SlideShare a Scribd company logo
1 of 3
Download to read offline
22 Must Haves For
    Secure Enterprise Social
How to Avoid Common Risk, Compliance, and Governance Mistakes
The Enterprise Social Media Security Reality

       “Almost two-thirds of companies surveyed
       say that social media is a significant or
       critical risk to their brand reputation; yet
       60% of companies either never train their
       employees about their corporate social
       media policies or do so only upon hiring.
       Moreover, 43% of companies have less than
       one Full-Time Equivalent (FTE) dedicated to
       managing social media risk.”
                    Guarding the Social Gates: The Imperative
                           for Social Media Risk Management
                       (Alan Webber, Altimeter, August 2012)



       “Nearly two-thirds of security and risk
       professionals (64%) have no social media
       policy in place or if they do, they lack
       tools to sufficiently enforce and support
       the policy.”
                            Manage the Risks of Social Media
                              (Chris McClean and Nick Hayes,
                    Forrester Research, Inc., November 2012)
Social@Scale Security Checklist
22 Must Haves For Every Enterprise-wide Social Media Deployment


                 Do we have...?                                                               Yes   No
Governance
                  1. content rules that flag unacceptable outbound content?

                  2. an approval workflow for outbound content?

                  3. the legal team involved for outbound content guidelines?

                  4. a defined escalation process?

                  5. the ability to track messages from inception to resolution?

                  6. a way to handle rogue accounts?

                  7. enterprise-wide, single point password control?

                  8. a rule to disapprove sending passwords around in Excel?

                  9. Access Management?

                 10. a social media policy or guidelines?

Security
                 11. the ability to treat private messages differently?

                 12. the ability to integrate with enterprise-wide authentication systems?

                 13. only tools and platforms that are enterprise-grade security compliant?

                 14. enforced password guidelines?

                 15. the ability to differentiate influencers?

                 16. automated monitoring rules?

Compliance
                 17. the ability to retract social messages from a central location?
                 18. the ability to document internal conversations about social
                     media situations?
                 19. the ability to archive outbound content?

                 20. the ability to archive inbound content?

                 21. the ability to create audit trails for social media activities?
                 22. a Social Media Management System that meets our own corporate
                     security requirements?

           To learn more about Social@Scale Security, visit us at www.sprinklr.com

More Related Content

What's hot

Synthesio book signing marshall sponder - delivered
Synthesio book signing    marshall sponder - deliveredSynthesio book signing    marshall sponder - delivered
Synthesio book signing marshall sponder - deliveredMarshall Sponder
 
[Report] Power to the People: Identify and Empower Your Mobile Workforce, by ...
[Report] Power to the People: Identify and Empower Your Mobile Workforce, by ...[Report] Power to the People: Identify and Empower Your Mobile Workforce, by ...
[Report] Power to the People: Identify and Empower Your Mobile Workforce, by ...Altimeter, a Prophet Company
 
[Report] Social Data Intelligence, by Susan Etlinger
[Report] Social Data Intelligence, by Susan Etlinger [Report] Social Data Intelligence, by Susan Etlinger
[Report] Social Data Intelligence, by Susan Etlinger Altimeter, a Prophet Company
 
The guide to social media marketing and buisness intel.pdf
The guide to social media marketing and buisness intel.pdfThe guide to social media marketing and buisness intel.pdf
The guide to social media marketing and buisness intel.pdfAnjanette Delgado
 
[Report] The Social Media ROI Cookbook, by Susan Etlinger
[Report] The Social Media ROI Cookbook, by Susan Etlinger[Report] The Social Media ROI Cookbook, by Susan Etlinger
[Report] The Social Media ROI Cookbook, by Susan EtlingerAltimeter, a Prophet Company
 
Social monitoring bootcamp Bogota, Colobmia
Social monitoring bootcamp Bogota, ColobmiaSocial monitoring bootcamp Bogota, Colobmia
Social monitoring bootcamp Bogota, ColobmiaMarshall Sponder
 
Brands onlysocial marshall sponder - updated & delivered-v3
Brands onlysocial marshall sponder - updated & delivered-v3Brands onlysocial marshall sponder - updated & delivered-v3
Brands onlysocial marshall sponder - updated & delivered-v3Marshall Sponder
 
