Skip to content

Security Program Reporting

5 automated security scanners


Purpose: The Resource Allocation Misrepresentation Scanner is designed to analyze organizational disclosures and press releases to detect changes in headcount reporting, shifts in role definitions, and reallocation of responsibilities. This tool helps identify potential misrepresentations that could indicate improper resource management or accountability issues.

What It Detects:

  • Headcount Reporting Changes: Identifies mentions of significant changes in employee numbers without clear justification and discrepancies between reported headcounts and actual organizational structures.
  • Role Definition Shifts: Looks for changes in job titles, responsibilities, or departmental roles that may not align with previous disclosures and flags instances where new roles are introduced without proper context or explanation.
  • Responsibility Reallocation: Identifies shifts in who is responsible for specific tasks or departments and detects vague statements about responsibility changes without clear accountability.
  • Linguistic Patterns Indicating Misrepresentation: Uses regex patterns to identify linguistic cues that may indicate misrepresentation, such as passive voice and minimization language.
  • Unexplained Organizational Changes: Flags unexplained organizational restructuring or reallocation of resources and detects instances where changes are mentioned but not adequately explained in public disclosures.

Inputs Required:

  • domain (string): Primary domain to analyze (e.g., acme.com)
  • company_name (string): Company name for statement searching (e.g., “Acme Corporation”)

Business Impact: This scanner is crucial for organizations looking to ensure accurate and transparent reporting of their human resources, which directly impacts financial disclosures, legal compliance, and stakeholder trust. Misrepresentations in resource allocation can lead to misappropriation of funds, non-compliance with regulations, and loss of investor confidence.

Risk Levels:

  • Critical: Severe misrepresentations that could mislead stakeholders or regulatory bodies significantly, potentially leading to legal consequences or material financial impact.
  • High: Misrepresentations that may cause significant confusion or misunderstanding among stakeholders without direct legal implications but still indicative of potential governance issues.
  • Medium: Moderate risk of misrepresentation that might require further investigation or clarification from the organization.
  • Low: Minimal risk, possibly informational findings indicating minor discrepancies in reporting that do not significantly impact trust or compliance.
  • Info: Generally informative findings that provide insights into routine adjustments rather than critical issues.

Example Findings:

  1. “The company recently announced a significant increase in headcount without providing clear justification for such a drastic change, raising concerns about potential misrepresentation of financial performance.”
  2. “A new role titled ‘Chief Risk Officer’ was introduced with vague responsibilities listed, suggesting possible misrepresentation of organizational structure and decision-making authority.”

Purpose: The Control Effectiveness Misrepresentation Scanner is designed to analyze breach disclosure language in order to detect test scope limitations, selective testing, and limited validation. This tool identifies linguistic patterns that may indicate organizations are not fully transparent about the extent of their security testing and validation efforts.

What It Detects:

  • Test Scope Limitations: Identifies statements indicating a narrow or incomplete test scope, such as “We conducted tests on a limited number of systems.”
  • Selective Testing Patterns: Detects language suggesting that only certain aspects were tested, potentially omitting critical areas, like “No evidence of unauthorized access was found in the tested environments.”
  • Limited Validation Efforts: Looks for phrases indicating minimal or superficial validation processes, such as “Out of an abundance of caution, we are conducting further validation.”
  • Blame Deflection Patterns: Identifies attempts to shift blame to external factors rather than acknowledging internal issues, such as “The breach was caused by a sophisticated nation-state actor.”
  • Passive Voice and Vagueness: Detects the use of passive voice constructions that avoid direct accountability, like “Systems were accessed during the incident.”

Inputs Required:

  • domain (string): Primary domain to analyze (e.g., acme.com) - This input is crucial for searching company sites to gather breach disclosure statements.
  • company_name (string): Company name for statement searching (e.g., “Acme Corporation”) - This helps in identifying relevant language specific to the organization.

Business Impact: Understanding the full scope of security testing and validation efforts is critical for assessing risk accurately and implementing appropriate mitigation strategies. Misrepresentation in this area can lead to underestimation of actual risks, inadequate resource allocation, and potentially compromised security posture.

Risk Levels:

  • Critical: Conditions where there are clear indications of misrepresentation that could significantly impact the understanding of testing scope or validation efforts, leading to critical security implications.
  • High: Situations where partial or selective disclosure suggests a high risk area that needs immediate attention to avoid potential severe breaches.
  • Medium: Where disclosures hint at incomplete testing but do not fully reveal the extent of issues, requiring further investigation and potentially remedial actions.
  • Low: Findings indicating minimal misrepresentation that does not significantly affect overall security posture but may indicate areas for improvement in transparency and disclosure practices.
  • Info: Informational findings about inconclusive tests or where no clear evidence of misrepresentation is found, serving as a baseline for understanding the typical performance of the scanner.

