SlideShare une entreprise Scribd logo
1  sur  14
How to Enable Social Media in Financial Services
Agenda

    Intro
    About Actiance
    Social Media on the Rise
    Benefits of Social Media
    Understanding the Risks
    Applicable Regulations
    Anecdotes
    Applying Appropriate Controls
    Wrap-up




1   Confidential and Proprietary © 2011, Actiance, Inc. All rights reserved.
About Actiance

    Enable the New Internet
      – 4,500+ Web 2.0 apps, Unified
           Communications, Social Networks
    Global operations
      – USA, EMEA, India, Asia/Pacific
    Market Leader
      – 9 of the top 10 US banks
      – Top 5 Canadian banks
      – 3 of the top 5 energy companies
    Broadest Partner Ecosystem
      – Technology alliances


2   Confidential and Proprietary © 2011, Actiance, Inc. All rights reserved.
Social Is Booming


    Social Networking


    Social Collaboration


    Social Publishing


    Social Feedback




3    Confidential and Proprietary © 2011, Actiance, Inc. All rights reserved.
Upside of Social Media

    Generate buzz and increase visibility


    Strengthen customer relations


    Build an additional revenue source


    Extend your brand




4    Confidential and Proprietary © 2011, Actiance, Inc. All rights reserved.
Risks of Using Social Media and Web 2.0

    Data Leakage          Incoming Threats   Compliance & eDiscovery      User Behavior




Personal                                      SEC, FINRA               Employee
Information             Malware, Spyware                               Productivity
                                              HIPAA, FISMA
Intellectual Property   Viruses, Trojans                               Bandwidth
                                              SOX, PCI, FSA
Credit Card,                                                           Explosion
                        Inappropriate
SSN                                           FRCP- eDiscovery
                        Content                                        Every employee is
Client Records                                FERC, NERC               the face of business
Web 2.0 & Social Networks Regulation & Compliance



          Regulation                             Social Network and Web 2.0 Impact

                                Obliged to store records and make accessible. Public correspondence requires
SEC and FINRA                   approval, review and retention. Extended to social media.
                                http://www.finra.org/Industry/Issues/Advertising/p006118

                                Protect information, monitor for sensitive content, and ensure not sent over
Gramm-Leach-Bliley Act (GLBA)   public channels (e.g., Twitter)

                                Ensuring cardholder data is not sent over unsecured channels AND PROVING
PCI                             IT
                                Prevent identity theft. Protect IM and Web 2.0 from malware and phishing
Red Flag Rules                  when users are more likely to drop their guard.

                                Email and IM are ESI. Posts to social media sites must be preserved if
FRCP (eDiscovery)               reasonably determined to be discoverable. http://blog.twitter.com/


Sarbanes-Oxley (SOX)            Businesses must preserve information relevant to the company reporting.
Real-Life Anecdotes


    Citibank
    Deloitte Financial
    Northshore Bank
    Online Banking




7    Confidential and Proprietary © 2011, Actiance, Inc. All rights reserved.
Appropriate Controls: The Basics

    Who needs controls applied?
       Users within your organization - HR, Marketing, Sales, IT?

    How do I apply these controls?
       Are there tools available?

    Where do I get started?




8   Confidential and Proprietary © 2011, Actiance, Inc. All rights reserved.
Appropriate Controls: The Specifics


                 Issue                                                           Control Requirements

Identity management                             Ensure that all the different logins of an individual link back to corporate identity

Activity control                                Posting of content allowed for marketing but read-only for everyone else

Granular application control                    Employees can access Facebook, but not Facebook Chat or Facebook Games


Anti-malware                                    Protect network against hidden phishing or Trojan attacks


Data leak prevention                            Protect organization from employees disclosing sensitive information


Moderation                                      Messages posted only upon approval by designated officer

Logging and archiving                           Log all content posted to social networks

Export of data                                  Export stored data to any email archive or WORM storage




9     Confidential and Proprietary © 2011, Actiance, Inc. All rights reserved.
Appropriate Controls: Moderation




                                                                                Posts to Twitter/Facebook/LinkedIn
                                                                                held for review by the following
                                                                                criteria:
                                                                            – All
                                                                            – Keyword/dictionary matches
                                                                            – Regular expressions (e.g., credit
                                                                              card/SSN patterns)


10   Confidential and Proprietary © 2011, Actiance, Inc. All rights reserved.
Appropriate Controls: Archiving for eDiscovery

