SlideShare a Scribd company logo
1 of 35
Download to read offline
PROPRIETARY & CONFIDENTIAL March 4, 2010Affect Strategies
PROPRIETARY & CONFIDENTIAL March 4, 2010Affect Strategies
MANAGING A HACK:
A Communicator’s Guide to Responding to a Data Breach
Sandra Fathi
President, Affect
Email: sfathi@affect.com
tweet: @sandrafathi
web: affect.com
blog: techaffect.com
FPRA Capital Chapter
May 25, 2017
PROPRIETARY & CONFIDENTIAL
SANDRA FATHI
Founder and president of Affect, a public relations and social media firm
specializing in technology, healthcare and professional services
o  Board Member, PR Council
o  Past Tri-State District Chair, PRSA
o  Past President, PRSA-NY Chapter
o  Past President, PRSA Technology Section
 
@sandrafathi
sfathi@affect.com
@sandrafathi Affect
PROPRIETARY & CONFIDENTIAL
SAMPLE CRISIS WORK
o  Data Breaches, Identity Theft, Website Hacks, Malware
(Multiple Companies)
o  Product Recall for Potential Lead Poisoning (Baby Product)
o  Hurricane Sandy, Hurricane Irene (ConEd)
o  Worker Strike, Manhole Cover Explosion, Building Explosion (ConEd)
o  Hit & Run (By Company Employee)
o  Sexual Harassment and Executive Misconduct (By CEO)
o  Executive Arrest for DUI
o  Terrorist Activity Interrupts Operations (Tech Company)
o  Foreign Mafia Threats on Executives
o  Employee Kidnapping/Release by Militia (EDS)
 
