SlideShare ist ein Scribd-Unternehmen logo
1 von 24
Social Collaboration:   10 must have tips for security, productivity and compliance  Sarah Carter, VP Marketing Actiance, Inc. ,[object Object],[object Object]
Ten Tips to Safe Social Collaboration ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
The Internet Has Changed ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Source:  Actiance Annual Greynets Surveys 2008 – 2011 & Projected ,[object Object],[object Object],[object Object],[object Object],[object Object]
The Enterprise and Web 2.0 Are Converging Source:  Actiance Annual Collaborative Internet Surveys 2008 – 2011 & Projected 2008 2009 2010 2011 2010 2009 2008
Social Is Booming ,[object Object],[object Object],[object Object],[object Object],[object Object],Confidential and Proprietary © 2011, Actiance, Inc. All rights reserved.
Understand the Social Risks Data Leakage Personal Information Intellectual Property Credit Card,  SSN Patient Records Incoming Threats Malware, Spyware Viruses, Trojans Inappropriate Content Compliance & eDiscovery SEC, FINRA, NFA HIPAA, FISMA, SOX PCI, FOI, DOD, FSA FRCP- eDiscovery FERC, NERC User Behavior Employee Productivity Bandwidth Explosion Every employee is the face of the business
Best Practices – The 4E’s Objective Recommendation Establish Create a LinkedIn profile and populate with relevant information Engage Make it easy for your network to contact, interact, and communicate with you Educate Publish event notifications, news updates, upcoming conferences, job openings, etc. Expand  Offer links to other professionals or like-minded individuals (e.g., tax specialists, estate planning attorneys, etc.)
Establishing a Presence  Social Media? ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Social Networking: Balancing Benefit & Risk ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Establish  a Presence (1a) ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Establish  a Presence ,[object Object],[object Object],[object Object]
Engage  with Customers, Colleagues, and Prospects (1) ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Educate  Your Network ,[object Object],[object Object],[object Object],[object Object]
Educate  & Re Educate Your Network ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Control, Manage, Secure Issue Control Requirements Identity management Ensure that all the different logins of an individual link back to corporate identity Activity control Posting of content allowed for marketing but read-only for everyone else Granular application control Employees can access Facebook, but not Facebook Chat or Facebook Games Anti-malware Protect network against hidden phishing or Trojan attacks Data leak prevention Protect organization from employees disclosing sensitive information Moderation Messages posted only upon approval by designated officer Logging and archiving Log all content posted to social networks Export of data Export stored data to any email archive or WORM storage
End Users Adopting Web 2.0 Faster Than IT Can Control Actual customer traffic history (~155 organizations) Representing all Internet activity from over 150K end users  (Actiance Internet Survey 2009) Source:  Actiance Annual Internet Survey 2010
Social Networking Feature Control ,[object Object]
Content Monitoring ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
eDiscovery of Social Networking Posts ,[object Object],[object Object]
Measuring Your Efforts ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Confidential and Proprietary © 2011, Actiance, Inc. All rights reserved.
About Actiance: Enabling the New Internet ,[object Object],[object Object],[object Object],[object Object],[object Object]
More Info? ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Ten Tips to Safe Social Collaboration ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Sarah Carter, VP Marketing Actiance, Inc http://www.linkedin.com/in/sarahlouisecarter Pg.

Weitere ähnliche Inhalte

Was ist angesagt?

Social Media Security Risk Slide Share Version
Social Media Security Risk Slide Share VersionSocial Media Security Risk Slide Share Version
Social Media Security Risk Slide Share Versionfamudal
 
Security is Hard
Security is HardSecurity is Hard
Security is HardMike Murray
 
Cloud service providers in pune
Cloud service providers in puneCloud service providers in pune
Cloud service providers in puneAnshita Dixit
 
Data-driven storytelling and security stakeholder engagement - FND326-S - AWS...
Data-driven storytelling and security stakeholder engagement - FND326-S - AWS...Data-driven storytelling and security stakeholder engagement - FND326-S - AWS...
Data-driven storytelling and security stakeholder engagement - FND326-S - AWS...Amazon Web Services
 
Prevent phishing scams
Prevent phishing scamsPrevent phishing scams
Prevent phishing scamsronpoul
 
4 Reasons Why Your Business Needs A Cyber Security Consultant.pdf
4 Reasons Why Your Business Needs A Cyber Security Consultant.pdf4 Reasons Why Your Business Needs A Cyber Security Consultant.pdf
4 Reasons Why Your Business Needs A Cyber Security Consultant.pdfSania Baker
 
Cyber Privacy & Password Protection
Cyber Privacy & Password ProtectionCyber Privacy & Password Protection
Cyber Privacy & Password ProtectionNikhil D
 
