Social Networking: Roadblocks, Risks, Rewards

Watch Now

To watch this webinar you’ll need an Infosecurity Magazine account. Log in or sign up below.

Log In

Sign Up

Get up-to-the-minute news and opinions, plus access to a wide assortment of Information Security resources that will keep you current and informed.

This will be used to identify you if you take part in our online comments.
Your password should be at least six characters long. It is case sensitive. Passwords can only consist of alphanumeric characters or ~!@#$%^&*()_-+=?.

For more information explaining how we use your information please see our privacy policy.

By registering you agree with our terms and conditions.

Facebook and Twitter usage in the workplace is going through the roof, causing major security headaches at all levels,
both inside and outside the boardroom.

The security issues that Web 2.0 services create are far from simple - managers need to understand not just the IT risks of data leakage, malware propagation, but also the compliance and legislative requirements.

On top of this, managers also need to control what each department - and member of staff - does online, creating a growing logistical and technological headache for most organisations.

How do you, for example, allow call center staff to interact with customers via Twitter - a perfectly good business scenario - and yet stop the office staff from playing Farmville on Facebook instead of working?

It's all about being able to control, at a granular level, what each member of staff and/or their departments can and cannot do.


Join us for an educational and informative webinar in which we will:

* Explain the social computing security and compliance problems that you now face.

* Help you understand the regulatory issues involved with Web 2.0 services.

* Detail the solutions to those problems.

* Look at how granular control of social networking services functions.

This webinar is for:

* IT professionals wanting to understand the security and compliance issues that social networking sites create - and how to solve those issues.

* Any management professional wanting a 60-minute rundown on the social networking security and compliance challenges that lie ahead.

* Business and IT managers seeking to leverage use of social computing to improve internal and external collaboration.

* Professionals seeking to understand how to leverage social computing in a manner consistent with compliance requirements.



CISSPs, SSCPs and ISACA members can receive 1 CPE credit for attending each webinar. You can earn the credit by simply specifying your number on the registration form and correctly answering 3 multiple choice polling questions about the program at the end of the event.




Sarah Carter

Sarah Carter Vice President of Marketing, FaceTime Communicatio

    Steve Gold

    Steve Gold, Infosecurity Magazine

      Ted Ritter

      Ted Ritter Senior Research Analyst, Nemertes Research