Example Findings:

  • “We conducted tests on a limited number of systems.” - Indicates that the test scope was not comprehensive.
  • “Out of an abundance of caution, we are conducting further validation.” - Suggests limitations in validation efforts and potential underestimation of risks.

This scanner is essential for organizations aiming to be transparent about their security practices and for stakeholders requiring clear, accurate information about risk assessments.


Purpose: The Budget Utilization Distortion Scanner is designed to analyze and detect potential financial irregularities in company disclosures related to cybersecurity spending. It aims to identify shifts in categorization, cost allocation, budget padding, misallocation of resources, and other financial reporting inconsistencies that may indicate misallocation or misrepresentation of funds intended for security operations.

What It Detects:

  • Categorization Shift Detection: Identify changes in how security expenses are categorized, including shifting from IT infrastructure to consulting services or introducing new categories without clear justification.
  • Cost Allocation Anomalies: Analyze cost allocation methods and detect inconsistencies over time, particularly sudden increases in spending on specific vendors or services without corresponding improvements in security posture.
  • Budget Padding Indicators: Detect unusually high or disproportionate spending on non-core security activities that may suggest budget padding.
  • Misallocation of Resources: Identify underfunding in critical areas such as threat detection and response, or overfunding in non-critical areas that do not contribute significantly to overall security posture.
  • Financial Reporting Irregularities: Detect discrepancies between reported security spending and actual financial statements, particularly inconsistencies in how security costs are presented across annual reports and press releases.

Inputs Required:

  • domain (string): The primary domain of the company being analyzed, such as “acme.com”.
  • company_name (string): The name of the company for searching financial disclosure statements, e.g., “Acme Corporation”.

Business Impact: This scanner is crucial for maintaining transparency and integrity in corporate financial reporting, ensuring that cybersecurity spending aligns with strategic priorities and contributes effectively to overall security posture. It helps stakeholders understand whether reported expenditures are reflective of actual resource allocation and effectiveness.

Risk Levels:

  • Critical: Conditions where there are significant discrepancies between allocated and spent security budgets, potentially masking other critical areas or misrepresenting financial health.
  • High: Sudden spikes in security spending without clear justification that could indicate budget padding or hidden costs.
  • Medium: Inconsistencies in how security expenses are categorized or presented in annual reports that may suggest lack of transparency or strategic misalignment.
  • Low: Minor discrepancies in security spending that do not significantly impact financial reporting integrity but still warrant attention for clarity and accuracy.
  • Info: Routine categorization changes or minor cost allocation adjustments that do not raise immediate concerns but are important for ongoing monitoring and strategy refinement.

Example Findings:

  1. A company consistently allocates security expenses under the “Consulting Services” category, but recently shifted to a more ambiguous “Professional Fees” category without clear rationale.
  2. A firm reports significant spending on cybersecurity consultants annually despite minimal reported improvements in network security posture or documented risk assessments.
  3. An organization overfunds its “Marketing and Public Relations” budget with funds intended for core cybersecurity initiatives, indicating potential misallocation of resources.
  4. A company’s financial disclosures show a disproportionate increase in spending on cybersecurity audits without corresponding enhancements in compliance or threat mitigation capabilities.
  5. Inconsistencies between the detailed breakdown of security expenses provided in annual reports and the broader financial statements that suggest possible budget padding or hidden costs.


Purpose: The Audit Finding Manipulation Scanner is designed to analyze breach disclosure language and detect various patterns that may indicate organizations are manipulating their security disclosures. This includes identifying linguistic cues such as blame deflection, passive voice usage, minimization of impact, third-party blames, and employee scapegoating.

What It Detects:

  • Blame Deflection Patterns:

    • Nation-state actor claims without evidence (e.g., “nation[- ]?state(?:\s+actor)?”).
    • State-sponsored attacks (e.g., “state[- ]?sponsored”).
    • Highly sophisticated attacks (e.g., “highly?\s+sophisticated”).
    • Unprecedented levels of breaches (e.g., “unprecedented(?:\s+level)?”).
    • Zero-day exploits without CVE details (e.g., “zero[- ]?day”).
  • Passive Voice Usage:

    • Systems were accessed (e.g., “was\s+accessed”).
    • Data were compromised (e.g., “were\s+compromised”).
    • Information was obtained (e.g., “was\s+obtained”).
    • Determinations have been made (e.g., “has\s+been\s+determined”).
  • Minimization of Impact:

