Security Disclaimer: Security guidance provided by AICyberNav is informational only — not legal counsel or regulatory guarantee. Findings labeled [SEEK EXPERT ADVICE] require professional consultation from qualified security professionals. [SEEK EXPERT ADVICE] from a licensed insurance broker for any binding coverage decisions.
AICyberNav is an AI-powered cybersecurity assessment platform. Artificial intelligence is central to our Service. This AI Use Policy explains how we use AI, what safeguards we have in place, how we handle your data in the context of AI processing, and our commitments to transparency and responsible AI use.
AI is integrated into the following core functions of the AICyberNav platform:
Our AI-powered intake system conducts interactive conversations to gather information about your organization's technology stack, security practices, business operations, and risk profile. The AI asks targeted follow-up questions to build a comprehensive understanding of your security posture.
Based on the information collected during intake, our AI generates security assessments that include threat identification, vulnerability analysis, risk scoring, and prioritized recommendations. The AI cross-references your inputs against known threat databases, the OWASP LLM Top 10, and industry-standard security frameworks.
The AI compiles assessment findings into structured, actionable reports. These reports include executive summaries, detailed findings, remediation roadmaps, vendor evaluations, and insurance readiness analyses. Each report is generated specifically for your organization based on the data you provide.
The AI evaluates your security posture in the context of cyber insurance requirements, identifying coverage gaps and readiness factors that may affect your insurability and premium rates.
Model Provider: AICyberNav currently uses OpenAI models accessed through a secure proxy infrastructure. We do not run AI models directly on our servers.
Secure Proxy: All communications between our platform and the AI model provider are routed through an encrypted proxy that ensures data isolation, request logging, and access control. Your data never flows directly from your browser to the model provider.
Model Selection: We select and configure models specifically for cybersecurity assessment tasks. Model versions are tested and validated before deployment to ensure assessment quality and consistency.
We take the following measures to protect your data during AI processing:
To help you assess the reliability and confidence of AI-generated content, all assessment outputs use the following labeling system:
[VERIFIED] Information that has been cross-referenced against authoritative sources such as the National Vulnerability Database (NVD), OWASP publications, vendor security advisories, or established security frameworks. Verified items include specific CVE references, published vulnerability data, and facts from recognized industry standards.
[ESTIMATE] Analysis, scores, or projections generated by the AI based on the information you provided and general cybersecurity knowledge. Estimates include risk scores, likelihood assessments, cost projections, and prioritization rankings. These are informed approximations, not precise measurements.
[SEEK EXPERT ADVICE] Recommendations or findings where the AI has identified significant complexity, legal implications, regulatory requirements, or potential for high-impact consequences. These items require review by a qualified human professional (security consultant, attorney, compliance officer) before action is taken.
These labels are themselves generated by the AI and should be treated as guidance, not guarantees. When in doubt about the reliability of any output, seek independent professional verification.
AI models can generate plausible-sounding but factually incorrect information ("hallucinations"). We implement the following measures to minimize this risk:
While our assessments are AI-generated, human oversight is built into our process:
We are committed to transparency about our use of AI:
All reports and assessments generated by AICyberNav include the following attribution:
This assessment was generated by AICyberNav using artificial intelligence. AI-generated content should be independently verified before use in critical security, legal, or regulatory decisions. See aicybernav.ai/ai-policy for details.
We may update this AI Use Policy as our AI capabilities evolve and as industry best practices develop. We will notify you of material changes by updating the effective date and posting the revised policy on this page. For significant changes affecting data handling or AI model providers, we will provide advance notice via email.
If you have questions about our AI practices, want to report an inaccuracy in an AI-generated output, or would like to request a human review of your assessment, please contact us:
AICyberNav (a KCENAV property)
Email: ai@aicybernav.ai