     Social networking activity and
     posts are captured




                                                                                 All the captured
                                                                                 events are presented
                                                                                 for eDiscovery and
                                                                                 available for export to
                                                                                 archiving platforms



11    Confidential and Proprietary © 2011, Actiance, Inc. All rights reserved.
Further Reading and Materials


 Osterman Research White Paper
       “The Impact of New Communications
       Tools for Financial Services Organizations”



 Meeting FINRA 10-06 Compliance Guidelines White Paper
 How Actiance address FINRA 10-06 Matrix
 2010 Internet Usage Survey Results




12   Confidential and Proprietary © 2011, Actiance, Inc. All rights reserved.
Questions

Contenu connexe

Tendances

Bright talk intrusion prevention are we joking - henshaw july 2010 a
Bright talk   intrusion prevention are we joking - henshaw july 2010 aBright talk   intrusion prevention are we joking - henshaw july 2010 a
Bright talk intrusion prevention are we joking - henshaw july 2010 a
Mark Henshaw
 
Best Practice For Public Sector Information Security And Compliance
Best  Practice For  Public  Sector    Information  Security And  ComplianceBest  Practice For  Public  Sector    Information  Security And  Compliance
Best Practice For Public Sector Information Security And Compliance
Oracle
 
Managing IT security and Business Ethics
Managing IT security and Business EthicsManaging IT security and Business Ethics
Managing IT security and Business Ethics
Rahul Sharma
 
Security is Hard
Security is HardSecurity is Hard
Security is Hard
Mike Murray
 

Tendances (20)

Actiance - BDI 6.14.11 Mobile Financial Services Communications Leadership Forum
Actiance - BDI 6.14.11 Mobile Financial Services Communications Leadership ForumActiance - BDI 6.14.11 Mobile Financial Services Communications Leadership Forum
Actiance - BDI 6.14.11 Mobile Financial Services Communications Leadership Forum
 
Six Irrefutable Laws of Information Security
Six Irrefutable Laws of Information SecuritySix Irrefutable Laws of Information Security
Six Irrefutable Laws of Information Security
 
Bright talk intrusion prevention are we joking - henshaw july 2010 a
Bright talk   intrusion prevention are we joking - henshaw july 2010 aBright talk   intrusion prevention are we joking - henshaw july 2010 a
Bright talk intrusion prevention are we joking - henshaw july 2010 a
 
Centrify rethink security brochure
Centrify rethink security brochureCentrify rethink security brochure
Centrify rethink security brochure
 
Best Practice For Public Sector Information Security And Compliance
Best  Practice For  Public  Sector    Information  Security And  ComplianceBest  Practice For  Public  Sector    Information  Security And  Compliance
Best Practice For Public Sector Information Security And Compliance
 
Cyber liabilty
Cyber liabiltyCyber liabilty
Cyber liabilty
 
Cyber Liabilty: A new exposure for businesses
Cyber Liabilty: A new exposure for businesses Cyber Liabilty: A new exposure for businesses
Cyber Liabilty: A new exposure for businesses
 
Heartbleed
HeartbleedHeartbleed
Heartbleed
 
IT vs. Users? How Law Firms Can Maximize Security While Granting Access to th...
IT vs. Users? How Law Firms Can Maximize Security While Granting Access to th...IT vs. Users? How Law Firms Can Maximize Security While Granting Access to th...
IT vs. Users? How Law Firms Can Maximize Security While Granting Access to th...
 
Managing IT security and Business Ethics
Managing IT security and Business EthicsManaging IT security and Business Ethics
Managing IT security and Business Ethics
 
Managed Security for Your Business
Managed Security for Your BusinessManaged Security for Your Business
Managed Security for Your Business
 
Security is Hard
Security is HardSecurity is Hard
Security is Hard
 
A Guide to Internet Security For Businesses- Business.com
A Guide to Internet Security For Businesses- Business.comA Guide to Internet Security For Businesses- Business.com
A Guide to Internet Security For Businesses- Business.com
 
The importance of information security nowadays
The importance of information security nowadaysThe importance of information security nowadays
The importance of information security nowadays
 
CyberCrime attacks on Small Businesses
CyberCrime attacks on Small BusinessesCyberCrime attacks on Small Businesses
CyberCrime attacks on Small Businesses
 