@sandrafathi@sandrafathi Affect
PROPRIETARY & CONFIDENTIALAffect
SCALE OF THE ISSUE
PROPRIETARY & CONFIDENTIAL
Cyber
Threats
Insiders
Hacktivist
Organized
Crime
Script
Kiddies
Cyber
Terrorist
State-
Sponsored
WHO IS BEHIND IT
@sandrafathi Affect
PROPRIETARY & CONFIDENTIAL@sandrafathi Affect
PROPRIETARY & CONFIDENTIAL
SAMPLE CYBER THREATS
@sandrafathi Affect
PROPRIETARY & CONFIDENTIAL
SAMPLE CYBER THREATS II
@sandrafathi Affect
PROPRIETARY & CONFIDENTIAL
THE THREAT IS REAL
@sandrafathi Affect
PROPRIETARY & CONFIDENTIAL
DOMINO-EFFECT
@sandrafathi Affect
PROPRIETARY & CONFIDENTIAL
THE THREAT IS
REAL
•  The Element of Surprise: breaches are often leaked to the media before full
investigations are complete
•  Under Pressure: Customers, media, employees etc. demand information
•  The Gift that Keeps on Giving: Data breach incidents tend to have more than
one news cycle
•  Social Media Wildfire: False information spreads quickly on sites like Twitter,
Facebook and LinkedIn
If you are prepared for data breach response, you have a better chance of
controlling your message and preserving your reputation.
@sandrafathi Affect
PROPRIETARY & CONFIDENTIAL
•  Gmail
•  DropBox
•  Yahoo
•  Oracle
•  Snapchat
•  Cisco
•  Verifone
•  Yahoo
•  Xbox
•  Intercontinental
Hotels
•  Arby’s
•  Wendy’s
•  Chipotle
•  Dun &
Bradstreet
•  UNC Healthcare
•  Saks Fifth
Avenue
•  Brooks
Brothers
DATA BREACHES LAST 18 MONTHS
@sandrafathi Affect
PROPRIETARY & CONFIDENTIAL
WHAT’S THE
SCENARIO
•  Scenario #1: A reporter tweets that they’ve broken a story about your
data breach – you were unaware that the press was aware.
•  Scenario #2: IT department detects a breach and informs the PR
department that it has been mitigated.
•  Scenario #3: The FBI calls to tell you that they are investigating your
data breach.
•  Scenario #4: The IT department reports a breach to PR, but has no
idea how large it is or what the total impact will be.
You need a plan and you needed it yesterday.
@sandrafathi Affect
PROPRIETARY & CONFIDENTIAL
CORE CONCEPTS
CRISIS COMMUNICATIONS
4 Phases of Crisis Communications
1.  Readiness
2.  Response
3.  Reassurance
4.  Recovery
@sandrafathi Affect
PROPRIETARY & CONFIDENTIAL
PHASE 1: READINESS
PREVENTATIVE MEDICINE
Anticipating a Crisis
1.  Crisis Mapping (SWOT Analysis)
2.  Policies and Procedures (Prevention)
3.  Crisis Monitoring
4.  Crisis Communications Plan
5.  Crisis Action Plan
6.  Crisis Standard Communications Template
@sandrafathi Affect
PROPRIETARY & CONFIDENTIAL
THREAT MAPPING
RISK ASSESSMENT
Internal
•  Employees
•  Facilities
•  Vendors/Suppliers
•  Distributors/Resellers
•  Product
External
•  Acts of Nature
•  Market
•  Legal Restrictions/Law
•  Customers
•  Advocacy Groups
Anticipating & Understanding Threats to a Business
People, Products, Facilities, Environment, Information
@sandrafathi Affect
PROPRIETARY & CONFIDENTIAL
INFORMATION THREATS
What’s in your files?
1.  HR – Name, Address, Social Security
2.  Payroll – Name, Address, Social Security & Bank Account
3.  Customer – Name, Address, Credit Card & Bank Account
4.  Vendor – Name, Address, Credit Card & Bank Account
5.  Other – Medical Records, Demographic Information, Email, File Servers
etc.
@sandrafathi Affect
PROPRIETARY & CONFIDENTIAL
CRISIS COMMUNICATIONS
ANTICIPATING THREATS
Create A Chart:
Potential Informational Threats to Your Business
HR Sales Marketing Finance
Rank Order
High Risk
to
Low Risk
@sandrafathi Affect
PROPRIETARY & CONFIDENTIAL
CRISIS TOOLKIT
RESPONSE RESOURCES
1. Develop materials:
•  Messages/FAQ
•  Prepared statements
•  Press release template
•  Customer letters
2.  Train employees
•  Awareness
•  Anticipation
•  Organizational Preparation
3. Prepare channels:
•  Hotline
•  Dark site
•  Social Media
4. Data Breach/Customer Assistance
Resources
•  Microsite/Landing Page FAQ
•  Identity Theft Remediation
Services
•  Force Password/Account
Information Change
•  Special Customer Advocate/Team
@sandrafathi Affect
PROPRIETARY & CONFIDENTIAL
IMMEDIATE ACTION
BEST PRACTICES
Preparing a Response
1.  Don’t delay
2.  Acknowledge situation
3.  Acknowledge impact and ‘victims’
4.  Commit to investigate
5.  Commit to sharing information and cooperation with relevant parties
6.  Share corrective action plan if available
7.  Respond in the format in which the crisis was received**
@sandrafathi Affect
PROPRIETARY & CONFIDENTIAL March 4, 2010
SOURCE: IMATION
PROPRIETARY & CONFIDENTIAL
RESPONSE OUTLINE
CRITICAL INFORMATION
Prepare a Template Crisis Response:
1.  What happened?
2.  What do we know about it?
3.  Who/what was impacted?
4.  How do we feel about it? (How should we feel?)
5.  What are we going to do about it?
6.  When are we going to do it?
7.  When/how will we communicate next?
@sandrafathi Affect
PROPRIETARY & CONFIDENTIAL
CUSTOMER COMMUNICATION
Notice of Data Breach
1.  Introduction: Why are we contacting you?
2.  What happened?
3.  What information was compromised?
4.  What are we doing to remedy the situation?
5.  What can you do to prevent/mitigate further risk?
6.  Where can you find more information?
@sandrafathi Affect
PROPRIETARY & CONFIDENTIAL
BREACH NOTIFICATIONS
SAMPLES
@sandrafathi Affect
PROPRIETARY & CONFIDENTIAL
BREACH CONSEQUENCES
@sandrafathi Affect
PROPRIETARY & CONFIDENTIAL
PHASE 3: REASSURANCE
DOSE OF MEDICINE
Who to Reassure? How to Reassure?
1.  Develop full response plan
2.  Put plan into action: Immediate remedy
3.  Communicate results of plan and impact
4.  Reaffirm commitment to correction
5.  Demonstrate results of program
@sandrafathi Affect
PROPRIETARY & CONFIDENTIAL
PHASE 4: RECOVERY
LONG-TERM TREATMENT PLAN
Rebuilding reputation, trust and customer loyalty
Implementing preventative measures for long-term crisis mitigation
and/or prevention
1.  Review need for operational, regulatory, environmental and employee
changes
2.  Develop long-term plan including policies and prevention tactics
3.  Reassess crisis plan
4.  Regain customer/public trust
@sandrafathi Affect
PROPRIETARY & CONFIDENTIAL
1.  Implement Policies to Address Potential Vulnerabilities
2.  Establish a Regular Review Cycle for Information Security
3.  Establish Inter-Departmental Cooperation
4.  Establish a Framework for Response
5.  Build a Data Breach Crisis Toolkit
10 KEY TAKEAWAYS
CRISIS COMMUNICATIONS FOR DATA
BREACHES
@sandrafathi Affect
PROPRIETARY & CONFIDENTIAL
6.  Know Where & How to Respond
7.  Prepare Your Employees in Advance
8.  Establish Assistance Services for those Impacted
9.  Know the Law Regarding Reporting in All Regions of Operations
10.  Be Honest, Be Transparent
10 KEY TAKEAWAYS
CRISIS COMMUNICATIONS FOR DATA
BREACHES
@sandrafathi Affect
PROPRIETARY & CONFIDENTIAL
SCENARIO 1: Prestigious Hospital - Tallahassee Premier Medical Center
Your IT department informs you that they’ve just discovered that a hospital
server has been breached. They don’t know exactly when it happened,
sometime in the last 12 months, but potentially all employee data (10,000
employees) and medical records for approximately 100,000 patients may
have been compromised. The data was not encrypted.
Assignments:
1.  Craft an action plan for the next 24 hours: What steps need to be taken? Who needs
to be involved?
2.  Develop a patient communications plan. Write a data breach notification letter to
patients.
3.  Develop an employee communications plan. Write a data breach notification letter
to employees.
4.  Develop a plan of action for reassurance and recovery for the long term.
WORKSHOP 1
@sandrafathi Affect
PROPRIETARY & CONFIDENTIAL
WORKSHOP 2
SCENARIO 2: Financial Services Company – Sunshine Banking
You get an influx of calls from customers experiencing trouble with your
online banking system. You discover that the bank is the target of a DDoS
attack. You, and your customers, cannot access the bank website. The attack
is paralyzing your business. The IT department doesn’t currently know how to
stop it or how long it will take to remediate the situation.
Assignments:
1.  Craft an action plan for the next 4 hours. What needs to happen?
2.  Members of the media are starting to call. Develop a communications plan for
media and write a statement or press release.
3.  Develop a communications plan for customers. Write a sample customer
communication.
4.  Develop a plan of action for reassurance and recovery for the long term.
@sandrafathi Affect
PROPRIETARY & CONFIDENTIAL
WORKSHOP 3
SCENARIO 3: Consumer Brand – Promises Wholesome Snacks
You just received a call from a reporter from the Tallahassee Democrat asking
you to comment on the racist remarks on your Facebook page and the call for
a company boycott. You go to the FB page and realize that someone has
posted a diatribe of hate speech on your page (in the name of the company)
and there have already been over 1000 comments and a call by customers to
boycott the company’s products and stores that carry them. You also realize
that someone has changed your admin rights and you can no longer access
the page.
Assignments:
1.  Craft an action plan for the next 12 hours.
2.  Develop a customer communications plan. What are your key messages for
customers?
3.  Develop a plan of action for reassurance and recovery for the long term.
@sandrafathi Affect
PROPRIETARY & CONFIDENTIAL
RESOURCES
White Paper:
Crisis Communications in the Social Media Age
Download at: Affect.com
@sandrafathi Affect
PROPRIETARY & CONFIDENTIAL March 4, 2010Affect Strategies
Sandra Fathi
President, Affect
Email: sfathi@affect.com
tweet: @sandrafathi
web: affect.com
blog: techaffect.com
Slides Available: Slideshare.net/sfathi

More Related Content

Similar to Managing Data Breaches

Recovering from a Social Media Mistake (SMX)
Recovering from a Social Media Mistake (SMX)Recovering from a Social Media Mistake (SMX)
Recovering from a Social Media Mistake (SMX)Sandra Fathi
 
