Top Banner
Slide Heading Social Media: Awareness, Audit and Assurance Tom Snyder Trivera Interactive November 16 th 2011
23

Slide Heading

Feb 25, 2016

Download

Documents

Hester

Slide Heading. Social Media: Awareness, Audit and Assurance. Tom Snyder Trivera Interactive November 16 th 2011. Introductions. Trivera Interactive Web site development, Email Marketing, SEO and Social Media Social Media Strategies and Policies. Tom Snyder Founded Trivera in 1996 - PowerPoint PPT Presentation
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: Slide Heading

Slide HeadingSocial Media: Awareness, Audit and Assurance

Tom SnyderTrivera Interactive

November 16th 2011

Page 2: Slide Heading

Introductions

• Tom Snyder– Founded Trivera in 1996– Working with businesses and organizations to find the

acceptable level of balance between visionary possibilities and technological and organizational realities.

• Trivera Interactive– Web site development, Email

Marketing, SEO and Social Media – Social Media Strategies and Policies.

Page 3: Slide Heading

Introductions

Page 4: Slide Heading

Social Media Usage

Top 100 most valuable brands in the world are experiencing a direct correlation between top financial performance and deep social media engagement

~ ENGAGEMENTdb, The World’s Most Valuable Brands

Fortune Global 100 companies 65% have active Twitter accounts 54% have Facebook fan pages 50% have YouTube video channels 33% have corporate blogs

~Burson-Marsteller, The Global Social Media Check-up Insights

Page 5: Slide Heading

Social Media Usage

95% of social media users now use it for business reasons

61% use public social media sites like LinkedIn, Twitter, Facebook, and YouTube every day (up from 51% in 2008).

15% use these sites "constantly throughout the day.

56% work for companies that have no policies that cover use at work and outside work

Page 6: Slide Heading

Social Media Usage

Page 7: Slide Heading

Social Media Usage

76% of companies now use Social Media for business purposes

43% have experienced employee misuse

31% have disciplined employees for misuse

29% block employee access

27% monitor employee use

25% ban use for non-business purposes

Page 8: Slide Heading

The Old Paradigm

Page 9: Slide Heading

The New Paradigm

Page 10: Slide Heading

Risks for Business

Internal/Infrastructure• Viruses/malware• Non-compliance with record management

regulations (PCI-DSS, HIPAA)• Employee Inefficiency• Employee Headhunting

Page 11: Slide Heading

Malware and Chain Exploitation

• Malicious profile generation• Exploitation of “Social Human Touch”• Worm Generation – Chain Infection and

Reaction • Drive-by-Download Browser Attacks • Exploitation of Custom Code and APIs • Exploitation of URL Shorteners or Hidden Links • QR Codes

Page 12: Slide Heading

Risks for Business

External/Customer Facing• Lack of control over publicly-generated

content• Lack of control over internally-generated

content• Customer expectations • Brand hijacking

Page 13: Slide Heading

Addressing Risk

Tactics without strategy is the

noise before defeat

Strategy without tacticsis the

slowest route to victory

-Sun Tzu

Page 14: Slide Heading

Addressing Risk

Social Media Strategy• Set your Goals• Identify your Target• Choose your Tools• Craft your Voice• Define your Roles• Commit to Consistency• Measure and Improve

Page 15: Slide Heading

Addressing Risk

Social Media Policy• “Official” Voices• Associated Voices• Everyone Else• Work and Non-Work Usage• Process• Technology

Page 16: Slide Heading

Mitigating RiskThreats and Vulnerabilities

Risks Risk Mitigation Techniques

Introduction of viruses and malware to the organizationalnetwork

•Data leakage/theft•“Owned” systems (zombies)•System downtime•Resources required to clean systems

•Ensure that antivirus and antimalware controls are installed on all systems and updated daily.

•Consider use of content filtering technology to restrict or limit access to social media sites.

•Ensure that appropriate controls are also installed on mobile devices such as smartphones.

•Establish or update policies and standards.•Develop and conduct awareness training and campaigns to inform employees of the risks involved with using social media sites.

Exposure to customers and theenterprise through a fraudulent or hijacked corporate presence

•Customer backlash and/or adverse legal actions

•Exposure of customer information

•Reputational damage•Targeted phishing attacks on customers or employees

•Engage a brand protection firm that can scan the Internet and search out misuse of the enterprise brand.

•Give periodic informational updates to customers to maintain awareness of potential fraud and to establish clear guidelines regarding what information should be posted as part of the enterprise social media presence.

Source: Social Media: Business Benefits and Security, Governance and Assurance Perspectives , ISACA Emerging Technology Whitepaper, May 2010

Page 17: Slide Heading

Mitigating RiskThreats and Vulnerabilities

Risks Risk Mitigation Techniques

Unclear or undefined content rights to information posted to social media sites

•Enterprise’s loss of control/ and/or legal rights of information posted to the social media sites

•Ensure that legal and communications teams carefully review user agreements for social media sites that are being considered.

