19
1 Managing IT and security Risks from Social Media in Your business By Boris Agranovich http://www.globalriskcommunity.com [email protected] Copyright © 2011 Global Risk Consult

1 Managing IT and security Risks from Social Media in Your business By Boris Agranovich [email protected] Copyright

Embed Size (px)

Citation preview

Page 1: 1 Managing IT and security Risks from Social Media in Your business By Boris Agranovich  info@globalriskconsult.com Copyright

1

Managing IT and security Risks from Social Media in Your business

By Boris Agranovich

http://[email protected] Copyright © 2011 Global Risk Consult 

Page 2: 1 Managing IT and security Risks from Social Media in Your business By Boris Agranovich  info@globalriskconsult.com Copyright

2

Who am I?

Boris Agranovich: Founder at GlobalRisk community helping clients master risk,

adviser, Building Bridges Globally

http://[email protected] Copyright © 2011 Global Risk Consult 

• more than 25 years of global experience in working with large & medium corporations in West & East Europe, Middle East, Asia Pacific across multiple sectors including Financial Services, IT, Consulting, Manufacturers and Distributors.

•Recently founded GlobalRisk Community – http://globalriskcommunity.com one of the world’s premier risk community

•Founder at GlobalRiskConsult, http://globalriskconsult.com

•Providing services in the area of risk management, business social networking and marketing

Page 3: 1 Managing IT and security Risks from Social Media in Your business By Boris Agranovich  info@globalriskconsult.com Copyright

3

Agenda

http://[email protected] Copyright © 2011 Global Risk Consult 

•Risks of social media

•IT/security risks

•Social media compliance policies, and some case studies.

•The need for effective strategies and policies

•Regulatory requirements on the use of social media.

•Where to start?

Page 4: 1 Managing IT and security Risks from Social Media in Your business By Boris Agranovich  info@globalriskconsult.com Copyright

4

Social media means:

http://[email protected] Copyright © 2011 Global Risk Consult 

• Loss of brand ownership. Can you cope?

• Technology available – but figure out strategy than pick right tools

• Educate internally, encourage behavioural shifts before going external

• Threads can create opportunities and new ways of engaging with people

Page 5: 1 Managing IT and security Risks from Social Media in Your business By Boris Agranovich  info@globalriskconsult.com Copyright

5

Legal liability:

http://[email protected] Copyright © 2011 Global Risk Consult 

• Third Party Statements• Defamation and False Light • False Advertising and Online

Disclosures• Privacy and Publicity • Cyberstalking  • Intellectual Property • Trade Secrets • Recommendations and

References

Page 6: 1 Managing IT and security Risks from Social Media in Your business By Boris Agranovich  info@globalriskconsult.com Copyright

6

IT/Security related risks

http://[email protected] Copyright © 2011 Global Risk Consult 

1. Viruses/malware

• Phishing

• Click-jacking

2. Data Loss

3. Bandwidth Consumption

4. Productivity Loss

5. Non-compliance with record management regulations.

6. Brand hijacking and lack of control over content

Page 7: 1 Managing IT and security Risks from Social Media in Your business By Boris Agranovich  info@globalriskconsult.com Copyright

7

Employee monitoring and pre-employment screening

http://[email protected] Copyright © 2011 Global Risk Consult 

• Employers must strike a careful balance to avoid violating privacy rights

• What you know can also hurt you.

• Companies should obtain employee acknowledgment of policies dictating the extent to which activities may be monitored

Page 8: 1 Managing IT and security Risks from Social Media in Your business By Boris Agranovich  info@globalriskconsult.com Copyright

8

Reputation risk

http://[email protected] Copyright © 2011 Global Risk Consult 

Page 9: 1 Managing IT and security Risks from Social Media in Your business By Boris Agranovich  info@globalriskconsult.com Copyright

9

Reputation risk

http://[email protected] Copyright © 2011 Global Risk Consult 

Page 10: 1 Managing IT and security Risks from Social Media in Your business By Boris Agranovich  info@globalriskconsult.com Copyright

10http://[email protected] Copyright © 2011 Global Risk Consult 

Case study. How private is your email? 