Cyber Security Incident Response Planning
Cyber Security Incident Response PlanningCyber Security Incident Response Planning
Cyber Security Incident Response PlanningPECB
 
Cybersecurity & Data Protection: Thinking About Risk & Compliance
Cybersecurity & Data Protection: Thinking About Risk & ComplianceCybersecurity & Data Protection: Thinking About Risk & Compliance
Cybersecurity & Data Protection: Thinking About Risk & ComplianceShawn Tuma
 
Security and the cloud
Security and the cloudSecurity and the cloud
Security and the cloudFREVVO
 
Cyber Risks & Liabilities - Sept/Oct 2017
Cyber Risks & Liabilities - Sept/Oct 2017Cyber Risks & Liabilities - Sept/Oct 2017
Cyber Risks & Liabilities - Sept/Oct 2017Gary Chambers
 
Information Security Management System in the Banking Sector
Information Security Management System in the Banking SectorInformation Security Management System in the Banking Sector
Information Security Management System in the Banking SectorSamvel Gevorgyan
 
Cyber Security 101: What Your Agency Needs to Know
Cyber Security 101: What Your Agency Needs to KnowCyber Security 101: What Your Agency Needs to Know
Cyber Security 101: What Your Agency Needs to KnowSandra Fathi
 
Email security lexington ky
Email security lexington kyEmail security lexington ky
Email security lexington kyIntegrityky11
 
Ferraz Itp368 Optmizing Information Security
Ferraz Itp368 Optmizing Information SecurityFerraz Itp368 Optmizing Information Security
Ferraz Itp368 Optmizing Information Securitymferraz
 
SocialSafe for SMEs/SMBs - V1
SocialSafe for SMEs/SMBs - V1SocialSafe for SMEs/SMBs - V1
SocialSafe for SMEs/SMBs - V1Julian Ranger
 
ECM and Enterprise 2.0
ECM and Enterprise 2.0ECM and Enterprise 2.0
ECM and Enterprise 2.0Carl Frappaolo
 
Data Privacy and Protection Presentation
Data Privacy and Protection PresentationData Privacy and Protection Presentation
Data Privacy and Protection Presentationmlw32785
 
Best Practice For Public Sector Information Security And Compliance
Best  Practice For  Public  Sector    Information  Security And  ComplianceBest  Practice For  Public  Sector    Information  Security And  Compliance
Best Practice For Public Sector Information Security And ComplianceOracle
 
Csa about-threats-june-2010-ibm
Csa about-threats-june-2010-ibmCsa about-threats-june-2010-ibm
Csa about-threats-june-2010-ibmSergio Loureiro
 

Was ist angesagt? (20)

Social Media Security Risk Slide Share Version
Social Media Security Risk Slide Share VersionSocial Media Security Risk Slide Share Version
Social Media Security Risk Slide Share Version
 
Security is Hard
Security is HardSecurity is Hard
Security is Hard
 
Cloud service providers in pune
Cloud service providers in puneCloud service providers in pune
Cloud service providers in pune
 
Data-driven storytelling and security stakeholder engagement - FND326-S - AWS...
Data-driven storytelling and security stakeholder engagement - FND326-S - AWS...Data-driven storytelling and security stakeholder engagement - FND326-S - AWS...
Data-driven storytelling and security stakeholder engagement - FND326-S - AWS...
 
Prevent phishing scams
Prevent phishing scamsPrevent phishing scams
Prevent phishing scams
 
4 Reasons Why Your Business Needs A Cyber Security Consultant.pdf
4 Reasons Why Your Business Needs A Cyber Security Consultant.pdf4 Reasons Why Your Business Needs A Cyber Security Consultant.pdf
4 Reasons Why Your Business Needs A Cyber Security Consultant.pdf
 
Cyber Privacy & Password Protection
Cyber Privacy & Password ProtectionCyber Privacy & Password Protection
Cyber Privacy & Password Protection
 
Cyber Security Incident Response Planning
Cyber Security Incident Response PlanningCyber Security Incident Response Planning
Cyber Security Incident Response Planning
 
Cybersecurity & Data Protection: Thinking About Risk & Compliance
Cybersecurity & Data Protection: Thinking About Risk & ComplianceCybersecurity & Data Protection: Thinking About Risk & Compliance
Cybersecurity & Data Protection: Thinking About Risk & Compliance
 
Security and the cloud
Security and the cloudSecurity and the cloud
Security and the cloud
 
Cyber Risks & Liabilities - Sept/Oct 2017
Cyber Risks & Liabilities - Sept/Oct 2017Cyber Risks & Liabilities - Sept/Oct 2017
Cyber Risks & Liabilities - Sept/Oct 2017
 
