Human risk.
Finally measured.

Three dimensions converge into one score. That's the hologram.

External
What attackers see from the outside.
Internal
What your systems reveal from within.
Simulated
How your people perform under real attack.
Scroll to explore
The Problem

The Industry Measures Everything Except The People

The data tells a story the market doesn't want to hear.

74%
Breaches involve humans
Verizon DBIR 2024
76
Security tools per enterprise
Panaseer 2022
0
Measure human risk holistically
Industry analysis

The Checkbox Reality

"My current SAT program is embarrassing. We send fake phishing emails, people click or don't click, we generate a report, nothing changes."

— CISO, 15-year security veteran

"This is checkbox compliance. Everyone knows it. We accept it because there hasn't been a better alternative that's auditable."

— VP, Cybersecurity Audit Practice (SOC 2, PCI-DSS, GLBA)

The Market Knows It's Broken

"Every CISO hates their SAT program. It's compliance theater."

— CISO persona research

"KnowBe4 is stale, Proofpoint SAT is an afterthought."

— Venture Capitalist, cybersecurity focus

"My KnowBe4 renewal is coming up. I'm already frustrated. That's a displacement sale, not a new budget sale."

— CEO

The Threat Evolved

Training didn't.

"When I asked KnowBe4 about deepfake simulations, they said it was 'on the roadmap.' That was 18 months ago."

— CISO

"Deepfake vishing, AI spear phishing — these are 2024-2026 problems that legacy SAT vendors are completely unequipped to handle."

— Venture Capitalist

What CISOs face in 2025 — What legacy SAT can't simulate:

📞Vishing (voice phishing)
📱Smishing (SMS phishing)
🎭Deepfake attacks
🔗Multi-stage social engineering
🔔MFA fatigue attacks
📷QR code phishing

The Measurement Gap

"Here's a dirty secret: Security awareness training completion rates tell us almost nothing about actual risk. A company with 100% completion on KnowBe4 can still have 40% phish-click rates."

— Cyber Insurance Underwriter

"Human risk is the biggest blind spot in our cyber risk portfolio. When the board asks 'what's our exposure to social engineering attacks?' I give qualitative answers. That's not risk management. That's hand-waving."

— Chief Risk Officer

The Insurance Parallel

"Human risk is currently a questionnaire checkbox. 'Do you have security awareness training? Y/N' — That's like asking 'Do you have income?' instead of measuring creditworthiness."

— Strategic analysis

Silos everywhere: email sees inbox, identity sees logins, SAT sees completion.

Attackers synthesize everything about a person.

Defenders don't.

There's a pattern here that the industry is missing.

The Approach

Three Dimensions. One Score.

A hologram requires multiple light sources to create depth. Human risk measurement is no different.

🌐
External

What attackers see

🔐
Internal

How people behave

🎯
Simulated

How they perform

🌐
Dimension 1

External

What attackers see when they look at your people from the outside.

  • OSINT exposure (social media, public records)
  • Dark web breach data
  • Credential exposure in dumps
  • Social engineering attack surface

The pen-tester's view.

🔐
Dimension 2

Internal

How your people actually behave inside your systems every day.

  • Login patterns and anomalies
  • Access behavior baselines
  • Identity threat indicators
  • Privilege usage patterns

The behavioral view.

🎯
Dimension 3

Simulated

How your people perform when tested against real attack patterns.

  • Response to defanged real threats
  • Skills-based competency verification
  • Multi-vector simulation results
  • Behavioral change over time

The proof.

External (OSINT)
Internal (Behavior)
Simulated (Training)
One Unified Score

Just like a hologram needs multiple light sources to create a 3D image, human risk measurement needs multiple data dimensions to create depth.

Flat Image vs. Hologram

Current State

Four Tools, Four Flat Images

  • Email security sees the inbox
  • Identity sees logins
  • SAT sees completion rates
  • OSINT sees exposure

No correlation. No unified view. No depth.

The Hologram

Three Dimensions, One Score

  • External exposure weighted by role criticality
  • Behavioral patterns correlated with risk
  • Simulation performance against real threats
  • Unified score drives policy automatically

The measurement becomes the defense.

A Score Everyone Can Use

CISOs
Automate security controls
CROs
Quantify human risk
Boards
Govern with data
Insurers
Price policies accurately
Auditors
Verify with a number
About

Built by Someone Who's Been on Both Sides

This isn't theoretical. It's personal.

CISSPCISAGSNAGPENHCISPPSSAPPragmatic InstituteStrategyzer

The Origin

I've spent years on the offensive side — penetration testing, social engineering assessments, watching how easily humans become the entry point. I've crafted the phishing emails. I've made the vishing calls. I've seen the moment someone clicks.

And I've watched what happens after. The shame. The fear. The "how could I be so stupid" spiral — when the truth is, they were targeted by someone who spent hours studying them.

That's when I realized: defenders deserve to see what attackers see.

The people protecting organizations are flying blind. They have email logs, identity alerts, training completion rates — but no unified view of who's actually at risk and why. Meanwhile, attackers are synthesizing LinkedIn profiles, breach databases, org charts, and behavioral patterns into targeted campaigns.

The asymmetry is the problem. This is my attempt to fix it. 🥃

Background

Security Practitioner

I've done the work, not just studied the theory.

CISSPCISAGSNAGPENHCISPPSSAP

Penetration testing. Social engineering. Security architecture. Healthcare security. Audit and compliance.

Product Strategist

Security expertise without product thinking is just a feature list.

Pragmatic InstituteStrategyzer

Market sensing. Jobs-to-be-done. Business model design. Value proposition canvas. Go-to-market strategy.

Business Foundation

BS Business Administration — Marketing, with concentrations in Insurance and Law. I understand how buyers buy, how risk gets priced, and how deals get done.

The Synthesis

Security practitioner + Product strategist + Business foundation = Someone who can see the full picture.

The Point

This isn't someone who watched a YouTube video about cybersecurity and decided to build a product.

This is someone who's lived it — on both sides — and sees a gap that needs to be filled.

Human Risk Measurement · © 2025 Hologram AI🥃

Want to see how this becomes the industry standard?

Request the Strategic Brief — the framework, the FICO parallel, and why this requires incumbent infrastructure.

We'll review your request and follow up within 24 hours.