Human Vulnerability Scanner

Uncovering Hidden Vulnerabilities Traditional Tools Overlook

Transforming the human element of security through evidence-based behavioural interventions

Executive Summary

Privci is a research‑driven platform — the Human Vulnerability Scanner — designed to address the human element of cybersecurity at a deeper, more scientific level. Instead of treating security as a training problem, Privci focuses on sustainable behavioural change through targeted, evidence‑based interventions.

Our approach combines behavioural science, psychology, and AI to uncover the trust, fatigue, pressure, and everyday context that quietly shape how employees make decisions — long before those decisions are exploited.

The Scanner enables organisations to identify:

Dominant behavioural patterns across users and teams
Pressures influencing security‑related decisions
Normalised behaviours forming over time
Behavioural routes to compromise that attackers could exploit

The Scanner

Our methodology is operationalised through a structured, cyclical framework called APIR (Assess, Personalise, Intervene, Reassess), creating a continuous feedback loop that strengthens security behaviour over time.

1
Assess

Continuous synthesis of behavioural signals, organisational policies, and threat intelligence to build dynamic behavioural profiles.

2
Personalise

Advanced behavioural modelling across individual and archetype layers to enable context‑aware risk assessment.

3
Intervene

Targeted interventions selected from 10 specialised Direct Interventions, powered by an AI‑driven reasoning layer.

4
Reassess

Ongoing evaluation using reinforcement learning to refine intervention strategies for each behavioural profile.

Continuous Feedback Loop

The Training Agent

The central component of Privci operates continuously in the background, using lightweight, browser‑based agents to observe and measure how employees respond to real, contemporary cyber threats.

For employees, the experience is simple. It runs directly in the browser — with no software to install and no disruption to daily work. The agent is fast to deploy, easy to scale, and non‑intrusive, presenting itself as a personal assistant rather than a security control. It provides guidance, reminders, and support in context.

A user with the report stats as an example
Users see a personalised dashboard that helps them understand their own habits, reinforces good decisions, and makes secure behaviour easier rather than burdensome.
Overview of Privci’s browser‑based training agents

Behavioural Intelligence

Archetype Distribution

The scan provides a clear behavioural map of your organisation, both at an individual and team level. This visibility into dominant archetypes and normalised behaviours makes it clear where attention is needed and why risk manifests the way it does.

Dominant Archetype

Why risk manifests the way it does

Overconfident
92%
of users
Trust Bias
2.8 / 10
Fatigue
5.7 / 10
Env Pressure
1.0 / 10
Busy Browser
1.7 / 10
HVI
Human Vulnerability Index

Measures individual susceptibility to security threats

TEI
Threat Exposure Index

Quantitative organisational exposure to specific threats

DA
Dominant Archetype

Primary behavioural pattern that explains why user exhibits certain habits

BRC
Behavioural Risk Context

Contextual factors identified as influencing user's behaviour

Compromise Routes

Beyond organisational mapping, the Scanner identifies realistic routes to compromise – step‑by‑step attacker pathways that exploit observed behavioural patterns. This shows exactly how an attacker could chain seemingly minor behaviours into a full‑scale breach, and where intervention is most effective.

Example: Social Engineering Route

Impersonation of IT Credential reset Internal access Ransomware

This route — identical to the M&S and Co‑op attacks — is flagged when the Scanner detects users likely to bypass verification or trust unsolicited contact. It doesn’t just identify who is at risk; it shows the exact path an attacker would take.

Multi‑step Pathways

Each route includes actors, methods, and potential business impact – from credential theft to data exfiltration.

Behaviour‑Driven

Routes are generated dynamically based on actual observed behaviours, not hypothetical threat models.

Targeted Controls

Understanding the exact sequence enables precise interventions at each vulnerable point, stopping attacks before they succeed.

Interventions

Our interventions are grounded in the COM‑B model of behaviour change, enabling us to understand a user's Capability, Opportunity, and Motivation—the three essential components for sustainable behavioural change.

Capability

Do users have the knowledge and skills required?

+

Opportunity

Does their environment make it easy (or even possible) to do it?

+

Motivation

Do they want to do it, and do they see the value in doing it?

Behaviour Change

Users consistently adopt secure cybersecurity practices.

Capability

The psychological and physical ability to engage in secure behaviour. Includes knowledge, skills, and understanding of security protocols.

Training Interventions
Just-in-Time Guidance
Opportunity

External factors that make secure behaviour possible. Includes organisational policies, tools, and environmental cues that support security practices.

Policy Alignment
Environmental Restructuring
Motivation

Brain processes that energise and direct behaviour. Includes both reflective (planned) and automatic (habitual) motivation for security practices.

Incentives & Rewards
Social Comparison

The Privci Engines

Our platform brings together six specialised engines that work in unison to cover the full spectrum of human risk, forming a continuous, adaptive defence system.

