SlideShare una empresa de Scribd logo
1 de 49
Descargar para leer sin conexión
Social networks and security –
     can you have both?
   Ben Rothke, CISSP, CISM CISA
          Session SE-31
           May 12, 2011
            @benrothke
About me
• Ben Rothke, CISSP, CISM, CISA
• Senior Security Consultant – British Telecom
• Frequent writer and speaker
• Author - Computer Security: 20 Things Every
  Employee Should Know (McGraw-Hill)
• Write the Security Reading Room blog
    – https://365.rsaconference.com/blogs/securityreading
Agenda
• Overview of social networks
• Scary security risks associated with social
  networks
• Social network security strategies
• Conclusion / Recommendations / Q/A
Security risks can’t be ignored
Twitter – corporate, mainstream
Facebook – corporate, mainstream
Business benefits
• enhanced collaboration
• faster access to information within the
  company
• ability to get questions answered
• shared workspaces
• microblogs and chat
• platform applications
Social networking reality
….is now social networking

• Your mission
  – find 20 design engineers based in the US at Boeing
  – build a rapport with them to get designs for new 737 derivative

• Time / Budget / Success
  – 1990 – Many people, many months, limited success, very
    expensive
  – 2011 – One person, multiple Facebook accounts, can outsource to
    India, near immediate results, extremely high success rate

