SlideShare une entreprise Scribd logo
1  sur  49
Social Media Risks Vs. Rewards


Understanding and avoiding risks in order to achieve rewards for
your brand in social media.
   Introductions

   Social Media Risk Concepts

   Tackling Risk

   Technology Recommendations

   Conclusion




                             Confidential   Slide 2
   Handle objections to social investment

   Protect your investment

   Protect your audience

   Save time – resource – money

   Don’t be a headline - Reduce crises that
    impact your brand and your team




                                   Confidential   Slide 3
   Who –
    ◦ Experienced Enterprise Software & Security Professionals

   What –
    ◦ Solution to discover, audit, and protect brand social accounts

   How –
    ◦ Secure, SaaS-based product




                                   Confidential                   Slide 4
5




   Social Media: Balancing
   Opportunity With Risk




Alan Webber
Principal Analyst
@AlanWebber
6




               ABOUT US
                Altimeter Group is a research-based advisory firm that helps
                companies and industries leverage disruption to their advantage.


                Visit us at http://www.altimetergroup.com or contact
                info@altimetergroup.com.




© 2012 Altimeter Group
7


       Pandora’s box




                   Used under a Creative Commons license from Christian Botha via Flickr at http://www.flickr.com/photos/23497519@N06/3868128009/

© 2012 Altimeter Group
8


       Social media crises are on the rise




© 2012 Altimeter Group
9


       What can happen…

                          March 6, 2012: “Dinner w/Board
                          tonite. Used to be fun. Now one
                               must be on guard every
                                      second.”




                          March 7, 2012: “Board meeting.
                          Good numbers=Happy Board.”




                          March 10, 2012: “I am logging
                           off Twitter now because co-
                          workers are looking at me as
                                   I'm laughing.”




© 2012 Altimeter Group
10


       Agenda
    Understanding the
     risks
    Putting social media
     risk management in
     place
    Next steps




© 2012 Altimeter Group
11


       Key types of risk
                  Reputation

            Confidential Info

           Legal, Regulatory
            & Compliance

                Identity Theft




© 2012 Altimeter Group
12


       Key types of risk
                  Reputation
                                 Internal
            Confidential Info

           Legal, Regulatory
            & Compliance
                                 External
                Identity Theft




© 2012 Altimeter Group
13


       Reputation is the highest risk




© 2012 Altimeter Group
14


       Every platform is a source of risk




© 2012 Altimeter Group
15


       Facebook is the riskiest




© 2012 Altimeter Group
16


       The IAME model




© 2012 Altimeter Group
17


       Step 1: Identify the risks




© 2012 Altimeter Group
18


       Four types of risk
        Reputational
        Regulatory and compliance
        Legal and privacy
        Operational




© 2012 Altimeter Group
Organizational reputation risk
        Damage to the brand reputation
        Results in a loss of trust and credibility
        Can lead to other significant losses




© 2012 Altimeter Group
20


       Kenneth Cole receives mass backlash for
       insensitive #Cairo tweet and quickly retracts




© 2012 Altimeter Group
21


       But not before spoof PR Twitter account is
       created and bad press spread with hashtag




© 2012 Altimeter Group
Regulatory and compliance risk
        Violations of government and regulatory agency
         rules and and guidelines
        Primary result is financial penalty or similar
         government imposed sanction
        Can lead to reputation degradation




© 2012 Altimeter Group
Novartis gets slapped by FDA




© 2012 Altimeter Group
Legal and privacy risk
        Result in the organization failing to take a
         necessary action that results in harm
        Often these are privacy issues or release of
         confidential information




© 2012 Altimeter Group
Operational risk
        Can compromise the operations and security of
         an organization
        Includes
               • Reduced employee productivity
               • Release of IP
               • Malware
               • Social engineering
               • Digital business continuity



© 2012 Altimeter Group
26


       How to identify potential risks
        Review historical activities
        What are you hearing
        Learn from others
        Create a social media risk library
        Review the risks of new activities
        Look at platform shifts




© 2012 Altimeter Group
27


       Step 2: Assess the risks




© 2012 Altimeter Group
28


       Companies don’t assess their social risk




© 2012 Altimeter Group
29



       BofA fee debacle: what happened?


   How this




                         Led to this




                                   Which led
                                    to this

                                               Sources: TIME, New York Times
© 2012 Altimeter Group
30



       BofA fee debacle: Twitter exploded




                                                   There was so much buzz that
                                                   “Debit card fees” was a
                                                   trending topic




                         Source: Huffington Post, “Bank Of America Debit Card Fees: Twitter Reacts”

© 2012 Altimeter Group
31



       BofA fee debacle: a real business impact

               In a TIME poll, 75% of nearly 1,000 Bank of
               America customers said they’d switch banks.

