A panel of CIOs have agreed developing a workplace social media policy around the use of sites like Twitter is not exclusively an IT issue. A panel of CIOs have agreed developing a workplace social media policy around the use of sites like Twitter is not exclusively an IT issue.My Enterprise 2.0 Rollout: 4 Keys to SuccessThe panel met as part of the CIO Summit 2010 in Sydney this week, and comprised newly appointed general manager of operations at Open Universities, Michelle Beveridge, Foxtel’s eight-year CIO, Robyn Elliot, and David Kennedy, the CIO for the Office of State Revenue.Beveridge explained why Open Universities has adopted a social media policy and why it is so important to the organisation. “Open Universities has a policy around social media and we have a broad range of people that are involved with us. This policy focuses on our connections with customers as well as an employee point of view,” Beveridge told attendees at the summit.David Kennedy said social media is just another channel of communication for the Office of State Revenue. “The IT group were asked to write the social media policy and we said it wasn’t about the technology. Until people understand their responsibility to social media, they constitute a risk,” he said.“It’s not the tool that’s creating the issue it’s a management issue. It’s about managing the people not the tool,” Beveridge said in agreement with Kennedy.Robyn Elliot said Foxtel employees are beginning to blur the boundaries between their personal and work life with the use of social media, and restricting this wouldn’t be an effective move on her part.“My approach was on a risk approach and risk assessment point of view, and implementing certain policies for those,” she said.While all three CIOs saw the positives of using social media, they did stress a business’ reputation can be damaged in the world of Web 2.0.“Search for your organisation on Twitter and see what’s going on. You’ll never know who those people are but they’re talking about your company. You should pick up patterns from this at take action and fix those problems. People are talking about it for a reason,” Elliot said. Related content brandpost Unmasking ransomware threat clusters: Why it matters to defenders Similar patterns of behavior among ransomware treat groups can help security teams better understand and prepare for attacks By Joan Goodchild Sep 21, 2023 3 mins Cybercrime news analysis China’s offensive cyber operations support “soft power” agenda in Africa Researchers track Chinese cyber espionage intrusions targeting African industrial sectors. By Michael Hill Sep 21, 2023 5 mins Advanced Persistent Threats Cyberattacks Critical Infrastructure brandpost Proactive OT security requires visibility + prevention You cannot protect your operation by simply watching and waiting. It is essential to have a defense-in-depth approach. By Austen Byers Sep 21, 2023 4 mins Security news Gitlab fixes bug that exploited internal policies to trigger hostile pipelines It was possible for an attacker to run pipelines as an arbitrary user via scheduled security scan policies. By Shweta Sharma Sep 21, 2023 3 mins Vulnerabilities Podcasts Videos Resources Events SUBSCRIBE TO OUR NEWSLETTER From our editors straight to your inbox Get started by entering your email address below. Please enter a valid email address Subscribe