<< by on November 20th, 2009
Chris Tignor CISO at Capital One, Michael McGarry, CTO at Genworth Financial and Kirsten Kliphouse, Eastern Regional Manager of Microsoft spoke about some best practices and procedures for using social media in the workplace.
Kliphouse said social media has become core to Microsoft product development in a diverse market. She suggested that companies listen to what’s being said about their products
and then adapt. Microsoft did exactly that when consumers wanted access to Twitter and Facebook from the Xbox. They added this feature as soon as they could.
Social media policies were also discussed, and Tignor shared his opinion saying that telling employees to use commonsense doesn’t work because the definition of commonsense is diverse. Kliphouse said employees need to be trained to learn what is public and what shouldn’t be shared.
Concerning policies McGarry said:
Legal and compliance become your best friend.
At Capital One, financial data and social media cannot mix, so the company has installed kiosks for employees to use while on their breaks if they would like to log on to social media sites. They’ve also taken on social media internally.
The last segment of RichTech TechSummit, was a presentation by Dr. Terry Gudaitis, Cyber Intelligence Director of Cyveillance. She said like land grab days of domain squatting, social media is the Wild West, and username squatting has become a real problem. Let me urge you to register your company name, major product names, and CEO’s name, as recommended by Gudaitis. A good point she had was that when internet and e-mail were new, people had many of the same concerns they have with social media: viruses, malicious code, bandwidth, and the sharing of proprietary information. At the present day, she said:
If you’re not monitoring in real-time, you’re behind the curve.
She closed with six recommendations for a social media program:
1. What’s considered most sensitive?
3. Social networking policies and enforcement
a. Who is authorized and who isn’t?
4. Training (executives, employees, families)
a. New protocols and platforms
b. Internal activities/external activities
6. Organizational Feedback Loop (multiple departments)
And another suggestion from Gudaitis, gather your social media SWAT team with PR, lawyers, IT and executives, because if something does go wrong you’ll want an educated team of people ready to respond.