SlideShare une entreprise Scribd logo
1  sur  25
2012 National BDPA Technology
Conference




Managing Your Digital Footprint
                    Shauna Cox




                 August 1 – 4, 2012   Baltimore, MD
Purpose and Objectives


   •   Discuss considerations for
       protecting sensitive
       information.

   •   Understand ways to
       leverage electronic assets
       to benefit your “digital
       profile”.

   •   Understand strategies for
       managing your online
       reputation.
                                   2
Agenda



I. What is a digital footprint?
II. Strategies for protecting
     information
III. Leveraging your footprint for
     personal branding
IV. Action plan for post-session
V. Questions
                                     3
Session Structure




Part 1: Risks & Protection
Part 2: Personal Branding




                             4
What is a digital footprint?




• Data trail produced by activities in
  cyberspace

• Content generated by online action




                                         5
Components of Digital Footprint

•   Email Communications
•   Social Media Profiles
•   Online transactions
•   Web surfing activity
•   Cell phone / Smart Phone tracks




                                      6
Examples of Digital Footprint Content


                                                      Text
                Photos          E-mails             Messages
 Social
Networkin
 g Posts
                                                        Videos
                                Sites
            Blogs              Visited



                                         Phone
                                         Activity
                    Tablet
                    Activity




                                                               7
“You already have zero
 privacy. Get over it.”
                          •   Most large cities have surveillance
         Scott McNealy        cameras.
         former CEO Sun
         Microsystems     •   1 out of every 5 passwords are
                              simple and easy to guess
                          •   Hackers typically take less than 4
                              minutes to enter a system
                          •   Some experts estimate Internet
                              crime costs Americans @ $1 trillion
                              / year
                          •   Over a 2-year period (2007 – 2009)
                              identity theft incidents rose by 37%
                               Source: Online Privacy by Stephen Currie
                                                                          8
Risks


•   Fraud Victimization
•   Identity Theft
•   Poor Reputation
•   Harassment
•   Invasion of Privacy




                          9
Managing Risk

• Stay current on privacy policies
• Use appropriate authentication
  standards
• Avoid using debit cards for online
  transactions
• Limit credit card use online (e.g., low
  limit cards, gift cards or prepaid credit
  cards)
• Beware of social engineering techniques
• Educate yourself on how data is used
                                         10
Rules of Engagement

• Separate business & personal
  cyber activities
• Utilize strong passwords and PIN
  numbers {Example: Iluv3ewe}
• Utilize encryption where
  appropriate
• Assume no “expectation of privacy”
• Utilize built-in privacy settings (but
  do not assume 100% protection)


                                  11
Rules of Engagement

• Reveal information on a “need to
  know” basis
• Never reveal private information in a
  public place
• Execute consumer transactions
  cautiously
• Properly discard electronic
  equipment (e.g., cell phones,
  computers, etc.)
• Utilize different passwords for
  different purposes                      12
Personal Branding


             • Personal image
             • Self presentation

Definition:
“…a promise to a…well defined audience,
combined with the actual experience these
individuals have with the brand [you].”
                           Source: Managing Brand
You
                           by Jerry S. Wilson & Ira
Blumenthal




                                                      13
Digital Profile  Personal Branding




Digital Profile
•Collection of cyber tools used to
present you
•One component of personal brand
•Key to building online reputation




                                     14
Digital Profile Tools


•   LinkedIn             •   YouTube
•   Facebook             •   Blogs
•   Google+              •   Personal Web Site
•   Twitter              •   Professional
•   Pinterest                Organizations (e.g.,
                             online profiles)




                                               15
Building a Digital Profile Tips



• Determine your digital identity and learn
  your niche.
• Complete your profiles based on your
  personal brand.
• Encourage endorsements.
• Be judicious in what networks you join.
• Leverage others’ digital profiles.