Cyber Privacy & Password Protection
Cyber Privacy & Password ProtectionCyber Privacy & Password Protection
Cyber Privacy & Password Protection
 
Mitigating Malware Presentation Jkd 11 10 08 Aitp
Mitigating Malware Presentation Jkd 11 10 08 AitpMitigating Malware Presentation Jkd 11 10 08 Aitp
Mitigating Malware Presentation Jkd 11 10 08 Aitp
 
Strong Authentication: Securing Identities and Enabling Business
Strong Authentication: Securing Identities and Enabling BusinessStrong Authentication: Securing Identities and Enabling Business
Strong Authentication: Securing Identities and Enabling Business
 
Top 10 Tips for Data Security
Top 10 Tips for Data SecurityTop 10 Tips for Data Security
Top 10 Tips for Data Security
 
introduction to cyber security
introduction to cyber securityintroduction to cyber security
introduction to cyber security
 

Similaire à Actiance Presentation - BDI 2/9/11 Financial Services Social Communications Leadership Forum

ISACA NA CACS 2012 Orlando session 414 Ulf Mattsson
ISACA NA CACS 2012 Orlando session 414 Ulf MattssonISACA NA CACS 2012 Orlando session 414 Ulf Mattsson
ISACA NA CACS 2012 Orlando session 414 Ulf Mattsson
Ulf Mattsson
 
Cloud Privacy Update: What You Need to Know
Cloud Privacy Update: What You Need to KnowCloud Privacy Update: What You Need to Know
Cloud Privacy Update: What You Need to Know
Act-On Software
 
Ssi Data Protection Solutions V0.2
Ssi Data Protection Solutions V0.2Ssi Data Protection Solutions V0.2
Ssi Data Protection Solutions V0.2
olambel
 

Similaire à Actiance Presentation - BDI 2/9/11 Financial Services Social Communications Leadership Forum (20)

Risk Management Practices for PCI DSS 2.0
Risk Management Practices for PCI DSS 2.0Risk Management Practices for PCI DSS 2.0
Risk Management Practices for PCI DSS 2.0
 
Cyberoam: il futuro della network security!
Cyberoam: il futuro della network security!Cyberoam: il futuro della network security!
Cyberoam: il futuro della network security!
 
IT Security Presentation - IIMC 2014 Conference
IT Security Presentation - IIMC 2014 ConferenceIT Security Presentation - IIMC 2014 Conference
IT Security Presentation - IIMC 2014 Conference
 
FaceTime - DSS @Vilnius 2010
FaceTime - DSS @Vilnius 2010FaceTime - DSS @Vilnius 2010
FaceTime - DSS @Vilnius 2010
 
PCTY 2012, IBM Security and Strategy v. Fabio Panada
PCTY 2012, IBM Security and Strategy v. Fabio PanadaPCTY 2012, IBM Security and Strategy v. Fabio Panada
PCTY 2012, IBM Security and Strategy v. Fabio Panada
 
Identity intelligence: Threat-aware Identity and Access Management
Identity intelligence: Threat-aware Identity and Access ManagementIdentity intelligence: Threat-aware Identity and Access Management
Identity intelligence: Threat-aware Identity and Access Management
 
Security in Web 2.0, Social Web and Cloud
Security in Web 2.0, Social Web and CloudSecurity in Web 2.0, Social Web and Cloud
Security in Web 2.0, Social Web and Cloud
 
Information Security Risk Management
Information Security Risk ManagementInformation Security Risk Management
Information Security Risk Management
 
Information security management v2010
Information security management v2010Information security management v2010
Information security management v2010
 
Безопасность данных мобильных приложений. Мифы и реальность.
Безопасность данных мобильных приложений. Мифы и реальность.Безопасность данных мобильных приложений. Мифы и реальность.
Безопасность данных мобильных приложений. Мифы и реальность.
 
Information Management in a Web 2.0 World May 2009
Information Management in a Web 2.0 World May 2009Information Management in a Web 2.0 World May 2009
Information Management in a Web 2.0 World May 2009
 
Shaping-Up SharePoint Security in 5 Steps
Shaping-Up SharePoint Security in 5 StepsShaping-Up SharePoint Security in 5 Steps
Shaping-Up SharePoint Security in 5 Steps
 
Joanna Belbey, Actiance Presentation - BDI 2/23/12 Social Media in Wealth Man...
Joanna Belbey, Actiance Presentation - BDI 2/23/12 Social Media in Wealth Man...Joanna Belbey, Actiance Presentation - BDI 2/23/12 Social Media in Wealth Man...
Joanna Belbey, Actiance Presentation - BDI 2/23/12 Social Media in Wealth Man...
 