Managing a Hack: Orchestrating Incident Response to Preserve Brand Reputation
Managing a Hack: Orchestrating Incident Response to Preserve Brand ReputationManaging a Hack: Orchestrating Incident Response to Preserve Brand Reputation
Managing a Hack: Orchestrating Incident Response to Preserve Brand ReputationSandra Fathi
 
Cyber Crime: Preparing Your Organization for the New Normal
Cyber Crime: Preparing Your Organization for the New NormalCyber Crime: Preparing Your Organization for the New Normal
Cyber Crime: Preparing Your Organization for the New NormalSandra Fathi
 
Before Disaster Strikes: Creating an Effective Crisis Communications Plan
Before Disaster Strikes: Creating an Effective Crisis Communications PlanBefore Disaster Strikes: Creating an Effective Crisis Communications Plan
Before Disaster Strikes: Creating an Effective Crisis Communications PlanSandra Fathi
 
Jh tdg stakeholdersandprioritywise_june_2015
Jh tdg stakeholdersandprioritywise_june_2015Jh tdg stakeholdersandprioritywise_june_2015
Jh tdg stakeholdersandprioritywise_june_2015John Hudson
 
Is Bad Data Killing Your Customer Engagement Strategy?
Is Bad Data Killing Your Customer Engagement Strategy? Is Bad Data Killing Your Customer Engagement Strategy?
Is Bad Data Killing Your Customer Engagement Strategy? Marketo
 
Digital Crisis Management
Digital Crisis ManagementDigital Crisis Management
Digital Crisis ManagementScott K. Wilder
 
RUN - DCM - Digital Crisis Management by Scott Wilder
RUN - DCM - Digital Crisis Management by Scott WilderRUN - DCM - Digital Crisis Management by Scott Wilder
RUN - DCM - Digital Crisis Management by Scott WilderEdelman Digital
 
RUN - DCM - Digital Crisis Management
RUN - DCM - Digital Crisis ManagementRUN - DCM - Digital Crisis Management
RUN - DCM - Digital Crisis ManagementScott K. Wilder
 
Devon County Council - Risk assessment for social media
Devon County Council - Risk assessment for social mediaDevon County Council - Risk assessment for social media
Devon County Council - Risk assessment for social mediaCarl Haggerty
 
Dreamforce 14 - Crisis Communications v1
Dreamforce 14 - Crisis Communications v1Dreamforce 14 - Crisis Communications v1
Dreamforce 14 - Crisis Communications v1Joel Book
 
Social Media and Financial Services presentation to Financial Planners Associ...
Social Media and Financial Services presentation to Financial Planners Associ...Social Media and Financial Services presentation to Financial Planners Associ...
Social Media and Financial Services presentation to Financial Planners Associ...SocMediaFin - Joyce Sullivan
 
Creating An Effective Social Media Strategy
Creating An Effective Social Media StrategyCreating An Effective Social Media Strategy
Creating An Effective Social Media StrategyAlphapod
 
Before Disaster Strikes: Creating an Effective Crisis Communications Plan
Before Disaster Strikes: Creating an Effective Crisis Communications PlanBefore Disaster Strikes: Creating an Effective Crisis Communications Plan
Before Disaster Strikes: Creating an Effective Crisis Communications PlanSandra Fathi
 
The importance of social media in developing an effective communications stra...
The importance of social media in developing an effective communications stra...The importance of social media in developing an effective communications stra...
The importance of social media in developing an effective communications stra...Ben Matthews
 
Tactical Misinformation-Disinformation in your Organization
Tactical Misinformation-Disinformation in your OrganizationTactical Misinformation-Disinformation in your Organization
Tactical Misinformation-Disinformation in your OrganizationEyesOpen Association
 
Create a Responsive Social Strategy on a Shoestring Budget
Create a Responsive Social Strategy on a Shoestring BudgetCreate a Responsive Social Strategy on a Shoestring Budget
Create a Responsive Social Strategy on a Shoestring BudgetMichelle Killebrew
 
How to build a social media campaign: strategy and tools
How to build a social media campaign: strategy and toolsHow to build a social media campaign: strategy and tools
How to build a social media campaign: strategy and toolsBeth Granter
 

Similar to Managing Data Breaches (20)

Recovering from a Social Media Mistake (SMX)
Recovering from a Social Media Mistake (SMX)Recovering from a Social Media Mistake (SMX)
Recovering from a Social Media Mistake (SMX)
 
Managing a Hack: Orchestrating Incident Response to Preserve Brand Reputation
Managing a Hack: Orchestrating Incident Response to Preserve Brand ReputationManaging a Hack: Orchestrating Incident Response to Preserve Brand Reputation
Managing a Hack: Orchestrating Incident Response to Preserve Brand Reputation
 
Cyber Crime: Preparing Your Organization for the New Normal
Cyber Crime: Preparing Your Organization for the New NormalCyber Crime: Preparing Your Organization for the New Normal
Cyber Crime: Preparing Your Organization for the New Normal
 
Before Disaster Strikes: Creating an Effective Crisis Communications Plan
Before Disaster Strikes: Creating an Effective Crisis Communications PlanBefore Disaster Strikes: Creating an Effective Crisis Communications Plan
Before Disaster Strikes: Creating an Effective Crisis Communications Plan
 
Ravinder ld hpgd jl15-0752
Ravinder ld hpgd jl15-0752Ravinder ld hpgd jl15-0752
Ravinder ld hpgd jl15-0752
 
Jh tdg stakeholdersandprioritywise_june_2015
Jh tdg stakeholdersandprioritywise_june_2015Jh tdg stakeholdersandprioritywise_june_2015
Jh tdg stakeholdersandprioritywise_june_2015
 
Is Bad Data Killing Your Customer Engagement Strategy?
Is Bad Data Killing Your Customer Engagement Strategy? Is Bad Data Killing Your Customer Engagement Strategy?
Is Bad Data Killing Your Customer Engagement Strategy?
 