                                       16
Rules of Engagement

• Separate business & personal profiles
• Utilize built-in privacy settings
• Limit sharing easily exploitable PII
  (e.g., birth dates)
• Assume your digital profile is
  permanent
• Make your online brand consistent
  with your offline brand
• Assume all online information is
  accessible
                                    17
Rules of Engagement



• Keep online communications
  positive
• Present yourself professionally
  •   Use proper grammar, etc.
  •   Clear visuals
• Monitor your digital profile




                                    18
Managing Your Digital Profile

• Set regular time intervals to
  monitor & clean up
  inaccurate information
• Set time aside to optimize
  your profile
• Use automated tools to
  monitor your profile
• Use search optimization
  techniques


                                        19
Inaccurate or Unflattering Information


1. Ask posting party to remove the information
2. If removal does not occur, dispute
   information publicly (if appropriate)
3. Engage “reputation” specialist
4. Optimize profile / reputation with positive
   information
5. Execute legal recourse if necessary




                                                 20
What’s Next? (Action Plan)

• Review your existing footprint
• Determine what you want your digital
  profile to be (Prioritize components)
• Build / Optimize your profile
• Develop profile management / monitoring
  strategy




                                       21
Reality

• Many employers / potential employers
  check online information
• Clients, potential clients, colleagues, etc.
  check digital profiles
• Laws / legislative environment typically
  trail the advancement of technology
• Everyone has or will have some
  interaction in cyberspace



                                            22
Questions




            23
Contact Information



        Shauna Cox
 Chicago Housing Authority
s_cox_tech2011@yahoo.com




                             24
Resources

 Books
• Managing Your Digital Footprint by Stephen Currie
• Online Privacy by Robert Grayson
• How to Disappear: Erase Your Digital Footprint, Leave
   False Trails, and Vanish without a Trace by Frank Ahearn
• Social Networking for Career Success by Miriam Salpeter

Web Sites / Organizations
• Privacy Rights Clearinghouse (www.privacyrights.org)
• ACLU (www.aclu.org/technology-and-liberty/)
• Electronic Privacy Information Center (epic.org)
• Federal Trade Commission (www.ftc.gov)


                                                         25

Contenu connexe

Tendances

Information Security - Foundations and basic understanding
Information Security - Foundations and basic understanding Information Security - Foundations and basic understanding
Information Security - Foundations and basic understanding Facundo Mauricio
 
Digital citizenship number 6
Digital citizenship number 6Digital citizenship number 6
Digital citizenship number 6Siegmeyer
 
Digital citizenship
Digital citizenshipDigital citizenship
Digital citizenshipstephensc
 
Digital citizenship
Digital citizenshipDigital citizenship
Digital citizenshipstephensc
 
Your Digital Afterlife: What happens to your digital memories when you die? ...
Your Digital Afterlife: What happens to your digital memories when you die?  ...Your Digital Afterlife: What happens to your digital memories when you die?  ...
Your Digital Afterlife: What happens to your digital memories when you die? ...Evan Carroll
 
Your digital identity - are you feeling lucky?
Your digital identity - are you feeling lucky?Your digital identity - are you feeling lucky?
Your digital identity - are you feeling lucky?Kirsten Thompson
 
Intro to information security
Intro to information securityIntro to information security
Intro to information securityViraj Ekanayake
 
Digital Natives
Digital NativesDigital Natives
Digital NativesChauTran09
 
Protecting Customer Confidential Information
Protecting Customer Confidential InformationProtecting Customer Confidential Information
Protecting Customer Confidential InformationWilliam McBorrough
 
Web Application Security Session for Web Developers
Web Application Security Session for Web DevelopersWeb Application Security Session for Web Developers
Web Application Security Session for Web DevelopersKrishna Srikanth Manda
 
OSINT - Open Soure Intelligence - Webinar on CyberSecurity
OSINT - Open Soure Intelligence - Webinar on CyberSecurityOSINT - Open Soure Intelligence - Webinar on CyberSecurity
OSINT - Open Soure Intelligence - Webinar on CyberSecurityMohammed Adam
 
Will My Family be Able to Access the Photos I Took at the Big House When I’m ...
Will My Family be Able to Access the Photos I Took at the Big House When I’m ...Will My Family be Able to Access the Photos I Took at the Big House When I’m ...
Will My Family be Able to Access the Photos I Took at the Big House When I’m ...gallowayandcollens
 
What is cyber crime ppoint
What is cyber crime ppointWhat is cyber crime ppoint
What is cyber crime ppointatkinsondf
 
Embracing the IT Consumerization Imperitive
Embracing the IT Consumerization ImperitiveEmbracing the IT Consumerization Imperitive
Embracing the IT Consumerization ImperitiveBarry Caplin
 
Embracing the IT Consumerization Imperative NG Security
Embracing the IT Consumerization Imperative NG SecurityEmbracing the IT Consumerization Imperative NG Security
Embracing the IT Consumerization Imperative NG SecurityBarry Caplin
 

Tendances (20)

Information Security - Foundations and basic understanding
Information Security - Foundations and basic understanding Information Security - Foundations and basic understanding
Information Security - Foundations and basic understanding
 
Digital citizenship number 6
Digital citizenship number 6Digital citizenship number 6
Digital citizenship number 6
 
Digital citizenship
Digital citizenshipDigital citizenship
Digital citizenship
 
Digital citizenship
Digital citizenshipDigital citizenship
Digital citizenship
 
Internal social media: risks and added value
Internal social media: risks and added valueInternal social media: risks and added value
Internal social media: risks and added value
 
Your Digital Afterlife: What happens to your digital memories when you die? ...
Your Digital Afterlife: What happens to your digital memories when you die?  ...Your Digital Afterlife: What happens to your digital memories when you die?  ...
Your Digital Afterlife: What happens to your digital memories when you die? ...
 
Privacy and Protection of Online Identity in the New Internet Age CTO Cyberse...
Privacy and Protection of Online Identity in the New Internet Age CTO Cyberse...Privacy and Protection of Online Identity in the New Internet Age CTO Cyberse...
Privacy and Protection of Online Identity in the New Internet Age CTO Cyberse...
 
Your digital identity - are you feeling lucky?
Your digital identity - are you feeling lucky?Your digital identity - are you feeling lucky?
Your digital identity - are you feeling lucky?
 
Safe Social Networking Handout
Safe Social Networking HandoutSafe Social Networking Handout
Safe Social Networking Handout
 
Intro to information security
Intro to information securityIntro to information security
Intro to information security
 
Digital Natives
Digital NativesDigital Natives
Digital Natives
 
Protecting Customer Confidential Information
Protecting Customer Confidential InformationProtecting Customer Confidential Information
Protecting Customer Confidential Information
 
Web Application Security Session for Web Developers
Web Application Security Session for Web DevelopersWeb Application Security Session for Web Developers
Web Application Security Session for Web Developers
 
OSINT - Open Soure Intelligence - Webinar on CyberSecurity
OSINT - Open Soure Intelligence - Webinar on CyberSecurityOSINT - Open Soure Intelligence - Webinar on CyberSecurity
OSINT - Open Soure Intelligence - Webinar on CyberSecurity
 
Internet security
Internet securityInternet security
Internet security
 
Visual hacking (ec)
Visual hacking (ec)Visual hacking (ec)
Visual hacking (ec)
 
Will My Family be Able to Access the Photos I Took at the Big House When I’m ...
Will My Family be Able to Access the Photos I Took at the Big House When I’m ...Will My Family be Able to Access the Photos I Took at the Big House When I’m ...
Will My Family be Able to Access the Photos I Took at the Big House When I’m ...
 
What is cyber crime ppoint
What is cyber crime ppointWhat is cyber crime ppoint
What is cyber crime ppoint
 
Embracing the IT Consumerization Imperitive
Embracing the IT Consumerization ImperitiveEmbracing the IT Consumerization Imperitive
Embracing the IT Consumerization Imperitive
 
Embracing the IT Consumerization Imperative NG Security
Embracing the IT Consumerization Imperative NG SecurityEmbracing the IT Consumerization Imperative NG Security
Embracing the IT Consumerization Imperative NG Security
 

Similaire à Managing Your Digital Footprint - 2012 National BDPA Conference Presentation

Harbin clinic iot-mobile-no-vid
Harbin clinic iot-mobile-no-vidHarbin clinic iot-mobile-no-vid
Harbin clinic iot-mobile-no-vidErnest Staats
 
DIGITAL FOOTPRINT-WPS Office.pptx
DIGITAL FOOTPRINT-WPS Office.pptxDIGITAL FOOTPRINT-WPS Office.pptx
DIGITAL FOOTPRINT-WPS Office.pptxT Tanujha
 
Advanced Research Investigations for SIU Investigators
Advanced Research Investigations for SIU InvestigatorsAdvanced Research Investigations for SIU Investigators
Advanced Research Investigations for SIU InvestigatorsSloan Carne
 
