Social Media: Infiltrating The Enterprise

37
SOCIAL MEDIA: INFILTRATING THE ENTERPRISE MIDTECH IT Summit June 27th, 2011 JAY A. MCLAUGHLIN, CISSP SVP , CHIEF INFORMATION OFFICER

description

This presentation was given on June 27th at the 2011 MidTech IT Summit at the Red Rock Resort/Casino in Las Vegas, NV.

Transcript of Social Media: Infiltrating The Enterprise

Page 1: Social Media: Infiltrating The Enterprise

SOCIAL MEDIA:���INFILTRATING THE

ENTERPRISE

MIDTECH IT Summit June 27th, 2011

JAY A. MCLAUGHLIN, CISSP SVP, CHIEF INFORMATION OFFICER

Page 2: Social Media: Infiltrating The Enterprise

DISCLAIMER The materials, thoughts, comments, ideas and opinions expressed throughout this presentation are entirely my own and do not necessarily represent the thoughts or

opinions of my employer (past or present).

Page 3: Social Media: Infiltrating The Enterprise

AGENDA

•  Defining social media •  Embracing the Inevitable •  Understanding the Benefits & Risks •  Friending your Customers •  Preventing social media disasters •  Building a strategy

Page 4: Social Media: Infiltrating The Enterprise

: forms of electronic communication (as Web sites for social networking and microblogging) through which users create online communities to share information, ideas, personal messages, and other content

Social media is media for social interaction using highly accessible and scalable communication techniques. Social media is the use of web-based and mobile technologies to turn communication into interactive dialogue.

What is Social Media?

Page 5: Social Media: Infiltrating The Enterprise
Page 6: Social Media: Infiltrating The Enterprise

•  500 Million •  250 Million •  700 Billion

Source: Facebook.com April 2011

Page 7: Social Media: Infiltrating The Enterprise

It’s Corporate

Page 8: Social Media: Infiltrating The Enterprise

•  6939 •  319 •  140 Million

Source: Twitter. com March 2011

Page 9: Social Media: Infiltrating The Enterprise

It’s Mainstream

Page 10: Social Media: Infiltrating The Enterprise

•  100 Million •  2 Million •  4.3 Billion

Source: LinkedIn.com May 2011

Page 11: Social Media: Infiltrating The Enterprise
Page 12: Social Media: Infiltrating The Enterprise

WHY SHOULD WE CARE?

• It's where your customers are

• It's where your prospects are

• It's reach stretches further broader than any marketing channel

• It's relevant to be in the game

Page 13: Social Media: Infiltrating The Enterprise

“We don’t have a choice on whether we will DO

social media, the question is how WELL we DO it.”

- Erik Qualman, Author Socialnomics

http://www.youtube.com/user/Socialnomics09?blend=1&ob=5

Page 14: Social Media: Infiltrating The Enterprise

Source: eMarketer, Nov 2010

* companies that have 100 or more employees

Page 15: Social Media: Infiltrating The Enterprise

BUSINESS BENEFITS

Enhanced Collaboration

Shared Workspaces

Faster access to Information

Extended Organizational Reach

Ability to Compete

Page 16: Social Media: Infiltrating The Enterprise

THE EQUALIZER

• When leveraged effectively, social networks become an equalizer, leveling the playing field

• It allows organizations both large and small to compete and be relevant in their space

• Ability to influence with little or not cost

Page 17: Social Media: Infiltrating The Enterprise

UNANTICIPATED DISASTERS

Page 18: Social Media: Infiltrating The Enterprise

PREVENTING DISASTERS

Page 19: Social Media: Infiltrating The Enterprise

IS YOUR ORGANIZATION PREPARED FOR...?

• Employees posting opinions about the organization

• Managing brand reputation and public opinion/

exposure

• Responding to positive and negative feedback from

customers

• Standing by the decision NOT to get engaged....?

Page 20: Social Media: Infiltrating The Enterprise

SOCIAL MEDIA SWOT

•  Strength - ability to build relationships with your target audience like never before.

• Weakness - silo-ed as a business function and not integrated in overall business strategy.

• Threat - fear of losing control. Seeks risk aversion. Non-innovative.

• Opportunities - its where our customers are. Integration with the business is key.

Page 21: Social Media: Infiltrating The Enterprise

ESTABLISHING A POLICY

?

Page 22: Social Media: Infiltrating The Enterprise

THE BASICS • Do your employees know what is acceptable or permitted?

• How may (or not) employees identify themselves?

• To what degree can corporate content be used?

• Has your organization determined what is can do with information obtained through social media?

"  Establishing a policy is critical!