Best Practices from the World's Most Social Big Brands
Best Practices from the World's Most Social Big BrandsBest Practices from the World's Most Social Big Brands
Best Practices from the World's Most Social Big BrandsSprinklr
 
[Report] Make An App For That: Mobile Strategies For Retail, by Chris Silva
[Report] Make An App For That: Mobile Strategies For Retail, by Chris Silva[Report] Make An App For That: Mobile Strategies For Retail, by Chris Silva
[Report] Make An App For That: Mobile Strategies For Retail, by Chris SilvaAltimeter, a Prophet Company
 
Social CRM the new rules of relationship management
Social CRM the new rules of relationship managementSocial CRM the new rules of relationship management
Social CRM the new rules of relationship managementPlínio Okamoto
 
The Social CEO: Executives Tell All
The Social CEO: Executives Tell AllThe Social CEO: Executives Tell All
The Social CEO: Executives Tell AllWeber Shandwick
 
Financial Institutions and Social Media
Financial Institutions and Social Media Financial Institutions and Social Media
Financial Institutions and Social Media Ogilvy Consulting
 
Social Media ROI Cycle by Jamie Turner
Social Media ROI Cycle by Jamie TurnerSocial Media ROI Cycle by Jamie Turner
Social Media ROI Cycle by Jamie TurnerSIXTY
 
2014 market-report-online-community-trends get-satisfaction
2014 market-report-online-community-trends get-satisfaction2014 market-report-online-community-trends get-satisfaction
2014 market-report-online-community-trends get-satisfactionHai Dongkixot
 
A Framework for Social Analytics
A Framework for Social AnalyticsA Framework for Social Analytics
A Framework for Social AnalyticsSusan Etlinger
 
Kreative.asia Refining the ROI Equation
Kreative.asia Refining the ROI EquationKreative.asia Refining the ROI Equation
Kreative.asia Refining the ROI EquationEsther Lim
 

What's hot (19)

Synthesio book signing marshall sponder - delivered
Synthesio book signing    marshall sponder - deliveredSynthesio book signing    marshall sponder - delivered
Synthesio book signing marshall sponder - delivered
 
[Report] Power to the People: Identify and Empower Your Mobile Workforce, by ...
[Report] Power to the People: Identify and Empower Your Mobile Workforce, by ...[Report] Power to the People: Identify and Empower Your Mobile Workforce, by ...
[Report] Power to the People: Identify and Empower Your Mobile Workforce, by ...
 
[Report] Social Data Intelligence, by Susan Etlinger
[Report] Social Data Intelligence, by Susan Etlinger [Report] Social Data Intelligence, by Susan Etlinger
[Report] Social Data Intelligence, by Susan Etlinger
 
The guide to social media marketing and buisness intel.pdf
The guide to social media marketing and buisness intel.pdfThe guide to social media marketing and buisness intel.pdf
The guide to social media marketing and buisness intel.pdf
 
[Report] The Social Media ROI Cookbook, by Susan Etlinger
[Report] The Social Media ROI Cookbook, by Susan Etlinger[Report] The Social Media ROI Cookbook, by Susan Etlinger
[Report] The Social Media ROI Cookbook, by Susan Etlinger
 
Social monitoring bootcamp Bogota, Colobmia
Social monitoring bootcamp Bogota, ColobmiaSocial monitoring bootcamp Bogota, Colobmia
Social monitoring bootcamp Bogota, Colobmia
 
Brands onlysocial marshall sponder - updated & delivered-v3
Brands onlysocial marshall sponder - updated & delivered-v3Brands onlysocial marshall sponder - updated & delivered-v3
Brands onlysocial marshall sponder - updated & delivered-v3
 
Best Practices from the World's Most Social Big Brands
Best Practices from the World's Most Social Big BrandsBest Practices from the World's Most Social Big Brands
Best Practices from the World's Most Social Big Brands
 
[Report] Make An App For That: Mobile Strategies For Retail, by Chris Silva
[Report] Make An App For That: Mobile Strategies For Retail, by Chris Silva[Report] Make An App For That: Mobile Strategies For Retail, by Chris Silva
[Report] Make An App For That: Mobile Strategies For Retail, by Chris Silva
 
Social CRM the new rules of relationship management
Social CRM the new rules of relationship managementSocial CRM the new rules of relationship management
Social CRM the new rules of relationship management
 
The Social CEO: Executives Tell All
The Social CEO: Executives Tell AllThe Social CEO: Executives Tell All
The Social CEO: Executives Tell All
 
What is the future for social media??
What is the future for social media??What is the future for social media??
What is the future for social media??
 
