Home Security How to strap on the Web 2.0 safety harness
×

Warning

JUser: :_load: Unable to load user with ID: 3667

The founder of the Australian High Tech Crime Centre, Alastair MacGibbon, and Australian Federal Police agent and high tech security expert Nigel Phair have teamed up to run a workshop exploring the security challenges associated with enterprise adventures with Web 2.0.

The event - Manipulating Online Social Media - will be held on Sydney on 11 May and look at the way social media can be abused, as well as the steps organisations can take to protect themselves.

The timing for such an event seems ripe given the rising interest in Web 2.0 among enterprises.

When Gartner released its 2010 CIO report earlier this month it noted that internationally Web 2.0 was the third highest technology priority - up from 15th position a year ago. Australian CIOs were slightly less gung-ho, ranking Web 2.0 as their sixth technology priority.

MacGibbon, a former agent with the AFP and more recently head of trust, safety and customer support for eBay Asia Pacific, now runs private security consultancy Surete Group. He said that Australian organisations were facing 'an awful lot of pressure to get on the social web and engage customers.

'That's terrific, but nothing is consequence free,' according to MacGibbon. 'Companies face a lot of pressure from marketing, but they need to go in with their legal, privacy and IT security eyes open.'

For example, companies who engaged with customers through Twitter, needed to still establish the identity of a customer as they would if the interaction was face to face or on the telephone. They also needed to ensure that fundamental privacy rights were maintained, and may have to beef up IT security to cope with Web 2.0 challenges.


Companies also needed to have clear policies on the way they interacted with people using Web 2.0 tools. MacGibbon offered the example of Nestle which earlier this month copped flak over its Facebook activities.

The company had set up a page on Facebook and encouraged consumers to interact using the social web, but when the site was used by environmental protestors Nestle lashed out, leading to a public relations hiccup for the giant company.

MacGibbon said that part of the conference was aimed at demonstrating how companies could establish Web 2.0 presence 'Without getting called up to the CEO's office about how it all went dreadfully wrong.'

Stressing that he was in no way criticising social networking itself, MacGibbon said the seminar was intended to provide some guidance about how to 'build robust mechanisms' that would allow companies to safely engage using Web 2.0.

'Anyone who sees Web 2.0 as a silver bullet is probably buying the wrong silver bullet. It's just another way to deal with customers.'

47 REASONS TO ATTEND YOW! 2018

With 4 keynotes + 33 talks + 10 in-depth workshops from world-class speakers, YOW! is your chance to learn more about the latest software trends, practices and technologies and interact with many of the people who created them.

Speakers this year include Anita Sengupta (Rocket Scientist and Sr. VP Engineering at Hyperloop One), Brendan Gregg (Sr. Performance Architect Netflix), Jessica Kerr (Developer, Speaker, Writer and Lead Engineer at Atomist) and Kent Beck (Author Extreme Programming, Test Driven Development).

YOW! 2018 is a great place to network with the best and brightest software developers in Australia. You’ll be amazed by the great ideas (and perhaps great talent) you’ll take back to the office!

Register now for YOW! Conference

· Sydney 29-30 November
· Brisbane 3-4 December
· Melbourne 6-7 December

Register now for YOW! Workshops

· Sydney 27-28 November
· Melbourne 4-5 December

REGISTER NOW!

LEARN HOW TO REDUCE YOUR RISK OF A CYBER ATTACK

Australia is a cyber espionage hot spot.

As we automate, script and move to the cloud, more and more businesses are reliant on infrastructure that has the high potential to be exposed to risk.

It only takes one awry email to expose an accounts’ payable process, and for cyber attackers to cost a business thousands of dollars.

In the free white paper ‘6 Steps to Improve your Business Cyber Security’ you’ll learn some simple steps you should be taking to prevent devastating and malicious cyber attacks from destroying your business.

Cyber security can no longer be ignored, in this white paper you’ll learn:

· How does business security get breached?
· What can it cost to get it wrong?
· 6 actionable tips

DOWNLOAD NOW!

 

Popular News

 

Telecommunications

 

Sponsored News

 

 

 

 

Connect