               According to J.D. Power’s director of banking
               services, roughly two-thirds of people who say
               that they plan to switch banks actually do so.


                         The bank’s stock dropped by more
                         than 3.5 percent the day after the
                         fees were announced.

                               Source: TIME, “Bank of America Backlash: Consumers React to Debit Card Fee”

© 2012 Altimeter Group
32


       Assessing a social media risk
             Component            Subcomponent
         Likelihood


                         Catalyst
                         Opportunity
                         Motive
                         Reputation
         Impact




                         Availability
                         Legal/Compliance

© 2012 Altimeter Group
33


       Four steps to assess a risk
       1. Rate the likelihood
       2. Rate the potential impact
       3. Rank the risks
       4. Prioritize efforts and resources




© 2012 Altimeter Group
34


       Scoring the social risk




© 2012 Altimeter Group
35


       Step 3: Mitigate and manage




© 2012 Altimeter Group
36


       Six steps to social media risk mitigation
       1. Understand how to make decisions
       2. Put governance in place
       3. Staff with dedicated resources
       4. Put the right policies in place
       5. Train employees on boundaries
       6. Deploy necessary tools




© 2012 Altimeter Group
37


       Have a decision making structure




© 2012 Altimeter Group
38


       Have a governance model established




© 2012 Altimeter Group
39


       All the right components of the organization need
       to be included
                                         Marketing


                                         Human
                                        Resources

                                         Legal and
                                        Compliance
                         Social Media
                          Risk Mgt.
                                         IT and IS


                                        Comms and
                                           PR

                                        Security and
                                         Risk Mgt

© 2012 Altimeter Group
40


       Have the right policies




© 2012 Altimeter Group
41


       Define expectations for associates with an
       internal Social Media Policy




                    Examples of Social Media Guidelines created by
                                   Intel and Cisco

© 2012 Altimeter Group
42


       And make sure they are up to date




© 2012 Altimeter Group
43


       Train employees on the boundaries




© 2012 Altimeter Group
44


       Put the right tools in place


                                Listening and
                                 Monitoring




                           Social
                           Media            SMMS
                         Compliance



© 2012 Altimeter Group
45


       Step 4: Monitor and evaluate




© 2012 Altimeter Group
46


       Putting evaluation in place
        Listen and learn
        Review mitigation efforts and strategies when
               • Entering a new channel
               • Emergence of a new technology
               • Identification of a new threat
        Go back to start




© 2012 Altimeter Group
47


       Next steps:
       1. Make social media risk a board issue
       2. Learn from past crises
       3. Review your own responses
       4. Test your ability to respond




© 2012 Altimeter Group
①   Address Account Sprawl
    Inventory & Audit Your Brand Accounts
               +
②   Protect / Lock Account Access
    Which admins
    What Publishing Apps (never just 1)
    What known good profile
               +
③   Compliance, Security, and AUP Policies
    Auto-moderation for bad / dangerous content
    Enforce policies regardless of publishing app
    Use incident notification, archiving, and remediation
    for posts, comments, tweets, etc.




                                                            Slide 48
49




               THANK YOU



                 Alan Webber               Devin Redmond
                 alan@altimetergroup.com   devin@socialiqnetworks.com
                 roninresearch.org         socialiqnetworks.com
                 Twitter: alanewebber      @SocialiQNet




© 2012 Altimeter Group

Contenu connexe

En vedette

Sales Email Hacks for Gmail and Salesforce
Sales Email Hacks for Gmail and SalesforceSales Email Hacks for Gmail and Salesforce
Sales Email Hacks for Gmail and SalesforceRingLead
 
Ute el emprendimiento social comomarco de análisis; el liderazgo de los empre...
Ute el emprendimiento social comomarco de análisis; el liderazgo de los empre...Ute el emprendimiento social comomarco de análisis; el liderazgo de los empre...
Ute el emprendimiento social comomarco de análisis; el liderazgo de los empre...Monica Ordoñez
 
FenForm Technical Booklet
FenForm Technical BookletFenForm Technical Booklet
FenForm Technical BookletCoral Banks
 