Managing Social Media Risks
Managing Social Media RisksManaging Social Media Risks
Managing Social Media Risks
 
Financial Institutions and Social Media
Financial Institutions and Social Media Financial Institutions and Social Media
Financial Institutions and Social Media
 
Social Media ROI Cycle by Jamie Turner
Social Media ROI Cycle by Jamie TurnerSocial Media ROI Cycle by Jamie Turner
Social Media ROI Cycle by Jamie Turner
 
2014 market-report-online-community-trends get-satisfaction
2014 market-report-online-community-trends get-satisfaction2014 market-report-online-community-trends get-satisfaction
2014 market-report-online-community-trends get-satisfaction
 
A Framework for Social Analytics
A Framework for Social AnalyticsA Framework for Social Analytics
A Framework for Social Analytics
 
Kreative.asia Refining the ROI Equation
Kreative.asia Refining the ROI EquationKreative.asia Refining the ROI Equation
Kreative.asia Refining the ROI Equation
 
RESEARCH_PRINT
RESEARCH_PRINTRESEARCH_PRINT
RESEARCH_PRINT
 

Similar to Best Practices for Secure Enterprise Social Media Deployments

3852 Socialnetworking Bk
3852 Socialnetworking Bk3852 Socialnetworking Bk
3852 Socialnetworking BkLeo Greeley
 
Social Media Security Risk Slide Share Version
Social Media Security Risk Slide Share VersionSocial Media Security Risk Slide Share Version
Social Media Security Risk Slide Share Versionfamudal
 
Cyber security: five leadership issues worthy of Board and executive attention
Cyber security: five leadership issues worthy of Board and executive attentionCyber security: five leadership issues worthy of Board and executive attention
Cyber security: five leadership issues worthy of Board and executive attentionRamón Gómez de Olea y Bustinza
 
Cyber security: Five leadership issues worthy of board and executive attention
Cyber security: Five leadership issues worthy of board and executive attentionCyber security: Five leadership issues worthy of board and executive attention
Cyber security: Five leadership issues worthy of board and executive attentionRamón Gómez de Olea y Bustinza
 
D'souza social content
D'souza social contentD'souza social content
D'souza social contentactkm
 
Risksense: 7 Experts on Threat and Vulnerability Management
Risksense: 7 Experts on Threat and Vulnerability ManagementRisksense: 7 Experts on Threat and Vulnerability Management
Risksense: 7 Experts on Threat and Vulnerability ManagementMighty Guides, Inc.
 
InfoSec's Guide to Social Media [WHITEPAPER]
InfoSec's Guide to Social Media [WHITEPAPER]InfoSec's Guide to Social Media [WHITEPAPER]
InfoSec's Guide to Social Media [WHITEPAPER]Josh Stein
 
Cloud Cybersecurity: Strategies for Managing Vendor Risk
Cloud Cybersecurity: Strategies for Managing Vendor RiskCloud Cybersecurity: Strategies for Managing Vendor Risk
Cloud Cybersecurity: Strategies for Managing Vendor RiskHealth Catalyst
 
FORUM 2013 Social media - a risk management challenge
FORUM 2013 Social media - a risk management challengeFORUM 2013 Social media - a risk management challenge
FORUM 2013 Social media - a risk management challengeFERMA
 
Insider threats
Insider threatsInsider threats
Insider threatsizoologic
 
Managing Online Reputation. How to Protect Your Company on Social Media
Managing Online Reputation. How to Protect Your Company on Social MediaManaging Online Reputation. How to Protect Your Company on Social Media
Managing Online Reputation. How to Protect Your Company on Social MediaCharlie Pownall
 
Rothke rsa 2012 what happens in vegas goes on youtube using social networks...
Rothke rsa 2012   what happens in vegas goes on youtube using social networks...Rothke rsa 2012   what happens in vegas goes on youtube using social networks...
Rothke rsa 2012 what happens in vegas goes on youtube using social networks...Ben Rothke
 