Social media and Security risks
Social media and Security risksSocial media and Security risks
Social media and Security risksParakum Pathirana
 
Biz miz io2 content for module 5
Biz miz io2 content for module 5Biz miz io2 content for module 5
Biz miz io2 content for module 5EmanuelePristera
 
It Security For Healthcare
It Security For HealthcareIt Security For Healthcare
It Security For HealthcareNicholas Davis
 
How to Effectively Equip Your IG Program for the Perilous Journey Into the Fu...
How to Effectively Equip Your IG Program for the Perilous Journey Into the Fu...How to Effectively Equip Your IG Program for the Perilous Journey Into the Fu...
How to Effectively Equip Your IG Program for the Perilous Journey Into the Fu...Aggregage
 
Shadow it risks & control managing the unknown unknowns in the deep &...
Shadow it risks & control managing the unknown unknowns in the deep &...Shadow it risks & control managing the unknown unknowns in the deep &...
Shadow it risks & control managing the unknown unknowns in the deep &...Priyanka Aash
 
Corporate Intelligence: Bridging the security and intelligence community
Corporate Intelligence: Bridging the security and intelligence communityCorporate Intelligence: Bridging the security and intelligence community
Corporate Intelligence: Bridging the security and intelligence communityantitree
 
Social Networks - The Good and the Bad
Social Networks - The Good and the BadSocial Networks - The Good and the Bad
Social Networks - The Good and the BadXavier Mertens
 
IS201 Internet Crime and Safety
IS201 Internet Crime and SafetyIS201 Internet Crime and Safety
IS201 Internet Crime and Safetyjaenjenny
 
DSS ITSEC CONFERENCE - Spector360 as productivity and security tool - Riga NO...
DSS ITSEC CONFERENCE - Spector360 as productivity and security tool - Riga NO...DSS ITSEC CONFERENCE - Spector360 as productivity and security tool - Riga NO...
DSS ITSEC CONFERENCE - Spector360 as productivity and security tool - Riga NO...Andris Soroka
 
Iron Bastion: How to Manage Your Clients' Data Responsibly
Iron Bastion: How to Manage Your Clients' Data ResponsiblyIron Bastion: How to Manage Your Clients' Data Responsibly
Iron Bastion: How to Manage Your Clients' Data ResponsiblyGabor Szathmari
 
IT Security in a Scientific Research Environment
IT Security in a Scientific Research EnvironmentIT Security in a Scientific Research Environment
IT Security in a Scientific Research EnvironmentNicholas Davis
 
IT Security in a Scientific Research Environment
IT Security in a Scientific Research EnvironmentIT Security in a Scientific Research Environment
IT Security in a Scientific Research EnvironmentNicholas Davis
 
Webinar: 12 Tips to Stay Safer Online - 2018-10-16
Webinar: 12 Tips to Stay Safer Online - 2018-10-16Webinar: 12 Tips to Stay Safer Online - 2018-10-16
Webinar: 12 Tips to Stay Safer Online - 2018-10-16TechSoup
 
Social Networks and Security: What Your Teenager Likely Won't Tell You
Social Networks and Security: What Your Teenager Likely Won't Tell YouSocial Networks and Security: What Your Teenager Likely Won't Tell You
Social Networks and Security: What Your Teenager Likely Won't Tell YouDenim Group
 

Similaire à Managing Your Digital Footprint - 2012 National BDPA Conference Presentation (20)

DECEPTICONv2
DECEPTICONv2DECEPTICONv2
DECEPTICONv2
 
Harbin clinic iot-mobile-no-vid
Harbin clinic iot-mobile-no-vidHarbin clinic iot-mobile-no-vid
Harbin clinic iot-mobile-no-vid
 
DIGITAL FOOTPRINT-WPS Office.pptx
DIGITAL FOOTPRINT-WPS Office.pptxDIGITAL FOOTPRINT-WPS Office.pptx
DIGITAL FOOTPRINT-WPS Office.pptx
 
Advanced Research Investigations for SIU Investigators
Advanced Research Investigations for SIU InvestigatorsAdvanced Research Investigations for SIU Investigators
Advanced Research Investigations for SIU Investigators
 