Information Security Management System in the Banking Sector
Information Security Management System in the Banking SectorInformation Security Management System in the Banking Sector
Information Security Management System in the Banking Sector
 
Cyber Security 101: What Your Agency Needs to Know
Cyber Security 101: What Your Agency Needs to KnowCyber Security 101: What Your Agency Needs to Know
Cyber Security 101: What Your Agency Needs to Know
 
Email security lexington ky
Email security lexington kyEmail security lexington ky
Email security lexington ky
 
Ferraz Itp368 Optmizing Information Security
Ferraz Itp368 Optmizing Information SecurityFerraz Itp368 Optmizing Information Security
Ferraz Itp368 Optmizing Information Security
 
SocialSafe for SMEs/SMBs - V1
SocialSafe for SMEs/SMBs - V1SocialSafe for SMEs/SMBs - V1
SocialSafe for SMEs/SMBs - V1
 
ECM and Enterprise 2.0
ECM and Enterprise 2.0ECM and Enterprise 2.0
ECM and Enterprise 2.0
 
Data Privacy and Protection Presentation
Data Privacy and Protection PresentationData Privacy and Protection Presentation
Data Privacy and Protection Presentation
 
Best Practice For Public Sector Information Security And Compliance
Best  Practice For  Public  Sector    Information  Security And  ComplianceBest  Practice For  Public  Sector    Information  Security And  Compliance
Best Practice For Public Sector Information Security And Compliance
 
Csa about-threats-june-2010-ibm
Csa about-threats-june-2010-ibmCsa about-threats-june-2010-ibm
Csa about-threats-june-2010-ibm
 

Ähnlich wie Social collaboration 10 must have tips for security, productivity and compliance

20110720 fose 2011 sm governance
20110720 fose 2011 sm governance20110720 fose 2011 sm governance
20110720 fose 2011 sm governanceJesse Wilkins
 
Cybersecurity pres 05-19-final
Cybersecurity pres 05-19-finalCybersecurity pres 05-19-final
Cybersecurity pres 05-19-finalVivek Ahuja
 
Internet & Social Media issues for brand owners
Internet & Social Media issues for brand ownersInternet & Social Media issues for brand owners
Internet & Social Media issues for brand ownersDavid Green
 
Bright talk intrusion prevention are we joking - henshaw july 2010 a
Bright talk   intrusion prevention are we joking - henshaw july 2010 aBright talk   intrusion prevention are we joking - henshaw july 2010 a
Bright talk intrusion prevention are we joking - henshaw july 2010 aMark Henshaw
 
20110427 ARMA Houston Keynote Records Management 2.0
20110427 ARMA Houston Keynote Records Management 2.020110427 ARMA Houston Keynote Records Management 2.0
20110427 ARMA Houston Keynote Records Management 2.0Jesse Wilkins
 
Shibboleth Guided Tour Webinar
Shibboleth Guided Tour WebinarShibboleth Guided Tour Webinar
Shibboleth Guided Tour WebinarJohn Lewis
 
"Evolving Cybersecurity Strategies" - Identity is the new security boundary
"Evolving Cybersecurity Strategies" - Identity is the new security boundary"Evolving Cybersecurity Strategies" - Identity is the new security boundary
"Evolving Cybersecurity Strategies" - Identity is the new security boundaryDean Iacovelli
 
Information security management v2010
Information security management v2010Information security management v2010
Information security management v2010joevest
 
Social Media: Legal & Business Issues
Social Media: Legal & Business IssuesSocial Media: Legal & Business Issues
Social Media: Legal & Business IssuesJeff Johnson
 
Security Basics Webinar
Security Basics WebinarSecurity Basics Webinar
Security Basics WebinarTechSoup
 
Brandtology Walter Lim Presentation V1.0
Brandtology    Walter Lim Presentation V1.0Brandtology    Walter Lim Presentation V1.0
Brandtology Walter Lim Presentation V1.0Cooler Insights
 
Brandtology Walter Lim Presentation
Brandtology    Walter Lim PresentationBrandtology    Walter Lim Presentation
Brandtology Walter Lim PresentationCooler Insights
 
20110110 ARMA Dallas Managing Web 2.0 Records: Facebook, Twitter and Everythi...
20110110 ARMA Dallas Managing Web 2.0 Records: Facebook, Twitter and Everythi...20110110 ARMA Dallas Managing Web 2.0 Records: Facebook, Twitter and Everythi...
20110110 ARMA Dallas Managing Web 2.0 Records: Facebook, Twitter and Everythi...Jesse Wilkins
 
