Published: 01 March 2019
This summary contains input from eleven members on security protocols they have established around cyber espionage. We begin this summary by discussing members' approaches to cybersecurity for associates traveling to high-risk countries. Next, we discuss members' security measures regarding accessing wireless networks at public places within countries known for cyber espionage. We then explore the provision and usage of burner phones to associates travelling outside the member's home country. We close this summary by highlighting additional cybersecurity protocols members follow for securing their associates' travel.
Included in Full Research
Consult the Board Research Team