Digital Crisis Management
Digital Crisis ManagementDigital Crisis Management
Digital Crisis Management
 
RUN - DCM - Digital Crisis Management by Scott Wilder
RUN - DCM - Digital Crisis Management by Scott WilderRUN - DCM - Digital Crisis Management by Scott Wilder
RUN - DCM - Digital Crisis Management by Scott Wilder
 
RUN - DCM - Digital Crisis Management
RUN - DCM - Digital Crisis ManagementRUN - DCM - Digital Crisis Management
RUN - DCM - Digital Crisis Management
 
Devon County Council - Risk assessment for social media
Devon County Council - Risk assessment for social mediaDevon County Council - Risk assessment for social media
Devon County Council - Risk assessment for social media
 
Dreamforce 14 - Crisis Communications v1
Dreamforce 14 - Crisis Communications v1Dreamforce 14 - Crisis Communications v1
Dreamforce 14 - Crisis Communications v1
 
Integrating Social Media - notes version
Integrating Social Media - notes versionIntegrating Social Media - notes version
Integrating Social Media - notes version
 
Social Media and Financial Services presentation to Financial Planners Associ...
Social Media and Financial Services presentation to Financial Planners Associ...Social Media and Financial Services presentation to Financial Planners Associ...
Social Media and Financial Services presentation to Financial Planners Associ...
 
Creating An Effective Social Media Strategy
Creating An Effective Social Media StrategyCreating An Effective Social Media Strategy
Creating An Effective Social Media Strategy
 
Before Disaster Strikes: Creating an Effective Crisis Communications Plan
Before Disaster Strikes: Creating an Effective Crisis Communications PlanBefore Disaster Strikes: Creating an Effective Crisis Communications Plan
Before Disaster Strikes: Creating an Effective Crisis Communications Plan
 
The importance of social media in developing an effective communications stra...
The importance of social media in developing an effective communications stra...The importance of social media in developing an effective communications stra...
The importance of social media in developing an effective communications stra...
 
Tactical Misinformation-Disinformation in your Organization
Tactical Misinformation-Disinformation in your OrganizationTactical Misinformation-Disinformation in your Organization
Tactical Misinformation-Disinformation in your Organization
 
Create a Responsive Social Strategy on a Shoestring Budget
Create a Responsive Social Strategy on a Shoestring BudgetCreate a Responsive Social Strategy on a Shoestring Budget
Create a Responsive Social Strategy on a Shoestring Budget
 
How to build a social media campaign: strategy and tools
How to build a social media campaign: strategy and toolsHow to build a social media campaign: strategy and tools
How to build a social media campaign: strategy and tools
 

More from Sandra Fathi

News Making Machine - How Story Hijacking & Trend Intervention Can Transform ...
News Making Machine - How Story Hijacking & Trend Intervention Can Transform ...News Making Machine - How Story Hijacking & Trend Intervention Can Transform ...
News Making Machine - How Story Hijacking & Trend Intervention Can Transform ...Sandra Fathi
 
Women's Leadership Conference: Changing Perceptions to Change Reality
Women's Leadership Conference: Changing Perceptions to Change RealityWomen's Leadership Conference: Changing Perceptions to Change Reality
Women's Leadership Conference: Changing Perceptions to Change RealitySandra Fathi
 
Cyber Security 101: What Your Agency Needs to Know
Cyber Security 101: What Your Agency Needs to KnowCyber Security 101: What Your Agency Needs to Know
Cyber Security 101: What Your Agency Needs to KnowSandra Fathi
 
Show Me the Money: PR Metrics that Impress the C-Suite
Show Me the Money: PR Metrics that Impress the C-SuiteShow Me the Money: PR Metrics that Impress the C-Suite
Show Me the Money: PR Metrics that Impress the C-SuiteSandra Fathi
 
Flash Fires: Crisis Communications in the Age of NOW
Flash Fires: Crisis Communications in the Age of NOWFlash Fires: Crisis Communications in the Age of NOW
Flash Fires: Crisis Communications in the Age of NOWSandra Fathi
 
Fear Factor Metrics: PR Metrics Communicators Fear Most
Fear Factor Metrics: PR Metrics Communicators Fear MostFear Factor Metrics: PR Metrics Communicators Fear Most
Fear Factor Metrics: PR Metrics Communicators Fear MostSandra Fathi
 
Trade Secrets Your Agency Isn't Sharing
Trade Secrets Your Agency Isn't SharingTrade Secrets Your Agency Isn't Sharing
Trade Secrets Your Agency Isn't SharingSandra Fathi
 
Bloggers Speak Out: New paid and pitching techniques to score more placement
Bloggers Speak Out: New paid and pitching techniques to score more placement Bloggers Speak Out: New paid and pitching techniques to score more placement
Bloggers Speak Out: New paid and pitching techniques to score more placement Sandra Fathi
 
Data-Driven PR Measurement (eMetrics Chicago)
Data-Driven PR Measurement (eMetrics Chicago)Data-Driven PR Measurement (eMetrics Chicago)
Data-Driven PR Measurement (eMetrics Chicago)Sandra Fathi
 
Data-Driven PR Metrics: Share of Voice, Competitive Benchmarking, Correlations
Data-Driven PR Metrics: Share of Voice, Competitive Benchmarking, CorrelationsData-Driven PR Metrics: Share of Voice, Competitive Benchmarking, Correlations
Data-Driven PR Metrics: Share of Voice, Competitive Benchmarking, CorrelationsSandra Fathi
 
How to Develop a Content Strategy
How to Develop a Content StrategyHow to Develop a Content Strategy
How to Develop a Content StrategySandra Fathi
 
Payback: The ROI of SM & PR Measurement
Payback: The ROI of SM & PR MeasurementPayback: The ROI of SM & PR Measurement
Payback: The ROI of SM & PR MeasurementSandra Fathi
 
PR Measurement Clinic: Assessing the Success of a Communications Strategy
PR Measurement Clinic: Assessing the Success of a Communications StrategyPR Measurement Clinic: Assessing the Success of a Communications Strategy
PR Measurement Clinic: Assessing the Success of a Communications StrategySandra Fathi
 
How to Create an Effective Crisis Communications Plan Before Disaster Strikes
How to Create an Effective Crisis Communications Plan Before Disaster StrikesHow to Create an Effective Crisis Communications Plan Before Disaster Strikes
How to Create an Effective Crisis Communications Plan Before Disaster StrikesSandra Fathi
 
Content Marketing Strategy: How to Engage & Attract Customers
Content Marketing Strategy: How to Engage & Attract Customers Content Marketing Strategy: How to Engage & Attract Customers
Content Marketing Strategy: How to Engage & Attract Customers Sandra Fathi
 