20110518-4 ARMA Central Iowa Records Management 2.0
20110518-4 ARMA Central Iowa Records Management 2.020110518-4 ARMA Central Iowa Records Management 2.0
20110518-4 ARMA Central Iowa Records Management 2.0Jesse Wilkins
 
Using Web 2.0 to Improve How TSA Does Business
Using Web 2.0 to Improve How TSA Does BusinessUsing Web 2.0 to Improve How TSA Does Business
Using Web 2.0 to Improve How TSA Does BusinessPeter Stinson
 
B2 - The History of Content Security: Part 2 - Adam Levithan
B2 - The History of Content Security: Part 2 - Adam LevithanB2 - The History of Content Security: Part 2 - Adam Levithan
B2 - The History of Content Security: Part 2 - Adam LevithanSPS Paris
 
Cyber 101: An introduction to privileged access management
Cyber 101: An introduction to privileged access managementCyber 101: An introduction to privileged access management
Cyber 101: An introduction to privileged access managementseadeloitte
 

Ähnlich wie Social collaboration 10 must have tips for security, productivity and compliance (20)

20110720 fose 2011 sm governance
20110720 fose 2011 sm governance20110720 fose 2011 sm governance
20110720 fose 2011 sm governance
 
Cybersecurity pres 05-19-final
Cybersecurity pres 05-19-finalCybersecurity pres 05-19-final
Cybersecurity pres 05-19-final
 
Internet & Social Media issues for brand owners
Internet & Social Media issues for brand ownersInternet & Social Media issues for brand owners
Internet & Social Media issues for brand owners
 
Bright talk intrusion prevention are we joking - henshaw july 2010 a
Bright talk   intrusion prevention are we joking - henshaw july 2010 aBright talk   intrusion prevention are we joking - henshaw july 2010 a
Bright talk intrusion prevention are we joking - henshaw july 2010 a
 
Web Governance
Web GovernanceWeb Governance
Web Governance
 
20110427 ARMA Houston Keynote Records Management 2.0
20110427 ARMA Houston Keynote Records Management 2.020110427 ARMA Houston Keynote Records Management 2.0
20110427 ARMA Houston Keynote Records Management 2.0
 
Shibboleth Guided Tour Webinar
Shibboleth Guided Tour WebinarShibboleth Guided Tour Webinar
Shibboleth Guided Tour Webinar
 
"Evolving Cybersecurity Strategies" - Identity is the new security boundary
"Evolving Cybersecurity Strategies" - Identity is the new security boundary"Evolving Cybersecurity Strategies" - Identity is the new security boundary
"Evolving Cybersecurity Strategies" - Identity is the new security boundary
 
Information security management v2010
Information security management v2010Information security management v2010
Information security management v2010
 
Social Media: Legal & Business Issues
Social Media: Legal & Business IssuesSocial Media: Legal & Business Issues
Social Media: Legal & Business Issues
 
Security Basics Webinar
Security Basics WebinarSecurity Basics Webinar
Security Basics Webinar
 
Dr K Subramanian
Dr K SubramanianDr K Subramanian
Dr K Subramanian
 
Brandtology Walter Lim Presentation V1.0
Brandtology    Walter Lim Presentation V1.0Brandtology    Walter Lim Presentation V1.0
Brandtology Walter Lim Presentation V1.0
 
Brandtology Walter Lim Presentation
Brandtology    Walter Lim PresentationBrandtology    Walter Lim Presentation
Brandtology Walter Lim Presentation
 
20110110 ARMA Dallas Managing Web 2.0 Records: Facebook, Twitter and Everythi...
20110110 ARMA Dallas Managing Web 2.0 Records: Facebook, Twitter and Everythi...20110110 ARMA Dallas Managing Web 2.0 Records: Facebook, Twitter and Everythi...
20110110 ARMA Dallas Managing Web 2.0 Records: Facebook, Twitter and Everythi...
 
Managing Web 2.0 Records.
Managing Web 2.0 Records.Managing Web 2.0 Records.
Managing Web 2.0 Records.
 
20110518-4 ARMA Central Iowa Records Management 2.0
20110518-4 ARMA Central Iowa Records Management 2.020110518-4 ARMA Central Iowa Records Management 2.0
20110518-4 ARMA Central Iowa Records Management 2.0
 
Using Web 2.0 to Improve How TSA Does Business
Using Web 2.0 to Improve How TSA Does BusinessUsing Web 2.0 to Improve How TSA Does Business
Using Web 2.0 to Improve How TSA Does Business
 
B2 - The History of Content Security: Part 2 - Adam Levithan
B2 - The History of Content Security: Part 2 - Adam LevithanB2 - The History of Content Security: Part 2 - Adam Levithan
B2 - The History of Content Security: Part 2 - Adam Levithan
 