Steve Grubich Healthcare Overview : 57 teams - 25 settings - 27 coaching cl...
Steve Grubich  Healthcare Overview :  57 teams - 25 settings - 27 coaching cl...Steve Grubich  Healthcare Overview :  57 teams - 25 settings - 27 coaching cl...
Steve Grubich Healthcare Overview : 57 teams - 25 settings - 27 coaching cl...Steve Grubich
 
Concour pharmacie 2012-2013
Concour pharmacie 2012-2013Concour pharmacie 2012-2013
Concour pharmacie 2012-2013Spiderbooy
 
Ninth Space Brand Consultants; Our Work
Ninth Space Brand Consultants; Our Work Ninth Space Brand Consultants; Our Work
Ninth Space Brand Consultants; Our Work Ninth Space
 
2015 International ESD Workshop
2015 International ESD Workshop2015 International ESD Workshop
2015 International ESD WorkshopESD association
 
Crear+un+blog+con+blogger
Crear+un+blog+con+bloggerCrear+un+blog+con+blogger
Crear+un+blog+con+bloggerTINI07
 
Bose Recalls Dual-Voltage CineMate II Home Theater Speaker Systems Due to Fir...
Bose Recalls Dual-Voltage CineMate II Home Theater Speaker Systems Due to Fir...Bose Recalls Dual-Voltage CineMate II Home Theater Speaker Systems Due to Fir...
Bose Recalls Dual-Voltage CineMate II Home Theater Speaker Systems Due to Fir...didacticspectat00
 
V Concurso De Fotografía del Arboreto (EMASESA)
V  Concurso De  Fotografía del  Arboreto (EMASESA)V  Concurso De  Fotografía del  Arboreto (EMASESA)
V Concurso De Fotografía del Arboreto (EMASESA)EmasesaMetropolitana
 
Cadena de valor kte
Cadena de valor kteCadena de valor kte
Cadena de valor ktekate463182
 
El comercio electrónico: una oportunidad para el desarrollo
El comercio electrónico: una oportunidad para el desarrolloEl comercio electrónico: una oportunidad para el desarrollo
El comercio electrónico: una oportunidad para el desarrolloClaudio Alberto Moreno López
 
30 errores que cometemos las empresas en Marketing Online
30 errores que cometemos las empresas en Marketing Online30 errores que cometemos las empresas en Marketing Online
30 errores que cometemos las empresas en Marketing OnlineBruno Vázquez-Dodero
 
əLaqə microsoft office power point presentation (2)
əLaqə microsoft office power point presentation (2)əLaqə microsoft office power point presentation (2)
əLaqə microsoft office power point presentation (2)Mehriban Meherremova
 
Lecture 12 a eco labels
Lecture 12 a eco labelsLecture 12 a eco labels
Lecture 12 a eco labelsAdane Nega
 
Amarigna & Tigrigna Qal Rosetta Stone
Amarigna & Tigrigna Qal Rosetta StoneAmarigna & Tigrigna Qal Rosetta Stone
Amarigna & Tigrigna Qal Rosetta StoneLegesse Allyn
 
IVU complicada y no complicada
IVU complicada y no complicadaIVU complicada y no complicada
IVU complicada y no complicadaSesman Dezzet
 

En vedette (20)

Sales Email Hacks for Gmail and Salesforce
Sales Email Hacks for Gmail and SalesforceSales Email Hacks for Gmail and Salesforce
Sales Email Hacks for Gmail and Salesforce
 
Ute el emprendimiento social comomarco de análisis; el liderazgo de los empre...
Ute el emprendimiento social comomarco de análisis; el liderazgo de los empre...Ute el emprendimiento social comomarco de análisis; el liderazgo de los empre...
Ute el emprendimiento social comomarco de análisis; el liderazgo de los empre...
 
FenForm Technical Booklet
FenForm Technical BookletFenForm Technical Booklet
FenForm Technical Booklet
 
Steve Grubich Healthcare Overview : 57 teams - 25 settings - 27 coaching cl...
Steve Grubich  Healthcare Overview :  57 teams - 25 settings - 27 coaching cl...Steve Grubich  Healthcare Overview :  57 teams - 25 settings - 27 coaching cl...
Steve Grubich Healthcare Overview : 57 teams - 25 settings - 27 coaching cl...
 
Concour pharmacie 2012-2013
Concour pharmacie 2012-2013Concour pharmacie 2012-2013
Concour pharmacie 2012-2013
 
Ninth Space Brand Consultants; Our Work
Ninth Space Brand Consultants; Our Work Ninth Space Brand Consultants; Our Work
Ninth Space Brand Consultants; Our Work
 
Big fish!
Big fish!Big fish!
Big fish!
 
