Skip to content

Executive Security Messaging

5 automated security scanners


Purpose: This scanner is designed to detect potential misrepresentations in a company’s executive security messaging regarding investment in cybersecurity. It aims to uncover whether companies are inflating their commitment to security by making exaggerated claims about the size of their dedicated security teams, the scope of technology investments, or other related metrics. This analysis helps stakeholders understand the true level of engagement and expenditure on cybersecurity compared to promotional statements.

What It Detects:

  1. Exaggerated Team Size Claims: The scanner identifies when a company claims to have a much larger dedicated security team than what is actually evidenced by job postings or internal data.
  2. Vague Investment Claims: Companies are flagged for making broad, unquantifiable statements about cybersecurity investments without specifying details such as the amount invested in technology or specific enhancements.
  3. Inconsistent Budget-Team Size Ratios: The ratio of budgeted investment to the size of the security team is scrutinized to ensure that claims about large investments are supported by a commensurate number of personnel.

Inputs Required:

  1. Domain: The web address of the company’s main website, which serves as the primary source for evaluating its security messaging.
  2. Company Name: Used in conjunction with domain information to contextualize the evaluation within the broader business landscape and any related news or reports.

Business Impact: Misrepresentations in executive communications about cybersecurity investments can lead to overconfidence in a company’s security posture, potentially causing stakeholders to underestimate risks or overestimate the effectiveness of existing defenses. This misinformation could influence investment decisions that may not be aligned with actual capabilities and needs.

Risk Levels:

  • Critical: The scanner identifies significant discrepancies between claimed and actual cybersecurity investments that are likely to mislead critical decision makers such as investors, regulators, or strategic partners.
  • High: There is a clear overstatement of investment in security relative to the company’s operational capacity, which could be perceived as deceptive by market participants.
  • Medium: The scanner detects some exaggeration but does not reach the level of deception that would warrant a critical assessment, potentially signaling an area for improvement without severe consequences.
  • Low: Minimal or no evidence of misrepresentation in security investment claims, indicating a generally accurate portrayal of cybersecurity efforts within the company.
  • Info: Informal findings regarding minor discrepancies or vague statements that do not significantly impact trust but could be clarified for better transparency.

If the README doesn’t specify exact risk levels, infer them based on the scanner’s purpose and impact.

Example Findings:

  1. Acme Corporation claims to have a 200-person security team, yet job postings indicate only around 50 positions available in this area. The discrepancy suggests an overstatement of resources dedicated solely to security.
  2. Despite significant annual revenue, the company reports minimal investment in cybersecurity technology upgrades compared to industry benchmarks and internal data points suggest substantial underinvestment in digital defense capabilities.

Purpose: This scanner is designed to analyze and detect potential downplaying of security incidents in executive communications by examining the language used in incident disclosures. It aims to identify patterns that may suggest obfuscation or minimization of the severity of an event, which could be indicative of a broader vulnerability in the organization’s handling of critical information.

What It Detects:

  • Vague User Count Patterns: The scanner identifies statements that use vague language to describe the number of affected users, potentially downplaying the scope of the incident.
  • Percentage Indicators: Findings where percentages are used to express a small portion of total users, suggesting fewer impacts than might be implied by absolute numbers.
  • Absolute Counts: The scanner looks for specific numerical counts that could suggest higher numbers if expressed as a percentage or vague term.
  • Minimized Statements: Incidents described using terms like “only” or “minimally affected,” which may indicate a reduced perception of the incident’s seriousness.
  • Data Type Omission Indicators: The scanner flags mentions of data types that are not disclosed, suggesting potential omissions and obfuscation.
  • Passive Voice Usage: Incidents described in a passive voice can sometimes imply a lack of direct responsibility or proactive communication about the issue at hand.

Inputs Required:

  • <domain>: The target domain whose executive communications are to be analyzed.
  • <company_name>: The name of the company associated with the domain, used for context in analysis and reporting.

Business Impact: The accurate communication of security incidents is crucial as it directly impacts stakeholder trust, regulatory compliance, and potential legal repercussions. Misleading or obfuscated communications can lead to delayed response times, ineffective risk mitigation strategies, and a loss of credibility with both internal teams and external stakeholders.

Risk Levels:

  • Critical: If the scanner identifies multiple critical indicators (e.g., vague user counts consistently used across different disclosure channels), it would likely classify the risk as “critical.”
  • High: A high-risk level is indicated when there are significant indications of downplaying, such as a pattern of passive voice usage or substantial omissions in data type disclosures.
  • Medium: Medium risk might be assigned if patterns of obfuscation are detected but do not reach the threshold for criticality. It serves as a warning that further investigation and potentially more proactive measures are needed.
  • Low: A low risk level suggests minimal indications of downplaying, with no significant passive voice usage or substantial omissions found during analysis.
  • Info: This category is used for findings that do not necessarily indicate vulnerability but provide informational insights about the company’s communication practices around security incidents.

Example Findings:

  1. A disclosure stating “approximately 50,000 users were affected” could be flagged as a vague user count pattern if followed by further analysis suggesting this number is significantly lower than typical usage.
  2. If a data breach affecting sensitive customer information was described using passive voice and without clear timelines or consequences for impacted individuals, it would likely trigger a detection of potential obfuscation in the communication of the incident’s severity.

Purpose: The purpose of this scanner is to analyze and detect discrepancies in CEO security claims made through public messaging. It aims to identify if there are any inconsistencies between what is claimed and what is actually present, providing insights into the company’s commitment to data security.

What It Detects:

  1. Inconsistent Team Size Claims: The scanner identifies if the number of employees claimed for a dedicated security team significantly differs from estimates based on public information or LinkedIn profiles.
  2. Absolute Security Claims: It flags any claims that promise absolute protection against all threats, which are unrealistic and can be misleading.
  3. Technical Reality vs. Claims: The scanner checks how closely the technical capabilities of the company match what is claimed in terms of security headers and other technological measures.