• Facebook - easy to find out who they are
  – who their friends are
  – what they like, where they shop, daily habits, friends
• To block or not to block?
  – no longer the question
• Social media isn’t a choice anymore – it’s
  a business transformation tool
  – Natalie Petouhoff – Weber Shandwick
• Business and information security goal
  – Secure use and enablement of social
    media
Reasons not to block
• Don’t blame the game, blame the player
• Smart companies control, not block
  – Staff can use social media and be productive
• No longer a 9-5 world
• Lose the benefits of social media
• Abusers don’t suddenly become productive
   – Social media abuse - HR issue.
   – Not a technical issue
New security ideas required
• Easy security tasks
  – Block all outbound ftp traffic
  – Use DLP to encrypt sensitive -mails
  – Block admission to network if host AV signatures are
    not current
  – Use SIEM to correlate all logs
• Challenging security task
  – Stop end-users from inappropriate sharing of
    confidential/proprietary data via social networks
Resistance is futile
• Social networks are not a fad
• Not only is resistance futile - it is a
  negative business decision
• Prepare a social networking strategy
• Have a realistic understanding of the
  risks and benefits of social software
• Understand unique challenges and factor
  them into on when and how to proceed
Try stopping this…
Security game-changer
• Organizations and management are
  struggling
  – to understand and deal with the numerous security
    and privacy risks associated with social networks
• Traditional information security
  – firewalls and access control protected the perimeter.
    Social networks open up that perimeter
• Focus shift
  – from infrastructure protection to data protection
Security issues
• People will share huge amounts of highly
  confidential personal & business information
  with people they perceive to be legitimate
• Numerous legitimate security risks with
  allowing uncontrolled access to social sites
• But…these risks can be mitigated via a
  comprehensive security strategy
Security and privacy risks
• Malware
  – Social networks as a malware distribution point
• Vulnerabilities
  – cross site scripting, cross site request forgery
  – 1 in 5 web attacks aimed at social networks
• Corporate espionage
• Phishing / spear phishing
• Bandwidth consumption
More security and privacy risks
• Information leakage
• Social engineering attacks
• Geotagging / location-based social
  networking
  – allows random people to track an individual’s
    location and correlate it with other information
  – publishing business photos can be detrimental to
    business
  – Content-based Image Retrieval (CBIR)
Cree.py is just the beginning
Infosec losing on social media?
• Requires a combination of technical,
  behavioral and organizational security
  controls
  – many information security groups clueless on
    how to do that
• Arguing that social media presents a
  highly unmanageable set of security risks
  – gives the impression that the infosec group is
    incompetent
Strategies and action items
for enterprises to deal with
  the security and privacy
  risks of social networks
Secure use of social media
1. Enablement
  – Awareness, education
2. Governance
  – Corporate social media strategy
  – Realistic policies
3. Management
  – Effective monitoring
Get in front of the wave
• Be proactive
  – dedicated team to deal with social networks
  – identify all issues around social networks
• Get involved and be engaged
• Social networking is moving fast
• Be flexible
  – overall uncertainty about what strategies and
    tactics to adopt to security social media
Risk assessment
• for each social network community
  – vulnerabilities associated with each
    community
• each social community has its own set of
  unique security and privacy concerns
• which users are the greatest risk?
Risk assessment
• output will be used to create the social
  media policy and strategy
  – customized to your specific risk matrix
• balance risks vs. benefits
  – US Marines – totally prohibited
  – Starbucks – totally embraced
Social network risk assessment
• LinkedIn analysis – you can determine:
    •   what technologies a company is using
    •   corporate direction
    •   vendors
    •   partners
    •   internal e-mail addresses and address formats
• Facebook analysis – you can determine:
    • almost everything
Social media strategy
• Based on your social media goals
• Identify people or positions who will be the
  online public face of the firm
• Decide if/how employees may identify
  themselves
• Twitter strategy for Government
  Departments
  – http://digitalengagement.cabinetoffice.gov.uk/blog
Social media strategy
• Draconian policies preventing the use of
  social media will most often not be
  effective
• Use a balanced approach
  – allow access
  – manage risk via technical controls, policies
    and employee training
Blurred role boundaries
• who speaks for the company
• border between the company and the
  outside world is evaporating
• management decision, not an IT decision
• strategies: block, contain, disregard,
  embrace
• create user scenarios
  – not all users need access
Social networking policy
• Social networking policy is a must
  – even if it prohibits everything, you still need a policy
• Employees will do stupid things
• Rational, sensible use of social media
  services
  – include photography and video
  – don’t reference clients, customers, or partners
    without obtaining their express permission
Monitoring
• Maintain control over content company
  owns
  – monitor employee social networking participation
  – significant risk of loss of IP protection if not
    monitored
  – inappropriate use of enterprise content occurred?
     • notify employee - explain how their actions violated
       policy
  – control where and how corporate content is
    shared externally
Security awareness
• Social media is driven by social interactions
• Most significant risks are tied to the behavior of
  staff when they are using social software
• Don'shun social media for fear of bad end-
        t
  user behavior
  – Anticipate it and formulate a multilevel approach to
    policies for effective governance
• 3 C’s
  – clear, comprehensive, continuous
Security awareness
• Awareness and training program is critical
  – effectively communicated and customized
  – disseminate to everyone
  – ensure recurrent training
  – create topic taboo lists
  – define expectations of privacy
How to get fired in 3 tweets….
• Let employees know they can lose their job
  – policy violation
  – managers and executives - special responsibility
    when blogging by virtue of their position
  – too much time on social network sites
  – perception that they are promoting themselves at
    the expense of the company
  – especially if employer is not into social networking
End-user awareness
• Curb your enthusiasm
  – those with OCD/addictive personalities – be
    cognizant of addictive nature of social networking
  – what is fun today is embarrassing tomorrow
  – expect that entire world will see your comments
  – consider carefully which images, videos and
    information you publish
  – set daily time limits on social media
Awareness 101
• Ensure staff know about and are
  compliant with social media guidelines
  – post something corporate, ensure that it is
    public information
  – be careful about posting customer
    information, even if it is public
Awareness 101
• Ensure staff know about and are
  compliant with social media guidelines
  – breach of insider information can cost you your job
  – know the rules of using social networking sites
    while at work
  – take extra care if you friend your boss on Facebook
  – Facebook is viral and addictive – don’t waste the
    workday on it
Social media guidelines
• Without guidelines, breaches are inevitable
• Excellent sources:
  – Intel Social Media Guidelines
  – IBM Social Computing Guidelines
  – Oracle Social Media Participation Policy
     • Policies much have directives for blogs, wikis, social networks,
       virtual worlds, social media and more.
Regulatory compliance
• Regulatory framework should be reviewed
  and where necessary, revised
• Consider what specific laws, regulations,
  standards, breach notice laws apply
Reputation management
• Traditional PR and legal responses to an
  Internet-based negative reputation event can
  cause more damage than doing nothing
• establish, follow and update protocols can
  make social-media chaos less risky to
  enterprises
• Infosec coordinate activities with PR teams
  – expand monitoring and supplement monitoring with
    investigations and evidence collection processes
Reputation management
Reputation management
• Goal is to build and protect a positive
  Internet-based reputation
• Risks to reputation are significant and
  growing with the increased use of social
  networks
• Create reputation management group with
  input from IT, legal, risk management, PR
  and marketing
Reputation management
• Coordinated approach
  – proactive / responsive
HR must be involved
• Social networks open up a huge can of HR
  worms
• What are disciplinary actions for non-
  compliance?
• Can candidate’s social network presence
  be a factor in hiring process?
• Create directives for managing personal
  and professional time
HR must be involved
• Don’t be seen as encroaching on
  employees’ free speech
• Create reasonable guidelines
• Explain how innocent postings can be
  misconstrued
• heavy-handed approach will often backfire
  and result in lower morale and often bad
  publicity
HR & FCRA
• Via Facebook, you can know way too
  much about a candidate:
  – race, orientation, religion, politics, health, etc.
  – such information can be used to show bias
     • EEOC and expensive litigation
References
• Clearswift Security Awareness Research
• New Media and the Air Force
• ENISA position papers
  – Security Issues and Recommendations for Online
    Social Networks
  – Online as Soon as it Happens
• Parents’ Guide to Facebook
Conclusion
• Social networks introduce security risks
  – social networks & security can be compatible
• Perform a comprehensive risk assessment
  against all social networks to be used
• Understand business & technical
  requirements
• Recognize these security and privacy risks
  and take a formal approach to mitigate them
Contact info
•   Ben Rothke, CISSP CISA
•   Senior Security Consultant
•   BT Professional Services
•   @benrothke
• www.linkedin.com/in/benrothke
• www.twitter.com/benrothke
• www.slideshare.net/benrothke

Más contenido relacionado

La actualidad más candente

Information Security Awareness And Training Business Case For Web Based Solut...
Information Security Awareness And Training Business Case For Web Based Solut...Information Security Awareness And Training Business Case For Web Based Solut...
Information Security Awareness And Training Business Case For Web Based Solut...Michael Kaishar, MSIA | CISSP
 