2015 International ESD Workshop
2015 International ESD Workshop2015 International ESD Workshop
2015 International ESD Workshop
 
Crear+un+blog+con+blogger
Crear+un+blog+con+bloggerCrear+un+blog+con+blogger
Crear+un+blog+con+blogger
 
Bose Recalls Dual-Voltage CineMate II Home Theater Speaker Systems Due to Fir...
Bose Recalls Dual-Voltage CineMate II Home Theater Speaker Systems Due to Fir...Bose Recalls Dual-Voltage CineMate II Home Theater Speaker Systems Due to Fir...
Bose Recalls Dual-Voltage CineMate II Home Theater Speaker Systems Due to Fir...
 
Sincope
SincopeSincope
Sincope
 
V Concurso De Fotografía del Arboreto (EMASESA)
V  Concurso De  Fotografía del  Arboreto (EMASESA)V  Concurso De  Fotografía del  Arboreto (EMASESA)
V Concurso De Fotografía del Arboreto (EMASESA)
 
Cadena de valor kte
Cadena de valor kteCadena de valor kte
Cadena de valor kte
 
El puto amo
El puto amoEl puto amo
El puto amo
 
El comercio electrónico: una oportunidad para el desarrollo
El comercio electrónico: una oportunidad para el desarrolloEl comercio electrónico: una oportunidad para el desarrollo
El comercio electrónico: una oportunidad para el desarrollo
 
30 errores que cometemos las empresas en Marketing Online
30 errores que cometemos las empresas en Marketing Online30 errores que cometemos las empresas en Marketing Online
30 errores que cometemos las empresas en Marketing Online
 
əLaqə microsoft office power point presentation (2)
əLaqə microsoft office power point presentation (2)əLaqə microsoft office power point presentation (2)
əLaqə microsoft office power point presentation (2)
 
Lecture 12 a eco labels
Lecture 12 a eco labelsLecture 12 a eco labels
Lecture 12 a eco labels
 
Amarigna & Tigrigna Qal Rosetta Stone
Amarigna & Tigrigna Qal Rosetta StoneAmarigna & Tigrigna Qal Rosetta Stone
Amarigna & Tigrigna Qal Rosetta Stone
 
IVU complicada y no complicada
IVU complicada y no complicadaIVU complicada y no complicada
IVU complicada y no complicada
 

Similaire à iStrategy Chicago Conference 2012 - Social Media Risks Vs. Rewards

Attack of the Customers!
Attack of the Customers!Attack of the Customers!
Attack of the Customers!Paul Gillin
 
Paul Gillin Keynote: April 25, 2012
Paul Gillin Keynote: April 25, 2012Paul Gillin Keynote: April 25, 2012
Paul Gillin Keynote: April 25, 2012SugarCRM
 
Optimizing the Customer Experience with Real-Time Marketing
Optimizing the Customer Experience with Real-Time MarketingOptimizing the Customer Experience with Real-Time Marketing
Optimizing the Customer Experience with Real-Time MarketingRebecca Lieb
 
Preparing For The Future Of Social Media
Preparing For The Future Of Social MediaPreparing For The Future Of Social Media
Preparing For The Future Of Social MediaCharlene Li
 
Social Content Marketing on SlideShare, by @jowyang
Social Content Marketing on SlideShare, by @jowyangSocial Content Marketing on SlideShare, by @jowyang
Social Content Marketing on SlideShare, by @jowyangSlideShare Webinar
 
Building Effective Social Media Policies
Building Effective Social Media PoliciesBuilding Effective Social Media Policies
Building Effective Social Media PoliciesSocial iQ Networks
 
What Law Firms Need to Know About Their Clients
What Law Firms Need to Know About Their ClientsWhat Law Firms Need to Know About Their Clients
What Law Firms Need to Know About Their ClientsJayne Navarre
 
Outlook: 2013 Marketing, Advertising & Social Media Trends
Outlook: 2013 Marketing, Advertising & Social Media TrendsOutlook: 2013 Marketing, Advertising & Social Media Trends
Outlook: 2013 Marketing, Advertising & Social Media TrendsRebecca Lieb
 
Guarding the Social Gates: The Imperative for Social Media Risk Management
 Guarding the Social Gates: The Imperative for Social Media Risk Management Guarding the Social Gates: The Imperative for Social Media Risk Management
Guarding the Social Gates: The Imperative for Social Media Risk ManagementUzzi Ohana
 