Ulf mattsson webinar jun 7 2012 slideshare version
Ulf mattsson webinar jun 7 2012   slideshare versionUlf mattsson webinar jun 7 2012   slideshare version
Ulf mattsson webinar jun 7 2012 slideshare version
 
ISACA NA CACS 2012 Orlando session 414 Ulf Mattsson
ISACA NA CACS 2012 Orlando session 414 Ulf MattssonISACA NA CACS 2012 Orlando session 414 Ulf Mattsson
ISACA NA CACS 2012 Orlando session 414 Ulf Mattsson
 
Chris Boyer
Chris BoyerChris Boyer
Chris Boyer
 
Cloud Privacy Update: What You Need to Know
Cloud Privacy Update: What You Need to KnowCloud Privacy Update: What You Need to Know
Cloud Privacy Update: What You Need to Know
 
Cloud Privacy
Cloud PrivacyCloud Privacy
Cloud Privacy
 
2022 APIsecure_Understanding API Abuse With Behavioral Analytics
2022 APIsecure_Understanding API Abuse With Behavioral Analytics2022 APIsecure_Understanding API Abuse With Behavioral Analytics
2022 APIsecure_Understanding API Abuse With Behavioral Analytics
 
Ssi Data Protection Solutions V0.2
Ssi Data Protection Solutions V0.2Ssi Data Protection Solutions V0.2
Ssi Data Protection Solutions V0.2
 

Plus de Business Development Institute

Digital Marketing Strategies to Drive Enrollment - BDI 11/19 Social Media Mar...
Digital Marketing Strategies to Drive Enrollment - BDI 11/19 Social Media Mar...Digital Marketing Strategies to Drive Enrollment - BDI 11/19 Social Media Mar...
Digital Marketing Strategies to Drive Enrollment - BDI 11/19 Social Media Mar...
Business Development Institute
 

Plus de Business Development Institute (20)

The Business of Blogging (for Lawyers) - BDI 12/11 Social Media Marketing Sum...
The Business of Blogging (for Lawyers) - BDI 12/11 Social Media Marketing Sum...The Business of Blogging (for Lawyers) - BDI 12/11 Social Media Marketing Sum...
The Business of Blogging (for Lawyers) - BDI 12/11 Social Media Marketing Sum...
 
Content is Still King: A look at best practices for creating and distributing...
Content is Still King: A look at best practices for creating and distributing...Content is Still King: A look at best practices for creating and distributing...
Content is Still King: A look at best practices for creating and distributing...
 
Use Storytelling to Define Your Brand and Connect on Social Media - BDI 12/11...
Use Storytelling to Define Your Brand and Connect on Social Media - BDI 12/11...Use Storytelling to Define Your Brand and Connect on Social Media - BDI 12/11...
Use Storytelling to Define Your Brand and Connect on Social Media - BDI 12/11...
 
Combining Eyes and Ears: The Visual Search for Social - BDI 12/4 Visual Conte...
Combining Eyes and Ears: The Visual Search for Social - BDI 12/4 Visual Conte...Combining Eyes and Ears: The Visual Search for Social - BDI 12/4 Visual Conte...
Combining Eyes and Ears: The Visual Search for Social - BDI 12/4 Visual Conte...
 
Digital Marketing Strategies to Drive Enrollment - BDI 11/19 Social Media Mar...
Digital Marketing Strategies to Drive Enrollment - BDI 11/19 Social Media Mar...Digital Marketing Strategies to Drive Enrollment - BDI 11/19 Social Media Mar...
Digital Marketing Strategies to Drive Enrollment - BDI 11/19 Social Media Mar...
 
People are (S)Talking: How to Get Users to Participate, Not Just Spectate - B...
People are (S)Talking: How to Get Users to Participate, Not Just Spectate - B...People are (S)Talking: How to Get Users to Participate, Not Just Spectate - B...
People are (S)Talking: How to Get Users to Participate, Not Just Spectate - B...
 
The Power of Social Listening - BDI 11/19 Social Media Marketing Forum for Ed...
The Power of Social Listening - BDI 11/19 Social Media Marketing Forum for Ed...The Power of Social Listening - BDI 11/19 Social Media Marketing Forum for Ed...
The Power of Social Listening - BDI 11/19 Social Media Marketing Forum for Ed...
 
