Checklist

How to Assess Your Executive’s Digital Footprint to Identify Threats

An executive’s digital footprint has evolved into an audit trail of personal activity — from breached data on the dark web to social media accounts used by family members. It’s critical to remain aware of what online information creates vulnerabilities that a threat actor can exploit to harm an executive or their reputation.

This site is protected by reCAPTCHA and the Google
Privacy Policy and Terms of Service apply.

Highlights

This checklist will help you enhance your understanding of:

Accessible online information

Establish a baseline of information to work with to find potential weak spots

Overlooked vulnerabilities

Identify overlooked details that could compromise your executive’s safety

Process improvements

Uplevel your processes to protect executives online and in-person