    • Limited number of affected individuals (e.g., “limited\s+number\s+of”).
    • No evidence of broader impact (e.g., “no\s+evidence\s+of”).
    • Abundance of caution statements (e.g., “out\s+of\s+(?:an\s+)?abundance\s+of\s+caution”).
    • Potentially affected users (e.g., “potentially\s+affected”).
  • Third-Party Blame Patterns:

    • Vendor/partner responsibility shifting.
    • Supply chain attack framing.
    • Managed service provider blame.
    • Contractor/consultant scapegoating.
    • Outsourcing as primary explanation.
  • Employee Scapegoating:

    • Rogue employee or insider framing.
    • Individual termination announcements.
    • Lack of systemic control failure acknowledgment.
    • HR action emphasis over security gaps.
    • Isolated incident framing.

Inputs Required:

  • domain (string): Primary domain to analyze (e.g., acme.com).
  • company_name (string): Company name for statement searching (e.g., “Acme Corporation”).

Business Impact: This scanner is crucial as it helps in identifying and mitigating the risk of organizations manipulating their security disclosures to downplay the severity or extent of incidents, which can lead to misinformation and ineffective decision-making regarding cybersecurity strategies and investments.

Risk Levels:

  • Critical: Conditions that directly impact critical systems or involve highly sophisticated and potentially state-sponsored attacks without evidence are considered critical.
  • High: Conditions involving widespread data compromise, significant third-party involvement, or manipulation of historical comparisons are considered high risk.
  • Medium: Conditions involving limited but still impactful breaches or passive voice usage in disclosures are considered medium risk.
  • Low: Informational findings that do not significantly impact security posture but may indicate potential issues warranting attention are categorized as low risk.
  • Info: Any conditions that merely suggest potential vulnerabilities without concrete evidence of compromise or manipulation are considered informational.

Example Findings:

  • “The company claims a data breach occurred, but the disclosure lacks specific details and does not align with typical indicators of such an event.”
  • “Statements attribute the incident to a rogue insider despite no clear evidence linking this individual to the breach.”

Purpose: The Project Status Manipulation Scanner is designed to analyze breach disclosure language in order to detect manipulative tactics such as milestone definition changes, success criteria shifts, and selective reporting. These practices can obscure the true state of a project’s security posture and mislead stakeholders by providing false impressions about progress and stability.

What It Detects:

  • Milestone Definition Changes: Identifies alterations in previously announced milestones or timelines that may indicate delays or issues not being fully disclosed.
  • Success Criteria Shifts: Identifies modifications to the criteria used to define project success, which could mask underlying problems by introducing new metrics after setbacks or failures.
  • Selective Reporting: Analyzes press releases and disclosures for selective reporting of positive outcomes, potentially omitting critical information about negative developments.
  • Blame Deflection Patterns: Detects language that deflects blame to external actors, vendors, or employees using specific regex patterns indicative of common deflection tactics.
  • Passive Voice and Vagueness: Identifies the use of passive voice constructions to avoid direct accountability and vague language that obscures responsibility or causality, suggesting minimized impact or selective disclosure.

Inputs Required:

  • domain (string): The primary domain to analyze, such as acme.com, which helps in identifying relevant breach disclosure statements on the company’s website.
  • company_name (string): The name of the company for searching and referencing specific breach disclosure statements related to the organization.

Business Impact: This scanner is crucial for assessing the transparency and integrity of project status disclosures, ensuring that stakeholders receive accurate information about a project’s security posture and progress. Misleading or manipulative practices can significantly impact stakeholder trust and decision-making processes in critical infrastructure projects.

Risk Levels:

  • Critical: Conditions where there are significant discrepancies between planned milestones and actual reported progress, with no clear communication of delays or issues.
  • High: Modifications to success criteria that do not align with typical project management practices, potentially masking underlying problems such as technical failures or security breaches.
  • Medium: Selective reporting of positive outcomes without adequate disclosure of negative developments, leading to incomplete understanding of the project’s status.
  • Low: Minimal use of passive voice and vague language, indicating a generally transparent communication strategy regarding project risks and challenges.
  • Info: Informal or minimal changes in milestone definitions or success criteria with clear explanations provided for adjustments made during the course of the project.

Example Findings:

{
"blame_deflection": [
{
"statement": "We were compromised by a highly sophisticated nation-state actor.",
"pattern": "highly?\\s+sophisticated",
"source": "https://acme.com/security-incident"
}
],
"passive_voice": [
{
"statement": "The systems were accessed without authorization.",
"pattern": "were\\s+accessed",
"source": "https://acme.com/data-breach"
}
]
}