Sivasubramanian Risk Management In The Web 2.0 Environment
Sivasubramanian Risk  Management In The  Web 2.0  EnvironmentSivasubramanian Risk  Management In The  Web 2.0  Environment
Sivasubramanian Risk Management In The Web 2.0 EnvironmentVinoth Sivasubramanan
 
Cyber security awareness booklet for citizens from mahashtra cyber 10 jan2020
Cyber security awareness booklet for citizens from mahashtra cyber  10 jan2020Cyber security awareness booklet for citizens from mahashtra cyber  10 jan2020
Cyber security awareness booklet for citizens from mahashtra cyber 10 jan2020Rahul Boga
 
Five things I learned about information security
Five things I learned about information securityFive things I learned about information security
Five things I learned about information securityMajor Hayden
 
Information security awareness (sept 2012) bis handout
Information security awareness (sept 2012) bis handoutInformation security awareness (sept 2012) bis handout
Information security awareness (sept 2012) bis handoutMarc Vael
 
Employee Awareness in Cyber Security - Kloudlearn
Employee Awareness in Cyber Security - KloudlearnEmployee Awareness in Cyber Security - Kloudlearn
Employee Awareness in Cyber Security - KloudlearnKloudLearn
 
The challenge of security awareness
The challenge of security awarenessThe challenge of security awareness
The challenge of security awarenessJisc
 
Social Media Security
Social Media SecuritySocial Media Security
Social Media SecurityDel Belcher
 
Information Security Awareness for everyone
Information Security Awareness for everyoneInformation Security Awareness for everyone
Information Security Awareness for everyoneYasir Nafees
 
Information security
Information securityInformation security
Information securityOnkar Sule
 
Cybersecurity tips for employees
Cybersecurity tips for employeesCybersecurity tips for employees
Cybersecurity tips for employeesPriscila Bernardes
 
Information Security Awareness
Information Security Awareness Information Security Awareness
Information Security Awareness Net at Work
 
Strengthening the Weakest Link - Reducing Risks from Social Engineering Attacks
Strengthening the Weakest Link - Reducing Risks from Social Engineering AttacksStrengthening the Weakest Link - Reducing Risks from Social Engineering Attacks
Strengthening the Weakest Link - Reducing Risks from Social Engineering AttacksFitCEO, Inc. (FCI)
 
The Cyber Security Training Gap: Rotarian Reach
The Cyber Security Training Gap: Rotarian ReachThe Cyber Security Training Gap: Rotarian Reach
The Cyber Security Training Gap: Rotarian ReachRotary International
 
How children's fingerprints on the web could mean the end of PII Authenticati...
How children's fingerprints on the web could mean the end of PII Authenticati...How children's fingerprints on the web could mean the end of PII Authenticati...
How children's fingerprints on the web could mean the end of PII Authenticati...Jisc
 
Cyberwar Gets Personal
Cyberwar Gets PersonalCyberwar Gets Personal
Cyberwar Gets PersonalNicholas Davis
 
Cybersecurity Powerpoint Presentation Slides
Cybersecurity Powerpoint Presentation SlidesCybersecurity Powerpoint Presentation Slides
Cybersecurity Powerpoint Presentation SlidesSlideTeam
 

La actualidad más candente (20)

Information Security Awareness And Training Business Case For Web Based Solut...
Information Security Awareness And Training Business Case For Web Based Solut...Information Security Awareness And Training Business Case For Web Based Solut...
Information Security Awareness And Training Business Case For Web Based Solut...
 
Sivasubramanian Risk Management In The Web 2.0 Environment
Sivasubramanian Risk  Management In The  Web 2.0  EnvironmentSivasubramanian Risk  Management In The  Web 2.0  Environment
Sivasubramanian Risk Management In The Web 2.0 Environment
 
Cyber security awareness booklet for citizens from mahashtra cyber 10 jan2020
Cyber security awareness booklet for citizens from mahashtra cyber  10 jan2020Cyber security awareness booklet for citizens from mahashtra cyber  10 jan2020
Cyber security awareness booklet for citizens from mahashtra cyber 10 jan2020
 
End-User Security Awareness
End-User Security AwarenessEnd-User Security Awareness
End-User Security Awareness
 
Five things I learned about information security
Five things I learned about information securityFive things I learned about information security
Five things I learned about information security
 
Information security awareness (sept 2012) bis handout
Information security awareness (sept 2012) bis handoutInformation security awareness (sept 2012) bis handout
Information security awareness (sept 2012) bis handout
 
Employee Awareness in Cyber Security - Kloudlearn
Employee Awareness in Cyber Security - KloudlearnEmployee Awareness in Cyber Security - Kloudlearn
Employee Awareness in Cyber Security - Kloudlearn
 
The challenge of security awareness
The challenge of security awarenessThe challenge of security awareness
The challenge of security awareness
 
information security awareness course
information security awareness courseinformation security awareness course
information security awareness course
 
Employee Security Awareness Program
Employee Security Awareness ProgramEmployee Security Awareness Program
Employee Security Awareness Program
 
Social Media Security
Social Media SecuritySocial Media Security
Social Media Security
 
Information Security Awareness for everyone
Information Security Awareness for everyoneInformation Security Awareness for everyone
Information Security Awareness for everyone
 
