Crisis Management at the Speed of the Internet: Trend Report
By Bob Hayes and Kathleen Kotwica
()
About this ebook
Crisis Management at the Speed of the Internet provides security executives and practitioners with an overview of the potentially harmful impact of social media communication on corporate reputation. Within minutes, the online consumer community can propel a company into an image crisis, brand damage, and a financial disaster—even if the viral information isn’t factual. It is critical that an organization respond quickly and decisively to crises in online media.
The report explores examples of companies that have experienced this kind of impact, and describes practical, strategic methods for mitigating and resolving a crisis, including cross-functional team readiness and internal communications training. It is a valuable resource for any security professional working to create or improve an existing corporate crisis management policy.
Crisis Management at the Speed of the Internet is a part of Elsevier’s Security Executive Council Risk Management Portfolio, a collection of real world solutions and "how-to" guidelines that equip executives, practitioners, and educators with proven information for successful security and risk management programs.
- Provides security executives and practitioners with an overview of the potentially harmful impact of social media communication on corporate reputation
- Cites examples of companies that have experienced this kind of threat and describes the successes or failures of their responses
- Describes practical, strategic methods for mitigating and resolving a crisis
Bob Hayes
Bob Hayes has more than 25 years of experience developing security programs and providing security services for corporations, including eight years as the CSO at Georgia Pacific and nine years as security operations manager at 3M. His security experience spans the manufacturing, distribution, research and development, and consumer products industries as well as national critical infrastructure organizations. Additionally, he has more than 10 years of successful law enforcement and training experience in Florida and Michigan. Bob is a recognized innovator in the security field and was named as one of the “25 Most Influential People in the Security Industry in 2007 by Security magazine. He is a frequent speaker at key industry events. He is a leading expert on security issues and has been quoted by such major media outlets as the Wall Street Journal and Forbes. Bob is currently the managing director of the Security Executive Council.
Read more from Bob Hayes
Business Continuity: Playbook Rating: 0 out of 5 stars0 ratingsNine Practices of the Successful Security Leader: Research Report Rating: 0 out of 5 stars0 ratingsCorporate Security Organizational Structure, Cost of Services and Staffing Benchmark: Research Report Rating: 0 out of 5 stars0 ratingsBring Your Own Device (BYOD) to Work: Trend Report Rating: 0 out of 5 stars0 ratingsSmart Partners: Building Successful Relationships in Business and Life Rating: 4 out of 5 stars4/5International Security Programs Benchmark Report: Research Report Rating: 3 out of 5 stars3/5Wolves of the Yukon Rating: 3 out of 5 stars3/5Blood Bath Casino Rating: 0 out of 5 stars0 ratings
Related to Crisis Management at the Speed of the Internet
Related ebooks
Workplace Security Playbook: The New Manager's Guide to Security Risk Rating: 0 out of 5 stars0 ratingsSecurity Leader Insights for Risk Management: Lessons and Strategies from Leading Security Professionals Rating: 0 out of 5 stars0 ratingsSecurity Leader Insights for Effective Management: Lessons and Strategies from Leading Security Professionals Rating: 0 out of 5 stars0 ratingsThe Manager’s Guide to Handling the Media in Crisis: Saying & Doing the Right Thing When It Matters Most Rating: 0 out of 5 stars0 ratingsERM - Enterprise Risk Management: Issues and Cases Rating: 0 out of 5 stars0 ratingsSecurity Leader Insights for Success: Lessons and Strategies from Leading Security Professionals Rating: 0 out of 5 stars0 ratingsBusiness Continuity Planning: A Step-by-Step Guide With Planning Forms Rating: 0 out of 5 stars0 ratingsInformation Governance and Security: Protecting and Managing Your Company’s Proprietary Information Rating: 0 out of 5 stars0 ratingsEverything you want to know about Business Continuity Rating: 0 out of 5 stars0 ratingsMeasuring and Communicating Security's Value: A Compendium of Metrics for Enterprise Protection Rating: 0 out of 5 stars0 ratingsInternational Security Programs Benchmark Report: Research Report Rating: 3 out of 5 stars3/5Business Continuity Management: Choosing to Survive Rating: 3 out of 5 stars3/5Business Practical Security Rating: 0 out of 5 stars0 ratingsBusiness Continuity from Preparedness to Recovery: A Standards-Based Approach Rating: 0 out of 5 stars0 ratingsBecoming a Global Chief Security Executive Officer: A How to Guide for Next Generation Security Leaders Rating: 5 out of 5 stars5/5CRISIS MANAGEMENT: THE ART OF SUCCESS & FAILURE: 30 Case Studies in Business & Politics Rating: 5 out of 5 stars5/5Crisis management Complete Self-Assessment Guide Rating: 0 out of 5 stars0 ratingsCrisis Management: How to Manage Personal Life Crises Rating: 0 out of 5 stars0 ratingsCrisis Com Rating: 0 out of 5 stars0 ratingsThe Manager’s Guide to Quick Crisis Response: Effective Action in an Emergency Rating: 0 out of 5 stars0 ratingsManager's Guide to Crisis Management Rating: 4 out of 5 stars4/5Business Continuity Planning BCP Complete Self-Assessment Guide Rating: 0 out of 5 stars0 ratingsCorporate Smokejumper: Crisis Management: Tools, Tales and Techniques Rating: 0 out of 5 stars0 ratingsExecuting Crisis: A C-Suite Crisis Leadership Survival Guide Rating: 0 out of 5 stars0 ratingsCollaborative Crisis Management: Prepare, Execute, Recover, Repeat Rating: 0 out of 5 stars0 ratingsThe Manager’s Guide to Business Continuity Exercises: Testing Your Plan Rating: 0 out of 5 stars0 ratingsBusiness Continuity Management Systems: Implementation and certification to ISO 22301 Rating: 0 out of 5 stars0 ratingsDisaster Communications in a Changing Media World Rating: 5 out of 5 stars5/5Risk Analysis and the Security Survey Rating: 4 out of 5 stars4/5Modern Concepts of Security Rating: 0 out of 5 stars0 ratings