Cyber 101: An introduction to privileged access management
Cyber 101: An introduction to privileged access managementCyber 101: An introduction to privileged access management
Cyber 101: An introduction to privileged access management
 

Mehr von Unified Communications Online

Developing a Social Business approach at Standard Life
Developing a Social Business approach at Standard LifeDeveloping a Social Business approach at Standard Life
Developing a Social Business approach at Standard Life Unified Communications Online
 
Essential email security …business requirements and competitive landscape
Essential email security …business requirements and competitive landscapeEssential email security …business requirements and competitive landscape
Essential email security …business requirements and competitive landscapeUnified Communications Online
 
Converging Enterprise Communications, IT and the Cloud - White Paper - Unifie...
Converging Enterprise Communications, IT and the Cloud - White Paper - Unifie...Converging Enterprise Communications, IT and the Cloud - White Paper - Unifie...
Converging Enterprise Communications, IT and the Cloud - White Paper - Unifie...Unified Communications Online
 
Microsoft and polycom, transforming unified communications, microsoft, polycom
Microsoft and polycom, transforming unified communications, microsoft, polycomMicrosoft and polycom, transforming unified communications, microsoft, polycom
Microsoft and polycom, transforming unified communications, microsoft, polycomUnified Communications Online
 
How can collaboration and communications tools effectively drive business per...
How can collaboration and communications tools effectively drive business per...How can collaboration and communications tools effectively drive business per...
How can collaboration and communications tools effectively drive business per...Unified Communications Online
 
Lessons learnt from implementing enterprise social software at cisco
Lessons learnt from implementing enterprise social software at ciscoLessons learnt from implementing enterprise social software at cisco
Lessons learnt from implementing enterprise social software at ciscoUnified Communications Online
 
Transform the way you work with online collaboration save time, money and i...
Transform the way you work with online collaboration   save time, money and i...Transform the way you work with online collaboration   save time, money and i...
Transform the way you work with online collaboration save time, money and i...Unified Communications Online
 
The new workspace - putting people at the centre of collaboration
The new workspace - putting people at the centre of collaborationThe new workspace - putting people at the centre of collaboration
The new workspace - putting people at the centre of collaborationUnified Communications Online
 
Transform the way you work with online collaboration save time, money and i...
Transform the way you work with online collaboration   save time, money and i...Transform the way you work with online collaboration   save time, money and i...
Transform the way you work with online collaboration save time, money and i...Unified Communications Online
 
Transform the way you work with online collaboration save time, money and i...
Transform the way you work with online collaboration   save time, money and i...Transform the way you work with online collaboration   save time, money and i...
Transform the way you work with online collaboration save time, money and i...Unified Communications Online
 
Flying cars and cool uniforms, the future for knowledge workers
Flying cars and cool uniforms,   the future for knowledge workersFlying cars and cool uniforms,   the future for knowledge workers
Flying cars and cool uniforms, the future for knowledge workersUnified Communications Online
 

Mehr von Unified Communications Online (20)

Developing a Social Business approach at Standard Life
Developing a Social Business approach at Standard LifeDeveloping a Social Business approach at Standard Life
Developing a Social Business approach at Standard Life
 
Essential email security …business requirements and competitive landscape
Essential email security …business requirements and competitive landscapeEssential email security …business requirements and competitive landscape
Essential email security …business requirements and competitive landscape
 
How can Private Cloud UC enable your business
How can Private Cloud UC enable your businessHow can Private Cloud UC enable your business
How can Private Cloud UC enable your business
 
Converging Enterprise Communications, IT and the Cloud - White Paper - Unifie...
Converging Enterprise Communications, IT and the Cloud - White Paper - Unifie...Converging Enterprise Communications, IT and the Cloud - White Paper - Unifie...
Converging Enterprise Communications, IT and the Cloud - White Paper - Unifie...
 
Delivering UC Flexibility
Delivering UC FlexibilityDelivering UC Flexibility
Delivering UC Flexibility
 
The ucc ecosystem with lync at the heart
The ucc ecosystem with lync at the heartThe ucc ecosystem with lync at the heart
The ucc ecosystem with lync at the heart
 
Don't rip it lync it
Don't rip it   lync itDon't rip it   lync it
Don't rip it lync it
 
Microsoft and polycom, transforming unified communications, microsoft, polycom
Microsoft and polycom, transforming unified communications, microsoft, polycomMicrosoft and polycom, transforming unified communications, microsoft, polycom
Microsoft and polycom, transforming unified communications, microsoft, polycom
 
How can collaboration and communications tools effectively drive business per...
How can collaboration and communications tools effectively drive business per...How can collaboration and communications tools effectively drive business per...
How can collaboration and communications tools effectively drive business per...
 
