Skip to content

Team Cognitive Resilience

5 automated security scanners


Purpose: The Cognitive Diversity Gaps Scanner is designed to identify and assess potential cognitive biases within a company’s security documentation and policies. It aims to detect thought pattern homogeneity, analysis approach limitations, perspective blindness, policy inconsistencies, and lack of expert diversity, which can lead to inadequate risk assessments and response strategies.

What It Detects:

  • Thought Pattern Homogeneity: Identifies repetitive language and phrases in security documents, indicating a limited range of vocabulary used across multiple sections or documents.
  • Analysis Approach Limitations: Looks for a narrow range of methodologies mentioned in incident response plans, suggesting the lack of diverse analytical tools and techniques.
  • Perspective Blindness: Identifies gaps in considering different stakeholder perspectives (employees, customers, attackers), indicating one-sided viewpoints or lack of multidisciplinary input.
  • Policy Consistency: Evaluates consistency across security policies and procedures, flagging contradictions or inconsistencies that may indicate cognitive rigidity.
  • Expert Diversity: Checks for the involvement of diverse experts in policy development and review, detecting a lack of cross-functional collaboration in security initiatives.

Inputs Required:

  • domain (string): The primary domain to analyze, such as “acme.com,” which helps in identifying relevant documentation and policies.
  • company_name (string): The company name for statement searching, e.g., “Acme Corporation,” used to contextualize the analysis within the organization’s broader security framework.

Business Impact: This scanner is crucial as it helps organizations identify potential cognitive biases that could lead to inadequate risk assessments and response strategies. By detecting homogeneity in thought patterns, limitations in analytical approaches, one-sided perspectives, policy inconsistencies, and lack of expert diversity, the scanner contributes significantly to enhancing the overall security posture and resilience against potential threats.

Risk Levels:

  • Critical: Conditions that could lead to severe vulnerabilities or significant compliance issues with strict regulatory requirements.
  • High: Conditions that may result in substantial risks to data integrity, operational continuity, or asset safety.
  • Medium: Conditions that might impact the effectiveness of security measures and require immediate attention for improvement.
  • Low: Informal findings indicating minor deviations from best practices but not necessarily impacting critical security aspects.
  • Info: General recommendations for continuous improvement in documentation and processes to enhance overall security posture.

Example Findings:

  • “The company’s incident response plan predominantly mentions traditional red team methodologies without discussing newer, more innovative approaches like threat modeling.”
  • “Security policies across different departments are inconsistent, suggesting a lack of cross-functional collaboration and potential cognitive rigidity in decision-making processes.”


Purpose: The Burnout Trajectory Analysis Scanner is designed to identify early signs of burnout within a company by analyzing internal documentation, policy reviews, and manual evaluations. This tool helps in identifying performance decline patterns, engagement deterioration, and effectiveness decay among team members, which can lead to decreased productivity and increased risk.

What It Detects:

  • Performance Decline Indicators:
    • Test for phrases indicating reduced output or quality (“performance declined”, “output dropped”)
    • Check for mentions of missed deadlines or project delays (“missed deadline”, “project delay”)
    • Verify reports of decreased efficiency (“less efficient”, “slower performance”)
  • Engagement Deterioration Patterns:
    • Test for signs of disengagement (“disengaged”, “lack of engagement”)
    • Check for comments on reduced participation in meetings or activities (“fewer meetings”, “reduced participation”)
    • Verify reports of decreased morale (“morale is low”, “team spirit is down”)
  • Effectiveness Decay Indicators:
    • Test for phrases indicating reduced effectiveness (“less effective”, “ineffective performance”)
    • Check for mentions of increased errors or mistakes (“more errors”, “higher mistake rate”)
    • Verify reports of declining quality in deliverables (“quality has dropped”, “lower quality work”)
  • Policy Compliance Issues:
    • Test for policy violations or non-compliance (“policy violation”, “non-compliance with policies”)
    • Check for mentions of inadequate training or resources (“lack of training”, “insufficient resources”)
    • Verify reports of outdated procedures (“outdated procedures”, “old protocols”)
  • Manual Evaluation Findings:
    • Test for qualitative assessments indicating burnout (“burnout is evident”, “signs of burnout observed”)
    • Check for comments on increased absenteeism or tardiness (“more absent”, “frequent tardiness”)
    • Verify reports of high turnover rates (“high turnover”, “many employees leaving”)

Inputs Required:

  • domain (string): Primary domain to analyze (e.g., acme.com)
  • company_name (string): Company name for statement searching (e.g., “Acme Corporation”)

Business Impact: Identifying early signs of burnout can lead to proactive interventions that prevent significant productivity loss, employee dissatisfaction, and potential legal issues associated with poor workplace conditions. This is crucial for maintaining a healthy organizational culture and ensuring long-term business sustainability.