Social media and Security risks
Social media and Security risksSocial media and Security risks
Social media and Security risks
 
Biz miz io2 content for module 5
Biz miz io2 content for module 5Biz miz io2 content for module 5
Biz miz io2 content for module 5
 
It Security For Healthcare
It Security For HealthcareIt Security For Healthcare
It Security For Healthcare
 
How to Effectively Equip Your IG Program for the Perilous Journey Into the Fu...
How to Effectively Equip Your IG Program for the Perilous Journey Into the Fu...How to Effectively Equip Your IG Program for the Perilous Journey Into the Fu...
How to Effectively Equip Your IG Program for the Perilous Journey Into the Fu...
 
Shadow it risks & control managing the unknown unknowns in the deep &...
Shadow it risks & control managing the unknown unknowns in the deep &...Shadow it risks & control managing the unknown unknowns in the deep &...
Shadow it risks & control managing the unknown unknowns in the deep &...
 
Corporate Intelligence: Bridging the security and intelligence community
Corporate Intelligence: Bridging the security and intelligence communityCorporate Intelligence: Bridging the security and intelligence community
Corporate Intelligence: Bridging the security and intelligence community
 
Social Networks - The Good and the Bad
Social Networks - The Good and the BadSocial Networks - The Good and the Bad
Social Networks - The Good and the Bad
 
L48 slides
L48 slidesL48 slides
L48 slides
 
IS201 Internet Crime and Safety
IS201 Internet Crime and SafetyIS201 Internet Crime and Safety
IS201 Internet Crime and Safety
 
DSS ITSEC CONFERENCE - Spector360 as productivity and security tool - Riga NO...
DSS ITSEC CONFERENCE - Spector360 as productivity and security tool - Riga NO...DSS ITSEC CONFERENCE - Spector360 as productivity and security tool - Riga NO...
DSS ITSEC CONFERENCE - Spector360 as productivity and security tool - Riga NO...
 
Iron Bastion: How to Manage Your Clients' Data Responsibly
Iron Bastion: How to Manage Your Clients' Data ResponsiblyIron Bastion: How to Manage Your Clients' Data Responsibly
Iron Bastion: How to Manage Your Clients' Data Responsibly
 
One of 2 protect your business
One of 2 protect your businessOne of 2 protect your business
One of 2 protect your business
 
IT Security in a Scientific Research Environment
IT Security in a Scientific Research EnvironmentIT Security in a Scientific Research Environment
IT Security in a Scientific Research Environment
 
IT Security in a Scientific Research Environment
IT Security in a Scientific Research EnvironmentIT Security in a Scientific Research Environment
IT Security in a Scientific Research Environment
 
Webinar: 12 Tips to Stay Safer Online - 2018-10-16
Webinar: 12 Tips to Stay Safer Online - 2018-10-16Webinar: 12 Tips to Stay Safer Online - 2018-10-16
Webinar: 12 Tips to Stay Safer Online - 2018-10-16
 
Social Networks and Security: What Your Teenager Likely Won't Tell You
Social Networks and Security: What Your Teenager Likely Won't Tell YouSocial Networks and Security: What Your Teenager Likely Won't Tell You
Social Networks and Security: What Your Teenager Likely Won't Tell You
 