What’s new in lync 2010, microsoft
What’s new in lync 2010, microsoftWhat’s new in lync 2010, microsoft
What’s new in lync 2010, microsoft
 
Lessons learnt from implementing enterprise social software at cisco
Lessons learnt from implementing enterprise social software at ciscoLessons learnt from implementing enterprise social software at cisco
Lessons learnt from implementing enterprise social software at cisco
 
Transform the way you work with online collaboration save time, money and i...
Transform the way you work with online collaboration   save time, money and i...Transform the way you work with online collaboration   save time, money and i...
Transform the way you work with online collaboration save time, money and i...
 
The new workspace - putting people at the centre of collaboration
The new workspace - putting people at the centre of collaborationThe new workspace - putting people at the centre of collaboration
The new workspace - putting people at the centre of collaboration
 
Pervasive video
Pervasive videoPervasive video
Pervasive video
 
Changing behaviours. for good
Changing behaviours. for goodChanging behaviours. for good
Changing behaviours. for good
 
Business intelligence & collaboration
Business intelligence & collaborationBusiness intelligence & collaboration
Business intelligence & collaboration
 
Transform the way you work with online collaboration save time, money and i...
Transform the way you work with online collaboration   save time, money and i...Transform the way you work with online collaboration   save time, money and i...
Transform the way you work with online collaboration save time, money and i...
 
Transform the way you work with online collaboration save time, money and i...
Transform the way you work with online collaboration   save time, money and i...Transform the way you work with online collaboration   save time, money and i...
Transform the way you work with online collaboration save time, money and i...
 
Star wars and social CRM
Star wars and social CRMStar wars and social CRM
Star wars and social CRM
 
Flying cars and cool uniforms, the future for knowledge workers
Flying cars and cool uniforms,   the future for knowledge workersFlying cars and cool uniforms,   the future for knowledge workers
Flying cars and cool uniforms, the future for knowledge workers
 

Kürzlich hochgeladen

Connecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfConnecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfNeo4j
 
Generative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfGenerative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfIngrid Airi González
 
Scale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterScale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterMydbops
 
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentEmixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentPim van der Noll
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxLoriGlavin3
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsNathaniel Shimoni
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfLoriGlavin3
 
2024 April Patch Tuesday
2024 April Patch Tuesday2024 April Patch Tuesday
2024 April Patch TuesdayIvanti
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxLoriGlavin3
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rick Flair
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxLoriGlavin3
 
Decarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityDecarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityIES VE
 
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...Scott Andery
 
Manual 508 Accessibility Compliance Audit
Manual 508 Accessibility Compliance AuditManual 508 Accessibility Compliance Audit
Manual 508 Accessibility Compliance AuditSkynet Technologies
 
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality AssuranceInflectra
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersNicole Novielli
 
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...Wes McKinney
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxLoriGlavin3
 
Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Hiroshi SHIBATA
 

Kürzlich hochgeladen (20)

Connecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfConnecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdf
 
Generative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfGenerative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdf
 
Scale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterScale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL Router
 
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentEmixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptx
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directions
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdf
 
2024 April Patch Tuesday
2024 April Patch Tuesday2024 April Patch Tuesday
2024 April Patch Tuesday
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
 
Decarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityDecarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a reality
 
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...
 
Manual 508 Accessibility Compliance Audit
Manual 508 Accessibility Compliance AuditManual 508 Accessibility Compliance Audit
Manual 508 Accessibility Compliance Audit
 
