Recent Breaches
Breaches
2026PowerSchool62.4M records stolen2026DISA Global Solutions3.3M records stolen2026Globe Life850K records stolen2026NHS ScotlandUndisclosed records stolen2026HertzUndisclosed records stolen2025Marks & Spencer9.4M records stolen2025PayPal35K records stolen2025Jaguar Land RoverUndisclosed records stolen2025Co-operative GroupUndisclosed records stolen2024National Public Data2.9B records stolen2024Ticketmaster560M records stolen2024Change Healthcare100M+ records stolen2024AT&T73M records stolen2024Dell Technologies49M records stolen2023Progress Software (MOVEit)77M+ records stolen202323andMe6.9M records stolen2023Royal MailOperations halted records stolen2023British LibraryUndisclosed records stolen2023MGM ResortsUndisclosed records stolen2022Uber57M records stolen2022LastPass33M records stolen2022Optus9.8M records stolen2022Medibank9.7M records stolen2022Twitter5.4M records stolen2026NHS ScotlandUndisclosed records stolen2026HertzUndisclosed records stolen2025Marks & Spencer9.4M records stolen2025PayPal35K records stolen2025Jaguar Land RoverUndisclosed records stolen2025Co-operative GroupUndisclosed records stolen2024National Public Data2.9B records stolen2024Ticketmaster560M records stolen2024Change Healthcare100M+ records stolen2024AT&T73M records stolen2024Dell Technologies49M records stolen2023Progress Software (MOVEit)77M+ records stolen202323andMe6.9M records stolen2023Royal MailOperations halted records stolen2023British LibraryUndisclosed records stolen2023MGM ResortsUndisclosed records stolen2022Uber57M records stolen2022LastPass33M records stolen2022Optus9.8M records stolen2022Medibank9.7M records stolen2022Twitter5.4M records stolen2026PowerSchool62.4M records stolen2026DISA Global Solutions3.3M records stolen2026Globe Life850K records stolen
View All →
Back to Knowledge Vault
Guides30 July 20259 min read

Buyer's Guide: MDs and Board Executives

A board-level guide to cyber governance and personal accountability. Learn how offline secure storage provides the demonstrable, auditable protection that directors need to fulfil their fiduciary duties.

Mark Fermor

Mark Fermor

Director & Co-Founder, Firevault

Share
An executive boardroom table with printed strategy documents and warm window light

1. Why This Guide Exists

Firevault has created a world-first offline secure storage platform that physically controls connectivity to identity-locked and isolated hard drives. This is not cloud. This is not software. This is not an application. It is architecture that removes reachability as an attack vector.

This guide exists because cyber risk has become board-level risk, and board-level risk requires board-level understanding. The World Economic Forum ranks cyber attacks among the top 5 global risks. Lloyd's of London estimates potential losses from a major cyber event at $3.5 trillion. This is not IT's problem—this is the board's fiduciary duty.

The governance reality: When a company suffers a major breach, the first questions are not technical. They are governance questions: What did the board know? What controls were approved? What risks were accepted? The answers determine legal liability, regulatory outcomes, and shareholder response.

This guide helps you understand offline secure storage as a governance control—demonstrating duty of care, limiting liability exposure, and providing the evidence trail that regulators and courts now require.

2. Your Role and Your Data

As a Managing Director or Board Executive, you are accountable for enterprise risk, strategic direction, and shareholder value. Your fiduciary duty extends to protecting the assets—including data—that determine company survival. When breach occurs, you face shareholders, regulators, and increasingly, the courts.

The data for which you bear ultimate accountability:

  • Customer data: Personal information entrusted to your organisation—breach exposes customers and triggers regulatory action
  • Financial records: The information that moves markets—from accounts to strategic plans to M&A documentation
  • Intellectual property: The competitive advantage that justifies your valuation—trade secrets, R&D, proprietary methods
  • Board materials: Strategic discussions, compensation data, governance records—the most sensitive information in the organisation
  • Employee data: Personal information for everyone who works for you—payroll, health records, performance reviews

The governance gap: This data is protected by technical controls that the board cannot verify, operated by teams the board cannot audit, against threats the board cannot fully understand. Yet when controls fail, the board is accountable for the outcome.

3. The Threats in Business Terms

Cyber threats translate directly to business outcomes:

ThreatBusiness ImpactBoard Exposure Ransomware23 days average downtime; £4.5M+ total cost"Why couldn't we recover faster? What did we invest in resilience?" Data breach (customer data)£180 per record; class action exposure; customer exodus"Were appropriate controls in place? Can we demonstrate due diligence?" Intellectual property theftCompetitive advantage lost; valuation impact; strategic damage"How did attackers access our most sensitive information?" Business email compromiseDirect financial loss; fraud exposure; operational disruption"How were executives targeted? Why did controls fail?" Regulatory fine (GDPR, SEC)Up to 4% global turnover; reputational damage; enforcement action"Did we meet our legal obligations? What did we know and when?"