Inputs Required:

  1. Domain: The web address of the company’s main website.
  2. Company Name: The official or recognizable name of the company.

Business Impact: This scanner is crucial as it helps stakeholders, including investors and customers, understand the reliability of a company’s claims about its security measures. Inaccurate or misleading statements can lead to loss of trust, potential financial losses, and increased risk for users’ data.

Risk Levels:

  • Critical: The scanner flags critical issues if there are significant discrepancies between claimed team sizes and actual estimates, or if the company makes unrealistic absolute security claims without any evidence to support it.
  • High: High severity is flagged when there are clear inconsistencies in technical capabilities compared to what is claimed, especially regarding data protection measures.
  • Medium: Medium risk levels are assigned when there are minor discrepancies that might indicate a lack of transparency or underestimation of risks.
  • Low: Low risk level findings are given for cases where the claims are plausible and aligned with available public information.
  • Info: Informational findings are provided to highlight areas where further investigation or verification could be beneficial, such as unverified certification claims.

Example Findings:

  1. The company claims a 200-person security team but LinkedIn estimates suggest only around 50 employees dedicated to cybersecurity.
  2. The CEO promises “unbreakable encryption” without any evidence of the technology’s effectiveness or independent audits.

This scanner plays a vital role in assessing corporate transparency and integrity, ensuring that public claims about data security are grounded in reality and not misleading.


Purpose: This scanner analyzes the credibility of a company’s executive security leadership by examining public announcements, breach disclosures, and communication patterns. It aims to assess the reliability and competence of individuals in charge of information security within an organization.

What It Detects:

  • Identifies key figures responsible for information security within the company.
  • Analyzes the duration of their tenure and any publicly disclosed breaches related to cybersecurity incidents.
  • Evaluates the technical depth and accuracy of public communications regarding cybersecurity measures.
  • Determines if there is a direct reporting relationship with the CEO or other executive leadership.
  • Assesses visibility within the organizational hierarchy, particularly in terms of influence on strategic decisions.

Inputs Required:

  • Domain: The internet domain name under investigation (e.g., “acme.com”).
  • Company Name: The legal name or recognizable brand of the company (e.g., “Acme Corporation”).

Business Impact: This analysis is crucial for understanding the robustness and trustworthiness of a company’s cybersecurity posture, which directly impacts its reputation, regulatory compliance, and potential liability in case of data breaches.

Risk Levels:

  • Critical: The scanner identifies significant security incidents that have significantly impacted public trust or operational capabilities.
  • High: The presence of multiple low-level issues that collectively undermine confidence in the company’s cybersecurity leadership.
  • Medium: A mix of minor credibility concerns and limited executive access, which could indicate a need for improved transparency and strategic direction.
  • Low: Minimal issues with no clear impact on overall security or trustworthiness.
  • Info: Informal communication that does not significantly affect the assessment but may warrant further monitoring.

Example Findings:

  • “Jane Smith’s appointment as Chief Information Security Officer is based on a recent announcement, indicating potential for change in leadership strategy.”
  • “Acme Corporation has disclosed multiple security incidents over the past year, raising concerns about ongoing cybersecurity challenges.”


Purpose: This scanner is designed to analyze and detect any exaggeration in a company’s security posture messaging by examining claims made about encryption, architecture, operational capabilities, and marketing buzzwords. It aims to uncover discrepancies between stated security measures and actual technical implementations, providing insights into potential misrepresentations of the organization’s security stance.

What It Detects:

  • Security Claims Not Matched by Implementation: The scanner identifies when claims about encryption (e.g., military-grade) are not supported by HTTPS implementation or other relevant security measures.
  • Architecture Claims Not Supported: It flags any architecture claims that cannot be substantiated with appropriate technical architectures, such as a lack of SSL/TLS certificates for secure communication.
  • Operational Capability Claims: The scanner checks the realism and supportability of operational capability claims like 24/7 SOC monitoring or real-time threat detection capabilities.
  • High Marketing Buzzword Usage: It evaluates the ratio of marketing buzzwords to technical terms, which can indicate a potential exaggeration in security messaging for promotional purposes.

Inputs Required:

  • <domain>: The target domain name (e.g., acme.com) whose security posture is being assessed.
  • <company_name>: The official or recognizable name of the company associated with the domain, used to contextualize the findings within the organization’s profile.

Business Impact: Misleading claims about a company’s security measures can significantly impact stakeholder trust and decision-making processes. Investors might base investment decisions on false impressions of risk mitigation, potentially leading to financial losses or reputational damage. Moreover, such misrepresentations undermine public confidence in the digital safety offered by companies.

Risk Levels:

  • Critical: When multiple high severity findings are present, indicating a severe lack of security maturity and potential exposure to critical threats.
  • High: When there is evidence of significant exaggeration or clear discrepancies between stated capabilities and actual technical implementation.
  • Medium: When the company’s messaging about security features is partially exaggerated or lacks substantial supporting evidence in its digital infrastructure.
  • Low: When findings are minimal, indicating a generally accurate portrayal of the company’s security posture without major inconsistencies.
  • Info: Used for minor discrepancies that do not significantly impact the overall risk assessment but should be addressed for continuous improvement.

If the README doesn’t specify exact risk levels, infer them based on the scanner’s purpose and impact.

Example Findings:

  1. “Acme Corporation claims to offer military-grade encryption for all customer data, yet their website does not enforce HTTPS, indicating a potential misrepresentation of security capabilities.”
  2. “The company architecture suggests robust security measures, but lacks SSL/TLS certificates on critical pages, leading to an unsupported claim about its defense-in-depth architecture.”