How Investors Will Communicate as the Internet Swallows Everything - BDI 11/0...
How Investors Will Communicate as the Internet Swallows Everything - BDI 11/0...How Investors Will Communicate as the Internet Swallows Everything - BDI 11/0...
How Investors Will Communicate as the Internet Swallows Everything - BDI 11/0...
 
Financial Communications Society - BDI 11/06 The Future of Financial Services...
Financial Communications Society - BDI 11/06 The Future of Financial Services...Financial Communications Society - BDI 11/06 The Future of Financial Services...
Financial Communications Society - BDI 11/06 The Future of Financial Services...
 
The New Communications Paradigm in Financial Services: The Penn Mutual Case S...
The New Communications Paradigm in Financial Services: The Penn Mutual Case S...The New Communications Paradigm in Financial Services: The Penn Mutual Case S...
The New Communications Paradigm in Financial Services: The Penn Mutual Case S...
 
Social Listening Trends and the Paradigm Change in Financial Services - BDI 1...
Social Listening Trends and the Paradigm Change in Financial Services - BDI 1...Social Listening Trends and the Paradigm Change in Financial Services - BDI 1...
Social Listening Trends and the Paradigm Change in Financial Services - BDI 1...
 
Digital Financial Wellness: The Future of Money - BDI 11/06 The Future of Fin...
Digital Financial Wellness: The Future of Money - BDI 11/06 The Future of Fin...Digital Financial Wellness: The Future of Money - BDI 11/06 The Future of Fin...
Digital Financial Wellness: The Future of Money - BDI 11/06 The Future of Fin...
 
Bitcoin & The Sharing Economy - BDI 11/06 The Future of Financial Services Co...
Bitcoin & The Sharing Economy - BDI 11/06 The Future of Financial Services Co...Bitcoin & The Sharing Economy - BDI 11/06 The Future of Financial Services Co...
Bitcoin & The Sharing Economy - BDI 11/06 The Future of Financial Services Co...
 
Hearts, Heads and Hands: How cupcakes, sidewalk chalk, and the story of a tee...
Hearts, Heads and Hands: How cupcakes, sidewalk chalk, and the story of a tee...Hearts, Heads and Hands: How cupcakes, sidewalk chalk, and the story of a tee...
Hearts, Heads and Hands: How cupcakes, sidewalk chalk, and the story of a tee...
 
Content is still King: A look at best practices for creating and distributing...
Content is still King: A look at best practices for creating and distributing...Content is still King: A look at best practices for creating and distributing...
Content is still King: A look at best practices for creating and distributing...
 
Developing and Sustaining an Effective Mobile Strategy - BDI 10/16 Financial ...
Developing and Sustaining an Effective Mobile Strategy - BDI 10/16 Financial ...Developing and Sustaining an Effective Mobile Strategy - BDI 10/16 Financial ...
Developing and Sustaining an Effective Mobile Strategy - BDI 10/16 Financial ...
 
Make Friends First, Do Business Last: Relationship Marketing Using Social Med...
Make Friends First, Do Business Last: Relationship Marketing Using Social Med...Make Friends First, Do Business Last: Relationship Marketing Using Social Med...
Make Friends First, Do Business Last: Relationship Marketing Using Social Med...
 
The New Communications Paradigm in Financial Services: The Penn Mutual Case S...
The New Communications Paradigm in Financial Services: The Penn Mutual Case S...The New Communications Paradigm in Financial Services: The Penn Mutual Case S...
The New Communications Paradigm in Financial Services: The Penn Mutual Case S...
 
Using Social Media Ethically - BDI 10/15 Social Media Marketing Summit for La...
Using Social Media Ethically - BDI 10/15 Social Media Marketing Summit for La...Using Social Media Ethically - BDI 10/15 Social Media Marketing Summit for La...
Using Social Media Ethically - BDI 10/15 Social Media Marketing Summit for La...
 
The Power of Social Media: Attracting the Next Generation of Clients - BDI 9/...
The Power of Social Media: Attracting the Next Generation of Clients - BDI 9/...The Power of Social Media: Attracting the Next Generation of Clients - BDI 9/...
The Power of Social Media: Attracting the Next Generation of Clients - BDI 9/...
 