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software Developers
 
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
 
Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024
 

Social collaboration 10 must have tips for security, productivity and compliance

  • 1.
  • 2.
  • 3.
  • 4. The Enterprise and Web 2.0 Are Converging Source: Actiance Annual Collaborative Internet Surveys 2008 – 2011 & Projected 2008 2009 2010 2011 2010 2009 2008
  • 5.
  • 6. Understand the Social Risks Data Leakage Personal Information Intellectual Property Credit Card, SSN Patient Records Incoming Threats Malware, Spyware Viruses, Trojans Inappropriate Content Compliance & eDiscovery SEC, FINRA, NFA HIPAA, FISMA, SOX PCI, FOI, DOD, FSA FRCP- eDiscovery FERC, NERC User Behavior Employee Productivity Bandwidth Explosion Every employee is the face of the business
  • 7. Best Practices – The 4E’s Objective Recommendation Establish Create a LinkedIn profile and populate with relevant information Engage Make it easy for your network to contact, interact, and communicate with you Educate Publish event notifications, news updates, upcoming conferences, job openings, etc. Expand Offer links to other professionals or like-minded individuals (e.g., tax specialists, estate planning attorneys, etc.)
  • 8.
  • 9.
  • 10.
  • 11.
  • 12.
  • 13.
  • 14.
  • 15. Control, Manage, Secure Issue Control Requirements Identity management Ensure that all the different logins of an individual link back to corporate identity Activity control Posting of content allowed for marketing but read-only for everyone else Granular application control Employees can access Facebook, but not Facebook Chat or Facebook Games Anti-malware Protect network against hidden phishing or Trojan attacks Data leak prevention Protect organization from employees disclosing sensitive information Moderation Messages posted only upon approval by designated officer Logging and archiving Log all content posted to social networks Export of data Export stored data to any email archive or WORM storage
  • 16. End Users Adopting Web 2.0 Faster Than IT Can Control Actual customer traffic history (~155 organizations) Representing all Internet activity from over 150K end users (Actiance Internet Survey 2009) Source: Actiance Annual Internet Survey 2010
  • 17.
  • 18.
  • 19.
  • 20.
  • 21.
  • 22.
  • 23.
  • 24. Sarah Carter, VP Marketing Actiance, Inc http://www.linkedin.com/in/sarahlouisecarter Pg.