Risk Levels:

  • Critical: Conditions where there are clear indicators of severe performance decline, high levels of disengagement, or substantial policy non-compliance that could lead to immediate negative impacts on the company’s operations.
  • High: Situations where burnout is evident through manual evaluation findings and significant deterioration in engagement and effectiveness metrics.
  • Medium: Issues related to minor compliance violations or subtle changes in performance indicators that might require further investigation but do not pose an immediate threat.
  • Low: Informal observations of slight inefficiencies or minor policy non-compliance, which are generally manageable with standard HR practices and training.
  • Info: Routine checks for general company documentation consistency and compliance with internal policies, providing a baseline understanding of the organizational health.

Example Findings:

  • “Recent reports indicate a significant decline in project completion times, suggesting potential burnout among team members.”
  • “Multiple instances of policy violations have been noted across different departments, indicating possible non-compliance and need for review.”

Purpose: The Team Rotation Impact Scanner is designed to identify potential risks associated with shift handovers, knowledge transfer gaps, and coverage inconsistencies within teams. By ensuring that all critical information is documented and transferred during shifts, the scanner aims to enhance operational resilience and reduce the risk of security breaches due to inadequate transition processes.

What It Detects:

  • Shift Handover Documentation: The scanner checks for the presence and completeness of documented handover procedures, verifying whether critical information is included in these documents. Any missing or incomplete documentation is flagged as a potential issue.
  • Knowledge Transfer Processes: The scanner identifies formal knowledge transfer sessions or meetings, evaluates their frequency and effectiveness, and detects any gaps in the knowledge transfer activities.
  • Coverage Consistency: It assesses coverage during shift changes to ensure no critical roles are left unattended, verifies adequate overlap between outgoing and incoming team members, and flags periods with potential coverage gaps.
  • Training and Onboarding: The scanner looks for evidence of regular training sessions for new team members and checks if onboarding processes include security protocols and best practices. Any deficiencies in the training regimen are flagged as concerns.
  • Incident Reporting During Handovers: The scanner identifies instances where incidents occurred during or immediately after handovers, evaluates the response to these incidents, and flags recurring issues related to handover periods.

Inputs Required:

  • domain (string): Primary domain to analyze (e.g., acme.com). This input is crucial for scanning the company’s website to gather relevant information about team rotation and handover practices.
  • company_name (string): Company name for statement searching (e.g., “Acme Corporation”). This helps in identifying specific documents or policies related to team rotations and handovers within the organization.

Business Impact: Ensuring that critical information is documented, transferred, and maintained during shift changes directly impacts the security posture of a company by reducing the likelihood of knowledge gaps and operational disruptions. Proper documentation and training are essential for maintaining a secure and efficient work environment.

Risk Levels:

  • Critical: Severe deficiencies in handover documentation or critical roles left unattended can lead to immediate risks such as unauthorized access, data breaches, or security incidents.
  • High: Inadequate knowledge transfer processes or gaps in coverage during shifts can result in significant operational disruptions and potential exposure of sensitive information.
  • Medium: Minor deficiencies in training or incomplete handover documentation might not directly impact security but could contribute to long-term inefficiencies and potential risks if left unaddressed.
  • Low: Informational findings, while not critical, still highlight areas for improvement that could be addressed through enhanced training or better documentation practices.
  • Info: These are generally non-critical observations about the status quo that might suggest room for optimization in processes or communication strategies.

Example Findings:

  • “Incomplete handover documents were found during our scan of the /handover-procedures section of the Acme Corporation website, indicating a potential risk for knowledge gaps.”
  • “The frequency of knowledge transfer sessions was below recommended standards as per our scanner analysis; it is suggested to increase these meetings to ensure continuous learning and adaptation within the team.”


Purpose: The Crisis_Response_Stamina Scanner evaluates an organization’s capability to handle prolonged security incidents by analyzing its security documentation, policies, and compliance certifications. This assessment helps in understanding the preparedness of a company for extended emergency response scenarios.