Dernier

0183760ssssssssssssssssssssssssssss00101011 (27).pdf
0183760ssssssssssssssssssssssssssss00101011 (27).pdf0183760ssssssssssssssssssssssssssss00101011 (27).pdf
0183760ssssssssssssssssssssssssssss00101011 (27).pdf
Renandantas16
 
unwanted pregnancy Kit [+918133066128] Abortion Pills IN Dubai UAE Abudhabi
unwanted pregnancy Kit [+918133066128] Abortion Pills IN Dubai UAE Abudhabiunwanted pregnancy Kit [+918133066128] Abortion Pills IN Dubai UAE Abudhabi
unwanted pregnancy Kit [+918133066128] Abortion Pills IN Dubai UAE Abudhabi
Abortion pills in Kuwait Cytotec pills in Kuwait
 
Russian Call Girls In Gurgaon ❤️8448577510 ⊹Best Escorts Service In 24/7 Delh...
Russian Call Girls In Gurgaon ❤️8448577510 ⊹Best Escorts Service In 24/7 Delh...Russian Call Girls In Gurgaon ❤️8448577510 ⊹Best Escorts Service In 24/7 Delh...
Russian Call Girls In Gurgaon ❤️8448577510 ⊹Best Escorts Service In 24/7 Delh...
lizamodels9
 
Call Girls In Noida 959961⊹3876 Independent Escort Service Noida
Call Girls In Noida 959961⊹3876 Independent Escort Service NoidaCall Girls In Noida 959961⊹3876 Independent Escort Service Noida
Call Girls In Noida 959961⊹3876 Independent Escort Service Noida
dlhescort
 
Call Girls From Pari Chowk Greater Noida ❤️8448577510 ⊹Best Escorts Service I...
Call Girls From Pari Chowk Greater Noida ❤️8448577510 ⊹Best Escorts Service I...Call Girls From Pari Chowk Greater Noida ❤️8448577510 ⊹Best Escorts Service I...
Call Girls From Pari Chowk Greater Noida ❤️8448577510 ⊹Best Escorts Service I...
lizamodels9
 
Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...
Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...
Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...
Dipal Arora
 
Call Girls in Delhi, Escort Service Available 24x7 in Delhi 959961-/-3876
Call Girls in Delhi, Escort Service Available 24x7 in Delhi 959961-/-3876Call Girls in Delhi, Escort Service Available 24x7 in Delhi 959961-/-3876
Call Girls in Delhi, Escort Service Available 24x7 in Delhi 959961-/-3876
dlhescort
 
Call Girls Hebbal Just Call 👗 7737669865 👗 Top Class Call Girl Service Bangalore
Call Girls Hebbal Just Call 👗 7737669865 👗 Top Class Call Girl Service BangaloreCall Girls Hebbal Just Call 👗 7737669865 👗 Top Class Call Girl Service Bangalore
Call Girls Hebbal Just Call 👗 7737669865 👗 Top Class Call Girl Service Bangalore
amitlee9823
 

Dernier (20)

John Halpern sued for sexual assault.pdf
John Halpern sued for sexual assault.pdfJohn Halpern sued for sexual assault.pdf
John Halpern sued for sexual assault.pdf
 
Falcon's Invoice Discounting: Your Path to Prosperity
Falcon's Invoice Discounting: Your Path to ProsperityFalcon's Invoice Discounting: Your Path to Prosperity
Falcon's Invoice Discounting: Your Path to Prosperity
 
0183760ssssssssssssssssssssssssssss00101011 (27).pdf
0183760ssssssssssssssssssssssssssss00101011 (27).pdf0183760ssssssssssssssssssssssssssss00101011 (27).pdf
0183760ssssssssssssssssssssssssssss00101011 (27).pdf
 
A DAY IN THE LIFE OF A SALESMAN / WOMAN
A DAY IN THE LIFE OF A  SALESMAN / WOMANA DAY IN THE LIFE OF A  SALESMAN / WOMAN
A DAY IN THE LIFE OF A SALESMAN / WOMAN
 
Forklift Operations: Safety through Cartoons
Forklift Operations: Safety through CartoonsForklift Operations: Safety through Cartoons
Forklift Operations: Safety through Cartoons
 
Phases of Negotiation .pptx
 Phases of Negotiation .pptx Phases of Negotiation .pptx
Phases of Negotiation .pptx
 
Call Girls Service In Old Town Dubai ((0551707352)) Old Town Dubai Call Girl ...
Call Girls Service In Old Town Dubai ((0551707352)) Old Town Dubai Call Girl ...Call Girls Service In Old Town Dubai ((0551707352)) Old Town Dubai Call Girl ...
Call Girls Service In Old Town Dubai ((0551707352)) Old Town Dubai Call Girl ...
 
