Social Media for Business: What You Need to Know

Show More

Related videos

Social Media - What You Don’t Know Can Hurt You
As postings on social media have routinely replaced conversations over lunch or around the water cooler, workers have filed almost 100 social media-related complaints against employers with the National Labor Relations Board. Mich'l Schmidt, a partner at Cozen O'Connor P.C., counsels you on what policies should be in place to…
Creating Winning Social Media Strategies - With Charlene Li
A fundamental power shift is underway in relationships between organizations and customers. Traditional one-way, seller-to-buyer communication is evolving into a two-way dialog, as social media technologies give buyers a voice. With examples from Oracle, Southwest Airlines, Walmart, Comcast, and Starbucks, Charlene Li shows how companies can use social media tools…
Cyber Terror and Cyber Risk: What You Need To Know
By increasingly relying on digital technologies and networks to conduct their operations, at a time when cyber attacks are more frequent and more severe, companies are subject to a heightened level of risk. Kroll's Alan Brill examines recently released SEC guidance on your disclosure obligations related to cybersecurity risks and…
Social Networking: Legal Update 
Rapidly growing, constantly changing, and providing everyone - and anyone - the power to instantaneously broadcast information to the world, social media is potentially as risky as it is revolutionary. Peter Vogel, a partner at Gardere Wynne Sewell, reminds you why your company cannot afford to fall behind in this…
Social Networking - Does it Work at Work?
Not all that long ago, CIOs and IT managers were listening to the grumblings of many of their business colleagues who wanted to shut down or ban employee access to popular social networking sites such as Facebook, Linkedin and Twitter. However, the tide of opinion may be moderating, as some…
Perspectives on Business Continuity & Disaster Recovery Planning 
Business Continuity & Disaster Recovery planning, also known by the acronym, BC/DR plans, are top of mind issues for IT and business professionals today. Smart organizations routinely evaluate and review their plans, make changes were needed and then always test for effectiveness. In this report, guest expert Seth Miller, of…
Supply Chain: Understanding the Risk Factors
Where would our global economy be without supply chains? Going nowhere fast, would be a quick but accurate response. Let's face it, no matter if your firm is a manufacturer, retailer or financial organization you are undoubtedly tethered to, and reliant on, a supply chain. In this program expert, Joe…
Designing and Implementing Enterprise Mobile Strategies
There is no question that businesses are going toward more mobile computing. Mobile solutions enable the enterprise to respond quickly to customer and market demands, increase productivity and improve internal collaboration. In order to maximize the benefits and minimize the risks with mobile solutions, organizations need to plan and implement…
Cloud Computing: Trends, Strategies and Best Practices
This course features a recognized Cloud Computing and SOA expert. The course material covers the evolution of Cloud Computing, common misconceptions, effective Cloud Computing strategies, risks and benefits related to the Cloud, enabling capabilities of the Cloud related to modern day computing, plus guidelines for effective implementation of Cloud Computing.…
Business Intelligence: Best Practices for Successful Project Management
Managing a business intelligence (BI) project is more involved than managing other types of IT projects. For this reason, BI project management requires different techniques and methods to succeed. This program discusses best practices for organizing and managing a BI project. David Sterling, CEO and principal consultant for Sterling International…
Cyber Attacks and Security Breaches: Coping with External Threats
On any given day, IT and security professionals worldwide must be on-guard and ready to defend their enterprise networks, core data and intellectual property from external threats and attacks. From hacktivist groups like, Anonymous, to criminal organizations and state sponsored attackers, organizations need to be prepared to respond quickly to…
Cyber Attacks: The Best Defense is a Good Offense
External cyber-attacks are on the rise and IT security and business professionals must remain vigilant in their effort to defend critical systems and networks from being victimized by cyber-criminals and nation sponsored cyber-terrorism. In this report, Chris Valasek a security researcher discusses the latest cyber threats and offer advice and…