Human Vulnerability Scanner

Uncovering Hidden Vulnerabilities Traditional Tools Overlook

Transforming the human element of security through evidence-based behavioural interventions

Executive Summary

Privci is a research‑driven platform — the Human Vulnerability Scanner — designed to address the human element of cybersecurity at a deeper, more scientific level. Instead of treating security as a training problem, Privci focuses on sustainable behavioural change through targeted, evidence‑based interventions.

Our approach combines behavioural science, psychology, and AI to uncover the trust, fatigue, pressure, and everyday context that quietly shape how employees make decisions — long before those decisions are exploited.

The Scanner enables organisations to identify:

Dominant behavioural patterns across users and teams
Pressures influencing security‑related decisions
Normalised behaviours forming over time
Behavioural routes to compromise that attackers could exploit

The Scanner

Our methodology is operationalised through a structured, cyclical framework called APIR (Assess, Personalise, Intervene, Reassess), creating a continuous feedback loop that strengthens security behaviour over time.

1
Assess

Continuous synthesis of behavioural signals, organisational policies, and threat intelligence to build dynamic behavioural profiles.

2
Personalise

Advanced behavioural modelling across individual and archetype layers to enable context‑aware risk assessment.

3
Intervene

Targeted interventions selected from 10 specialised Direct Interventions, powered by an AI‑driven reasoning layer.

4
Reassess

Ongoing evaluation using reinforcement learning to refine intervention strategies for each behavioural profile.

Continuous Feedback Loop

The Training Agent

The central component of Privci operates continuously in the background, using lightweight, browser‑based agents to observe and measure how employees respond to real, contemporary cyber threats.

For employees, the experience is simple. It runs directly in the browser — with no software to install and no disruption to daily work. The agent is fast to deploy, easy to scale, and non‑intrusive, presenting itself as a personal assistant rather than a security control. It provides guidance, reminders, and support in context.

A user with the report stats as an example
Users see a personalised dashboard that helps them understand their own habits, reinforces good decisions, and makes secure behaviour easier rather than burdensome.
Overview of Privci’s browser‑based training agents

Behavioural Intelligence

Archetype Distribution

The scan provides a clear behavioural map of your organisation, both at an individual and team level. This visibility into dominant archetypes and normalised behaviours makes it clear where attention is needed and why risk manifests the way it does.

Dominant Archetype

Why risk manifests the way it does

Overconfident
92%
of users
Trust Bias
2.8 / 10
Fatigue
5.7 / 10
Env Pressure
1.0 / 10
Busy Browser
1.7 / 10
HVI
Human Vulnerability Index

Measures individual susceptibility to security threats

TEI
Threat Exposure Index

Quantitative organisational exposure to specific threats

DA
Dominant Archetype

Primary behavioural pattern that explains why user exhibits certain habits

BRC
Behavioural Risk Context

Contextual factors identified as influencing user's behaviour

Compromise Routes

Beyond organisational mapping, the Scanner identifies realistic routes to compromise – step‑by‑step attacker pathways that exploit observed behavioural patterns. This shows exactly how an attacker could chain seemingly minor behaviours into a full‑scale breach, and where intervention is most effective.

Example: Social Engineering Route

Impersonation of IT Credential reset Internal access Ransomware

This route — identical to the M&S and Co‑op attacks — is flagged when the Scanner detects users likely to bypass verification or trust unsolicited contact. It doesn’t just identify who is at risk; it shows the exact path an attacker would take.

Multi‑step Pathways

Each route includes actors, methods, and potential business impact – from credential theft to data exfiltration.

Behaviour‑Driven

Routes are generated dynamically based on actual observed behaviours, not hypothetical threat models.

Targeted Controls

Understanding the exact sequence enables precise interventions at each vulnerable point, stopping attacks before they succeed.

Interventions

Our interventions are grounded in the COM‑B model of behaviour change, enabling us to understand a user's Capability, Opportunity, and Motivation—the three essential components for sustainable behavioural change.

Capability

Do users have the knowledge and skills required?

+

Opportunity

Does their environment make it easy (or even possible) to do it?

+

Motivation

Do they want to do it, and do they see the value in doing it?

Behaviour Change

Users consistently adopt secure cybersecurity practices.

Capability

The psychological and physical ability to engage in secure behaviour. Includes knowledge, skills, and understanding of security protocols.

Training Interventions
Just-in-Time Guidance
Opportunity

External factors that make secure behaviour possible. Includes organisational policies, tools, and environmental cues that support security practices.

Policy Alignment
Environmental Restructuring
Motivation

Brain processes that energise and direct behaviour. Includes both reflective (planned) and automatic (habitual) motivation for security practices.

Incentives & Rewards
Social Comparison

The Privci Engines

Our comprehensive platform combines five specialised engines to address the full spectrum of human cybersecurity risk.

1
Policy Keeper

Transforms internal security policies into actionable guidance and training resources

2
Awareness Engine

Multi-layered training across three streams with real-time correction and gamified learning

3
Change Engine

Transforms behavioural data into targeted interventions using COM‑B model

4
Phish Aware

Dedicated phishing‑resilience module with 800+ templates and gamified challenges

5
Business Watch

Digital footprint analysis with real‑time enforcement and dark web monitoring

Policy Keeper

Transforms internal security policies into actionable guidance with 120+ customisable templates. Centralised Policy Hub with real-time tracking and audit‑ready evidence.

ROI: Automates manual processes, reduces administrative overhead by 60%, ensures complete accountability.

Awareness Engine

Multi-layered training across Baseline, CyberSkills, and Policy Training streams with real-time correction and gamified learning.

ROI: Reduces repeat violations by 67%, cuts training costs by 45%, meets mandatory compliance requirements.

Change Engine

Transforms behavioural data into targeted interventions using COM‑B model. Includes Behaviour Change with 10 Direct Interventions.

ROI: Moves from "training delivered" to "risk reduced," prevents incidents before escalation.

Phish Aware

Dedicated phishing‑resilience module with 800+ templates, Live Template Suggestions, and gamified Phish Challenge.

ROI: Reduces successful phishing attacks by 85%, meets PCI DSS, HIPAA, ISO 27001 requirements.

Business Watch

Digital footprint analysis with Exposure Scan, Data Guard (real‑time enforcement), and Dark Web Search for leaked credentials.

ROI: Identifies Shadow IT risks, prevents browser‑based data leakage, provides early credential breach detection.

ROI Analysis & Financial Impact

Privci delivers measurable financial returns through reduced incidents, lower training costs, and improved operational efficiency.

Quantifiable Benefits

67%
Lower incident response costs
54%
Increase in secure decision‑making
73%
Improvement in security culture
100%
Compliance alignment

Cost-Benefit Analysis (Sample 500-person organisation)

Metric Before Privci After Privci Improvement
Human‑caused Security Incidents 24 6 -75%
Average Cost per Incident $15,000 $7,500 -50%
Annual Training & Awareness Spend $50,000 $27,500 -45%
Policy & Compliance Admin Time 120 hours/month 48 hours/month -60%
Productivity Lost to Security Friction 10 hours/employee/year 4 hours/employee/year -60%

Compliance Framework Alignment

Privci aligns with established cybersecurity frameworks and regulations, ensuring comprehensive coverage of human‑factor security considerations.

NIST CSF

Privci supports the human‑centric elements of the NIST CSF across the core functions:

Identify (ID.AM, ID.GV, ID.RA)
Protect (PR.AT)
Detect (DE.CM)
Respond (RS.CO)
Recover (RC.IM)
ISO 27001

Privci supports the human‑factor requirements within Annex A, particularly:

A.6 – People Controls
A.7 – Physical Controls (Human Interaction)
A.8 – Technological Controls (User Behaviour)
CIS Controls

Privci directly supports the human‑centric controls within CIS:

Control 14 – Security Awareness & Skills Training
Control 17 – Incident Response Management (Human Behaviour)
Control 7 – Email & Browser Protections (Human Interaction)