Social Media & PR Content Measurement: How to monitor, measure and demonstrat...
Social Media & PR Content Measurement: How to monitor, measure and demonstrat...Social Media & PR Content Measurement: How to monitor, measure and demonstrat...
Social Media & PR Content Measurement: How to monitor, measure and demonstrat...Sandra Fathi
 
Data-Driven Headlines: A Guide to Securing Media Coverage Through Data
Data-Driven Headlines: A Guide to Securing Media Coverage Through DataData-Driven Headlines: A Guide to Securing Media Coverage Through Data
Data-Driven Headlines: A Guide to Securing Media Coverage Through DataSandra Fathi
 
PRx: The Future of Public Relations & Media
PRx: The Future of Public Relations & MediaPRx: The Future of Public Relations & Media
PRx: The Future of Public Relations & MediaSandra Fathi
 
Pr news pr measurement- building a foundation in metrics
Pr news   pr measurement- building a foundation in metricsPr news   pr measurement- building a foundation in metrics
Pr news pr measurement- building a foundation in metricsSandra Fathi
 
Crisis Communications in the Age of Social Media
Crisis Communications in the Age of Social MediaCrisis Communications in the Age of Social Media
Crisis Communications in the Age of Social MediaSandra Fathi
 

More from Sandra Fathi (20)

News Making Machine - How Story Hijacking & Trend Intervention Can Transform ...
News Making Machine - How Story Hijacking & Trend Intervention Can Transform ...News Making Machine - How Story Hijacking & Trend Intervention Can Transform ...
News Making Machine - How Story Hijacking & Trend Intervention Can Transform ...
 
Women's Leadership Conference: Changing Perceptions to Change Reality
Women's Leadership Conference: Changing Perceptions to Change RealityWomen's Leadership Conference: Changing Perceptions to Change Reality
Women's Leadership Conference: Changing Perceptions to Change Reality
 
Cyber Security 101: What Your Agency Needs to Know
Cyber Security 101: What Your Agency Needs to KnowCyber Security 101: What Your Agency Needs to Know
Cyber Security 101: What Your Agency Needs to Know
 
Show Me the Money: PR Metrics that Impress the C-Suite
Show Me the Money: PR Metrics that Impress the C-SuiteShow Me the Money: PR Metrics that Impress the C-Suite
Show Me the Money: PR Metrics that Impress the C-Suite
 
Flash Fires: Crisis Communications in the Age of NOW
Flash Fires: Crisis Communications in the Age of NOWFlash Fires: Crisis Communications in the Age of NOW
Flash Fires: Crisis Communications in the Age of NOW
 
Fear Factor Metrics: PR Metrics Communicators Fear Most
Fear Factor Metrics: PR Metrics Communicators Fear MostFear Factor Metrics: PR Metrics Communicators Fear Most
Fear Factor Metrics: PR Metrics Communicators Fear Most
 
Trade Secrets Your Agency Isn't Sharing
Trade Secrets Your Agency Isn't SharingTrade Secrets Your Agency Isn't Sharing
Trade Secrets Your Agency Isn't Sharing
 
Bloggers Speak Out: New paid and pitching techniques to score more placement
Bloggers Speak Out: New paid and pitching techniques to score more placement Bloggers Speak Out: New paid and pitching techniques to score more placement
Bloggers Speak Out: New paid and pitching techniques to score more placement
 
Data-Driven PR Measurement (eMetrics Chicago)
Data-Driven PR Measurement (eMetrics Chicago)Data-Driven PR Measurement (eMetrics Chicago)
Data-Driven PR Measurement (eMetrics Chicago)
 
Data-Driven PR Metrics: Share of Voice, Competitive Benchmarking, Correlations
Data-Driven PR Metrics: Share of Voice, Competitive Benchmarking, CorrelationsData-Driven PR Metrics: Share of Voice, Competitive Benchmarking, Correlations
Data-Driven PR Metrics: Share of Voice, Competitive Benchmarking, Correlations
 
How to Develop a Content Strategy
How to Develop a Content StrategyHow to Develop a Content Strategy
How to Develop a Content Strategy
 
Payback: The ROI of SM & PR Measurement
Payback: The ROI of SM & PR MeasurementPayback: The ROI of SM & PR Measurement
Payback: The ROI of SM & PR Measurement
 
PR Measurement Clinic: Assessing the Success of a Communications Strategy
PR Measurement Clinic: Assessing the Success of a Communications StrategyPR Measurement Clinic: Assessing the Success of a Communications Strategy
PR Measurement Clinic: Assessing the Success of a Communications Strategy
 
How to Create an Effective Crisis Communications Plan Before Disaster Strikes
How to Create an Effective Crisis Communications Plan Before Disaster StrikesHow to Create an Effective Crisis Communications Plan Before Disaster Strikes
How to Create an Effective Crisis Communications Plan Before Disaster Strikes
 
Content Marketing Strategy: How to Engage & Attract Customers
Content Marketing Strategy: How to Engage & Attract Customers Content Marketing Strategy: How to Engage & Attract Customers
Content Marketing Strategy: How to Engage & Attract Customers
 
Social Media & PR Content Measurement: How to monitor, measure and demonstrat...
Social Media & PR Content Measurement: How to monitor, measure and demonstrat...Social Media & PR Content Measurement: How to monitor, measure and demonstrat...
Social Media & PR Content Measurement: How to monitor, measure and demonstrat...
 
Data-Driven Headlines: A Guide to Securing Media Coverage Through Data
Data-Driven Headlines: A Guide to Securing Media Coverage Through DataData-Driven Headlines: A Guide to Securing Media Coverage Through Data
Data-Driven Headlines: A Guide to Securing Media Coverage Through Data
 
PRx: The Future of Public Relations & Media
PRx: The Future of Public Relations & MediaPRx: The Future of Public Relations & Media
PRx: The Future of Public Relations & Media
 
Pr news pr measurement- building a foundation in metrics
Pr news   pr measurement- building a foundation in metricsPr news   pr measurement- building a foundation in metrics
Pr news pr measurement- building a foundation in metrics
 
Crisis Communications in the Age of Social Media
Crisis Communications in the Age of Social MediaCrisis Communications in the Age of Social Media
Crisis Communications in the Age of Social Media
 

Recently uploaded

Pharma Works Profile of Karan Communications
Pharma Works Profile of Karan CommunicationsPharma Works Profile of Karan Communications
Pharma Works Profile of Karan Communicationskarancommunications
 
