INTERNATIONAL ISLAMIC UNIVERSITY ISLAMABAD
ENGLISH PRESENTATION
TOPIC:
MANAGING CRISIS COMMUNICATIONS IN CLOUD ERA
TEACHER:
GROUP MEMBERS:
• ASAD ULLAH
• ABDUL REHMAN
MUHAMMAD ARIF
• Mamoon
MANAGING CRISIS COMMUNICATION IN THE CLOUD ERA
• Managing:
Management is a process of planning, decision making
and information resources of an organization to reach
its goals efficiently and effectively.
• Crisis Communication:
Crisis communication is a sub-specialty of the public
relations profession that is designed to protect and
defend an individual, company, or organization facing a
public challenge to its reputation.
• Cloud Era:
Cloudera allows for a depth of data processing that goes
beyond just data accumulation and storage. Cloudera's
enhanced capabilities provide power to rapidly and easily
analyze data, while tracking and securing it across all
environments.
• Data Breach:
Data breach is an incident that has potential to disclose
sensitive information to an unauthorized party. Data
breaches may be caused by a variety of reasons such as
theft. In the era of cloud computing, data breaches is one of
the major security concerns
• Effects of Data Breaches:
Perhaps the biggest long-term consequence of a
cybersecurity data breach is the loss of customer trust.
According to IBM which focuses on data privacy found
that a data breach costs U.S company an average of
$8.2 million
• Crisis Communication in business:
Businesses are moving their it operations to the cloud faster
. In this we can see breaches and attack by hackers and
internal bad factors . Due to reputation damage they limit
their information to the people and blame on cloud server
provider
Companies usually hide information from stake holders about
data breach . Concealing information from those potentially
affected can be lethal to a company.
• How to handle the breaches:
Adam Levin, a digital security expert and author of the
book Swiped, has said doing so “can result in a near
extinction-level event” for an organization.
That’s why transparency is the best way to handle
breaches . They need for it is more vital than ever in the
cloud era .
• Most valuable resources:
These days, companies see data as their leading
driver of future growth. Data has even been
called the world’s most valuable resource.
Stake holders are aware of it . There is a huge black
market of stolen private information . Stake holders
expect businesses to let them know what
information may be out there.
• Example of Largest data breach:
There are so many examples of data breaches in
the history . A prominent one is YAHOO
YAHOO has faced tow major data breaches , one of
then being the largest one on the record
In 2016, it reported a data breach of over 500 million
user account in 2014 . In December 2016 it also
reported that another data breach that occurred around
2013 in hackers impact over 3 billion of its user
account.
As Fast Company put it, “Yahoo took three years
to tell the public about it.”
Not only did the company’s bungling of that
case decrease its sale price
but the breach still pops up in news stories, extending the
lasting damage to company’s image
• Trust In Data Security Is the New Price of Admission:
In business, few things are as vital to a company's success
as its brand reputation. It's so important that 87 percent of
executives told the World Economic Forum that reputational
challenges are more important than other strategic risks.
• What is digital trust?
Digital trust, as defined by IBM, is a consumer
expectation that companies have privacy controls to
ensure that the right user has the right access to
the right data for the right reason and the right
purpose.
It means you're using customers'
personal data the way they want you to
by:
• Explaining why you want their information, what you're going
to do with it, and who can access it before any data is
collected
• Giving them opportunities to opt-out of having certain
information collected or shared
• Providing cybersecurity and privacy process measures that
ensure information isn't exposed by bad actors or human
error.
Two ways to build digital trust
1. Map your data
2. Set your privacy strategy and policy
• Map your data
•What types of information are actively collected
•What data is actually being used
•Who the information is shared with and who has access to it
•Where and how long data is being stored
•Where your processes deviate from stated policies
• Set your privacy strategy and policy
•Seeking cross-functional input from all your teams
•Maximizing data value while minimizing the amount collected by
focusing on first-party data