Using encryption and trustworthy cryptographic algorithms

How would I prepare a short management brief for technical and non-technical staff members on the subject of protecting information using encryption and trustworthy cryptographic algorithms?  I want to address non-repudiation and how the sources and contents of important documents can and should be authenticated using digital signatures and hashing.