Privacy-First Approach: All calculations happen locally in your browser. No data is sent to external servers.
Scoring Methodology
This profiler combines three layers to generate your personalized threat profile:
1. Industry Baseline
Each industry has established threat levels based on historical breach data, threat actor targeting patterns, and regulatory exposure. These baselines are stable and reflect real-world threat intelligence.
2. Organization Context
Your organization size and geographic region modify the baseline. Smaller organizations may face different threat patterns than enterprises, and regional threat landscapes vary.
3. Tunable Controls
The five tuning sliders allow you to reflect your actual environment:
Internet-facing exposure: Increases intrusion and ransomware risk
Patch speed: Reduces exploit-driven attacks when high
Identity strength: Reduces credential theft and fraud
Vendor dependency: Increases supply chain and third-party risks
Threat paths are generated based on your highest risk categories combined with your tuning settings. They show the most likely attack scenarios for your specific profile.
Actionable Priorities
Priorities are prioritized based on your weakest controls and highest risk areas. Each recommendation includes a timeline to help you plan your security improvements.
Note: This is a threat profiling tool, not a comprehensive security assessment. For production deployments, integrate with live threat intelligence feeds and your organization's actual security data.
Data Sources & Attribution
Data Collection Period: January 2024 - October 2025
Last Updated: October 25, 2025
Primary Data Sources
MITRE ATT&CK Framework
Attack techniques, tactics, and threat actor profiles are mapped to the MITRE ATT&CK® knowledge base.