1
Policy Keeper

Transforms internal security policies into actionable guidance and training resources

2
Awareness Engine

Multi-layered training across three streams with real-time correction and gamified learning

3
Change Engine

Transforms behavioural data into targeted interventions using COM‑B model

4
Phish Aware

Dedicated phishing‑resilience module with 800+ templates and gamified challenges

5
Business Watch

Digital footprint analysis with real‑time enforcement and dark web monitoring

6
Compliance Engine

Auto‑maps human‑behaviour & admin evidence to 7 frameworks

Policy Keeper

Transforms internal security policies into actionable guidance with 120+ customisable templates. Centralised Policy Hub with real-time tracking and audit‑ready evidence.

ROI: Automates manual processes, reduces administrative overhead by 60%, ensures complete accountability.

Awareness Engine

Multi-layered training across Baseline, CyberSkills, and Policy Training streams with real-time correction and gamified learning.

ROI: Reduces repeat violations by 67%, cuts training costs by 45%, meets mandatory compliance requirements.

Change Engine

Transforms behavioural data into targeted interventions using COM‑B model. Includes Behaviour Change with 10 Direct Interventions.

ROI: Moves from "training delivered" to "risk reduced," prevents incidents before escalation.

Phish Aware

Dedicated phishing‑resilience module with 800+ templates, Live Template Suggestions, and gamified Phish Challenge.

ROI: Reduces successful phishing attacks by 85%, meets PCI DSS, HIPAA, ISO 27001 requirements.

Business Watch

Digital footprint analysis powered by Exposure Scan, Data Geofencing, Browser‑Based DLP, Data Guard (real‑time enforcement), and Dark Web Search for leaked credentials.

ROI: Identifies Shadow IT risks, prevents browser‑based data leakage, provides early credential breach detection.

Compliance Engine

Automatically gathers, structures, and maps human‑behaviour and administrative evidence across 7 major frameworks — SOC 2, HIPAA, ISO 27001, NIST CSF, PCI DSS, Cyber Essentials+, and GDPR.

ROI: Delivers instant audit‑ready evidence out of the box, reduces manual effort by up to 80%, accelerates audit readiness, and significantly lowers external consulting costs.

ROI Analysis & Financial Impact

Privci delivers measurable financial returns through reduced incidents, lower training costs, improved operational efficiency, and dramatically faster audit preparation. The Compliance Engine alone cuts manual evidence gathering by up to 80% and provides instant, auditor‑ready compliance packages across seven frameworks.

Quantifiable Benefits

67%
Lower incident response costs
54%
Increase in secure decision‑making
73%
Improvement in security culture
100%
Framework alignment – every control mapped
80%
Reduction in audit evidence gathering time

Cost-Benefit Analysis (Sample 500-person organisation)

Metric Before Privci After Privci Improvement
Human‑caused Security Incidents 24 6 -75%
Average Cost per Incident $15,000 $7,500 -50%
Annual Training & Awareness Spend $50,000 $27,500 -45%
Policy & Compliance Admin Time 120 hours/month 48 hours/month -60%
Productivity Lost to Security Friction 10 hours/employee/year 4 hours/employee/year -60%
Audit Evidence Preparation Time 80 hours/audit 16 hours/audit -80%

Compliance Framework Alignment

Privci automatically maps human‑behaviour and administrative evidence to major international standards. The Compliance Engine provides up to 50% of required control evidence out‑of‑the‑box, with clear gap disclosure for the remaining technical controls.

SOC 2

Strong support for policy communication, human‑risk assessment, behavioural monitoring, and control activities (Common Criteria).

CC1 – Control Environment
CC2 – Communication & Information
CC4 – Monitoring Activities
CC5 – Control Activities
HIPAA

Administrative safeguards are thoroughly addressed, including policy management, workforce training, risk analysis, and incident plan documentation.

Administrative Safeguards
Security Awareness & Training
Incident Response Planning
ISO 27001

Extensive coverage of organisational and people controls (Annex A.5 & A.6), with browser‑level data protection and incident early‑warning signals.

A.5 – Organisational Controls
A.6 – People Controls
A.8 – Technological Controls (User Behaviour)
NIST CSF 2.0

Strong in awareness & training, human behaviour monitoring, policy management, and browser‑level data security across all six Functions.

GOVERN – Policy & Risk
PROTECT – Awareness & Training
DETECT – Continuous Monitoring
PCI DSS v4.0

Excels in policy management, security awareness, acceptable use enforcement, phishing testing, and user‑activity monitoring.

Req. 12 – Policy & Awareness
Req. 7‑8 – Access & Authentication
Req. 10‑11 – Logging & Testing
Cyber Essentials+

Policy management, user awareness training, and behavioural monitoring fully covered; technical controls (firewalls, secure config, patching) must be provided externally.

User Awareness & Policy Governance
Access Control (Policy & Training)
Phishing Awareness & Detection
GDPR

Accountability documentation, staff awareness, organisational security measures, browser DLP & geofencing, and early‑warning breach detection.

Art. 32 – Security of Processing
Art. 33‑34 – Breach Detection & Notification
Art. 25 – Data Protection by Design