The British Airways lesson: £20 million ICO fine. 420,000 customers affected. Class action lawsuit. Share price impact. Executive scrutiny. The board had to explain why web application vulnerabilities led to payment card theft—a technical failure with governance consequences.

The Equifax lesson: $700 million settlement. 147 million people affected. CEO, CIO, and CSO departed. Congressional hearings. The board faced questions about patch management and network segmentation—technical details that became governance failures.

The board question: If breach occurs, can you demonstrate that the board exercised appropriate oversight of cyber risk? That controls were adequate to the data processed? That risks were understood and accepted explicitly? This is the governance test.

4. How Human Error Creates Governance Exposure

Most breaches involve human error, not sophisticated hacking:

  • Phishing attacks: 91% of attacks start with a phishing email. Training reduces but cannot eliminate human susceptibility.
  • Misconfiguration: Cloud storage left public. Databases exposed to the internet. Permissions set too broadly.
  • Credential compromise: Passwords reused, shared, or stolen. Multi-factor authentication bypassed through social engineering.
  • Insider actions: Employees with access beyond their legitimate need. Departing staff with unrevoked credentials.
  • Third-party failures: Vendor breaches that compromise your data. Supply chain attacks through trusted software.

The governance implication: When breach occurs through human error, the question becomes: Were appropriate controls in place to limit the damage? Did the organisation take reasonable steps? Can the board demonstrate oversight?

Duty of care: Offline secure storage acknowledges that human error is inevitable and limits the consequences by design. When the phishing email succeeds, when the configuration error is made, when the credential is stolen—critical data is physically unreachable. This is demonstrable due diligence.

5. The Governance Gap in Technical Controls

Boards approve security budgets without the ability to verify security outcomes:

The assurance problem: Security teams report on controls implemented. Auditors report on controls documented. Neither can guarantee controls will work under attack. The board approves based on representations it cannot independently verify.

The complexity problem: Modern IT architectures involve cloud services, third-party integrations, container platforms, and microservices—complexity that exceeds board-level understanding. When controls fail, explaining why is difficult because understanding how they were supposed to work is difficult.

The vendor problem: Security spending goes to tools from vendors who profit from ongoing threat. Detection products that generate alerts requiring more detection products. Response capabilities that assume detection works. The board cannot evaluate vendor claims independently.

The skills problem: Security teams face a 4-million-person global talent shortage. The board cannot assess whether the team has adequate skills for the threats faced. Vendor consultants fill gaps but create additional third-party risk.

The governance solution: Offline secure storage is verifiable by non-technical executives. Physical disconnection can be demonstrated. Identity-locked access can be observed. The control is not dependent on complex configuration or skilled operation. The board can verify directly that critical assets are protected.

6. The Accountability Evolution

Cyber governance accountability is being codified into law and regulation:

DevelopmentRequirementBoard Exposure SEC Cybersecurity Rules (2023)Disclose material incidents within 4 days; annual risk management disclosureBoard oversight of cyber risk becomes public; inadequate disclosure creates liability UK Corporate Governance CodeBoard responsibility for risk management and internal controlsCyber risk is enterprise risk; board accountability is explicit DORA (EU, 2025)ICT risk management; board-level accountability for financial servicesPersonal liability for directors in scope NIS2 (EU, 2024)Management body accountability for cyber risk measuresSenior management can be held personally liable D&O InsuranceDirectors' duty of care in risk managementInadequate cyber governance may void coverage

The liability trajectory: Ten years ago, cyber was an IT problem. Five years ago, it was a CISO problem. Today, it is a board problem—with personal liability implications for directors who fail to exercise appropriate oversight.

7. The Personal Stakes for Board Members

When breach occurs, board members face personal exposure:

  • Shareholder litigation: Derivative suits alleging breach of fiduciary duty. Class actions naming individual directors.
  • Regulatory investigation: Interviews, document requests, depositions. Personal accountability for governance decisions.
  • Media scrutiny: Names attached to governance failures. Reputation damage that follows beyond the current role.
  • D&O claims: Insurance coverage potentially denied if governance was inadequate. Personal assets at risk.
  • Career impact: Other boards questioning judgment. Future opportunities constrained.

The SolarWinds precedent: The SEC brought charges against the SolarWinds CISO personally, alleging fraud related to cybersecurity disclosures. While settled, the case established that individual executives can face personal liability for security posture representations. Board members approving those representations share exposure.