Page 23: Social Media: Infiltrating The Enterprise

• Governance required implement and enforce acceptable usage policy covering social networking sites

• It is key that all staff receive security awareness training covering your acceptable usage policy for social networking

• Promote good practices to help improve users behavior ultimately reducing and/or mitigating some of the risks

• Permit access only to social networking sites that have obvious business benefits only to users with a business need

ESTABLISH A STRATEGY

Page 24: Social Media: Infiltrating The Enterprise

• Institute processes to manage and monitor activity

• Be flexible - overall uncertainty about what strategies and tactics to adopt to security social media

• Understand and identify which users create the most amount of risk?

• Create reasonable guidelines that can be followed

• Review sites terms and conditions to understand risks associated with each site

ESTABLISH A STRATEGY

Page 25: Social Media: Infiltrating The Enterprise

REGULATION is coming

For regulated industries, what requirements do you face?

ex. FINRA

Employers know ALOT about their employees/candidates

Page 26: Social Media: Infiltrating The Enterprise

• HR is tempted to“peak” at these sites to gather information about employees and potential candidates

• Consider discrimination lawsuits! Proceed with caution. - ex: viewing the online photo/picture of a candidate

• Consistency is KING - it will minimize your risk.

- ex: if conducting a search for ONE candidate, then do so for ALL

• Even if employers have the technical capability to gain access to social networking information of their employees or candidates, it does not imply the legal right to do so.

HR: OBTAINING INFORMATION FROM SOCIAL NETWORKS

Page 27: Social Media: Infiltrating The Enterprise

consider ALL risks

Is there a need to address how to evaluate the risk of sharing too much information online in relation to the

value it brings to the business?

Page 28: Social Media: Infiltrating The Enterprise

• There is a continued growth in social networking sites being used as an attack distribution platform

• Users are less likely to see malware when it is passed on by a friend as it has a certain level of authenticity and a level of trust

• Social networks give attackers a potentially powerful point of leverage, sometimes allowing them to launch sophisticated attacks against businesses

• Known weaknesses exist in the security of the networks themselves, which limit our control

Security Concerns

Page 29: Social Media: Infiltrating The Enterprise
Page 30: Social Media: Infiltrating The Enterprise

•  Session-hijacking / authentication weaknesses

•  Profile harvesting leading to social engineering -  ex: phishing / spear-phishing

•  Cross-site scripting (XSS) / Cross-site request forgery

(CSRF)

•  Malicious code / Malware -  ex: drive-by downloads

“Threatscape” of sites

Page 31: Social Media: Infiltrating The Enterprise

<iframe id=”CrazyDaVinci” style=”display:none;” src=”http://m.facebook.com/connect/prompt_feed.php?display=wap&user_message_prompt=’<script>window.onload=function(){document.forms[0].message.value=’Just visited http://y.ahoo.it/gajeBA Wow.. cool! nice page dude!!!‘;document.forms[0].submit();}</script>”></iframe>

• this bit of HTML/Javascript would be included in a viral page. • the code sets the content of the wall post to a message that includes a link to a viral page, then submits the prompt automatically.

XSS Example

Page 32: Social Media: Infiltrating The Enterprise

Microsoft has documented a steady rise in the number of attacks targeting social networks

Primary vectors:

• Phishing attempts

• Social engineering tactics Instances of Phishing impressions increased from 8.3% to 84.5%

Page 33: Social Media: Infiltrating The Enterprise

Verizon highlighted in its 2011 DBIR, that malware and social engineering to have been the culprit for 60% of all reported attacks/breaches

Contribution of malware:

• 49% of breaches

• 79% of records stolen

Page 34: Social Media: Infiltrating The Enterprise

PROTECT & SERVE

Policing Social Media: How do we protect the usage of social networks?

Page 35: Social Media: Infiltrating The Enterprise

•  Is it possible to establish and implement a standard set of guidelines for enterprise users?

•  ...that would help to not only prevent data leaks, but

also keep emerging social networking malware at bay?

•  It requires a combination of technical, behavioral and organizational security controls

“Policing” Social Media

Page 36: Social Media: Infiltrating The Enterprise

• Social media isn’t a choice anyone….recognize it is a business transformation tool • Perform a comprehensive risk assessment against all

social networks that will be considered for use

• Social networks DO introduce new security risks - take a formal approach to mitigate them through policy enforcement and user education • Doing nothing is not an option...will you take that

risk?

CONCLUSION

Page 37: Social Media: Infiltrating The Enterprise

QUESTIONS?

@jaymclaughlin

linkedin.com/jaymclaughlin

Contact Info: