Executive Exposure Checklist

A structured self-diagnostic covering the ten public and semi-public surfaces an adversary uses to assemble an executive target profile. Work through it on screen, print it for a board binder, or use it to scope where a deeper audit is needed. Risk weighting reflects typical severity in the contexts we see — data-broker listings, breach fragments, filings, and credential leaks all land at the high end.

Last updated: April 2026 Designed for: executives, board members, HNW individuals See also: NIS2 Risk Vector
0 of 23 checks completed 0%

Category 1: Data Broker Presence

01 Data Broker Presence High

Category 2: Breach Database Exposure

02 Breach Database Exposure High

Category 3: Social Media Privacy Exposure

03 Social Media Privacy Exposure Medium

Category 4: Corporate Filings and Public Registers

04 Corporate Filings & Public Registers Medium

Category 5: Property and Land Registry Records

05 Property & Land Registry Records High

Category 6: Family Member Discoverability

06 Family Member Discoverability Medium

Category 7: Photo and Reverse-Image Searchability

07 Photo & Reverse-Image Searchability Medium

Category 8: Domain and WHOIS Leakage

08 Domain & WHOIS Leakage Low

Category 9: Dark-Web Credential Exposure

09 Dark-Web Credential Exposure High

Category 10: Social-Engineering Surface

10 Social-Engineering Surface High
Notes

Next Steps If Any Row Scored High

A high-weighted category here (data brokers, breach exposure, property registers, dark-web credentials, social-engineering surface) is rarely a single-row fix — it is a signal that the reconnaissance surface is mapped to you personally and that remediation needs to be structured rather than piecemeal.

A Corporate Audit runs this assessment end-to-end for a named executive or for a defined leadership cohort: surface mapping across the ten categories above, documented findings with severity weighting, and a prioritised remediation plan you can hand to legal, HR, or security. No client details are published; the deliverable is a bound report plus a debrief.

Talk to an Analyst

This checklist is for informational and self-diagnostic purposes only. It does not constitute legal or security advice. Your checklist data is stored locally in your browser and is never transmitted to our servers.

← All Free Resources