0183760ssssssssssssssssssssssssssss00101011 (27).pdf
0183760ssssssssssssssssssssssssssss00101011 (27).pdf0183760ssssssssssssssssssssssssssss00101011 (27).pdf
0183760ssssssssssssssssssssssssssss00101011 (27).pdfRenandantas16
 
Mondelez State of Snacking and Future Trends 2023
Mondelez State of Snacking and Future Trends 2023Mondelez State of Snacking and Future Trends 2023
Mondelez State of Snacking and Future Trends 2023Neil Kimberley
 
B.COM Unit – 4 ( CORPORATE SOCIAL RESPONSIBILITY ( CSR ).pptx
B.COM Unit – 4 ( CORPORATE SOCIAL RESPONSIBILITY ( CSR ).pptxB.COM Unit – 4 ( CORPORATE SOCIAL RESPONSIBILITY ( CSR ).pptx
B.COM Unit – 4 ( CORPORATE SOCIAL RESPONSIBILITY ( CSR ).pptxpriyanshujha201
 
Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...
Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...
Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...Dave Litwiller
 
Monte Carlo simulation : Simulation using MCSM
Monte Carlo simulation : Simulation using MCSMMonte Carlo simulation : Simulation using MCSM
Monte Carlo simulation : Simulation using MCSMRavindra Nath Shukla
 
M.C Lodges -- Guest House in Jhang.
M.C Lodges --  Guest House in Jhang.M.C Lodges --  Guest House in Jhang.
M.C Lodges -- Guest House in Jhang.Aaiza Hassan
 
7.pdf This presentation captures many uses and the significance of the number...
7.pdf This presentation captures many uses and the significance of the number...7.pdf This presentation captures many uses and the significance of the number...
7.pdf This presentation captures many uses and the significance of the number...Paul Menig
 
Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...
Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...
Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...anilsa9823
 
FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756dollysharma2066
 
Organizational Transformation Lead with Culture
Organizational Transformation Lead with CultureOrganizational Transformation Lead with Culture
Organizational Transformation Lead with CultureSeta Wicaksana
 
Regression analysis: Simple Linear Regression Multiple Linear Regression
Regression analysis:  Simple Linear Regression Multiple Linear RegressionRegression analysis:  Simple Linear Regression Multiple Linear Regression
Regression analysis: Simple Linear Regression Multiple Linear RegressionRavindra Nath Shukla
 
Insurers' journeys to build a mastery in the IoT usage
Insurers' journeys to build a mastery in the IoT usageInsurers' journeys to build a mastery in the IoT usage
Insurers' journeys to build a mastery in the IoT usageMatteo Carbone
 
Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...
Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...
Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...amitlee9823
 
Dr. Admir Softic_ presentation_Green Club_ENG.pdf
Dr. Admir Softic_ presentation_Green Club_ENG.pdfDr. Admir Softic_ presentation_Green Club_ENG.pdf
Dr. Admir Softic_ presentation_Green Club_ENG.pdfAdmir Softic
 
Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...
Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...
Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...Dipal Arora
 
Famous Olympic Siblings from the 21st Century
Famous Olympic Siblings from the 21st CenturyFamous Olympic Siblings from the 21st Century
Famous Olympic Siblings from the 21st Centuryrwgiffor
 
The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...
The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...
The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...Aggregage
 
John Halpern sued for sexual assault.pdf
John Halpern sued for sexual assault.pdfJohn Halpern sued for sexual assault.pdf
John Halpern sued for sexual assault.pdfAmzadHosen3
 

Recently uploaded (20)

Pharma Works Profile of Karan Communications
Pharma Works Profile of Karan CommunicationsPharma Works Profile of Karan Communications
Pharma Works Profile of Karan Communications
 
0183760ssssssssssssssssssssssssssss00101011 (27).pdf
0183760ssssssssssssssssssssssssssss00101011 (27).pdf0183760ssssssssssssssssssssssssssss00101011 (27).pdf
0183760ssssssssssssssssssssssssssss00101011 (27).pdf
 
Mondelez State of Snacking and Future Trends 2023
Mondelez State of Snacking and Future Trends 2023Mondelez State of Snacking and Future Trends 2023
Mondelez State of Snacking and Future Trends 2023
 
B.COM Unit – 4 ( CORPORATE SOCIAL RESPONSIBILITY ( CSR ).pptx
B.COM Unit – 4 ( CORPORATE SOCIAL RESPONSIBILITY ( CSR ).pptxB.COM Unit – 4 ( CORPORATE SOCIAL RESPONSIBILITY ( CSR ).pptx
B.COM Unit – 4 ( CORPORATE SOCIAL RESPONSIBILITY ( CSR ).pptx
 
Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...
Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...
Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...
 
Monte Carlo simulation : Simulation using MCSM
Monte Carlo simulation : Simulation using MCSMMonte Carlo simulation : Simulation using MCSM
Monte Carlo simulation : Simulation using MCSM
 
M.C Lodges -- Guest House in Jhang.
M.C Lodges --  Guest House in Jhang.M.C Lodges --  Guest House in Jhang.
M.C Lodges -- Guest House in Jhang.
 
Mifty kit IN Salmiya (+918133066128) Abortion pills IN Salmiyah Cytotec pills
Mifty kit IN Salmiya (+918133066128) Abortion pills IN Salmiyah Cytotec pillsMifty kit IN Salmiya (+918133066128) Abortion pills IN Salmiyah Cytotec pills
Mifty kit IN Salmiya (+918133066128) Abortion pills IN Salmiyah Cytotec pills
 
7.pdf This presentation captures many uses and the significance of the number...
7.pdf This presentation captures many uses and the significance of the number...7.pdf This presentation captures many uses and the significance of the number...
7.pdf This presentation captures many uses and the significance of the number...
 
Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...
Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...
Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...
 
FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756
 
Organizational Transformation Lead with Culture
Organizational Transformation Lead with CultureOrganizational Transformation Lead with Culture
Organizational Transformation Lead with Culture
 
Regression analysis: Simple Linear Regression Multiple Linear Regression
Regression analysis:  Simple Linear Regression Multiple Linear RegressionRegression analysis:  Simple Linear Regression Multiple Linear Regression
Regression analysis: Simple Linear Regression Multiple Linear Regression
 
Insurers' journeys to build a mastery in the IoT usage
Insurers' journeys to build a mastery in the IoT usageInsurers' journeys to build a mastery in the IoT usage
Insurers' journeys to build a mastery in the IoT usage
 
Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...
Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...
Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...
 