Based on the recent cases, your corporate policies including your employee manual, should include the following language:

• Email communication is not private;

• Email is to be used only for company business;

• Email communication is randomly and periodically monitored to ensure compliance;

Page 11: 1 Managing IT and security Risks from Social Media in Your business By Boris Agranovich  info@globalriskconsult.com Copyright

11http://[email protected] Copyright © 2011 Global Risk Consult 

Case study continued. The email policy should inform the

employee that the company policy:

• Specifically covers the use of cloud based email providers;

• Specifically covers social media companied that have internal email;

• Informs the employee that such communications may be monitored by the company

Page 12: 1 Managing IT and security Risks from Social Media in Your business By Boris Agranovich  info@globalriskconsult.com Copyright

12http://[email protected] Copyright © 2011 Global Risk Consult 

The need for strategies and policies 

Don’t prohibit but mitigate:

• Security risks;

• Risk of misrepresentation;

• Infringement of intellectual property;

• Unauthorized disclosure of confidential information;

• Data privacy;

• Data leakage and identity theft. 

Page 13: 1 Managing IT and security Risks from Social Media in Your business By Boris Agranovich  info@globalriskconsult.com Copyright

13http://[email protected] Copyright © 2011 Global Risk Consult 

Compliance requirements

Page 14: 1 Managing IT and security Risks from Social Media in Your business By Boris Agranovich  info@globalriskconsult.com Copyright

14http://[email protected] Copyright © 2011 Global Risk Consult 

Regulatory requirements on the use of social media

• Supervisory policies, procedures, systems and internal controls to monitor all electronic communications technology used by the party and its associated persons to conduct the business.

• Regulated parties are required to make and keep records of such use and consequently of all content sent or received regardless of the tools that are used to send it.

• There is no reason to exclude archiving of posts to social networking sites from this requirement. 

Page 15: 1 Managing IT and security Risks from Social Media in Your business By Boris Agranovich  info@globalriskconsult.com Copyright

15http://[email protected] Copyright © 2011 Global Risk Consult 

What to do next?

• A real-time Web Defence

• Selective Social networking Controls

• Caching

• Policy Flexibility

Page 16: 1 Managing IT and security Risks from Social Media in Your business By Boris Agranovich  info@globalriskconsult.com Copyright

16

Where to start (2).Collaborate & Share knowledge

http://[email protected] Copyright © 2011 Global Risk Consult 

Page 17: 1 Managing IT and security Risks from Social Media in Your business By Boris Agranovich  info@globalriskconsult.com Copyright

17

Social media compliance policies, some samples. 

http://[email protected] Copyright © 2011 Global Risk Consult 

● British Telecom - http://www.box.net/shared/static/llarpa9dnh.pdf ● Int. Fed. of Red Cross (IFRC) - http://www.box.net/shared/static/hrjk0nln59.pdf ● The Coca Cola Company - http://www.box.net/shared/static/1ifmdpdzb2.pdf ● UK CIPR - http://www.box.net/shared/static/fudf5fx1je.pdf ● WOMMA - http://www.box.net/shared/static/qxqj2zrd9v.pdf ● US FTC - Principles for Online Behavioral Advertising - http://www.box.net/shared/static/ssrv55sedo.pdf

● US CIO Council - SN Use by Federal Departments - http://www.box.net/shared/static/89149s00yu.pdf 

Isaca Social Media: Business Benefits and Security, Governance and Assurance

Perspectives http://www.isaca.org/Knowledge-Center/Research/Documents/Social-

Media-Wh-Paper-26-May10-Research.pdf

Page 18: 1 Managing IT and security Risks from Social Media in Your business By Boris Agranovich  info@globalriskconsult.com Copyright

18http://[email protected] Copyright © 2011 Global Risk Consult 

Regulatory requirements on the use of social media

• ● Osterman - The Impact of New Communications Tools -http://www.box.net/shared/static/exvkqvcleu.pdf ● Osterman - The Need to Archive SN Content - http://www.box.net/shared/static/byobpxpzi7.pdf ● US - FINRA - Supervision of Electronic Communications -http://www.box.net/shared/static/odja4zxt08.pdf ● US - FINRA - Guidance on Social Media Web Sites - http://www.box.net/shared/static/75ytdooycl.pdf ● US - FINRA - Communications with the Public -http://www.box.net/shared/static/s16c8jzigp.pdf

Page 19: 1 Managing IT and security Risks from Social Media in Your business By Boris Agranovich  info@globalriskconsult.com Copyright

19http://[email protected] Copyright © 2011 Global Risk Consult 

Questions??

Resources:

RIMS magazine

Rob van Alphen’s presentation

Blue Coat. Solution brief: The Top Four Business Risks of Social media

How private is your e-mail by Lawyers RMKB