[Report] Guarding the Social Gates: The Imperative for Social Media Risk Mana...
[Report] Guarding the Social Gates: The Imperative for Social Media Risk Mana...[Report] Guarding the Social Gates: The Imperative for Social Media Risk Mana...
[Report] Guarding the Social Gates: The Imperative for Social Media Risk Mana...Altimeter, a Prophet Company
 
Breaking down the cyber security framework closing critical it security gaps
Breaking down the cyber security framework closing critical it security gapsBreaking down the cyber security framework closing critical it security gaps
Breaking down the cyber security framework closing critical it security gapsIBM Security
 
(POMP Forum 2012) Rebecca Lieb: 5 stopenj vsebinskega marketinga
(POMP Forum 2012) Rebecca Lieb: 5 stopenj vsebinskega marketinga(POMP Forum 2012) Rebecca Lieb: 5 stopenj vsebinskega marketinga
(POMP Forum 2012) Rebecca Lieb: 5 stopenj vsebinskega marketingaPM, poslovni mediji
 
Working with-industry-analysts
Working with-industry-analystsWorking with-industry-analysts
Working with-industry-analystsSusan Etlinger
 
DM Event Facebook Ecosystem 2
DM Event Facebook Ecosystem 2DM Event Facebook Ecosystem 2
DM Event Facebook Ecosystem 2loukerner4
 
eMarketer Webinar: Social Media Marketing for Verticals—What Works for Key In...
eMarketer Webinar: Social Media Marketing for Verticals—What Works for Key In...eMarketer Webinar: Social Media Marketing for Verticals—What Works for Key In...
eMarketer Webinar: Social Media Marketing for Verticals—What Works for Key In...eMarketer
 
Vivaki Social PR Workshop
Vivaki Social PR WorkshopVivaki Social PR Workshop
Vivaki Social PR WorkshopMichoel Ogince
 
Cutter Summit 2012: Roundtable on ESN Adoption
Cutter Summit 2012: Roundtable on ESN AdoptionCutter Summit 2012: Roundtable on ESN Adoption
Cutter Summit 2012: Roundtable on ESN AdoptionClaude Baudoin
 
FORUM 2013 Social media - a risk management challenge
FORUM 2013 Social media - a risk management challengeFORUM 2013 Social media - a risk management challenge
FORUM 2013 Social media - a risk management challengeFERMA
 

Similaire à iStrategy Chicago Conference 2012 - Social Media Risks Vs. Rewards (20)

Attack of the Customers!
Attack of the Customers!Attack of the Customers!
Attack of the Customers!
 
Paul Gillin Keynote: April 25, 2012
Paul Gillin Keynote: April 25, 2012Paul Gillin Keynote: April 25, 2012
Paul Gillin Keynote: April 25, 2012
 
Optimizing the Customer Experience with Real-Time Marketing
Optimizing the Customer Experience with Real-Time MarketingOptimizing the Customer Experience with Real-Time Marketing
Optimizing the Customer Experience with Real-Time Marketing
 
Preparing For The Future Of Social Media
Preparing For The Future Of Social MediaPreparing For The Future Of Social Media
Preparing For The Future Of Social Media
 
Social Content Marketing on SlideShare, by @jowyang
Social Content Marketing on SlideShare, by @jowyangSocial Content Marketing on SlideShare, by @jowyang
Social Content Marketing on SlideShare, by @jowyang
 
Building Effective Social Media Policies
Building Effective Social Media PoliciesBuilding Effective Social Media Policies
Building Effective Social Media Policies
 
What Law Firms Need to Know About Their Clients
What Law Firms Need to Know About Their ClientsWhat Law Firms Need to Know About Their Clients
What Law Firms Need to Know About Their Clients
 
Outlook: 2013 Marketing, Advertising & Social Media Trends
Outlook: 2013 Marketing, Advertising & Social Media TrendsOutlook: 2013 Marketing, Advertising & Social Media Trends
Outlook: 2013 Marketing, Advertising & Social Media Trends
 
Social Media Presentation
Social Media PresentationSocial Media Presentation
Social Media Presentation
 
Guarding the Social Gates: The Imperative for Social Media Risk Management
 Guarding the Social Gates: The Imperative for Social Media Risk Management Guarding the Social Gates: The Imperative for Social Media Risk Management
Guarding the Social Gates: The Imperative for Social Media Risk Management
 
[Report] Guarding the Social Gates: The Imperative for Social Media Risk Mana...
[Report] Guarding the Social Gates: The Imperative for Social Media Risk Mana...[Report] Guarding the Social Gates: The Imperative for Social Media Risk Mana...
[Report] Guarding the Social Gates: The Imperative for Social Media Risk Mana...
 