Value Proposition canvas- Customer needs and pains
Value Proposition canvas- Customer needs and painsValue Proposition canvas- Customer needs and pains
Value Proposition canvas- Customer needs and pains
 
unwanted pregnancy Kit [+918133066128] Abortion Pills IN Dubai UAE Abudhabi
unwanted pregnancy Kit [+918133066128] Abortion Pills IN Dubai UAE Abudhabiunwanted pregnancy Kit [+918133066128] Abortion Pills IN Dubai UAE Abudhabi
unwanted pregnancy Kit [+918133066128] Abortion Pills IN Dubai UAE Abudhabi
 
Call Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service Available
Call Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service AvailableCall Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service Available
Call Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service Available
 
Russian Call Girls In Gurgaon ❤️8448577510 ⊹Best Escorts Service In 24/7 Delh...
Russian Call Girls In Gurgaon ❤️8448577510 ⊹Best Escorts Service In 24/7 Delh...Russian Call Girls In Gurgaon ❤️8448577510 ⊹Best Escorts Service In 24/7 Delh...
Russian Call Girls In Gurgaon ❤️8448577510 ⊹Best Escorts Service In 24/7 Delh...
 
Call Girls In Noida 959961⊹3876 Independent Escort Service Noida
Call Girls In Noida 959961⊹3876 Independent Escort Service NoidaCall Girls In Noida 959961⊹3876 Independent Escort Service Noida
Call Girls In Noida 959961⊹3876 Independent Escort Service Noida
 
Cracking the Cultural Competence Code.pptx
Cracking the Cultural Competence Code.pptxCracking the Cultural Competence Code.pptx
Cracking the Cultural Competence Code.pptx
 
Call Girls From Pari Chowk Greater Noida ❤️8448577510 ⊹Best Escorts Service I...
Call Girls From Pari Chowk Greater Noida ❤️8448577510 ⊹Best Escorts Service I...Call Girls From Pari Chowk Greater Noida ❤️8448577510 ⊹Best Escorts Service I...
Call Girls From Pari Chowk Greater Noida ❤️8448577510 ⊹Best Escorts Service I...
 
Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...
Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...
Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...
 
Business Model Canvas (BMC)- A new venture concept
Business Model Canvas (BMC)-  A new venture conceptBusiness Model Canvas (BMC)-  A new venture concept
Business Model Canvas (BMC)- A new venture concept
 
Call Girls in Delhi, Escort Service Available 24x7 in Delhi 959961-/-3876
Call Girls in Delhi, Escort Service Available 24x7 in Delhi 959961-/-3876Call Girls in Delhi, Escort Service Available 24x7 in Delhi 959961-/-3876
Call Girls in Delhi, Escort Service Available 24x7 in Delhi 959961-/-3876
 
How to Get Started in Social Media for Art League City
How to Get Started in Social Media for Art League CityHow to Get Started in Social Media for Art League City
How to Get Started in Social Media for Art League City
 
B.COM Unit – 4 ( CORPORATE SOCIAL RESPONSIBILITY ( CSR ).pptx
B.COM Unit – 4 ( CORPORATE SOCIAL RESPONSIBILITY ( CSR ).pptxB.COM Unit – 4 ( CORPORATE SOCIAL RESPONSIBILITY ( CSR ).pptx
B.COM Unit – 4 ( CORPORATE SOCIAL RESPONSIBILITY ( CSR ).pptx
 
Call Girls Hebbal Just Call 👗 7737669865 👗 Top Class Call Girl Service Bangalore
Call Girls Hebbal Just Call 👗 7737669865 👗 Top Class Call Girl Service BangaloreCall Girls Hebbal Just Call 👗 7737669865 👗 Top Class Call Girl Service Bangalore
Call Girls Hebbal Just Call 👗 7737669865 👗 Top Class Call Girl Service Bangalore
 

Actiance Presentation - BDI 2/9/11 Financial Services Social Communications Leadership Forum

