data breaches and the social web
DESCRIPTION
Presentation to the World Conference on Disaster Management June 2012TRANSCRIPT
![Page 1: Data Breaches and the Social Web](https://reader033.vdocuments.net/reader033/viewer/2022061207/5478a144b4af9f4b708b45e8/html5/thumbnails/1.jpg)
April 9, 2023
Boyd Neil
National Practice Leader
Social Media and Digital Communications
Social Web + Data Breaches = Reputation Risk
![Page 2: Data Breaches and the Social Web](https://reader033.vdocuments.net/reader033/viewer/2022061207/5478a144b4af9f4b708b45e8/html5/thumbnails/2.jpg)
![Page 3: Data Breaches and the Social Web](https://reader033.vdocuments.net/reader033/viewer/2022061207/5478a144b4af9f4b708b45e8/html5/thumbnails/3.jpg)
04/09/2023
3
The Social Web Changes Crisis Communications Permanently
![Page 4: Data Breaches and the Social Web](https://reader033.vdocuments.net/reader033/viewer/2022061207/5478a144b4af9f4b708b45e8/html5/thumbnails/4.jpg)
‘There won’t be a significant event in the future that won’t involve public participation… Social media (is) the sociological equivalent of climate change.’
Retired Admiral Thad Allen
![Page 5: Data Breaches and the Social Web](https://reader033.vdocuments.net/reader033/viewer/2022061207/5478a144b4af9f4b708b45e8/html5/thumbnails/5.jpg)
5
New voices empowered
through digital challenging
traditional media primacy
Two-way channels creating
opportunities for dialogue yet to be
fully exploited
Providing organizations with means to directly
touch most important audiences
Reputation & risk management
models impacted: speed,
transparency, inaccuracy
Mobile technologies
moving us into new areas still not fully
understood
![Page 6: Data Breaches and the Social Web](https://reader033.vdocuments.net/reader033/viewer/2022061207/5478a144b4af9f4b708b45e8/html5/thumbnails/6.jpg)
04/09/2023
6
A New Frontier for Risk:Data Breaches
![Page 7: Data Breaches and the Social Web](https://reader033.vdocuments.net/reader033/viewer/2022061207/5478a144b4af9f4b708b45e8/html5/thumbnails/7.jpg)
![Page 8: Data Breaches and the Social Web](https://reader033.vdocuments.net/reader033/viewer/2022061207/5478a144b4af9f4b708b45e8/html5/thumbnails/8.jpg)
04/09/2023
8
![Page 9: Data Breaches and the Social Web](https://reader033.vdocuments.net/reader033/viewer/2022061207/5478a144b4af9f4b708b45e8/html5/thumbnails/9.jpg)
![Page 10: Data Breaches and the Social Web](https://reader033.vdocuments.net/reader033/viewer/2022061207/5478a144b4af9f4b708b45e8/html5/thumbnails/10.jpg)
![Page 11: Data Breaches and the Social Web](https://reader033.vdocuments.net/reader033/viewer/2022061207/5478a144b4af9f4b708b45e8/html5/thumbnails/11.jpg)
![Page 12: Data Breaches and the Social Web](https://reader033.vdocuments.net/reader033/viewer/2022061207/5478a144b4af9f4b708b45e8/html5/thumbnails/12.jpg)
![Page 13: Data Breaches and the Social Web](https://reader033.vdocuments.net/reader033/viewer/2022061207/5478a144b4af9f4b708b45e8/html5/thumbnails/13.jpg)
![Page 14: Data Breaches and the Social Web](https://reader033.vdocuments.net/reader033/viewer/2022061207/5478a144b4af9f4b708b45e8/html5/thumbnails/14.jpg)
![Page 15: Data Breaches and the Social Web](https://reader033.vdocuments.net/reader033/viewer/2022061207/5478a144b4af9f4b708b45e8/html5/thumbnails/15.jpg)
![Page 16: Data Breaches and the Social Web](https://reader033.vdocuments.net/reader033/viewer/2022061207/5478a144b4af9f4b708b45e8/html5/thumbnails/16.jpg)
![Page 17: Data Breaches and the Social Web](https://reader033.vdocuments.net/reader033/viewer/2022061207/5478a144b4af9f4b708b45e8/html5/thumbnails/17.jpg)
![Page 18: Data Breaches and the Social Web](https://reader033.vdocuments.net/reader033/viewer/2022061207/5478a144b4af9f4b708b45e8/html5/thumbnails/18.jpg)