Personal protection: Offline secure storage provides evidence of board-level commitment to protecting critical assets. Not a checkbox on a compliance questionnaire—physical infrastructure that demonstrates duty of care. When the question is "What did the board do to protect this data?", offline secure storage is a tangible answer.

8. Insurance, Legal, and Regulatory Implications

Governance decisions have direct financial and legal consequences:

DomainCurrent StateBoard Implication Cyber InsurancePremiums up 50-100% over 3 years; detailed control attestations requiredInaccurate representations may void coverage; board approves representations D&O InsuranceCyber governance increasingly examined in underwritingInadequate cyber oversight may affect coverage availability Regulatory FinesGDPR: 4% global turnover; SEC: Material misstatement liabilityBoard oversight failures increase fine quantum Shareholder LitigationDerivative suits following major breaches increasingBusiness judgment rule requires demonstrated governance process Customer ContractsEnterprise customers require security attestationsContract breaches add to liability exposure

The insurance reality: Cyber insurers now conduct detailed assessments. If the policy assumes controls that are not actually implemented—and forensic investigation will reveal the truth—coverage may be denied when needed most. Board approval of insurance applications creates board accountability for representations made.

9. What Offline Secure Storage Changes

Offline secure storage is a governance control, not just a technical control:

Governance ConcernTraditional ApproachOffline Secure Storage Duty of careTrust that technical controls are adequatePhysical protection that can be verified by non-technical directors Risk oversightReports from management on control effectivenessTangible infrastructure demonstrating commitment Regulatory complianceAttestations based on point-in-time auditsContinuous physical state of protection Insurance validityRepresentations about controls that may failDemonstrable physical isolation Liability limitationHope that controls were adequateEvidence that critical data was unreachable

The governance value: Offline secure storage provides something rare in cyber security—a control that boards can understand and verify. Physical disconnection is tangible. Identity-locked access is observable. The control works regardless of whether other controls fail.

10. Board-Level Evaluation Criteria

When evaluating offline secure storage as a governance control:

CriterionWhat to VerifyGovernance Relevance Physical protectionIs critical data physically disconnected, not just encrypted?Demonstrates tangible commitment to protection Verifiable by directorsCan non-technical board members verify the control is working?Enables direct oversight without technical delegation Audit evidenceDoes the system provide evidence for regulators and insurers?Supports compliance demonstration and liability limitation Operational independenceDoes it work regardless of IT team skill or availability?Removes dependency on human execution SurvivabilityWould critical data survive a worst-case attack scenario?Provides guaranteed recovery path for business continuity

11. Where Firevault Fits in Governance

Firevault addresses the governance gap between board accountability and technical complexity:

  • Crown jewels protection: Customer data, IP, financial records—the data that would cause existential damage if breached
  • Board materials security: Strategic plans, M&A documentation, governance records—the most sensitive organisational information
  • Business continuity assurance: Recovery assets that guarantee operational resilience regardless of attack sophistication
  • Compliance evidence: Audit trails and documentation providing regulatory defence

The governance proposition: Firevault is a board-level decision, not an IT decision. It represents a commitment to protecting critical assets through architecture, not hope. It provides evidence that can be presented to regulators, insurers, and courts. It is duty of care made tangible.

12. Next Step: Governance Assessment

The next step is to evaluate offline secure storage as a governance control:

For Managing Directors and Board Executives:

  • Risk exposure assessment: What data would cause existential damage if breached? Where is it now? Who can reach it?
  • Governance gap analysis: Can the board verify that critical assets are protected? What evidence would be available post-breach?
  • Liability exposure review: What are the personal liability implications if current controls fail? Does D&O coverage depend on control adequacy?
  • Regulatory alignment check: Are current controls adequate for SEC, GDPR, DORA, NIS2 requirements? Can compliance be demonstrated?

Request:

  • Board-level briefing on offline secure storage as governance control
  • Risk and liability assessment mapped to your organisation
  • Demonstration of physical protection for non-technical directors

About the author

Mark Fermor

Mark Fermor

Director & Co-Founder

The driving force behind Firevault's market presence, combining commercial vision with deep tech insight.

Share this article

Guides30 July 20259 min read

Buyer's Guide: MDs and Board Executives

A board-level guide to cyber governance and personal accountability. Learn how offline secure storage provides the demonstrable, auditable protection that directors need to fulfil their fiduciary duties.

Buyer's Guide: MDs and Board Executives
Mark Fermor
Published by Mark Fermor, Director & Co-Founder
    Get started

    Your privacy matters

    We use cookies to keep the site running smoothly and to understand how you use it. You are in control. Privacy Charter · Cookie Policy