Managing Your Digital Footprint - 2012 National BDPA Conference Presentation

  • 1. 2012 National BDPA Technology Conference Managing Your Digital Footprint Shauna Cox August 1 – 4, 2012 Baltimore, MD
  • 2. Purpose and Objectives • Discuss considerations for protecting sensitive information. • Understand ways to leverage electronic assets to benefit your “digital profile”. • Understand strategies for managing your online reputation. 2
  • 3. Agenda I. What is a digital footprint? II. Strategies for protecting information III. Leveraging your footprint for personal branding IV. Action plan for post-session V. Questions 3
  • 4. Session Structure Part 1: Risks & Protection Part 2: Personal Branding 4
  • 5. What is a digital footprint? • Data trail produced by activities in cyberspace • Content generated by online action 5
  • 6. Components of Digital Footprint • Email Communications • Social Media Profiles • Online transactions • Web surfing activity • Cell phone / Smart Phone tracks 6
  • 7. Examples of Digital Footprint Content Text Photos E-mails Messages Social Networkin g Posts Videos Sites Blogs Visited Phone Activity Tablet Activity 7
  • 8. “You already have zero privacy. Get over it.” • Most large cities have surveillance Scott McNealy cameras. former CEO Sun Microsystems • 1 out of every 5 passwords are simple and easy to guess • Hackers typically take less than 4 minutes to enter a system • Some experts estimate Internet crime costs Americans @ $1 trillion / year • Over a 2-year period (2007 – 2009) identity theft incidents rose by 37% Source: Online Privacy by Stephen Currie 8
  • 9. Risks • Fraud Victimization • Identity Theft • Poor Reputation • Harassment • Invasion of Privacy 9
  • 10. Managing Risk • Stay current on privacy policies • Use appropriate authentication standards • Avoid using debit cards for online transactions • Limit credit card use online (e.g., low limit cards, gift cards or prepaid credit cards) • Beware of social engineering techniques • Educate yourself on how data is used 10
  • 11. Rules of Engagement • Separate business & personal cyber activities • Utilize strong passwords and PIN numbers {Example: Iluv3ewe} • Utilize encryption where appropriate • Assume no “expectation of privacy” • Utilize built-in privacy settings (but do not assume 100% protection) 11
  • 12. Rules of Engagement • Reveal information on a “need to know” basis • Never reveal private information in a public place • Execute consumer transactions cautiously • Properly discard electronic equipment (e.g., cell phones, computers, etc.) • Utilize different passwords for different purposes 12
  • 13. Personal Branding • Personal image • Self presentation Definition: “…a promise to a…well defined audience, combined with the actual experience these individuals have with the brand [you].” Source: Managing Brand You by Jerry S. Wilson & Ira Blumenthal 13
  • 14. Digital Profile  Personal Branding Digital Profile •Collection of cyber tools used to present you •One component of personal brand •Key to building online reputation 14
  • 15. Digital Profile Tools • LinkedIn • YouTube • Facebook • Blogs • Google+ • Personal Web Site • Twitter • Professional • Pinterest Organizations (e.g., online profiles) 15
  • 16. Building a Digital Profile Tips • Determine your digital identity and learn your niche. • Complete your profiles based on your personal brand. • Encourage endorsements. • Be judicious in what networks you join. • Leverage others’ digital profiles. 16
  • 17. Rules of Engagement • Separate business & personal profiles • Utilize built-in privacy settings • Limit sharing easily exploitable PII (e.g., birth dates) • Assume your digital profile is permanent • Make your online brand consistent with your offline brand • Assume all online information is accessible 17
  • 18. Rules of Engagement • Keep online communications positive • Present yourself professionally • Use proper grammar, etc. • Clear visuals • Monitor your digital profile 18
  • 19. Managing Your Digital Profile • Set regular time intervals to monitor & clean up inaccurate information • Set time aside to optimize your profile • Use automated tools to monitor your profile • Use search optimization techniques 19
  • 20. Inaccurate or Unflattering Information 1. Ask posting party to remove the information 2. If removal does not occur, dispute information publicly (if appropriate) 3. Engage “reputation” specialist 4. Optimize profile / reputation with positive information 5. Execute legal recourse if necessary 20
  • 21. What’s Next? (Action Plan) • Review your existing footprint • Determine what you want your digital profile to be (Prioritize components) • Build / Optimize your profile • Develop profile management / monitoring strategy 21
  • 22. Reality • Many employers / potential employers check online information • Clients, potential clients, colleagues, etc. check digital profiles • Laws / legislative environment typically trail the advancement of technology • Everyone has or will have some interaction in cyberspace 22
  • 23. Questions 23
  • 24. Contact Information Shauna Cox Chicago Housing Authority s_cox_tech2011@yahoo.com 24
  • 25. Resources Books • Managing Your Digital Footprint by Stephen Currie • Online Privacy by Robert Grayson • How to Disappear: Erase Your Digital Footprint, Leave False Trails, and Vanish without a Trace by Frank Ahearn • Social Networking for Career Success by Miriam Salpeter Web Sites / Organizations • Privacy Rights Clearinghouse (www.privacyrights.org) • ACLU (www.aclu.org/technology-and-liberty/) • Electronic Privacy Information Center (epic.org) • Federal Trade Commission (www.ftc.gov) 25