At a time when the theft of customer information often leads to executive-level shake-ups, boards are taking a greater role in evaluating the adequacy of their organizations’ cybersecurity. But many boards have yet to apply the same level of scrutiny to their board meeting materials. This article provides an evaluation framework for organizations. Focus is on three main factors: where data is stored, the strength of “locks” that provide access, and the control of “keys” for entry.
Please complete the form below with the information requested. Once you have filled in the form, you will receive or be taken to the white paper.
We need this information so that we can make the study’s findings available to you, and so that we and Diligent can keep you updated via email and telephone of our products and services.
Neither Corporate Secretary nor Diligent will share this information with any third parties, and will only process it in accordance with our respective privacy policies, available here: Corporate Secretary privacy policy and Diligent privacy policy.
You may choose to unsubscribe at any time by clicking on the “unsubscribe” link in any email communication from Corporate Secretary or Diligent.