Breaking down the cyber security framework closing critical it security gaps
Breaking down the cyber security framework closing critical it security gapsBreaking down the cyber security framework closing critical it security gaps
Breaking down the cyber security framework closing critical it security gaps
 
(POMP Forum 2012) Rebecca Lieb: 5 stopenj vsebinskega marketinga
(POMP Forum 2012) Rebecca Lieb: 5 stopenj vsebinskega marketinga(POMP Forum 2012) Rebecca Lieb: 5 stopenj vsebinskega marketinga
(POMP Forum 2012) Rebecca Lieb: 5 stopenj vsebinskega marketinga
 
Working with-industry-analysts
Working with-industry-analystsWorking with-industry-analysts
Working with-industry-analysts
 
DM Event Facebook Ecosystem 2
DM Event Facebook Ecosystem 2DM Event Facebook Ecosystem 2
DM Event Facebook Ecosystem 2
 
eMarketer Webinar: Social Media Marketing for Verticals—What Works for Key In...
eMarketer Webinar: Social Media Marketing for Verticals—What Works for Key In...eMarketer Webinar: Social Media Marketing for Verticals—What Works for Key In...
eMarketer Webinar: Social Media Marketing for Verticals—What Works for Key In...
 
Vivaki Social PR Workshop
Vivaki Social PR WorkshopVivaki Social PR Workshop
Vivaki Social PR Workshop
 
Web 2.0 Opportunities and Risks
Web 2.0 Opportunities and RisksWeb 2.0 Opportunities and Risks
Web 2.0 Opportunities and Risks
 
Cutter Summit 2012: Roundtable on ESN Adoption
Cutter Summit 2012: Roundtable on ESN AdoptionCutter Summit 2012: Roundtable on ESN Adoption
Cutter Summit 2012: Roundtable on ESN Adoption
 
FORUM 2013 Social media - a risk management challenge
FORUM 2013 Social media - a risk management challengeFORUM 2013 Social media - a risk management challenge
FORUM 2013 Social media - a risk management challenge
 

