Contenu connexe


Presentation2 [Autosaved].pdf

  2. MANAGING CRISIS COMMUNICATION IN THE CLOUD ERA • Managing: Management is a process of planning, decision making and information resources of an organization to reach its goals efficiently and effectively. • Crisis Communication: Crisis communication is a sub-specialty of the public relations profession that is designed to protect and defend an individual, company, or organization facing a public challenge to its reputation.
  3. • Cloud Era: Cloudera allows for a depth of data processing that goes beyond just data accumulation and storage. Cloudera's enhanced capabilities provide power to rapidly and easily analyze data, while tracking and securing it across all environments. • Data Breach: Data breach is an incident that has potential to disclose sensitive information to an unauthorized party. Data breaches may be caused by a variety of reasons such as theft. In the era of cloud computing, data breaches is one of the major security concerns
  4. • Effects of Data Breaches: Perhaps the biggest long-term consequence of a cybersecurity data breach is the loss of customer trust. According to IBM which focuses on data privacy found that a data breach costs U.S company an average of $8.2 million • Crisis Communication in business: Businesses are moving their it operations to the cloud faster . In this we can see breaches and attack by hackers and internal bad factors . Due to reputation damage they limit their information to the people and blame on cloud server provider
  5. Companies usually hide information from stake holders about data breach . Concealing information from those potentially affected can be lethal to a company. • How to handle the breaches: Adam Levin, a digital security expert and author of the book Swiped, has said doing so “can result in a near extinction-level event” for an organization. That’s why transparency is the best way to handle breaches . They need for it is more vital than ever in the cloud era .
  6. • Most valuable resources: These days, companies see data as their leading driver of future growth. Data has even been called the world’s most valuable resource. Stake holders are aware of it . There is a huge black market of stolen private information . Stake holders expect businesses to let them know what information may be out there.
  7. • Example of Largest data breach: There are so many examples of data breaches in the history . A prominent one is YAHOO YAHOO has faced tow major data breaches , one of then being the largest one on the record In 2016, it reported a data breach of over 500 million user account in 2014 . In December 2016 it also reported that another data breach that occurred around 2013 in hackers impact over 3 billion of its user account.
  8. As Fast Company put it, “Yahoo took three years to tell the public about it.” Not only did the company’s bungling of that case decrease its sale price but the breach still pops up in news stories, extending the lasting damage to company’s image • Trust In Data Security Is the New Price of Admission: In business, few things are as vital to a company's success as its brand reputation. It's so important that 87 percent of executives told the World Economic Forum that reputational challenges are more important than other strategic risks.
  9. • What is digital trust? Digital trust, as defined by IBM, is a consumer expectation that companies have privacy controls to ensure that the right user has the right access to the right data for the right reason and the right purpose. It means you're using customers' personal data the way they want you to by:
  10. • Explaining why you want their information, what you're going to do with it, and who can access it before any data is collected • Giving them opportunities to opt-out of having certain information collected or shared • Providing cybersecurity and privacy process measures that ensure information isn't exposed by bad actors or human error. Two ways to build digital trust 1. Map your data 2. Set your privacy strategy and policy
  11. • Map your data •What types of information are actively collected •What data is actually being used •Who the information is shared with and who has access to it •Where and how long data is being stored •Where your processes deviate from stated policies • Set your privacy strategy and policy •Seeking cross-functional input from all your teams •Maximizing data value while minimizing the amount collected by focusing on first-party data