privacy,;Web 2.0 Marketing; Social Media; IT Strategy; Enterprises; IT Management (or) How to win at security and influence peopleIf you agree with me and see the legendary Gene Spafford as the 2nd generation of security, and people of my experience as the third, then what if we have today in the marketplace is the fourth generation of security professionals. People 20 years my junior who never had to grow up without the Internet (or, for that matter, without a remote control or with tethered-only phones, and I could go on…) are now the backbone of information security in the country, nay, in the world.And yet, the problem that my generation referred to as “the loose nut on the keyboard” and today’s generation calls “layer 8”, is still seen as a problem in security circles.Well, I got news. They are not a problem, we, security professionals, are. They are the solution.Let me ‘xplain. Yes, I have time, don’t have to sum-up Early on in my career I learned that there are very few technical solutions to human action problems. I used to say that “there aren’t any”, but I wised up. We must teach, train, mentor and repeat. Allow me to draw a picture of life today – inside the corporate world or with-out.Part I – Social MediaQuite a large part of our workforce today, and certainly all of tomorrow’s, has been exposed to, used, and even reveled in Social Media. From BBS (I will explain to those who request) through Wikis; from Facebook to Twitter, our workers have not only become accustomed to using these tools, they enjoy them.You, Ms., Mr. or Mrs. Security Person, have two choices: 1. Fight an uphill battle, never to be won even in the US Military (as you can see here) U.S. military joins Twitter, Facebook U.S. Military In Afghanistan Turns To Twitter, Facebook & YouTube Nearly two years to the day that the U.S. Military banned social networking sites like YouTube and MySpace (back when MySpace was relevant), it has not only reversed its decision but each branch of the military now has its own Facebook fan page and Twitter feed. Or 2. Embrace it. “How do I embrace it?” you say? Well. Here is a road map to embracement (I made that word up, I think): To see and hear more on this subject, visit my website at www.arielsilverstone.com Permalink Related content brandpost Sponsored by Freshworks When your AI chatbots mess up AI ‘hallucinations’ present significant business risks, but new types of guardrails can keep them from doing serious damage By Paul Gillin Dec 08, 2023 4 mins Generative AI brandpost Sponsored by Dell New research: How IT leaders drive business benefits by accelerating device refresh strategies Security leaders have particular concerns that older devices are more vulnerable to increasingly sophisticated cyber attacks. By Laura McEwan Dec 08, 2023 3 mins Infrastructure Management case study Toyota transforms IT service desk with gen AI To help promote insourcing and quality control, Toyota Motor North America is leveraging generative AI for HR and IT service desk requests. By Thor Olavsrud Dec 08, 2023 7 mins Employee Experience Generative AI ICT Partners feature CSM certification: Costs, requirements, and all you need to know The Certified ScrumMaster (CSM) certification sets the standard for establishing Scrum theory, developing practical applications and rules, and leading teams and stakeholders through the development process. By Moira Alexander Dec 08, 2023 8 mins Certifications IT Skills Project Management Podcasts Videos Resources Events SUBSCRIBE TO OUR NEWSLETTER From our editors straight to your inbox Get started by entering your email address below. Please enter a valid email address Subscribe