iStrategy Chicago Conference 2012 - Social Media Risks Vs. Rewards

  • 1. Social Media Risks Vs. Rewards Understanding and avoiding risks in order to achieve rewards for your brand in social media.
  • 2. Introductions  Social Media Risk Concepts  Tackling Risk  Technology Recommendations  Conclusion Confidential Slide 2
  • 3. Handle objections to social investment  Protect your investment  Protect your audience  Save time – resource – money  Don’t be a headline - Reduce crises that impact your brand and your team Confidential Slide 3
  • 4. Who – ◦ Experienced Enterprise Software & Security Professionals  What – ◦ Solution to discover, audit, and protect brand social accounts  How – ◦ Secure, SaaS-based product Confidential Slide 4
  • 5. 5 Social Media: Balancing Opportunity With Risk Alan Webber Principal Analyst @AlanWebber
  • 6. 6 ABOUT US Altimeter Group is a research-based advisory firm that helps companies and industries leverage disruption to their advantage. Visit us at http://www.altimetergroup.com or contact info@altimetergroup.com. © 2012 Altimeter Group
  • 7. 7 Pandora’s box Used under a Creative Commons license from Christian Botha via Flickr at http://www.flickr.com/photos/23497519@N06/3868128009/ © 2012 Altimeter Group
  • 8. 8 Social media crises are on the rise © 2012 Altimeter Group
  • 9. 9 What can happen… March 6, 2012: “Dinner w/Board tonite. Used to be fun. Now one must be on guard every second.” March 7, 2012: “Board meeting. Good numbers=Happy Board.” March 10, 2012: “I am logging off Twitter now because co- workers are looking at me as I'm laughing.” © 2012 Altimeter Group
  • 10. 10 Agenda  Understanding the risks  Putting social media risk management in place  Next steps © 2012 Altimeter Group
  • 11. 11 Key types of risk Reputation Confidential Info Legal, Regulatory & Compliance Identity Theft © 2012 Altimeter Group
  • 12. 12 Key types of risk Reputation Internal Confidential Info Legal, Regulatory & Compliance External Identity Theft © 2012 Altimeter Group
  • 13. 13 Reputation is the highest risk © 2012 Altimeter Group
  • 14. 14 Every platform is a source of risk © 2012 Altimeter Group
  • 15. 15 Facebook is the riskiest © 2012 Altimeter Group
  • 16. 16 The IAME model © 2012 Altimeter Group
  • 17. 17 Step 1: Identify the risks © 2012 Altimeter Group
  • 18. 18 Four types of risk  Reputational  Regulatory and compliance  Legal and privacy  Operational © 2012 Altimeter Group
  • 19. Organizational reputation risk  Damage to the brand reputation  Results in a loss of trust and credibility  Can lead to other significant losses © 2012 Altimeter Group
  • 20. 20 Kenneth Cole receives mass backlash for insensitive #Cairo tweet and quickly retracts © 2012 Altimeter Group
  • 21. 21 But not before spoof PR Twitter account is created and bad press spread with hashtag © 2012 Altimeter Group
  • 22. Regulatory and compliance risk  Violations of government and regulatory agency rules and and guidelines  Primary result is financial penalty or similar government imposed sanction  Can lead to reputation degradation © 2012 Altimeter Group
  • 23. Novartis gets slapped by FDA © 2012 Altimeter Group
  • 24. Legal and privacy risk  Result in the organization failing to take a necessary action that results in harm  Often these are privacy issues or release of confidential information © 2012 Altimeter Group
  • 25. Operational risk  Can compromise the operations and security of an organization  Includes • Reduced employee productivity • Release of IP • Malware • Social engineering • Digital business continuity © 2012 Altimeter Group
  • 26. 26 How to identify potential risks  Review historical activities  What are you hearing  Learn from others  Create a social media risk library  Review the risks of new activities  Look at platform shifts © 2012 Altimeter Group
  • 27. 27 Step 2: Assess the risks © 2012 Altimeter Group
  • 28. 28 Companies don’t assess their social risk © 2012 Altimeter Group
  • 29. 29 BofA fee debacle: what happened? How this Led to this Which led to this Sources: TIME, New York Times © 2012 Altimeter Group
  • 30. 30 BofA fee debacle: Twitter exploded There was so much buzz that “Debit card fees” was a trending topic Source: Huffington Post, “Bank Of America Debit Card Fees: Twitter Reacts” © 2012 Altimeter Group
  • 31. 31 BofA fee debacle: a real business impact In a TIME poll, 75% of nearly 1,000 Bank of America customers said they’d switch banks. According to J.D. Power’s director of banking services, roughly two-thirds of people who say that they plan to switch banks actually do so. The bank’s stock dropped by more than 3.5 percent the day after the fees were announced. Source: TIME, “Bank of America Backlash: Consumers React to Debit Card Fee” © 2012 Altimeter Group
  • 32. 32 Assessing a social media risk Component Subcomponent Likelihood Catalyst Opportunity Motive Reputation Impact Availability Legal/Compliance © 2012 Altimeter Group
  • 33. 33 Four steps to assess a risk 1. Rate the likelihood 2. Rate the potential impact 3. Rank the risks 4. Prioritize efforts and resources © 2012 Altimeter Group
  • 34. 34 Scoring the social risk © 2012 Altimeter Group
  • 35. 35 Step 3: Mitigate and manage © 2012 Altimeter Group
  • 36. 36 Six steps to social media risk mitigation 1. Understand how to make decisions 2. Put governance in place 3. Staff with dedicated resources 4. Put the right policies in place 5. Train employees on boundaries 6. Deploy necessary tools © 2012 Altimeter Group
  • 37. 37 Have a decision making structure © 2012 Altimeter Group
  • 38. 38 Have a governance model established © 2012 Altimeter Group
  • 39. 39 All the right components of the organization need to be included Marketing Human Resources Legal and Compliance Social Media Risk Mgt. IT and IS Comms and PR Security and Risk Mgt © 2012 Altimeter Group
  • 40. 40 Have the right policies © 2012 Altimeter Group
  • 41. 41 Define expectations for associates with an internal Social Media Policy Examples of Social Media Guidelines created by Intel and Cisco © 2012 Altimeter Group
  • 42. 42 And make sure they are up to date © 2012 Altimeter Group
  • 43. 43 Train employees on the boundaries © 2012 Altimeter Group
  • 44. 44 Put the right tools in place Listening and Monitoring Social Media SMMS Compliance © 2012 Altimeter Group
  • 45. 45 Step 4: Monitor and evaluate © 2012 Altimeter Group
  • 46. 46 Putting evaluation in place  Listen and learn  Review mitigation efforts and strategies when • Entering a new channel • Emergence of a new technology • Identification of a new threat  Go back to start © 2012 Altimeter Group
  • 47. 47 Next steps: 1. Make social media risk a board issue 2. Learn from past crises 3. Review your own responses 4. Test your ability to respond © 2012 Altimeter Group
  • 48. Address Account Sprawl Inventory & Audit Your Brand Accounts + ② Protect / Lock Account Access Which admins What Publishing Apps (never just 1) What known good profile + ③ Compliance, Security, and AUP Policies Auto-moderation for bad / dangerous content Enforce policies regardless of publishing app Use incident notification, archiving, and remediation for posts, comments, tweets, etc. Slide 48
  • 49. 49 THANK YOU Alan Webber Devin Redmond alan@altimetergroup.com devin@socialiqnetworks.com roninresearch.org socialiqnetworks.com Twitter: alanewebber @SocialiQNet © 2012 Altimeter Group

