We just experienced one of the most highly publicized and bizarre social media blunders ever during the 2016 NFL Draft. A strategic CIO, thinking about social media and the long-term security of his or her company or organization, should not see draft gaffe as simply an isolated incident in the sports world. So who has access to your social media accounts? It’s a question that many CIOs probably don’t ask themselves very much or at all. However, we just experienced one of the most highly publicized and bizarre social media gaffes during the 2016 NFL Draft. Someone might say this is simply an isolated incident in the sports world, but a strategic CIO, thinking about the long-term security of his or her company or organization, should be looking long and hard at this event and reading between the lines. Laremy Tunsil, a talented offensive tackle out of Ole Miss, was touted in the months leading up to the NFL Draft as a potential Top 5 pick, if not in fact, the No. 1 overall draft pick. Thirteen minutes before the draft started, a video of Tunsil smoking marijuana through a gas mask surfaced on his Twitter account. The news spread quickly, and it was reported that many teams who were thinking about drafting Tunsil went in another direction. He went from a potential top pick, to being drafted at No. 13. He wasn’t even the top player taken at his position. And it cost him millions in potential salary. Now you might say that he didn’t fall that much; he’s still a first-round pick and at the end of the day, he’s still going to make millions of dollars. SUBSCRIBE TO OUR NEWSLETTER From our editors straight to your inbox Get started by entering your email address below. Please enter a valid email address Subscribe But hypothetically, let’s change the scenario from a football player to a high-profile executive, and instead of the NFL Draft, the event is a product announcement or merger or acquisition. Right before that executive goes to speak to the press, a nefarious personal video appears online from one of the company’s social media accounts. The company’s reputation is negatively impacted. It is also possible that losses in company value can occur. The Board and shareholders are not happy. There may also be reputational damage to the executive and more importantly to the brand. We’re also talking about a major piece of good company news turning into a PR nightmare. It’s now being reported that the person who posted the Tunsil video had access to Tunsil’s Twitter account. But insider threats are often greater than external threats. CIOs need to be proactive about laying out a strong executive internal social media governance plan so this scenario doesn’t happen. Before laying out a company-wide plan, a CIO should first look to the top and take these immediate actions: Understand which executives at the company are actively engaging in social media on behalf of the company and see what social media sites they post to, what social media identities they use to do the posting, what platforms they post from and what type of content they post. Determine who have access to these accounts. For instance, does someone in the marketing department run the CFO’s LinkedIn page? Do their teams or assistants have any passwords to their devices or accounts? Determine how regularly passwords have been changed. For people who have access to these accounts, determine whether any team members have left the company and whether the passwords have been changed. Determine what social media identities may be out there purporting to be the executive or the company and assess whether they are valid or whether they were set up by someone with an anti-company agenda. To the extent possible, understand the non-company related (i.e., personal) social media presence of senior executives. Ensure policies are clear on the use of personal social media accounts to disclose company business. This isn’t a sports problem: it’s a general business problem. When reputation, revenue and jobs are on the line, regardless of the scenario, the outcome needs to be the same: locked down. Related content opinion CEO and CIO cyber disconnect: Fixing the communications breakdown In this new business environment, to help their organizations bolster their cyber security protections and also boost their careers, CIOs must find ways to communicate more effectively and consistently with their CEOs and the board. By Tony Buffomante Aug 21, 2018 5 mins CIO IT Leadership opinion Emerging technology adoption: striking a balance between innovation and risk management Companies that are transforming themselves and enabling emerging and disruptive technologies can take four initial but concrete steps to strike the right balance between innovation and risk management. By Phillip Lageschulte Jul 20, 2018 4 mins Innovation Risk Management Emerging Technology opinion Onshore vs. offshore: 8 trends driving IT support back home When it comes to IT outsourcing, more companies are reporting plans to increase spending nearer to their own shores than u201coffshore.u201d This has several implications for CIOs and IT leaders. By Randy L. Wiele Jun 08, 2018 4 mins Technology Industry IT Skills IT Strategy opinion Comply today and realize value tomorrow: GDPR readiness day one and beyond This blog is dedicated to detailing the capabilities your organization needs to comply with General Data Protection Regulation (GDPR) and, eventually, to operationalize and enhance your privacy compliance and processes. By Tony Buffomante Apr 10, 2018 4 mins Regulation Government Technology Industry Podcasts Videos Resources Events SUBSCRIBE TO OUR NEWSLETTER From our editors straight to your inbox Get started by entering your email address below. Please enter a valid email address Subscribe