Dr. Admir Softic_ presentation_Green Club_ENG.pdf
Dr. Admir Softic_ presentation_Green Club_ENG.pdfDr. Admir Softic_ presentation_Green Club_ENG.pdf
Dr. Admir Softic_ presentation_Green Club_ENG.pdf
 
Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...
Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...
Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...
 
Famous Olympic Siblings from the 21st Century
Famous Olympic Siblings from the 21st CenturyFamous Olympic Siblings from the 21st Century
Famous Olympic Siblings from the 21st Century
 
The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...
The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...
The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...
 
John Halpern sued for sexual assault.pdf
John Halpern sued for sexual assault.pdfJohn Halpern sued for sexual assault.pdf
John Halpern sued for sexual assault.pdf
 

Managing Data Breaches

  • 1. PROPRIETARY & CONFIDENTIAL March 4, 2010Affect Strategies
  • 2. PROPRIETARY & CONFIDENTIAL March 4, 2010Affect Strategies MANAGING A HACK: A Communicator’s Guide to Responding to a Data Breach Sandra Fathi President, Affect Email: sfathi@affect.com tweet: @sandrafathi web: affect.com blog: techaffect.com FPRA Capital Chapter May 25, 2017
  • 3. PROPRIETARY & CONFIDENTIAL SANDRA FATHI Founder and president of Affect, a public relations and social media firm specializing in technology, healthcare and professional services o  Board Member, PR Council o  Past Tri-State District Chair, PRSA o  Past President, PRSA-NY Chapter o  Past President, PRSA Technology Section   @sandrafathi sfathi@affect.com @sandrafathi Affect
  • 4. PROPRIETARY & CONFIDENTIAL SAMPLE CRISIS WORK o  Data Breaches, Identity Theft, Website Hacks, Malware (Multiple Companies) o  Product Recall for Potential Lead Poisoning (Baby Product) o  Hurricane Sandy, Hurricane Irene (ConEd) o  Worker Strike, Manhole Cover Explosion, Building Explosion (ConEd) o  Hit & Run (By Company Employee) o  Sexual Harassment and Executive Misconduct (By CEO) o  Executive Arrest for DUI o  Terrorist Activity Interrupts Operations (Tech Company) o  Foreign Mafia Threats on Executives o  Employee Kidnapping/Release by Militia (EDS)   @sandrafathi@sandrafathi Affect
  • 8. PROPRIETARY & CONFIDENTIAL SAMPLE CYBER THREATS @sandrafathi Affect
  • 9. PROPRIETARY & CONFIDENTIAL SAMPLE CYBER THREATS II @sandrafathi Affect
  • 10. PROPRIETARY & CONFIDENTIAL THE THREAT IS REAL @sandrafathi Affect
  • 12. PROPRIETARY & CONFIDENTIAL THE THREAT IS REAL •  The Element of Surprise: breaches are often leaked to the media before full investigations are complete •  Under Pressure: Customers, media, employees etc. demand information •  The Gift that Keeps on Giving: Data breach incidents tend to have more than one news cycle •  Social Media Wildfire: False information spreads quickly on sites like Twitter, Facebook and LinkedIn If you are prepared for data breach response, you have a better chance of controlling your message and preserving your reputation. @sandrafathi Affect
  • 13. PROPRIETARY & CONFIDENTIAL •  Gmail •  DropBox •  Yahoo •  Oracle •  Snapchat •  Cisco •  Verifone •  Yahoo •  Xbox •  Intercontinental Hotels •  Arby’s •  Wendy’s •  Chipotle •  Dun & Bradstreet •  UNC Healthcare •  Saks Fifth Avenue •  Brooks Brothers DATA BREACHES LAST 18 MONTHS @sandrafathi Affect
  • 14. PROPRIETARY & CONFIDENTIAL WHAT’S THE SCENARIO •  Scenario #1: A reporter tweets that they’ve broken a story about your data breach – you were unaware that the press was aware. •  Scenario #2: IT department detects a breach and informs the PR department that it has been mitigated. •  Scenario #3: The FBI calls to tell you that they are investigating your data breach. •  Scenario #4: The IT department reports a breach to PR, but has no idea how large it is or what the total impact will be. You need a plan and you needed it yesterday. @sandrafathi Affect
  • 15. PROPRIETARY & CONFIDENTIAL CORE CONCEPTS CRISIS COMMUNICATIONS 4 Phases of Crisis Communications 1.  Readiness 2.  Response 3.  Reassurance 4.  Recovery @sandrafathi Affect
  • 16. PROPRIETARY & CONFIDENTIAL PHASE 1: READINESS PREVENTATIVE MEDICINE Anticipating a Crisis 1.  Crisis Mapping (SWOT Analysis) 2.  Policies and Procedures (Prevention) 3.  Crisis Monitoring 4.  Crisis Communications Plan 5.  Crisis Action Plan 6.  Crisis Standard Communications Template @sandrafathi Affect
  • 17. PROPRIETARY & CONFIDENTIAL THREAT MAPPING RISK ASSESSMENT Internal •  Employees •  Facilities •  Vendors/Suppliers •  Distributors/Resellers •  Product External •  Acts of Nature •  Market •  Legal Restrictions/Law •  Customers •  Advocacy Groups Anticipating & Understanding Threats to a Business People, Products, Facilities, Environment, Information @sandrafathi Affect
  • 18. PROPRIETARY & CONFIDENTIAL INFORMATION THREATS What’s in your files? 1.  HR – Name, Address, Social Security 2.  Payroll – Name, Address, Social Security & Bank Account 3.  Customer – Name, Address, Credit Card & Bank Account 4.  Vendor – Name, Address, Credit Card & Bank Account 5.  Other – Medical Records, Demographic Information, Email, File Servers etc. @sandrafathi Affect
  • 19. PROPRIETARY & CONFIDENTIAL CRISIS COMMUNICATIONS ANTICIPATING THREATS Create A Chart: Potential Informational Threats to Your Business HR Sales Marketing Finance Rank Order High Risk to Low Risk @sandrafathi Affect
  • 20. PROPRIETARY & CONFIDENTIAL CRISIS TOOLKIT RESPONSE RESOURCES 1. Develop materials: •  Messages/FAQ •  Prepared statements •  Press release template •  Customer letters 2.  Train employees •  Awareness •  Anticipation •  Organizational Preparation 3. Prepare channels: •  Hotline •  Dark site •  Social Media 4. Data Breach/Customer Assistance Resources •  Microsite/Landing Page FAQ •  Identity Theft Remediation Services •  Force Password/Account Information Change •  Special Customer Advocate/Team @sandrafathi Affect
