How to Assess Your Executive’s Digital Footprint to Identify Threats

An executive’s digital footprint has evolved into an audit trail of personal activity — from breached data on the dark web to social media accounts used by family members. It’s critical to remain aware of what online information creates vulnerabilities that a threat actor can exploit to harm an executive or their reputation.

This site is protected by reCAPTCHA and the Google
Privacy Policy and Terms of Service apply.


This checklist will help you enhance your understanding of:

What executive information is visible online?

Establish a baseline of information to work with to find potential weak spots

Where are the overlooked vulnerabilities?

Consider details that could impair your executive's safety that commonly go unnoticed

What steps can be taken to better protect online and in person?

Uplevel your security to protect executives online and in-person