Information security
Information securityInformation security
Information security
 
Cybersecurity tips for employees
Cybersecurity tips for employeesCybersecurity tips for employees
Cybersecurity tips for employees
 
Information Security Awareness
Information Security Awareness Information Security Awareness
Information Security Awareness
 
Strengthening the Weakest Link - Reducing Risks from Social Engineering Attacks
Strengthening the Weakest Link - Reducing Risks from Social Engineering AttacksStrengthening the Weakest Link - Reducing Risks from Social Engineering Attacks
Strengthening the Weakest Link - Reducing Risks from Social Engineering Attacks
 
The Cyber Security Training Gap: Rotarian Reach
The Cyber Security Training Gap: Rotarian ReachThe Cyber Security Training Gap: Rotarian Reach
The Cyber Security Training Gap: Rotarian Reach
 
How children's fingerprints on the web could mean the end of PII Authenticati...
How children's fingerprints on the web could mean the end of PII Authenticati...How children's fingerprints on the web could mean the end of PII Authenticati...
How children's fingerprints on the web could mean the end of PII Authenticati...
 
Cyberwar Gets Personal
Cyberwar Gets PersonalCyberwar Gets Personal
Cyberwar Gets Personal
 
Cybersecurity Powerpoint Presentation Slides
Cybersecurity Powerpoint Presentation SlidesCybersecurity Powerpoint Presentation Slides
Cybersecurity Powerpoint Presentation Slides
 

Similar a Interop 2011 las vegas - session se31 - rothke

Social Networks and Security: What Your Teenager Likely Won't Tell You
Social Networks and Security: What Your Teenager Likely Won't Tell YouSocial Networks and Security: What Your Teenager Likely Won't Tell You
Social Networks and Security: What Your Teenager Likely Won't Tell YouDenim Group
 
Social Media: Infiltrating The Enterprise
Social Media: Infiltrating The EnterpriseSocial Media: Infiltrating The Enterprise
Social Media: Infiltrating The EnterpriseJay McLaughlin
 
SocialSafe for SMEs/SMBs - V1
SocialSafe for SMEs/SMBs - V1SocialSafe for SMEs/SMBs - V1
SocialSafe for SMEs/SMBs - V1Julian Ranger
 
Social Media: Philosophy and Policy
Social Media: Philosophy and PolicySocial Media: Philosophy and Policy
Social Media: Philosophy and Policydrpeppermuseum
 
Social Media: Managing Risk
Social Media:  Managing RiskSocial Media:  Managing Risk
Social Media: Managing Riskshshap
 
Ethics in Social Media
Ethics in Social MediaEthics in Social Media
Ethics in Social Mediajrfields
 
Social networking in the workplace
Social networking in the workplaceSocial networking in the workplace
Social networking in the workplaceprowney
 
chapter 1. Introduction to Information Security
chapter 1. Introduction to Information Security chapter 1. Introduction to Information Security
chapter 1. Introduction to Information Security elmuhammadmuhammad
 
Helping Developers with Privacy
Helping Developers with PrivacyHelping Developers with Privacy
Helping Developers with PrivacyJason Hong
 
CIO Summit: Data Security in a Mobile World
CIO Summit: Data Security in a Mobile WorldCIO Summit: Data Security in a Mobile World
CIO Summit: Data Security in a Mobile WorldiMIS
 
CIO Summit: Data Security in a Mobile World
CIO Summit: Data Security in a Mobile WorldCIO Summit: Data Security in a Mobile World
CIO Summit: Data Security in a Mobile WorldiMIS
 
SocialSafe - essential Social Media app for Businesses
SocialSafe - essential Social Media app for BusinessesSocialSafe - essential Social Media app for Businesses
SocialSafe - essential Social Media app for BusinessesJulian Ranger
 
Effective Training and Policy Takes the Fear out of Social Networking - Shawn...
Effective Training and Policy Takes the Fear out of Social Networking - Shawn...Effective Training and Policy Takes the Fear out of Social Networking - Shawn...
Effective Training and Policy Takes the Fear out of Social Networking - Shawn...sdavis532
 
Risks of social media for businesses (and how to manage them)
Risks of social media for businesses (and how to manage them)Risks of social media for businesses (and how to manage them)
Risks of social media for businesses (and how to manage them)CrowdControlHQ
 
Successful Social Media for Mortgage Lenders: Engage With Your Audience While...
Successful Social Media for Mortgage Lenders: Engage With Your Audience While...Successful Social Media for Mortgage Lenders: Engage With Your Audience While...
Successful Social Media for Mortgage Lenders: Engage With Your Audience While...Smarsh
 

Similar a Interop 2011 las vegas - session se31 - rothke (20)

Social Networks and Security: What Your Teenager Likely Won't Tell You
Social Networks and Security: What Your Teenager Likely Won't Tell YouSocial Networks and Security: What Your Teenager Likely Won't Tell You
Social Networks and Security: What Your Teenager Likely Won't Tell You
 
Social media risks guide
Social media risks guideSocial media risks guide
Social media risks guide
 
Social Media: Infiltrating The Enterprise
Social Media: Infiltrating The EnterpriseSocial Media: Infiltrating The Enterprise
Social Media: Infiltrating The Enterprise
 
