Forrester Report: Boards of Directors Need to Make Better Use of Boardroom Technology

A global survey targeting governance professionals across 11 countries reveals multiple areas of vulnerability and technology misuse.

Today's executive board members and governance professionals are expected to manage critical issues like cyber risk, regulation, culture and ethics alongside the constant pressure to drive business performance. With the stakes higher than ever, boards cannot rely on outdated approaches to keeping their sensitive board information and materials safe from cyberattacks.

Diligent commissioned Forrester Consulting to evaluate global executive board governance practices and shed light on how professionals are stacking up against each other in adopting technology into their workflow and end to end governance management. After conducting a survey targeting governance professionals across 11 countries, we found that board members and governance professionals are practicing some shockingly dangerous practices leaving boards open to a potential barrage of cyberattacks.

Dive into the data below and see how you stack up against over 400 governance professionals.

50% of directors around the globe discuss sensitive board materials via personal channels, leaving their boards vulnerable against cyber attacks

Technology is an ever-present medium in the boardroom and misuse of technology in the boardroom can put your organisation at risk. In fact, a majority of boards of directors still use personal email to communicate about sensitive board materials. Usage of personal email was high across all regions – North America at 53%, EMEA at 51% and APAC at 40%.

.security-flaws-1, .security-flaws-2, .security-flaws-3 { fill: none; stroke-linejoin: round; stroke-width: 2px; } .security-flaws-1 { stroke: #768693; } .security-flaws-2 { stroke: #435465; } .security-flaws-3 { stroke: #7d2226; } .security-flaws-10, .security-flaws-11, .security-flaws-12, .security-flaws-13, .security-flaws-14, .security-flaws-15, .security-flaws-16, .security-flaws-17, .security-flaws-18, .security-flaws-19, .security-flaws-20, .security-flaws-21, .security-flaws-22, .security-flaws-23, .security-flaws-25, .security-flaws-26, .security-flaws-27, .security-flaws-28, .security-flaws-4, .security-flaws-5, .security-flaws-6, .security-flaws-7, .security-flaws-8, .security-flaws-9 { fill: #435465; } .security-flaws-11, .security-flaws-14, .security-flaws-17, .security-flaws-20, .security-flaws-23, .security-flaws-27, .security-flaws-30, .security-flaws-5, .security-flaws-8 { font-size: 17px; } .security-flaws-11, .security-flaws-14, .security-flaws-17, .security-flaws-20, .security-flaws-23, .security-flaws-27, .security-flaws-5, .security-flaws-8 { font-family: ProximaNova-Medium, Proxima Nova; } .security-flaws-12, .security-flaws-15, .security-flaws-18, .security-flaws-21, .security-flaws-25, .security-flaws-28, .security-flaws-32, .security-flaws-6, .security-flaws-9 { font-size: 40px; } .security-flaws-12, .security-flaws-15, .security-flaws-18, .security-flaws-21, .security-flaws-25, .security-flaws-28, .security-flaws-30, .security-flaws-32, .security-flaws-6, .security-flaws-9 { font-family: ProximaNova-Bold, Proxima Nova; font-weight: 700; } .security-flaws-7, .security-flaws-8, .security-flaws-9 { opacity: 0.9; } .security-flaws-10, .security-flaws-11, .security-flaws-12 { opacity: 0.8; } .security-flaws-13, .security-flaws-14, .security-flaws-15 { opacity: 0.7; } .security-flaws-16, .security-flaws-17, .security-flaws-18 { opacity: 0.6; } .security-flaws-19, .security-flaws-20, .security-flaws-21 { opacity: 0.5; } .security-flaws-22, .security-flaws-23, .security-flaws-25 { opacity: 0.4; } .security-flaws-24 { letter-spacing: -0.03em; } .security-flaws-26 { opacity: 0.3; } .security-flaws-27, .security-flaws-28 { opacity: 0.35; } .security-flaws-29, .security-flaws-30, .security-flaws-32 { fill: #b02834; } .security-flaws-31 { letter-spacing: -0.02em; } graphic_poor_security_4 Video Conferencing 58% Conference Calls 55% Business- Regulated Emails 55% Personal Email 50% File-Sharing Services 48% InstantMessaging 47% Closed-Loop Director Instant Messaging 35% Executive Board Communication Service 33% Certified Mail 27% .hero.knockout .image_container li, .hero.knockout h1, .hero.knockout h2, .hero.knockout h3, .hero.knockout h4, .hero.knockout h5, .hero.knockout h6, .hero.knockout p { color: #FFF!important; }

