The executive profile shows an extensive analysis of your executives’ OSINT data, public accounts, and breaches. When you open an executive’s profile, you’re looking at the executive’s publicly discoverable, third-party footprint –– the same data an attacker would use to build a convincing pretext. This data can help you better understand the following questions
What can an attacker learn?
How could they use it?
What should you clean up, lock down, or monitor?
How to use this page
Start broad: Scan each tab for obvious high-impact exposure (media assets, addresses, credential incidents).
Go deep where it matters: Use the profile details to understand why something is risky and how it could be weaponized.
Turn it into action:
Use Vulnerabilities to prioritize what to fix first.
Use the Intelligence Report to brief leadership and drive strategic controls.
Why Executive Profiles Matter
Your executives are the highest-value targets for sophisticated cyberattacks. Threat actors actively search for publicly available information about leadership to craft convincing phishing campaigns, business email compromise (BEC) attacks, and social engineering schemes. An executive profile aggregates all publicly discoverable information about an individual, from social media posts and data breaches to property records and professional networks, to show you exactly what attackers can see and exploit.
This visibility allows your security team to:
Identify specific attack vectors before threat actors do
Prioritize remediation efforts based on severity and exploitability
Educate executives on their personal risk profile with concrete examples
Demonstrate real business impact of security awareness training
Reduce the attack surface through targeted privacy improvements
Understanding the Dashboard Section
At the top of the profile, you'll see:
Executive name and photo: You can upload or update the profile picture for internal reference
OSINT Vulnerabilities Detected: Shows how many of the 17 possible vulnerability categories apply to this person. The horizontal progress bar breaks down detected vulnerabilities by severity, and badge labels display each specific vulnerability found (e.g., "Phone Channel Risk," "Deepfake Risk").
OSINT Search Results: Shows the breadth of data collected
Distinct Datapoints Searched: How many different types of information we searched for (e.g., 457 represents our comprehensive scan coverage including all attribute types, platforms, and breach databases)
Distinct Datapoints Found: How many unique types of data were actually discovered (e.g., 39 means we found 39 distinct categories of information)
Below the Dashboard overview, you will find two tabs.
The Vulnerabilities tab shows the executive’s specific breaches and vulnerabilities, providing real-life examples of these vulnerabilities being exploited, examples of real attacks that the executive might see using their data, the exposed data points, and remediation strategies for suppressing these exposures.
The Intelligence Report provides a seamless way to view all data that was found during our OSINT scanning, organized by data points exposed in the Identity, Media, Location, Persona, Accounts, Professional Footprint, and Records categories.