SocialSafe for SMEs/SMBs - V1
SocialSafe for SMEs/SMBs - V1SocialSafe for SMEs/SMBs - V1
SocialSafe for SMEs/SMBs - V1
 
Social Media: Philosophy and Policy
Social Media: Philosophy and PolicySocial Media: Philosophy and Policy
Social Media: Philosophy and Policy
 
Social Media: Managing Risk
Social Media:  Managing RiskSocial Media:  Managing Risk
Social Media: Managing Risk
 
Ethics in Social Media
Ethics in Social MediaEthics in Social Media
Ethics in Social Media
 
Social networking in the workplace
Social networking in the workplaceSocial networking in the workplace
Social networking in the workplace
 
chapter 1. Introduction to Information Security
chapter 1. Introduction to Information Security chapter 1. Introduction to Information Security
chapter 1. Introduction to Information Security
 
Helping Developers with Privacy
Helping Developers with PrivacyHelping Developers with Privacy
Helping Developers with Privacy
 
Global KM - Pitfalls.pptx
Global KM - Pitfalls.pptxGlobal KM - Pitfalls.pptx
Global KM - Pitfalls.pptx
 
CIO Summit: Data Security in a Mobile World
CIO Summit: Data Security in a Mobile WorldCIO Summit: Data Security in a Mobile World
CIO Summit: Data Security in a Mobile World
 
CIO Summit: Data Security in a Mobile World
CIO Summit: Data Security in a Mobile WorldCIO Summit: Data Security in a Mobile World
CIO Summit: Data Security in a Mobile World
 
SocialSafe - essential Social Media app for Businesses
SocialSafe - essential Social Media app for BusinessesSocialSafe - essential Social Media app for Businesses
SocialSafe - essential Social Media app for Businesses
 
DOC-20230410-WA0041..pptx
DOC-20230410-WA0041..pptxDOC-20230410-WA0041..pptx
DOC-20230410-WA0041..pptx
 
Effective Training and Policy Takes the Fear out of Social Networking - Shawn...
Effective Training and Policy Takes the Fear out of Social Networking - Shawn...Effective Training and Policy Takes the Fear out of Social Networking - Shawn...
Effective Training and Policy Takes the Fear out of Social Networking - Shawn...
 
Internal social networks
Internal social networksInternal social networks
Internal social networks
 
Risks of social media for businesses (and how to manage them)
Risks of social media for businesses (and how to manage them)Risks of social media for businesses (and how to manage them)
Risks of social media for businesses (and how to manage them)
 
Jisc e-safety
Jisc e-safety Jisc e-safety
Jisc e-safety
 
Successful Social Media for Mortgage Lenders: Engage With Your Audience While...
Successful Social Media for Mortgage Lenders: Engage With Your Audience While...Successful Social Media for Mortgage Lenders: Engage With Your Audience While...
Successful Social Media for Mortgage Lenders: Engage With Your Audience While...
 

Más de Ben Rothke

Securing your presence at the perimeter
Securing your presence at the perimeterSecuring your presence at the perimeter
Securing your presence at the perimeterBen Rothke
 
Rothke rsa 2012 building a security operations center (soc)
Rothke rsa 2012  building a security operations center (soc)Rothke rsa 2012  building a security operations center (soc)
Rothke rsa 2012 building a security operations center (soc)Ben Rothke
 
Rothke rsa 2013 - the five habits of highly secure organizations
Rothke   rsa 2013 - the five habits of highly secure organizationsRothke   rsa 2013 - the five habits of highly secure organizations
Rothke rsa 2013 - the five habits of highly secure organizationsBen Rothke
 
Rothke rsa 2013 - deployment strategies for effective encryption
Rothke   rsa 2013 - deployment strategies for effective encryptionRothke   rsa 2013 - deployment strategies for effective encryption
Rothke rsa 2013 - deployment strategies for effective encryptionBen Rothke
 
E5 rothke - deployment strategies for effective encryption
E5   rothke - deployment strategies for effective encryptionE5   rothke - deployment strategies for effective encryption
E5 rothke - deployment strategies for effective encryptionBen Rothke
 
Locking down server and workstation operating systems
Locking down server and workstation operating systemsLocking down server and workstation operating systems
Locking down server and workstation operating systemsBen Rothke
 
Mobile security blunders and what you can do about them
Mobile security blunders and what you can do about themMobile security blunders and what you can do about them
Mobile security blunders and what you can do about themBen Rothke
 
Securing your presence at the perimeter
Securing your presence at the perimeterSecuring your presence at the perimeter
Securing your presence at the perimeterBen Rothke
 
Lessons from ligatt from national cyber security nationalcybersecurity com
Lessons from ligatt   from national cyber security nationalcybersecurity comLessons from ligatt   from national cyber security nationalcybersecurity com
Lessons from ligatt from national cyber security nationalcybersecurity comBen Rothke
 
Lessons from ligatt
Lessons from ligattLessons from ligatt
Lessons from ligattBen Rothke
 
Infosecurity Needs Its T.J. Hooper
Infosecurity Needs Its T.J. HooperInfosecurity Needs Its T.J. Hooper
Infosecurity Needs Its T.J. HooperBen Rothke
 