  • 1. How to Enable Social Media in Financial Services
  • 2. Agenda Intro About Actiance Social Media on the Rise Benefits of Social Media Understanding the Risks Applicable Regulations Anecdotes Applying Appropriate Controls Wrap-up 1 Confidential and Proprietary © 2011, Actiance, Inc. All rights reserved.
  • 3. About Actiance Enable the New Internet – 4,500+ Web 2.0 apps, Unified Communications, Social Networks Global operations – USA, EMEA, India, Asia/Pacific Market Leader – 9 of the top 10 US banks – Top 5 Canadian banks – 3 of the top 5 energy companies Broadest Partner Ecosystem – Technology alliances 2 Confidential and Proprietary © 2011, Actiance, Inc. All rights reserved.
  • 4. Social Is Booming Social Networking Social Collaboration Social Publishing Social Feedback 3 Confidential and Proprietary © 2011, Actiance, Inc. All rights reserved.
  • 5. Upside of Social Media Generate buzz and increase visibility Strengthen customer relations Build an additional revenue source Extend your brand 4 Confidential and Proprietary © 2011, Actiance, Inc. All rights reserved.
  • 6. Risks of Using Social Media and Web 2.0 Data Leakage Incoming Threats Compliance & eDiscovery User Behavior Personal SEC, FINRA Employee Information Malware, Spyware Productivity HIPAA, FISMA Intellectual Property Viruses, Trojans Bandwidth SOX, PCI, FSA Credit Card, Explosion Inappropriate SSN FRCP- eDiscovery Content Every employee is Client Records FERC, NERC the face of business
  • 7. Web 2.0 & Social Networks Regulation & Compliance Regulation Social Network and Web 2.0 Impact Obliged to store records and make accessible. Public correspondence requires SEC and FINRA approval, review and retention. Extended to social media. http://www.finra.org/Industry/Issues/Advertising/p006118 Protect information, monitor for sensitive content, and ensure not sent over Gramm-Leach-Bliley Act (GLBA) public channels (e.g., Twitter) Ensuring cardholder data is not sent over unsecured channels AND PROVING PCI IT Prevent identity theft. Protect IM and Web 2.0 from malware and phishing Red Flag Rules when users are more likely to drop their guard. Email and IM are ESI. Posts to social media sites must be preserved if FRCP (eDiscovery) reasonably determined to be discoverable. http://blog.twitter.com/ Sarbanes-Oxley (SOX) Businesses must preserve information relevant to the company reporting.
  • 8. Real-Life Anecdotes Citibank Deloitte Financial Northshore Bank Online Banking 7 Confidential and Proprietary © 2011, Actiance, Inc. All rights reserved.
  • 9. Appropriate Controls: The Basics Who needs controls applied? Users within your organization - HR, Marketing, Sales, IT? How do I apply these controls? Are there tools available? Where do I get started? 8 Confidential and Proprietary © 2011, Actiance, Inc. All rights reserved.
  • 10. Appropriate Controls: The Specifics Issue Control Requirements Identity management Ensure that all the different logins of an individual link back to corporate identity Activity control Posting of content allowed for marketing but read-only for everyone else Granular application control Employees can access Facebook, but not Facebook Chat or Facebook Games Anti-malware Protect network against hidden phishing or Trojan attacks Data leak prevention Protect organization from employees disclosing sensitive information Moderation Messages posted only upon approval by designated officer Logging and archiving Log all content posted to social networks Export of data Export stored data to any email archive or WORM storage 9 Confidential and Proprietary © 2011, Actiance, Inc. All rights reserved.
  • 11. Appropriate Controls: Moderation Posts to Twitter/Facebook/LinkedIn held for review by the following criteria: – All – Keyword/dictionary matches – Regular expressions (e.g., credit card/SSN patterns) 10 Confidential and Proprietary © 2011, Actiance, Inc. All rights reserved.
  • 12. Appropriate Controls: Archiving for eDiscovery Social networking activity and posts are captured All the captured events are presented for eDiscovery and available for export to archiving platforms 11 Confidential and Proprietary © 2011, Actiance, Inc. All rights reserved.
  • 13. Further Reading and Materials Osterman Research White Paper “The Impact of New Communications Tools for Financial Services Organizations” Meeting FINRA 10-06 Compliance Guidelines White Paper How Actiance address FINRA 10-06 Matrix 2010 Internet Usage Survey Results 12 Confidential and Proprietary © 2011, Actiance, Inc. All rights reserved.