![Page 19: Data Breaches and the Social Web](https://reader033.vdocuments.net/reader033/viewer/2022061207/5478a144b4af9f4b708b45e8/html5/thumbnails/19.jpg)
04/09/2023
19
The Social Web Loves Data Breaches
![Page 20: Data Breaches and the Social Web](https://reader033.vdocuments.net/reader033/viewer/2022061207/5478a144b4af9f4b708b45e8/html5/thumbnails/20.jpg)
04/09/2023
20
![Page 21: Data Breaches and the Social Web](https://reader033.vdocuments.net/reader033/viewer/2022061207/5478a144b4af9f4b708b45e8/html5/thumbnails/21.jpg)
![Page 22: Data Breaches and the Social Web](https://reader033.vdocuments.net/reader033/viewer/2022061207/5478a144b4af9f4b708b45e8/html5/thumbnails/22.jpg)
Graphic Credit . . . http://gapingvoidgallery.com/
![Page 23: Data Breaches and the Social Web](https://reader033.vdocuments.net/reader033/viewer/2022061207/5478a144b4af9f4b708b45e8/html5/thumbnails/23.jpg)
![Page 24: Data Breaches and the Social Web](https://reader033.vdocuments.net/reader033/viewer/2022061207/5478a144b4af9f4b708b45e8/html5/thumbnails/24.jpg)
![Page 25: Data Breaches and the Social Web](https://reader033.vdocuments.net/reader033/viewer/2022061207/5478a144b4af9f4b708b45e8/html5/thumbnails/25.jpg)
25
“[Brands suffering data leaks] should email people, post on Twitter, Facebook and address their customers where they are - you shouldn’t have to let people do a Google search or find out through word of mouth.”
• Alys Woodward, research director at market intelligence firm IDC Europe
![Page 26: Data Breaches and the Social Web](https://reader033.vdocuments.net/reader033/viewer/2022061207/5478a144b4af9f4b708b45e8/html5/thumbnails/26.jpg)
26
1. Use the social web dammit (and ignore the sarcasm/humour)
2. Drive internally for timely notification (1-2 hours)
3. Provide interim security advice (‘change password immediately’)
4. Be transparent about the scope and consequences of the data breach (when known)
11 principles for managing data breach communication
on the social web
![Page 27: Data Breaches and the Social Web](https://reader033.vdocuments.net/reader033/viewer/2022061207/5478a144b4af9f4b708b45e8/html5/thumbnails/27.jpg)
27
5. Coordinate internal protocols for multi-platform communications (Twitter, Facebook, YouTube, etc.)
6. Use #hashtags related to incident so your info. is there in frame used to share news (Twitter/Facebook
7. Use multiple media formats (visuals + video + text) . . . facilitates sharing
11 principles for managing data breach communication
on the social web
![Page 28: Data Breaches and the Social Web](https://reader033.vdocuments.net/reader033/viewer/2022061207/5478a144b4af9f4b708b45e8/html5/thumbnails/28.jpg)
28
8. Amplify through paid/promoted tweets/Facebook posts
9. Reply to social web dialogue + questions with ‘confident humility’
10. Commit to fixing your firewall and/or internal security processes
11. Get ready now for the social web part of the hack dammit
11 principles for managing data breach communication
on the social web
![Page 29: Data Breaches and the Social Web](https://reader033.vdocuments.net/reader033/viewer/2022061207/5478a144b4af9f4b708b45e8/html5/thumbnails/29.jpg)
04/09/2023
29
Sources:
http://www.marketingweek.co.uk/news/linkedins-slow-reaction-to-data-leaks-hits-brand/4002126.article
http://www.cloudhance.com/how-data-breaches-happen/
http://www.pcmag.com/article2/0,2817,2394743,00.asp
http://www.focus.com/fyi/high-profile-data-breaches/
http://www.backgroundcheck.org/state-of-it-security/
http://siliconangle.com/blog/2011/06/26/the-largest-data-breaches-of-all-time-infographic/
http://www.infographs.org/2012/02/the-high-cost-of-a-data-breach-infographic/#
http://paranoid-security.blogspot.ca/
http://www.youtube.com/watch?v=xyIxFhQ_g5g