Rothke effective data destruction practices
Rothke   effective data destruction practicesRothke   effective data destruction practices
Rothke effective data destruction practicesBen Rothke
 
Rothke computer forensics show 2010
Rothke   computer forensics show 2010Rothke   computer forensics show 2010
Rothke computer forensics show 2010Ben Rothke
 
The Cloud is in the details webinar - Rothke
The Cloud is in the details webinar - RothkeThe Cloud is in the details webinar - Rothke
The Cloud is in the details webinar - RothkeBen Rothke
 
Webinar - Getting a handle on wireless security for PCI DSS Compliance
Webinar - Getting a handle on wireless security for PCI DSS ComplianceWebinar - Getting a handle on wireless security for PCI DSS Compliance
Webinar - Getting a handle on wireless security for PCI DSS ComplianceBen Rothke
 
La nécessité de la dlp aujourd’hui un livre blanc clearswift
La nécessité de la dlp aujourd’hui   un livre blanc clearswiftLa nécessité de la dlp aujourd’hui   un livre blanc clearswift
La nécessité de la dlp aujourd’hui un livre blanc clearswiftBen Rothke
 
The Need for DLP now - A Clearswift White Paper
The Need for DLP now - A Clearswift White PaperThe Need for DLP now - A Clearswift White Paper
The Need for DLP now - A Clearswift White PaperBen Rothke
 
Rothke secure360 building a security operations center (soc)
Rothke   secure360 building a security operations center (soc)Rothke   secure360 building a security operations center (soc)
Rothke secure360 building a security operations center (soc)Ben Rothke
 
Infotec 2010 Ben Rothke - social networks and information security
Infotec 2010   Ben Rothke - social networks and information security Infotec 2010   Ben Rothke - social networks and information security
Infotec 2010 Ben Rothke - social networks and information security Ben Rothke
 
Rothke Computer Forensics Show 2010 Deployment Strategies For Effective E...
Rothke   Computer Forensics Show 2010   Deployment Strategies For Effective E...Rothke   Computer Forensics Show 2010   Deployment Strategies For Effective E...
Rothke Computer Forensics Show 2010 Deployment Strategies For Effective E...Ben Rothke
 

Más de Ben Rothke (20)

Securing your presence at the perimeter
Securing your presence at the perimeterSecuring your presence at the perimeter
Securing your presence at the perimeter
 
Rothke rsa 2012 building a security operations center (soc)
Rothke rsa 2012  building a security operations center (soc)Rothke rsa 2012  building a security operations center (soc)
Rothke rsa 2012 building a security operations center (soc)
 
Rothke rsa 2013 - the five habits of highly secure organizations
Rothke   rsa 2013 - the five habits of highly secure organizationsRothke   rsa 2013 - the five habits of highly secure organizations
Rothke rsa 2013 - the five habits of highly secure organizations
 
Rothke rsa 2013 - deployment strategies for effective encryption
Rothke   rsa 2013 - deployment strategies for effective encryptionRothke   rsa 2013 - deployment strategies for effective encryption
Rothke rsa 2013 - deployment strategies for effective encryption
 
E5 rothke - deployment strategies for effective encryption
E5   rothke - deployment strategies for effective encryptionE5   rothke - deployment strategies for effective encryption
E5 rothke - deployment strategies for effective encryption
 
Locking down server and workstation operating systems
Locking down server and workstation operating systemsLocking down server and workstation operating systems
Locking down server and workstation operating systems
 
Mobile security blunders and what you can do about them
Mobile security blunders and what you can do about themMobile security blunders and what you can do about them
Mobile security blunders and what you can do about them
 
Securing your presence at the perimeter
Securing your presence at the perimeterSecuring your presence at the perimeter
Securing your presence at the perimeter
 
Lessons from ligatt from national cyber security nationalcybersecurity com
Lessons from ligatt   from national cyber security nationalcybersecurity comLessons from ligatt   from national cyber security nationalcybersecurity com
Lessons from ligatt from national cyber security nationalcybersecurity com
 
Lessons from ligatt
Lessons from ligattLessons from ligatt
Lessons from ligatt
 
Infosecurity Needs Its T.J. Hooper
Infosecurity Needs Its T.J. HooperInfosecurity Needs Its T.J. Hooper
Infosecurity Needs Its T.J. Hooper
 
Rothke effective data destruction practices
Rothke   effective data destruction practicesRothke   effective data destruction practices
Rothke effective data destruction practices
 
Rothke computer forensics show 2010
Rothke   computer forensics show 2010Rothke   computer forensics show 2010
Rothke computer forensics show 2010
 
The Cloud is in the details webinar - Rothke
The Cloud is in the details webinar - RothkeThe Cloud is in the details webinar - Rothke
The Cloud is in the details webinar - Rothke
 
Webinar - Getting a handle on wireless security for PCI DSS Compliance
Webinar - Getting a handle on wireless security for PCI DSS ComplianceWebinar - Getting a handle on wireless security for PCI DSS Compliance
Webinar - Getting a handle on wireless security for PCI DSS Compliance
 
La nécessité de la dlp aujourd’hui un livre blanc clearswift
La nécessité de la dlp aujourd’hui   un livre blanc clearswiftLa nécessité de la dlp aujourd’hui   un livre blanc clearswift
La nécessité de la dlp aujourd’hui un livre blanc clearswift
 