Can your technology provider ensure that your data is protected with a lost device?

Lost devices and misplaced board books are the most common security breaches for board members. Nearly 30% of board members lose or misplace their phone, tablet or computer in a given year. Without the right tool that offers the ability to "remotely wipe" a device, boards risk exposing confidential information to the public domain or people with malicious intent.

What's your biggest fear?

Boards mostly fear allegations of fraud or corruption, cyber incidents and compliance violations being discussed publicly

15% of boards are concerned about cyber incidents

Cyber incidents and compliance violations ranked as the highest areas of concern due to lack of visibility and technology gaps. This is compounded by the unease board members have with the mishandling of personal data.
@media screen and (max-width: 768px) { #forrester h4 { font-size: 18px!important; line-height: 21px!important;text-align: center;} }

Boards use many types of technology to manage their board meetings

In today's boardroom, even with the risk of cybersecurity, boards still use unsecure private email and pdfs to manage their boardroom documents. Only a third of boards are using virtual data rooms while another third are still using paper board books, which pose several risks including being misplaced. Paper packets are also more frequently out of date, without the ability to easily update something that has already been mailed out before a board meeting. .tech-1, .tech-11, .tech-15, .tech-20, .tech-5, .tech-8 { font-size: 40px; font-family: ProximaNova-Bold, Proxima Nova; font-weight: 700; } .tech-1 { fill: #fff; } .tech-2, .tech-23 { fill: none; stroke-linejoin: round; stroke-width: 2px; } .tech-2 { stroke: #768693; } .tech-10, .tech-11, .tech-12, .tech-13, .tech-15, .tech-16, .tech-17, .tech-20, .tech-21, .tech-3, .tech-4, .tech-5, .tech-6, .tech-7, .tech-8, .tech-9 { fill: #435465; } .tech-10, .tech-13, .tech-17, .tech-4, .tech-7 { font-size: 17px; font-family: ProximaNova-Medium, Proxima Nova; } .tech-6, .tech-7, .tech-8 { opacity: 0.9; } .tech-10, .tech-11, .tech-9 { opacity: 0.8; } .tech-12, .tech-17, .tech-20 { opacity: 0.6; } .tech-13, .tech-15, .tech-21 { opacity: 0.7; } .tech-14 { letter-spacing: -0.03em; } .tech-16 { opacity: 0.5; } .tech-18 { letter-spacing: -0.02em; } .tech-19 { letter-spacing: -0.02em; } .tech-22 { letter-spacing: -0.11em; } .tech-23 { stroke: #435465; } graphic_board_tech-15 Email &PDFs 71% Video Conferencing 67% ConferenceCalls 59% Virtual Data R ooms 34% P aper P ac k ets 29% Project Management T ools 39%

Less than a third of governance responsibilities are easily solved today using board management technology.

45% of governance professionals general counsels, corporate secretaries and investor relation staff, believe that their compliance requirements are being met. 42% of those surveyed believe that board collaboration is streamlined through the right technologies. However, only only 36% believe that technology alleviates confusion, which means that proper training still needs to be conducted to get the most out of board management software.

Demographics at a Glance

@media screen and (max-width: 768px) { #forrester-slider-title h2 { font-size: 22px!important; line-height: 24px!important; } }

Download the full report to take a deeper dive into the data.