Social Media, Privacy and Security
Project and Program:
Enterprise Data Center,
Integrating Innovative Technologies
Tags:
Proceedings,
SHARE in Boston 2013,
2013
Social media is here to stay and the explosion of smart mobile devices now allows employees to access Facebook, Twitter and other social media channels anytime and anywhere from a wide variety of devices. Security organizations are struggling to balance the demands of the business, which increasingly include allowing employees to bring their own devices and access social media at will, with the best interests of the organization, including protecting sensitive data, reducing risk, and complying with regulations.
Properly managed, social media can provide tremendous marketing and PR value to organizations. Those organizations that encourage (and enforce) proper usage can reap great benefits. Improper use of social media, however, can be disastrous. Leakage of sensitive data and privacy breaches, coupled with the potential for misrepresentation of corporate positions and libelous messages are but the tip of the social media risk iceberg. Our panel willdiscuss key social media trends, discuss recommendations for creating effective social media policies, and present emerging security technologies that can help security organizations to embrace the social media tsunami without getting drowned in litigation. Laura Knapp; Ellis Holman; Brian Cummings; Mike Buzzetti AES; IBM Corporation; Tata Consultancy Services
Laura Knapp; Ellis Holman; Brian Cummings; Mike Buzzetti , AES; IBM Corporation; Tata Consultancy Services
Back to Proceedings File Library