The Need for DLP now - A Clearswift White Paper
The Need for DLP now - A Clearswift White PaperThe Need for DLP now - A Clearswift White Paper
The Need for DLP now - A Clearswift White Paper
 
Rothke secure360 building a security operations center (soc)
Rothke   secure360 building a security operations center (soc)Rothke   secure360 building a security operations center (soc)
Rothke secure360 building a security operations center (soc)
 
Infotec 2010 Ben Rothke - social networks and information security
Infotec 2010   Ben Rothke - social networks and information security Infotec 2010   Ben Rothke - social networks and information security
Infotec 2010 Ben Rothke - social networks and information security
 
Rothke Computer Forensics Show 2010 Deployment Strategies For Effective E...
Rothke   Computer Forensics Show 2010   Deployment Strategies For Effective E...Rothke   Computer Forensics Show 2010   Deployment Strategies For Effective E...
Rothke Computer Forensics Show 2010 Deployment Strategies For Effective E...
 

Último

Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUK Journal
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?Igalia
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?Antenna Manufacturer Coco
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CVKhem
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 

Último (20)

Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 

Interop 2011 las vegas - session se31 - rothke

  • 1. Social networks and security – can you have both? Ben Rothke, CISSP, CISM CISA Session SE-31 May 12, 2011 @benrothke
  • 2. About me • Ben Rothke, CISSP, CISM, CISA • Senior Security Consultant – British Telecom • Frequent writer and speaker • Author - Computer Security: 20 Things Every Employee Should Know (McGraw-Hill) • Write the Security Reading Room blog – https://365.rsaconference.com/blogs/securityreading
  • 3. Agenda • Overview of social networks • Scary security risks associated with social networks • Social network security strategies • Conclusion / Recommendations / Q/A
  • 7. Business benefits • enhanced collaboration • faster access to information within the company • ability to get questions answered • shared workspaces • microblogs and chat • platform applications
  • 9. ….is now social networking • Your mission – find 20 design engineers based in the US at Boeing – build a rapport with them to get designs for new 737 derivative • Time / Budget / Success – 1990 – Many people, many months, limited success, very expensive – 2011 – One person, multiple Facebook accounts, can outsource to India, near immediate results, extremely high success rate • Facebook - easy to find out who they are – who their friends are – what they like, where they shop, daily habits, friends
  • 10. • To block or not to block? – no longer the question • Social media isn’t a choice anymore – it’s a business transformation tool – Natalie Petouhoff – Weber Shandwick • Business and information security goal – Secure use and enablement of social media
  • 11. Reasons not to block • Don’t blame the game, blame the player • Smart companies control, not block – Staff can use social media and be productive • No longer a 9-5 world • Lose the benefits of social media • Abusers don’t suddenly become productive – Social media abuse - HR issue. – Not a technical issue
  • 12. New security ideas required • Easy security tasks – Block all outbound ftp traffic – Use DLP to encrypt sensitive -mails – Block admission to network if host AV signatures are not current – Use SIEM to correlate all logs • Challenging security task – Stop end-users from inappropriate sharing of confidential/proprietary data via social networks
  • 13. Resistance is futile • Social networks are not a fad • Not only is resistance futile - it is a negative business decision • Prepare a social networking strategy • Have a realistic understanding of the risks and benefits of social software • Understand unique challenges and factor them into on when and how to proceed
  • 15. Security game-changer • Organizations and management are struggling – to understand and deal with the numerous security and privacy risks associated with social networks • Traditional information security – firewalls and access control protected the perimeter. Social networks open up that perimeter • Focus shift – from infrastructure protection to data protection
  • 16. Security issues • People will share huge amounts of highly confidential personal & business information with people they perceive to be legitimate • Numerous legitimate security risks with allowing uncontrolled access to social sites • But…these risks can be mitigated via a comprehensive security strategy
  • 17. Security and privacy risks • Malware – Social networks as a malware distribution point • Vulnerabilities – cross site scripting, cross site request forgery – 1 in 5 web attacks aimed at social networks • Corporate espionage • Phishing / spear phishing • Bandwidth consumption
  • 18. More security and privacy risks • Information leakage • Social engineering attacks • Geotagging / location-based social networking – allows random people to track an individual’s location and correlate it with other information – publishing business photos can be detrimental to business – Content-based Image Retrieval (CBIR)
  • 19. Cree.py is just the beginning
  • 20. Infosec losing on social media? • Requires a combination of technical, behavioral and organizational security controls – many information security groups clueless on how to do that • Arguing that social media presents a highly unmanageable set of security risks – gives the impression that the infosec group is incompetent
  • 21. Strategies and action items for enterprises to deal with the security and privacy risks of social networks
  • 22. Secure use of social media 1. Enablement – Awareness, education 2. Governance – Corporate social media strategy – Realistic policies 3. Management – Effective monitoring
  • 23. Get in front of the wave • Be proactive – dedicated team to deal with social networks – identify all issues around social networks • Get involved and be engaged • Social networking is moving fast • Be flexible – overall uncertainty about what strategies and tactics to adopt to security social media
  • 24. Risk assessment • for each social network community – vulnerabilities associated with each community • each social community has its own set of unique security and privacy concerns • which users are the greatest risk?