Essential guide to social media for executives
Essential guide to social media for executivesEssential guide to social media for executives
Essential guide to social media for executivesKwazi Communications
 
Social Media & Enterprise Security Whitepaper
Social Media & Enterprise Security WhitepaperSocial Media & Enterprise Security Whitepaper
Social Media & Enterprise Security WhitepaperSchleighS
 
Guarding the Social Gates: The Imperative for Social Media Risk Management
 Guarding the Social Gates: The Imperative for Social Media Risk Management Guarding the Social Gates: The Imperative for Social Media Risk Management
Guarding the Social Gates: The Imperative for Social Media Risk ManagementUzzi Ohana
 
Excelsior College Webinar: Human Resources & Social Media Governance
Excelsior College Webinar: Human Resources & Social Media GovernanceExcelsior College Webinar: Human Resources & Social Media Governance
Excelsior College Webinar: Human Resources & Social Media GovernanceMike Lesczinski
 
How to prevent data leaks with application security testing strategy
How to prevent data leaks with application security testing strategyHow to prevent data leaks with application security testing strategy
How to prevent data leaks with application security testing strategyCigniti Technologies Ltd
 

Similar to Best Practices for Secure Enterprise Social Media Deployments (20)

3852 Socialnetworking Bk
3852 Socialnetworking Bk3852 Socialnetworking Bk
3852 Socialnetworking Bk
 
Social Media Security Risk Slide Share Version
Social Media Security Risk Slide Share VersionSocial Media Security Risk Slide Share Version
Social Media Security Risk Slide Share Version
 
Cyber security: five leadership issues worthy of Board and executive attention
Cyber security: five leadership issues worthy of Board and executive attentionCyber security: five leadership issues worthy of Board and executive attention
Cyber security: five leadership issues worthy of Board and executive attention
 
Cyber security: Five leadership issues worthy of board and executive attention
Cyber security: Five leadership issues worthy of board and executive attentionCyber security: Five leadership issues worthy of board and executive attention
Cyber security: Five leadership issues worthy of board and executive attention
 
D'souza social content
D'souza social contentD'souza social content
D'souza social content
 
Risksense: 7 Experts on Threat and Vulnerability Management
Risksense: 7 Experts on Threat and Vulnerability ManagementRisksense: 7 Experts on Threat and Vulnerability Management
Risksense: 7 Experts on Threat and Vulnerability Management
 
InfoSec's Guide to Social Media [WHITEPAPER]
InfoSec's Guide to Social Media [WHITEPAPER]InfoSec's Guide to Social Media [WHITEPAPER]
InfoSec's Guide to Social Media [WHITEPAPER]
 
Avoiding The Seven Deadly Sins of IT
Avoiding The Seven Deadly Sins of ITAvoiding The Seven Deadly Sins of IT
Avoiding The Seven Deadly Sins of IT
 
Cloud Cybersecurity: Strategies for Managing Vendor Risk
Cloud Cybersecurity: Strategies for Managing Vendor RiskCloud Cybersecurity: Strategies for Managing Vendor Risk
Cloud Cybersecurity: Strategies for Managing Vendor Risk
 
FORUM 2013 Social media - a risk management challenge
FORUM 2013 Social media - a risk management challengeFORUM 2013 Social media - a risk management challenge
FORUM 2013 Social media - a risk management challenge
 
Insider threats
Insider threatsInsider threats
Insider threats
 
Managing Online Reputation. How to Protect Your Company on Social Media
Managing Online Reputation. How to Protect Your Company on Social MediaManaging Online Reputation. How to Protect Your Company on Social Media
Managing Online Reputation. How to Protect Your Company on Social Media
 
Rothke rsa 2012 what happens in vegas goes on youtube using social networks...
Rothke rsa 2012   what happens in vegas goes on youtube using social networks...Rothke rsa 2012   what happens in vegas goes on youtube using social networks...
Rothke rsa 2012 what happens in vegas goes on youtube using social networks...
 
Essential guide to social media for executives
Essential guide to social media for executivesEssential guide to social media for executives
Essential guide to social media for executives
 
Social Media & Enterprise Security Whitepaper
Social Media & Enterprise Security WhitepaperSocial Media & Enterprise Security Whitepaper
Social Media & Enterprise Security Whitepaper
 
Social Media and Identity
Social Media and IdentitySocial Media and Identity
Social Media and Identity
 
Social Media and Identity
Social Media and IdentitySocial Media and Identity
Social Media and Identity
 
Guarding the Social Gates: The Imperative for Social Media Risk Management
 Guarding the Social Gates: The Imperative for Social Media Risk Management Guarding the Social Gates: The Imperative for Social Media Risk Management
Guarding the Social Gates: The Imperative for Social Media Risk Management
 
Excelsior College Webinar: Human Resources & Social Media Governance
Excelsior College Webinar: Human Resources & Social Media GovernanceExcelsior College Webinar: Human Resources & Social Media Governance
Excelsior College Webinar: Human Resources & Social Media Governance
 
How to prevent data leaks with application security testing strategy
How to prevent data leaks with application security testing strategyHow to prevent data leaks with application security testing strategy
How to prevent data leaks with application security testing strategy
 

More from Sprinklr

Care Is The New Marketing
Care Is The New MarketingCare Is The New Marketing
Care Is The New MarketingSprinklr
 
Engaging New Audiences with Twitter
Engaging New Audiences with TwitterEngaging New Audiences with Twitter
Engaging New Audiences with TwitterSprinklr
 
Succeeding with Instagram Ads
Succeeding with Instagram AdsSucceeding with Instagram Ads
Succeeding with Instagram AdsSprinklr
 
Calculate Your ROI at SXSW
Calculate Your ROI at SXSWCalculate Your ROI at SXSW
Calculate Your ROI at SXSWSprinklr
 
How Groupon Manages 15 Million Social Relationships
How Groupon Manages 15 Million Social Relationships How Groupon Manages 15 Million Social Relationships
How Groupon Manages 15 Million Social Relationships Sprinklr
 
Content Management Best Practices by Josh Pines | Medidata Solutions
Content Management Best Practices by Josh Pines | Medidata SolutionsContent Management Best Practices by Josh Pines | Medidata Solutions
Content Management Best Practices by Josh Pines | Medidata SolutionsSprinklr
 
How Zillow Connected Thousands of Homeowners With President Obama
How Zillow Connected Thousands of Homeowners With President ObamaHow Zillow Connected Thousands of Homeowners With President Obama
How Zillow Connected Thousands of Homeowners With President ObamaSprinklr
 
Webinar: Can Google+ Help Enterprise Brands?
Webinar: Can Google+ Help Enterprise Brands?Webinar: Can Google+ Help Enterprise Brands?
Webinar: Can Google+ Help Enterprise Brands?Sprinklr
 
How Virgin America Soared During #Snowmageddon
How Virgin America Soared During #SnowmageddonHow Virgin America Soared During #Snowmageddon
How Virgin America Soared During #SnowmageddonSprinklr
 
Best Practices for Enterprise Social Media Management by the Social Media Dre...
Best Practices for Enterprise Social Media Management by the Social Media Dre...Best Practices for Enterprise Social Media Management by the Social Media Dre...
Best Practices for Enterprise Social Media Management by the Social Media Dre...Sprinklr
 
Build it before you need it -Social@Scale: Crisis Management
Build it before you need it -Social@Scale: Crisis ManagementBuild it before you need it -Social@Scale: Crisis Management
Build it before you need it -Social@Scale: Crisis ManagementSprinklr
 
Sprinklr overview of Facebook Timeline
Sprinklr overview of Facebook TimelineSprinklr overview of Facebook Timeline
Sprinklr overview of Facebook TimelineSprinklr
 

More from Sprinklr (12)

Care Is The New Marketing
Care Is The New MarketingCare Is The New Marketing
Care Is The New Marketing
 
Engaging New Audiences with Twitter
Engaging New Audiences with TwitterEngaging New Audiences with Twitter
Engaging New Audiences with Twitter
 
Succeeding with Instagram Ads
Succeeding with Instagram AdsSucceeding with Instagram Ads
Succeeding with Instagram Ads
 
Calculate Your ROI at SXSW
Calculate Your ROI at SXSWCalculate Your ROI at SXSW
Calculate Your ROI at SXSW
 
How Groupon Manages 15 Million Social Relationships
How Groupon Manages 15 Million Social Relationships How Groupon Manages 15 Million Social Relationships
How Groupon Manages 15 Million Social Relationships
 
Content Management Best Practices by Josh Pines | Medidata Solutions
Content Management Best Practices by Josh Pines | Medidata SolutionsContent Management Best Practices by Josh Pines | Medidata Solutions
Content Management Best Practices by Josh Pines | Medidata Solutions
 
How Zillow Connected Thousands of Homeowners With President Obama
How Zillow Connected Thousands of Homeowners With President ObamaHow Zillow Connected Thousands of Homeowners With President Obama
How Zillow Connected Thousands of Homeowners With President Obama
 
Webinar: Can Google+ Help Enterprise Brands?
Webinar: Can Google+ Help Enterprise Brands?Webinar: Can Google+ Help Enterprise Brands?
Webinar: Can Google+ Help Enterprise Brands?
 
How Virgin America Soared During #Snowmageddon
How Virgin America Soared During #SnowmageddonHow Virgin America Soared During #Snowmageddon
How Virgin America Soared During #Snowmageddon
 
Best Practices for Enterprise Social Media Management by the Social Media Dre...
Best Practices for Enterprise Social Media Management by the Social Media Dre...Best Practices for Enterprise Social Media Management by the Social Media Dre...
Best Practices for Enterprise Social Media Management by the Social Media Dre...
 
Build it before you need it -Social@Scale: Crisis Management
Build it before you need it -Social@Scale: Crisis ManagementBuild it before you need it -Social@Scale: Crisis Management
Build it before you need it -Social@Scale: Crisis Management
 
Sprinklr overview of Facebook Timeline
Sprinklr overview of Facebook TimelineSprinklr overview of Facebook Timeline
Sprinklr overview of Facebook Timeline
 

Recently uploaded

Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsPixlogix Infotech
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionDilum Bandara
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenHervé Boutemy
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clashcharlottematthew16
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLScyllaDB
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Enterprise Knowledge
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfRankYa
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningLars Bell
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piececharlottematthew16
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostZilliz
 

Recently uploaded (20)

Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An Introduction
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache Maven
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clash
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdf
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine Tuning
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piece
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
 

Best Practices for Secure Enterprise Social Media Deployments

  • 1. 22 Must Haves For Secure Enterprise Social How to Avoid Common Risk, Compliance, and Governance Mistakes
  • 2. The Enterprise Social Media Security Reality “Almost two-thirds of companies surveyed say that social media is a significant or critical risk to their brand reputation; yet 60% of companies either never train their employees about their corporate social media policies or do so only upon hiring. Moreover, 43% of companies have less than one Full-Time Equivalent (FTE) dedicated to managing social media risk.” Guarding the Social Gates: The Imperative for Social Media Risk Management (Alan Webber, Altimeter, August 2012) “Nearly two-thirds of security and risk professionals (64%) have no social media policy in place or if they do, they lack tools to sufficiently enforce and support the policy.” Manage the Risks of Social Media (Chris McClean and Nick Hayes, Forrester Research, Inc., November 2012)
  • 3. Social@Scale Security Checklist 22 Must Haves For Every Enterprise-wide Social Media Deployment Do we have...? Yes No Governance 1. content rules that flag unacceptable outbound content? 2. an approval workflow for outbound content? 3. the legal team involved for outbound content guidelines? 4. a defined escalation process? 5. the ability to track messages from inception to resolution? 6. a way to handle rogue accounts? 7. enterprise-wide, single point password control? 8. a rule to disapprove sending passwords around in Excel? 9. Access Management? 10. a social media policy or guidelines? Security 11. the ability to treat private messages differently? 12. the ability to integrate with enterprise-wide authentication systems? 13. only tools and platforms that are enterprise-grade security compliant? 14. enforced password guidelines? 15. the ability to differentiate influencers? 16. automated monitoring rules? Compliance 17. the ability to retract social messages from a central location? 18. the ability to document internal conversations about social media situations? 19. the ability to archive outbound content? 20. the ability to archive inbound content? 21. the ability to create audit trails for social media activities? 22. a Social Media Management System that meets our own corporate security requirements? To learn more about Social@Scale Security, visit us at www.sprinklr.com