What It Detects:

  • Security Policy Indicators: Identifies comprehensive security policies, incident response procedures, data protection measures, and robust access control mechanisms.
  • Maturity Indicators: Looks for compliance with SOC 2 certifications, adherence to ISO 27001 standards, penetration testing activities, and vulnerability scanning and assessment practices.
  • Public Policy Pages: Analyzes publicly available policy documents for relevant security information, mentions of incident response strategies, and data protection policies on public pages.
  • Trust Center Information: Reviews trust center content for security disclosures, emergency response plans mentioned in the trust center, and verifies recovery time objectives (RTO) and recovery point objectives (RPO).
  • Compliance Certifications: Searches for compliance certifications related to security and incident handling, validating the presence of SOC 2 or ISO 27001 certifications, and checking for other relevant compliance standards.

Inputs Required:

  • domain (string): Primary domain to analyze (e.g., acme.com)
  • company_name (string): Company name for statement searching (e.g., “Acme Corporation”)

Business Impact: This scanner is crucial as it helps in assessing the readiness of an organization to handle prolonged security incidents, which can directly impact data integrity, compliance with regulatory standards, and overall business continuity.

Risk Levels:

  • Critical: The presence of incomplete or non-existent security policies, lack of incident response procedures, inadequate data protection measures, and poor access control mechanisms are critical risks that this scanner identifies.
  • High: Compliance issues such as missing SOC 2 or ISO 27001 certifications, insufficient penetration testing, and vulnerability assessments can be identified at the high risk level.
  • Medium: Medium risk findings include partial compliance with security standards, mention of incident response strategies but no detailed procedures, and some data protection policies that are not fully robust.
  • Low: Informational findings such as minor discrepancies in compliance certifications or mentions of recovery objectives can be identified at the low risk level.
  • Info: These are less severe findings indicating minimal deviations from standard security practices.

Example Findings:

  1. The scanner identifies that Acme Corporation lacks a comprehensive data protection policy, posing a high risk as it could lead to unauthorized access and potential data breaches.
  2. A critical finding for XYZ Corp is the absence of any incident response procedures documented in their policies, which significantly impacts their ability to respond effectively to security incidents.

Purpose: The 24x7 SOC Degradation Scanner is designed to evaluate and assess the effectiveness of a company’s 24x7 Security Operations Center by examining publicly available security documentation, policies, and compliance certifications. This tool aims to identify gaps in continuous monitoring, incident response capabilities, and overall security maturity within the organization.

What It Detects:

  • Security Policy Indicators: The scanner checks for the presence of key security policy documents such as “security policy,” “incident response,” “data protection,” and “access control.”
  • Maturity Indicators: It identifies compliance certifications and maturity models like SOC 2, ISO 27001, penetration testing, and vulnerability scanning.
  • Public Policy Pages: The scanner analyzes public-facing policy pages for indicators of security practices and compliance standards.
  • Trust Center Information: Reviews trust center information to ensure transparency in security measures and incident response capabilities.
  • Compliance Certifications: Validates the presence and details of compliance certifications that demonstrate adherence to recognized security frameworks.

Inputs Required:

  • domain (string): Primary domain to analyze (e.g., acme.com)
  • company_name (string): Company name for statement searching (e.g., “Acme Corporation”)

Business Impact: Assessing the security posture of a company’s 24x7 SOC is crucial as it directly impacts the resilience and effectiveness of an organization’s security measures against potential threats and breaches. Identifying gaps in policies, procedures, and compliance certifications can lead to improved incident response times, enhanced data protection, and better access control practices, ultimately strengthening the overall security posture of the company.

Risk Levels:

  • Critical: The scanner would flag conditions where critical vulnerabilities exist that could lead to immediate system compromise or significant data loss.
  • High: High-risk findings include substantial gaps in security policies, missing compliance certifications, and inadequate incident response plans.
  • Medium: Medium-risk findings involve moderate deficiencies in security practices such as incomplete policy implementation or partial coverage of required compliance standards.
  • Low: Low-risk findings pertain to minor issues like outdated information within the documentation or minor discrepancies in compliance with recognized frameworks.
  • Info: Informational findings are those that provide general insights into the company’s security posture but do not pose immediate risks, such as presence of a well-documented and up-to-date privacy policy.

Example Findings:

  1. The company lacks a comprehensive “security policy” document, which could lead to inconsistencies in security practices across different departments.
  2. Inadequate compliance with ISO 27001 standards despite the presence of an ISO certification, indicating potential gaps in specific areas such as audit trail management or regular vulnerability assessments.