exploded, with hundreds of millions of people trading ideas and leads, from work, home and on the move. This growth has created enormous value, for everything from recruiting staff to customer service. In a recent Ponemon Institute survey, nearly 70 percent of global respondents said that social media is now very important for achieving their business objectives.1
  • 2. Executive Series Security Intelligence However, there is still a long way to go between seeing the value Analyze the risks and actively engaging. In IBM’s latest CEO Survey of 1709 The next step is an analysis of the risks inherent in each of CEOs around the world, only 16 percent of them are currently these initiatives. ISACA has defined five primary social media participating in social business platforms to connect with risks for business.3 They range from the increased threat customers. Within five years, that will likely grow to of viruses and malware to brand hijacking and lack of content 57 percent.2 Outperformers in the survey were more likely control to changing customer expectations to increasing to identify openness, often characterized by a greater use the chances of non-compliance. of social media, as a key influence on their organization. One growing trend is for criminals to harvest personal This growth and attention has created new opportunities for information from social networks, and then to use it to craft thieves and hackers, and many enterprises are unsure what to personalized phishing attacks. If successful, these can deliver do about it. In the Ponemon study, 63 percent of respondents malware, which can quietly steal information, shut down said that social media puts their organization at risk and vital operations, or even carry out sabotage. is a serious security threat. The risk is recognized, but only 29 percent admitted to having the necessary security controls There are not only external risks, but also risks from employees to mitigate that threat. There is still a long way to go. as well. What if company secrets are exposed via social media? What would happen to the firm’s reputation if negative photos of employees made their way onto Flickr? What to do if an ugly Nearly 70% and false rumor goes viral on Twitter or if a colleague appears to be spilling details from yesterday’s meeting on Facebook? of global respondents said that social These risks may be common across enterprises, but the way in which organizations respond will likely be unique to their media is now very important for corporate culture. The important element is to raise these achieving their business objectives.1 early on in the process, and build appropriate response plans. Source: Ponemon Institute Create and communicate your policy The third step of the process is crucial. It involves communicating Because of this growth, in both opportunity and risk, the opportunities and risks of the digital world, and providing we feel it’s important to share our ideas on how to help policies, awareness programs and tools to guide the entire work build a risk-aware culture for the social world. force. For this, ongoing education and guidance must be built into the fabric of the enterprise’s social media strategy. Define your social agenda The first step for every enterprise is to determine where it fits At IBM, we began these efforts with our own Intranet. In in the social sphere, and what it might gain from social media. 2005, IBMers were using an in-house social network known Ideally, top executives from every division will meet to explore as Connections to exchange everything from algorithms the possible benefits. Core questions include: Will participation to chili recipes. Then, external blogs and social networks boost brand awareness? Can it improve customer satisfaction? began to take off, and IBM considered the opportunities and Could we use social media to drive collaboration or crowdsourcing challenges of engaging far beyond the corporate firewall. for product innovation? Discussions must also extend to Collaborating on a wiki, IBM employees drew up our Social the costs of not engaging. Will the company be hamstrung Computing Guidelines. This initial effort was a starting point in responding to public relations issues if it lacks a well-known and we’ve been evolving it ever since. Twitter account or Facebook page? Will it be at a disadvantage finding and communicating with good recruits if it doesn’t Today, there are over 280,000 IBMers on LinkedIn, over 170,000 use social media? people on Facebook with IBM listed as their workplace, and an estimated 30,000 IBMers engaging on Twitter each month. Each enterprise will come up with its own answers. Some Done the right way, social media can pay off both for individuals may conclude that certain functions, perhaps HR, Sales, and the enterprise. By participating, our employees build what and Marketing need to be active on social networks while other functions require a smaller presence or none at all. 2