  • 21. PROPRIETARY & CONFIDENTIAL IMMEDIATE ACTION BEST PRACTICES Preparing a Response 1.  Don’t delay 2.  Acknowledge situation 3.  Acknowledge impact and ‘victims’ 4.  Commit to investigate 5.  Commit to sharing information and cooperation with relevant parties 6.  Share corrective action plan if available 7.  Respond in the format in which the crisis was received** @sandrafathi Affect
  • 22. PROPRIETARY & CONFIDENTIAL March 4, 2010 SOURCE: IMATION
  • 23. PROPRIETARY & CONFIDENTIAL RESPONSE OUTLINE CRITICAL INFORMATION Prepare a Template Crisis Response: 1.  What happened? 2.  What do we know about it? 3.  Who/what was impacted? 4.  How do we feel about it? (How should we feel?) 5.  What are we going to do about it? 6.  When are we going to do it? 7.  When/how will we communicate next? @sandrafathi Affect
  • 24. PROPRIETARY & CONFIDENTIAL CUSTOMER COMMUNICATION Notice of Data Breach 1.  Introduction: Why are we contacting you? 2.  What happened? 3.  What information was compromised? 4.  What are we doing to remedy the situation? 5.  What can you do to prevent/mitigate further risk? 6.  Where can you find more information? @sandrafathi Affect
  • 25. PROPRIETARY & CONFIDENTIAL BREACH NOTIFICATIONS SAMPLES @sandrafathi Affect
  • 26. PROPRIETARY & CONFIDENTIAL BREACH CONSEQUENCES @sandrafathi Affect
  • 27. PROPRIETARY & CONFIDENTIAL PHASE 3: REASSURANCE DOSE OF MEDICINE Who to Reassure? How to Reassure? 1.  Develop full response plan 2.  Put plan into action: Immediate remedy 3.  Communicate results of plan and impact 4.  Reaffirm commitment to correction 5.  Demonstrate results of program @sandrafathi Affect
  • 28. PROPRIETARY & CONFIDENTIAL PHASE 4: RECOVERY LONG-TERM TREATMENT PLAN Rebuilding reputation, trust and customer loyalty Implementing preventative measures for long-term crisis mitigation and/or prevention 1.  Review need for operational, regulatory, environmental and employee changes 2.  Develop long-term plan including policies and prevention tactics 3.  Reassess crisis plan 4.  Regain customer/public trust @sandrafathi Affect
  • 29. PROPRIETARY & CONFIDENTIAL 1.  Implement Policies to Address Potential Vulnerabilities 2.  Establish a Regular Review Cycle for Information Security 3.  Establish Inter-Departmental Cooperation 4.  Establish a Framework for Response 5.  Build a Data Breach Crisis Toolkit 10 KEY TAKEAWAYS CRISIS COMMUNICATIONS FOR DATA BREACHES @sandrafathi Affect
  • 30. PROPRIETARY & CONFIDENTIAL 6.  Know Where & How to Respond 7.  Prepare Your Employees in Advance 8.  Establish Assistance Services for those Impacted 9.  Know the Law Regarding Reporting in All Regions of Operations 10.  Be Honest, Be Transparent 10 KEY TAKEAWAYS CRISIS COMMUNICATIONS FOR DATA BREACHES @sandrafathi Affect
  • 31. PROPRIETARY & CONFIDENTIAL SCENARIO 1: Prestigious Hospital - Tallahassee Premier Medical Center Your IT department informs you that they’ve just discovered that a hospital server has been breached. They don’t know exactly when it happened, sometime in the last 12 months, but potentially all employee data (10,000 employees) and medical records for approximately 100,000 patients may have been compromised. The data was not encrypted. Assignments: 1.  Craft an action plan for the next 24 hours: What steps need to be taken? Who needs to be involved? 2.  Develop a patient communications plan. Write a data breach notification letter to patients. 3.  Develop an employee communications plan. Write a data breach notification letter to employees. 4.  Develop a plan of action for reassurance and recovery for the long term. WORKSHOP 1 @sandrafathi Affect
  • 32. PROPRIETARY & CONFIDENTIAL WORKSHOP 2 SCENARIO 2: Financial Services Company – Sunshine Banking You get an influx of calls from customers experiencing trouble with your online banking system. You discover that the bank is the target of a DDoS attack. You, and your customers, cannot access the bank website. The attack is paralyzing your business. The IT department doesn’t currently know how to stop it or how long it will take to remediate the situation. Assignments: 1.  Craft an action plan for the next 4 hours. What needs to happen? 2.  Members of the media are starting to call. Develop a communications plan for media and write a statement or press release. 3.  Develop a communications plan for customers. Write a sample customer communication. 4.  Develop a plan of action for reassurance and recovery for the long term. @sandrafathi Affect
  • 33. PROPRIETARY & CONFIDENTIAL WORKSHOP 3 SCENARIO 3: Consumer Brand – Promises Wholesome Snacks You just received a call from a reporter from the Tallahassee Democrat asking you to comment on the racist remarks on your Facebook page and the call for a company boycott. You go to the FB page and realize that someone has posted a diatribe of hate speech on your page (in the name of the company) and there have already been over 1000 comments and a call by customers to boycott the company’s products and stores that carry them. You also realize that someone has changed your admin rights and you can no longer access the page. Assignments: 1.  Craft an action plan for the next 12 hours. 2.  Develop a customer communications plan. What are your key messages for customers? 3.  Develop a plan of action for reassurance and recovery for the long term. @sandrafathi Affect
  • 34. PROPRIETARY & CONFIDENTIAL RESOURCES White Paper: Crisis Communications in the Social Media Age Download at: Affect.com @sandrafathi Affect
  • 35. PROPRIETARY & CONFIDENTIAL March 4, 2010Affect Strategies Sandra Fathi President, Affect Email: sfathi@affect.com tweet: @sandrafathi web: affect.com blog: techaffect.com Slides Available: Slideshare.net/sfathi