Notes de l'éditeur

  1. Gene Morphis, CFO of Francesca’s Holdings Corp., was fired in May 2012 for 'improperly' communicating through social networks. He used Twitter to write about Francesca's Holdings Corp., its results and dealings between investors and his board.He tweeted details of goings-on within his company from an account under the handle 'theoldcfo’: Dinner w/Board tonite. Used to be fun. Now one must be on guard every second' he told his followers on March 6.The following day he followed up with: 'Board meeting. Good numbers=Happy Board.’Greg Brenneman, Chairman of the Board of Directors, said in a statement that the company was 'disappointed by this situation'.'We expect our executives to comply with all Company policies,' he said.
  2. Reputation – Kenneth Cole tweet in Feb 2012 about the uprising in egyptConfidential info - Francesca exampleLegal – Allergy PathwaysIdentity theft – Royal Dutch Shell and Greenpeace
  3. Kenneth Cole tweet in Feb 2012 about the uprising in egypt
  4. Kenneth Cole tweeted the above insensitive and irresponsible message in a ploy to use the timely hashtag #Cairo to relay information about his brand's spring fashion line.While Kenneth Cole did tweet an apology some two hours later, it doesn't seem to be enough to quell the backlash taking place online already. Unfortunately for Kenneth Cole, he can't even push blame to an incompetent intern or PR lackey since his initials denote his ownership of the tweet.This isn’t the first time the fashion designer has been in hot water over insensitivity.Kenneth Cole has a history of distastefully inserting brand mentions into current events. He is on record for making light of 9-11 with his quote to New York Daily News: "Important moments like this are a time to reflect," Cole added. "To remind us, sometimes, that it's not only important what you wear, but it's also important to be aware.” SOURCES:http://mshahab.posterous.com/hashtag-hacking-the-kenneth-cole-failhttp://www.businessinsider.com/kenneth-cole-pr-2011-2#first-the-original-tweet-that-set-this-off-pretty-ghastly-1
  5. #KennethColeTweets and @KennethColePR were both used by the masses on Twitter to rally opposition against the fashion designer. They were used not only for spoof tweets but also to suggest repentance options to Kenneth Cole for his Twitter misstep. After cleverly brand jacking the Kenneth Cole name for a day, the person behind the @KennethColePR account offered to give up the handle if Kenneth Cole contributed to charity. He later tweeted the handle would no longer be used either way.SOURCES:http://mshahab.posterous.com/hashtag-hacking-the-kenneth-cole-failhttp://www.businessinsider.com/kenneth-cole-pr-2011-2#first-the-original-tweet-that-set-this-off-pretty-ghastly-1http://www.businessinsider.com/kenneth-cole-pr-2011-2#still-on-the-egypt-theme-referencing-that-cnns-anderson-cooper-got-assaulted-2
  6. 1. http://moneyland.time.com/2011/09/29/bank-of-america-to-charge-5-a-month-for-debit-card-use-next-year/2. http://moneyland.time.com/2011/10/03/bank-of-america-backlash-consumers-react-to-debit-card-fee3. http://www.nytimes.com/2011/11/02/business/bank-of-america-drops-plan-for-debit-card-fee.html
  7. http://www.mybanktracker.com/bank-reviews/Bank-of-America/Do-Not-Bank-Here-5165http://www.huffingtonpost.com/2011/09/30/bank-of-america-debit-card-fees_n_989397.html
  8. http://moneyland.time.com/2011/10/03/bank-of-america-backlash-consumers-react-to-debit-card-fee
  9. The Social Media Governance website has over 160 Social Media policy documents from a wide variety of companies