•Establish clear policies that dictate to employees and customers what information should be posted as part of the enterprise social media presence.

•If feasible and appropriate, ensure that there is a capability to capture and log all communications.

A move to a digital business model may increase customerservice expectations

•Customer dissatisfaction with the responsiveness received in this arena, leading to potential reputational damage for the enterprise and customer retention issues

•Ensure that staffing is adequate to handle the amount of traffic that could be created from a social media presence.

•Create notices that provide clear windows for customer response

Mismanagement of electroniccommunications that may be impacted by retention regulations or e-discovery

•Regulatory sanctions and fines

•Adverse legal actions

•Establish appropriate policies, processes and technologies to ensure that communications via social media that may be impacted by litigation or regulations are tracked and archived appropriately.

•Note that, depending on the social media site, maintaining an archive may not be a recommended approach.

Page 18: Slide Heading

Mitigating RiskThreats and Vulnerabilities

Risks Risk Mitigation Techniques

Use of personal accounts to communicate work-related information

•Privacy violations•Reputational damage•Loss of competitive advantage

•Work with the human resources (HR) department to establish new policies or ensure that existing policies address employee posting of work-related information.

•Work with the HR department to develop awareness training and campaigns that reinforce these policies.

Employee posting pictures or info that link them to the enterprise

•Brand damage•Reputational damage

•Work with the HR department to develop a policy that specifies how employees may use enterprise related images, assets, and intellectual property (IP) in their online presence.

Excessive employee use of social media in the workplace

•Network utilization issues •Productivity loss•Increased risk of exposure to viruses and malware due to longer duration of sessions

•Manage accessibility to social media sites through content filtering or by limiting network throughput to social media sites.

Employee access to social media via enterprise-suppliedmobile devices.

•Infection of mobile devices•Data theft via mobile devices•Circumvention of controls•Data leakage

•Route enterprise smartphones through corporate network filtering technology to restrict/limit access

•Ensure controls installed/updated on mobile devices

•Establish/update policies and standards regarding the use of smartphones to access social media.

•Social media awareness training and campaigns

Page 19: Slide Heading

Social Media Audit/Assurance

ISACA's Social Media Audit Assurance Program released February 2011 and is available to members only

ObjectiveThe objective of the social media audit/assurance review is to provide management with an independent assessment relating to the effectiveness of controls over the enterprise’s social media policies and processes.

ScopeThe review will focus on governance, policies, procedures, training and awareness functions related to social media. Specifically, it will address:

• Strategy and governance—policies and frameworks• People—training and awareness• Processes• Technology

Page 20: Slide Heading

Audit/Assurance Program

Audit/Assurance Program StepExcerpt fromISACA’s Social Media Audit/Assurance Program

COBIT Cross-

reference

COSOReferenceHyper-link

IssueCross-

reference

Comments

Control Environment

Risk Assessment

Control Activities

Information and Communication

Monitoring

2.1 Risk Management Audit/Assurance Objective: The risk associated with social media is identified, evaluated, and aligned with enterprise risk profiles and risk appetite. Risk management is routinely evaluated for new and existing social media projects.2.1.1 Ongoing Risk Assessment 2.1.1 Control: Risk assessments are performed prior to initiation of a social media project.

PO1.2PO9.3PO9.4ME4.2ME4.5

X X

2.2 Policies Audit/Assurance Objective: Policy and supporting standards exist to support social media use.2.2.1 Social Media Policies and Standards

Control: Policies for social media should address the following specific areas: Communication protocolStandardized terms/key words that may convey the company brand, product, image, campaign, business initiative, corporate social responsibilityUse of standard logos, images, pictures, etc.Employee personal use of social media in the workplaceEmployee personal use of social media outside the workplaceEmployee use of social media for business purposes (personally owned devices)Use of mobile devices to access social mediaRequired review, monitoring and follow-up processes for brand protectionCommunication of policy via social media sitesNotification that compliance monitoring will be the right of the companyManagement procedures for company accounts on social media sites

PO4.6PO4.8PO6.3PO6.4

X

Page 21: Slide Heading

Resources and References

• 5 low-risk, high-reward experiments that could turn IT people into heroes

• FaceTime Survey Reveals 38% of IT Managers Ignoring Web 2.0 Risks

• IT departments in dark over social media use• Social Media in Healthcare Marketing: Making the Case• Data breaches and the erosion of consumer trust in brands• Top Five Social Media Risks for Business: New ISACA White Paper • Social Media: Business Benefits and Security, Governance and Assura

nce Perspectives• Chain Exploitation - Social Media Malware• ISACA's Social Media Audit Assurance Program

released February 2011 and is available to members only

Page 22: Slide Heading

Questions?

Page 23: Slide Heading

Tom Snyder – [email protected]

http://www.triveraguy.com

Trivera Interactivehttp://www.trivera.com