  • 25. Risk assessment • output will be used to create the social media policy and strategy – customized to your specific risk matrix • balance risks vs. benefits – US Marines – totally prohibited – Starbucks – totally embraced
  • 26. Social network risk assessment • LinkedIn analysis – you can determine: • what technologies a company is using • corporate direction • vendors • partners • internal e-mail addresses and address formats • Facebook analysis – you can determine: • almost everything
  • 27. Social media strategy • Based on your social media goals • Identify people or positions who will be the online public face of the firm • Decide if/how employees may identify themselves • Twitter strategy for Government Departments – http://digitalengagement.cabinetoffice.gov.uk/blog
  • 28. Social media strategy • Draconian policies preventing the use of social media will most often not be effective • Use a balanced approach – allow access – manage risk via technical controls, policies and employee training
  • 29. Blurred role boundaries • who speaks for the company • border between the company and the outside world is evaporating • management decision, not an IT decision • strategies: block, contain, disregard, embrace • create user scenarios – not all users need access
  • 30. Social networking policy • Social networking policy is a must – even if it prohibits everything, you still need a policy • Employees will do stupid things • Rational, sensible use of social media services – include photography and video – don’t reference clients, customers, or partners without obtaining their express permission
  • 31. Monitoring • Maintain control over content company owns – monitor employee social networking participation – significant risk of loss of IP protection if not monitored – inappropriate use of enterprise content occurred? • notify employee - explain how their actions violated policy – control where and how corporate content is shared externally
  • 32. Security awareness • Social media is driven by social interactions • Most significant risks are tied to the behavior of staff when they are using social software • Don'shun social media for fear of bad end- t user behavior – Anticipate it and formulate a multilevel approach to policies for effective governance • 3 C’s – clear, comprehensive, continuous
  • 33. Security awareness • Awareness and training program is critical – effectively communicated and customized – disseminate to everyone – ensure recurrent training – create topic taboo lists – define expectations of privacy
  • 34. How to get fired in 3 tweets…. • Let employees know they can lose their job – policy violation – managers and executives - special responsibility when blogging by virtue of their position – too much time on social network sites – perception that they are promoting themselves at the expense of the company – especially if employer is not into social networking
  • 35. End-user awareness • Curb your enthusiasm – those with OCD/addictive personalities – be cognizant of addictive nature of social networking – what is fun today is embarrassing tomorrow – expect that entire world will see your comments – consider carefully which images, videos and information you publish – set daily time limits on social media
  • 36. Awareness 101 • Ensure staff know about and are compliant with social media guidelines – post something corporate, ensure that it is public information – be careful about posting customer information, even if it is public
  • 37. Awareness 101 • Ensure staff know about and are compliant with social media guidelines – breach of insider information can cost you your job – know the rules of using social networking sites while at work – take extra care if you friend your boss on Facebook – Facebook is viral and addictive – don’t waste the workday on it
  • 38. Social media guidelines • Without guidelines, breaches are inevitable • Excellent sources: – Intel Social Media Guidelines – IBM Social Computing Guidelines – Oracle Social Media Participation Policy • Policies much have directives for blogs, wikis, social networks, virtual worlds, social media and more.
  • 39. Regulatory compliance • Regulatory framework should be reviewed and where necessary, revised • Consider what specific laws, regulations, standards, breach notice laws apply
  • 40. Reputation management • Traditional PR and legal responses to an Internet-based negative reputation event can cause more damage than doing nothing • establish, follow and update protocols can make social-media chaos less risky to enterprises • Infosec coordinate activities with PR teams – expand monitoring and supplement monitoring with investigations and evidence collection processes
  • 42. Reputation management • Goal is to build and protect a positive Internet-based reputation • Risks to reputation are significant and growing with the increased use of social networks • Create reputation management group with input from IT, legal, risk management, PR and marketing
  • 43. Reputation management • Coordinated approach – proactive / responsive
  • 44. HR must be involved • Social networks open up a huge can of HR worms • What are disciplinary actions for non- compliance? • Can candidate’s social network presence be a factor in hiring process? • Create directives for managing personal and professional time
  • 45. HR must be involved • Don’t be seen as encroaching on employees’ free speech • Create reasonable guidelines • Explain how innocent postings can be misconstrued • heavy-handed approach will often backfire and result in lower morale and often bad publicity
  • 46. HR & FCRA • Via Facebook, you can know way too much about a candidate: – race, orientation, religion, politics, health, etc. – such information can be used to show bias • EEOC and expensive litigation
  • 47. References • Clearswift Security Awareness Research • New Media and the Air Force • ENISA position papers – Security Issues and Recommendations for Online Social Networks – Online as Soon as it Happens • Parents’ Guide to Facebook
  • 48. Conclusion • Social networks introduce security risks – social networks & security can be compatible • Perform a comprehensive risk assessment against all social networks to be used • Understand business & technical requirements • Recognize these security and privacy risks and take a formal approach to mitigate them
  • 49. Contact info • Ben Rothke, CISSP CISA • Senior Security Consultant • BT Professional Services • @benrothke • www.linkedin.com/in/benrothke • www.twitter.com/benrothke • www.slideshare.net/benrothke