Internet & Web For You
How to Be Invisible: Protect Your Home, Your Children, Your Assets, and Your Life Rating: 4 out of 5 stars4/5No Place to Hide: Edward Snowden, the NSA, and the U.S. Surveillance State Rating: 4 out of 5 stars4/5How to Disappear and Live Off the Grid: A CIA Insider's Guide Rating: 0 out of 5 stars0 ratingsThe Beginner's Affiliate Marketing Blueprint Rating: 4 out of 5 stars4/5Coding For Dummies Rating: 5 out of 5 stars5/5Coding All-in-One For Dummies Rating: 4 out of 5 stars4/5Six Figure Blogging Blueprint Rating: 5 out of 5 stars5/5Get Rich or Lie Trying: Ambition and Deceit in the New Influencer Economy Rating: 0 out of 5 stars0 ratingsGrokking Algorithms: An illustrated guide for programmers and other curious people Rating: 4 out of 5 stars4/5Cybersecurity For Dummies Rating: 4 out of 5 stars4/5The Hacker Crackdown: Law and Disorder on the Electronic Frontier Rating: 4 out of 5 stars4/5Stop Asking Questions: How to Lead High-Impact Interviews and Learn Anything from Anyone Rating: 5 out of 5 stars5/5How To Start A Podcast Rating: 4 out of 5 stars4/5Social Engineering: The Science of Human Hacking Rating: 3 out of 5 stars3/5Wireless Hacking 101 Rating: 4 out of 5 stars4/5Podcasting For Dummies Rating: 4 out of 5 stars4/5Everybody Lies: Big Data, New Data, and What the Internet Can Tell Us About Who We Really Are Rating: 4 out of 5 stars4/5The Gothic Novel Collection Rating: 5 out of 5 stars5/5The Digital Marketing Handbook: A Step-By-Step Guide to Creating Websites That Sell Rating: 5 out of 5 stars5/5More Porn - Faster!: 50 Tips & Tools for Faster and More Efficient Porn Browsing Rating: 3 out of 5 stars3/5Remote/WebCam Notarization : Basic Understanding Rating: 3 out of 5 stars3/5How To Start A Profitable Blog: Turn Your Blogging Passion Into Profit (Blog Mastermind Booklets) Rating: 4 out of 5 stars4/5Introduction to Internet Scams and Fraud: Credit Card Theft, Work-At-Home Scams and Lottery Scams Rating: 4 out of 5 stars4/5The Cyber Attack Survival Manual: Tools for Surviving Everything from Identity Theft to the Digital Apocalypse Rating: 0 out of 5 stars0 ratingsHacking : The Ultimate Comprehensive Step-By-Step Guide to the Basics of Ethical Hacking Rating: 5 out of 5 stars5/5How To Make Money Blogging: How I Replaced My Day-Job With My Blog and How You Can Start A Blog Today Rating: 4 out of 5 stars4/5Six Figure Blogging In 3 Months Rating: 4 out of 5 stars4/5
Reviews for Crisis Management at the Speed of the Internet
0 ratings0 reviews
Book preview
Crisis Management at the Speed of the Internet - Bob Hayes
Crisis Management at the Speed of the Internet
Trend Report
Bob Hayes
Kathleen Kotwica
Table of Contents
Cover image
Title page
Copyright
Executive Summary
What is a Trend Report?
Introduction
Understanding Threats from New Internet Technologies
YouTube
MySpace
Other Social Networking Sites
Examples of Internet-Based Incidents
Domino’s Pizza
United Airlines
Other Examples
Planning Ahead to Mitigate a Possible Internet Crisis
Assessment
Preparing for a Crisis
Proven Results
When Time Matters Most: Responding in Real Time
Speed of Response
Relevance
Closure and Follow-Through
A Comprehensive Approach to Internal Communications
Credibility
The New Timeline
Educate Executives on How to Respond
Don’t Let Rumors Start
Additional Resources
Also Available in Elsevier’s Security Executive Council Risk Management Portfolio
Contributors
References
About the Authors
About Elsevier’s Security Executive Council Risk Management Portfolio
Copyright
Elsevier
The Boulevard, Langford Lane, Kidlington, Oxford, OX5 1GB, UK
225 Wyman Street, Waltham, MA 02451, USA
First published 2013
Copyright © 2013 The Security Executive Council. Published by Elsevier Inc.
No part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopying, recording, or any information storage and retrieval system, without permission in writing from the publisher. Details on how to seek permission, further information about the Publisher’s permissions policies and our arrangement with organizations such as the Copyright Clearance Center and the Copyright Licensing Agency, can be found at our website: www.elsevier.com/permissions.
This book and the individual contributions contained in it are protected under copyright by the Publisher (other than as may be noted herein).
Notices
Knowledge and best practice in this field are constantly changing. As new research and experience broaden our understanding, changes in research methods, professional practices, or medical treatment may become necessary.
Practitioners and researchers must always rely on their own experience and knowledge in evaluating and using any information, methods, compounds, or experiments described herein. In using such information or methods they should be mindful of their own safety and the safety of others, including parties for