Hinweis der Redaktion

  1. So let me first talk about what we are seeing in the market place. I think you would all agree the internet has undergone a fairly dramatic change the last 5 to 10 years. It’s gone from being an information and commerce platform to a communication and collaboration platform. You can see that in the rise of new applications and new tools such as social networking, instant messaging peer to peer, streaming video, voice over IP, applications like Skype etc. All of these have changed the internet into a communication medium. And of course what is happening is peoplewho are using it at home also bring these tools them at work. Businesses in turn have responded to this trend by deploying enterprise platforms. They see the benefits that social networking and IP based communication, real time communications can give them and started to leverage those benefits by deploying platforms such as Microsoft OCS, IMB Sametime, or social networking analogues, such as Jive or Connections from IBM, or Share point from Microsoft.
  2. So what you are seeing in the organization as you guys are seeing everyday the enterprise environment is highly fragmented and highly complex. Users within the enterprise are not only using the platforms that you’re deploying, such as OCS and Sametime, but they are also using the consumer platforms such as AOL, MSN, Yahoo and Skype, and they are using Facebook, Linkedin, and Twitter. So companies are struggling with how to manage and how to enable this highly fragmented environment.
  3. Social media is not just a fad. Customers, prospects, and even employees are looking to social media to connect, engage, and build relationships with enterprise organizations. We are social animals - we want to connect and we will use all available resources to engage with each other. It’s important to remember that with social media you don’t want to talk AT people but rather talk with people. According to Gartner Research, the social media phenomenon can be broken down into five categories: Social networking Social profile management products, such as MySpace, Facebook, LinkedIn and Friendster as well as social networking analysis (SNA) technologies that employ algorithms to understand and utilize human relationships for the discovery of people and expertise. Social collaboration Technologies, such as wikis, blogs, instant messaging, collaborative office, and crowdsourcing Social publishing Technologies that assist communities in pooling individual content into a usable and community accessible content repository such as YouTube and flickr. Social feedback Gaining feedback and opinion from the community on specific items as witnessed on YouTube, flickr, Digg, Del.icio.us, and Amazon. Social analytics Describes the process of measuring, analyzing and interpreting the results of interactions and associations among people, topics and ideas. Involves collecting data from multiple sources, identifying relationships, and evaluating the impact, quality or effectiveness of a relationship. At the end of the day… Gartner predicts that by 2016, social technologies will be integrated with most business applications. Companies should bring together their social CRM, internal communications and collaboration, and public social site initiatives into a coordinated strategy.
  4. Some of the challenges that our customers talk us about are very familiar to you. Things like data leakage, you know it wasn’t that long ago that the main channel of communication that you had to worry about with respect to confidential information, was email. Today you got to worry about confidential information leaking out through Facebook, leaking out through Linkedin, leaking out through instant messaging going out over Skype which is highly encrypted and very difficult to monitor. There is a great example of all of this you had a couple of years ago, a company called Matrix Pharmaceuticals which does several drugs came out with a nasal spray called Zicam. It was found that this spray can damage the sense of smell in some of the customers. This news was first revealed over Twitter before the company was able to announce this in a controlled manner, it ran out over Twitter and the stock that day went from 19 dollars to 5 dollars and it has not really recovered since that. So there is an example that leaked out through these channels that caused severe damage to the company because it basically got out of their control. So data leakage, our customers tell us, is a huge issue. Of course incoming threats, you know it’s no longer spam and viruses coming over in email that you have to worry about. You’ve got to worry about spam and malware coming in through IM and through Facebook and Myspace and Linkedin. In fact, Information Week did a great article on how the conversion rate of spam over Facebook is far higher than the conversion rate of spam over email. So the bad guys, the hackers, are realizing that these new channels of communication are far more effective as vectors of attack than the old channels like email and increasingly they are targeting this. You need to worry about how you are addressing security on these new channels of communication. On top of that you’ve got compliance. So if you’re in financial serves or energy trading or health care or even retail you are subjected to variant compliance regulations. In fact any large company today is subject to eDiscovery and FRCP regulations that require them to make all their electronic communications easily discoverable. FINRA which is the financial services regulatory authority has explicit requirements of governing the use of social media by regulating users. So if you are financial services company with regulated users, or insurance company, or an energy company, you got to adhere with FINRA regulations. The FDA recently sanctioned a major pharmaceuticals company because their Facebook posting didn’t comply with regulations that pertain to advertising of drugs. So again if you are in healthcare or pharmaceuticals you got to worry about what the compliance regulations are around the use of these new forms of communication. And last but not least you need to ensure that critical IT resources such as Bandwidth are not getting used for unproductive or not getting swapped by unproductive use. A customer of ours, a local government agency found that as much as 84% of their Bandwidth was being used by employees for non-business related use on social networking sites, streaming videos, and using instant messaging. So 84% of their Bandwidth was being used by nonproductive use and with are solutions they are able to get visibility to that and put controls around the use of that. So these are some of the challenges that you have talked to use about with respect to the use of these new forms of communication.
  5. Osterman Research conducted a study and found that corporate users spend an average of 18 minutes on a typical workday using social networking tools (or about 4% of their workday). Indeed our own survey showed a change from 2009 to 2010 in the business use of Twitter, going from 13% of users to 78% , a 6-fold increase. Adoption of social computing and social networking in the enterprise is being driven by individuals and departments within the company, such as the Marketing & PR teams who want to use social networking for corporate messaging and advertisements or analysts who wish to publish “market”-relevant data. These are the folks who need write access. Conversely, there are those corporate users that only need read-only access. This could be departments like HR/Compliance/IT Security, which use social media to research new hires or conduct investigations. And then there’s the issue of personal use. We’ve found that restricted personal use is generally OK so long as clear guidelines are made available company-wide.
  6. So now that I’ve set the context for you and discussed the risks and regulations, it might calm your nerves, knowing that controls are available to address these security, management, and compliance concerns. Whether it’s preventing inadvertent or malicious leakage of information through social networks, protecting against hidden phishing or trojan attacks, or mapping the identities of your users across different social networking sites, there are solutions out there that enable you to comply with applicable security and compliance guidelines. For instance, it’s possible to control the activities of organizations, groups, or even individual users by setting policies, such as “only Marketing can post content” or “HR can have only read-only access to LinkedIn”. If the moderation of content is important to you (perhaps if you’re FINRA-regulated), then it’s now possible to have a second pair of eyes reviewing content before it’s posted, with little impact on the end user. And if that content is inappropriate, you can block it. If you want to enable the use of Facebook, LinkedIn, or Twitter, but block the use of thousands of applications within them, then that’s also doable, as is the logging and archiving of all activity and content, so that you have a full picture of the real-time communications of and between your users. At Actiance, we’ve been in the business of real-time communications security, management, and compliance since 2001, so we understand and know how to seamlessly integrate these real-time controls with your existing IT infrastructure.
  7. 50% of URLs are uncategorized Current solutions don’t detect many web2.0 apps – b/c they’re encrypted and/or use evasive techniques – port hopping, tunneling, etc.
  8. In fact, when it comes to Facebook, LinkedIn, and Twitter, there are nearly a hundred different features where controls can be applied. So if you don’t want your CEO using LinkedIn messaging, you can block that. You can stop the compliance team from using Facebook Careers or the HR team from following groups on LinkedIn. You can even make all of LinkedIn read-only, if that floats your boat.
  9. We also enable you to set your policies through easy pointing and clicking. You can choose to either Store, Alert, Block, or Moderate, or any combination of these four controls, for Facebook, LinkedIn, and Twitter. Furthermore, if you don’t have the time or the resources to moderate every single message that passes through the corporate network, you can set up lexicons such that certain keywords or phrases will trigger the system to withhold messages. For instance, if it’s a social security number or credit card number format, you can set a policy so that the system will catch and hold those messages that have that format.
  10. We also capture all the activities and posts of users on Facebook, LinkedIn, and Twitter – in context. So you can see that when Ted tried to share the phrase “I guarantee it”, he was actually talking about the upcoming football game, not an investment suggestion. Moreover, data can be presented for eDiscovery and exported to the archiving platform of your choice.