  • 3. Executive Series Security Intelligence Social Computing Tips • espect others’ rights. You should respect the rights of R others, including their privacy and intellectual property rights. for Employees • Be careful with connections. Your employees might Like many of today’s emerging technologies, social receive connection requests from those who are hunting computing puts employees in the driver’s seat—essentially for private company information so remind them that it’s making them your brand ambassadors. You might want good to be choosy when considering who to connect with. to consider the following tips as you empower your employees to effectively navigate the risks and reap • ead the fine print. Social networks have terms of use R the rewards of social platforms: and privacy policies, and you and your employees should review these closely to confirm that you can live with those • Be authentic. Encourage employees to identify their terms and policies. Also, social networks may change employer in their profiles, but provide a disclaimer that their terms and policies over time, so you should regularly their opinions remain their own. check them for changes before connecting. • hink before posting. Content and context go hand-in-hand. T • dmit mistakes. Things move faster than ever in social A Confidential or private information isn’t ever appropriate media, and employee mistakes are likely to happen. to share in a public context. For example, a tweet about A culture where employees are encouraged to admit and a recently released whitepaper would be fine, but a tweet quickly correct mistakes can help to avoid any fallout about confidential company financials would not be. from the inevitable social media faux pas. we call Digital Eminence, a reputation for sharing experience Join the conversation and ideas that can boost their professional persona as well as the To read additional articles, learn more about Security Essentials company’s prestige, while drawing people and business to IBM. for CIOs, or share your thoughts with other security leaders join us at ibm.com/smarter/cai/security. Monitor security and measure progress One word of warning, enterprises must be extremely careful About the author to balance privacy issues and security when it comes to social Kristin Lovejoy is Vice President of IT Risk, Office of the CIO, media use. Gartner recently reported that by 2015, 60 percent IBM. She can be contacted at klovejoy@us.ibm.com. of enterprises are expected to actively monitor employee’s social media use for potential security breaches.4 It’s important About IBM Center for Applied Insights to maintain a secure environment, but companies should The IBM Center for Applied Insights (ibm.com/smarter/cai/value) also consider doing so in a way that is sensitive to privacy and introduces new ways of thinking, working and leading. Through other concerns. evidence-based research, the Center arms leaders with pragmatic guidance and the case for change. Once an enterprise delves into social media, it is useful to measure various efforts and to gauge their effectiveness. 1 P onemon Institute, “Global Survey on Social Media Risks: Survey of IT IT If human resource professionals are using social networks for Security Practitioners”, September 2011 2 2 012 IBM CEO Study, “Leading Through Connections”, recruiting, how do the talent pool and pipeline match up http://www-935.ibm.com/services/us/en/c-suite/ceostudy2012/ before and after? If developers are collaborating through social 3 I SACA, “Social Media: Business Benefits and Security, Governance and Assurance Perspectives”, June 2010, http://www.isaca.org/Knowledge-Center/ media, how much more quickly are products and services Research/ResearchDeliverables/Pages/Social-Media-Business-Benefits-and- getting to market? With the development of new tools and Security-Governance-and-Assurance-Perspectives.aspx 4 “Gartner Predicts Huge Rise in Monitoring of Employees’ Social Media Use”, constant flows of data, social media is an ongoing laboratory. PC World, 29 May 2012, http://www.pcworld.com/businesscenter/article/256420/ The learning never ends. gartner_predicts_huge_rise_in_monitoring_of_employees_social_media_use.html 3
  • 4. Executive Series Security Intelligence © Copyright IBM Corporation 2012 IBM Global Services Route 100 Somers, NY 10589 U.S.A. Produced in the United States of America June 2012 All Rights Reserved IBM, the IBM logo and ibm.com are trademarks or registered trademarks of International Business Machines Corporation in the United States, other countries, or both. If these and other IBM trademarked terms are marked on their first occurrence in this information with a trademark symbol (® or ™), these symbols indicate U.S. registered or common law trademarks owned by IBM at the time this information was published. Such trademarks may also be registered or common law trademarks in other countries. A current list of IBM trademarks is available on the Web at “Copyright and trademark information” at ibm.com/legal/copytrade.shtml Other company, product and service names may be trademarks or service marks of others. References in this publication to IBM products and services do not imply that IBM intends to make them available in all countries in which IBM operates. Please Recycle WGW03006USEN-00